161. Novel framework to support information security audit in virtual environment
Author: Nagarle Shivashankarappa, A.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security ; Internet ; Security measures

164. Pharmaceutical and medical devices manufacturing computer systems validation /
Author: Orlando Lopez.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Medical instruments and apparatus-- Design.,Medical instruments and apparatus-- Quality control.,Pharmaceutical industry-- Data processing.,Computer Security.,Computer Systems.,Equipment and Supplies.,Technology, Pharmaceutical-- methods.,MEDICAL / Pharmacology,Medical instruments and apparatus-- Design.,Medical instruments and apparatus-- Quality control.,Pharmaceutical industry-- Data processing.
Classification :
RS122
.
2


165. Policies and research in identity management :
Author: Simone Fischer-Hübner, Elisabeth de Leeuw, Chris Mitchell (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
S566
2013


166. Principles of information security /
Author: Michael E. Whitman, Herbert J. Mattord
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security
Classification :
TK5105
.
59
.
W54
2012


167. Principles of information security /
Author: Michael E. Whitman, Ph. D., CISM, CISSP, Herbert J. Mattord, Ph. D., CISM, CISSP, Kennesaw State University.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.
Classification :
TK5105
.
59
.
W54
2018


168. Proceedings of The IFIP TC 11 23rd International Information Security Conference
Author: / edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer networks -- Security measures -- Congresses, Computers -- Access control -- Congresses, Computer security -- Congresses,Computer networks -- Access control -- Congresses,Data protection -- Congresses
Classification :
QA
76
.
9
.
A25I461
2008


169. Readings and Cases in Information Security
Author: / Michael E. Whitman, Herbert J. Mattord,Whitman, Michael E.
Library: Special Library of Law (Tehran)
Subject: Computer networks -- Moral and ethical aspects,Computers -- Access control,Computer networks -- Security measures,Computer security -- Case studies,Confidential communications -- Protection -- Case studies,Privacy, Right of,Information technology -- Law and legislation
Classification :
QA76
.
9
.
A25
W395
2011
,
DB6085


170. Responsive security
Author: Meng-Chow Kang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Data protection,Electronic data processing departments-- Security measures,Information technology-- Security measures,Risk management
Classification :
HF30
.
38
.
K38
2014


171. Risk, complexity and ICT /
Author: edited by Ole Hanseth and the late Claudio Ciborra.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Management information systems.,Risk management.,BUSINESS & ECONOMICS-- Information Management.,BUSINESS & ECONOMICS-- Knowledge Capital.,Computer networks-- Security measures.,Management information systems.,Risk management.
Classification :
T58
.
64
.
R57
2007eb


173. Secure ICT Service Provisioning for Cloud, Mobile and Beyond :
Author: Eberhard von Faber ; Wolfgang Behnsen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud Computing,Computer science.,Datensicherung
Classification :
TK5105
.
59
E247
2013


174. Security and trust management :
Author: Sokratis K. Katsikas, Cristina Alcaraz (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer programming-- software development.,Computer security.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Programming-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Information retrieval.,Information technology: general issues.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25
S76
2018


175. Security controls evaluation, testing, and assessment handbook /
Author: Leighton Johnson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Government policy-- United States,Electronic government information-- Security measures-- United States,Information technology-- Security measures-- United States,Information technology-- United States-- Management,Risk management-- Government policy-- United States
Classification :
QA76
.
9
.
A25


176. Security, privacy, and anonymity in computation, communication, and storage :
Author: Guojun Wang, Jinjun Chen, Laurence T. Yang (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25


177. Security, privacy and digital forensics in the cloud /
Author: edited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Digital forensic science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Digital forensic science.
Classification :
QA76
.
585
.
S43
2019


178. Software testing :
Author: Naresh Chauhan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer software -- Testing.,Logiciels -- Essais.
Classification :
QA76
.
76
.
T48
N374
2010


179. The art of enterprise information architecture :
Author: Mario Godinez [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Information technology-- Management.,Information technology-- Security measures.,Management information systems.,Business & Economics.,Business enterprises-- Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer Science.,Engineering & Applied Sciences.,Information technology-- Management.,Information technology-- Management.,Information technology-- Security measures.,Information technology-- Security measures.,Management information systems.,Management information systems.,Management Theory.,Management.
Classification :
HD30
.
2
.
A77
2010


180. <The> economic impacts of terrorist attacks /
Author: edited by Harry W. Richardson, Peter
Library: Library of Islamic Parliament (Tehran)
Subject:
