• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۱۲ پاسخ غیر تکراری از ۱۲ پاسخ تکراری در مدت زمان ۰,۵۵ ثانیه یافت شد.

1. Cyber war :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Richard A. Clarke and Robert K. Knake.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Cyberspace operations (Military science)-- United States.,Cyberterrorism-- United States-- Prevention.,Cyberterrorism-- United States.,Information warfare-- United States-- Prevention.,Information warfare-- United States.,Bekämpfung,Computer networks-- Security measures.,Computerkriminalität,Cyberspace operations (Military science),Cyberterrorism-- Prevention.,Cyberterrorism.,Cyberterrorism.,Information warfare-- Prevention.,Information warfare.,Informationskrigföring.,Internet,National security-- United States.,POLITICAL SCIENCE-- Political Freedom & Security-- International Security.,Sabotage-- United States-- Prevention.,Terrorism-- United States-- Prevention.,Terrorismus,United States.,USA, 7, 7

Classification :
HV6773
.
2
.
C57
2010

2. Digital security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ananda Mitra.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes, Juvenile literature.,Computer networks-- Security measures, Juvenile literature.,Computer security, Juvenile literature.,Cyberterrorism-- Prevention, Juvenile literature.,Internet-- Security measures, Juvenile literature.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Cyberterrorism.,Internet-- Security measures.,Computer crimes.,Computer crimes.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Cyberterrorism-- Prevention.,Internet-- Security measures.,Internet-- Security measures.

Classification :
HV6773
.
M58
2010

3. Implementing homeland security for enterprise IT

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Michael Erbschloe

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security,Internet- Security measures,Computer networks- Security measures,Cyberterrorism

Classification :
QA76
.
9
.
A25
,
E74
2004

4. Routledge companion to global cyber-security strategy /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Scott N. Romaniuk and Mary Manjikian.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention-- Government policy.,Computer networks-- Security measures-- Government policy.,Computer security-- Government policy.,Cyberspace-- Security measures-- Government policy.,Cyberterrorism-- Prevention-- Government policy.,Internet-- Security measures-- Government policy.,Computer networks-- Security measures-- Government policy,Computer security-- Government policy,COMPUTERS / Internet / Security,HISTORY / Military / Strategy,POLITICAL SCIENCE / Political Freedom & Security / International Security

Classification :
UA163
.
R68
2021

5. Securing the information infrastructur

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Joseph M. Kizza, Florence M. Kizza

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Cyberterrorism.,Internet--Security measures,Computer networks--Security measures,Information superhighway--Security measures

Classification :
HV
,
6773
,.
K59
,
2008eb

6. Securing the information infrastructure /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Joseph M. Kizza, Florence M. Kizza.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Cyberterrorism.,Information superhighway-- Security measures.,Internet-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computersicherheit,Cyberterrorism.,Datensicherung,Information superhighway-- Security measures.,Internet-- Security measures.,Internet.

Classification :
HV6773
.
K59
2008eb

7. Securing the information infrastructure

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kizza, Joseph Migga.

Library: Library of Niroo Research Institue (Tehran)

Subject: ، Cyberterrorism,Security measures ، Internet,Security measures ، Computer networks,Security measures ، Information superhighway

Classification :
HV
6773
.
K59
2008

8. Securing the information infrastructure

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Joseph M. Kizza, Florence M. Kizza.

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Cyberterrorism,Internet -- Security measures,Computer networks -- Security measures,Information superhighway -- Security

Classification :
HV
،
6773
،.
K59
،
2008

9. Securing the information infrastructure

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Joseph M. Kizza, Florence M. Kizza.

Library: Campus International Library of Kish University of Tehran (Hormozgan)

Subject: Cyberterrorism.,Internet--Security measures.,Computer networks--Security measures,Information superhighway--Security measures.

Classification :
HV
6773
.
K59
2008

10. Surviving cyberwar /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Richard Stiennon

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Civil defense-- United States,Computer networks-- Security measures-- United States,Cyberspace-- Security measures,Cyberterrorism-- United States-- Prevention,Information warfare-- United States

Classification :
U163
.
S73
2010

11. Toward a safer and more secure cyberspace /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism-- Prevention.

Classification :
QA76
.
9
.
A25
T695
2007eb

12. گام به گام با امنیت سایبری: راهبرد مدیران در امنیت اطلاعات

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / مولف دژان کوژتیچ,Steps to Cybersecurity The Managers Information Security Strategy Manual9

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: شبکه‌های کامپیوتری -- تدابیر ایمنی,Security measures -- Computer networks,فضای مجازی -- تدابیر ایمنی,Security measures -- Cyberspace,تکنولوژی اطلاعات -- تدابیر ایمنی,Security measures -- Information technology,اینترنت -- تدابیر ایمنی,Security measures -- Internet,تروریسم رایانه‌ای,Cyberterrorism

Classification :
TK
۵۱۰
/
۵
/
ک
۹
گ
۲ ۱۳۹۵
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival