21. Cisco security bible
Author: Rajesh Kumar Sharma
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Management ، Computer networks
Classification :
TK
5105
.
59
.
S47C5


22. Cisco security bible
Author: / Rajesh Kumar Sharma
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Computer networks- Security measures,Computer networks- Management
Classification :
TK5105
.
59
.
S52
2002


23. Computer Information Systems and Industrial Management
Author: \ Khalid Saeed, Władysław Homenda (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Congresses.,Computer networks -- Security measures -- Congresses.,Database management -- Congresses.,شبکه های کامپیوتری - کنگره ها.,شبکه های کامپیوتری - اقدامات امنیتی - کنگره ها,مدیریت پایگاه داده - کنگره ها
Classification :
QA
164
.
C657
2015
E-Book
,


24. Computer information systems and industrial management
Author: / Agostino Cortesi ... [et al.] (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks--Congresses,Computer networks--Security measures--Congresses,Database management--Congresses
Classification :
TK5105
.
5
.
I58
2012


25. Computer information systems and industrial management :
Author: Khalid Saeed, Rituparna Chaki, Agostino Cortesi, Sławomir Wierzchoń (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer networks, Congresses,Database management, Congresses
Classification :
TK5105
.
5
.
I58
2013


26. Cyber-security and global information assurance :
Author: Kenneth J. Knapp [editor].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Cyberspace-- Security measures.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
C918
2009eb


27. Data and Applications Security and Privacy XXIX
Author: \ Pierangela Samarati (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,Database management.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,پایگاههای اطلاعاتی -- مدیریت
Classification :
QA
76
.
9
.
A25D32
2015
E-Book
,


28. Data privacy
Author: Nataraj Venkataramanan and Ashwin Shriram.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Customer relations.,Data protection.,Management information systems-- Security measures.,Privacy, Right of.

29. Disaster recovery for LANs : a planning and action guide
Author: Bates, Regis J.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Local area networks )Computer networks( - Security measures - Planning , Disasters , Emergency management
Classification :
TK
5105
.
7
.
B38
1994


30. Disaster recovery for LANs : a planning and action guide
Author: Bates, Regis J.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Local area networks )Computer networks(-- Security measures-- Planning,، Disasters,، Emergency management
Classification :
TK
5105
.
7
.
B38
1994


31. Drift av lokalnettverk.English,Local area network management, design, and security
Author: Arne Mikalsen and Per Borgesen
Library: Central Library and Document Center of Shahid Madani University of Azarbayjan (East Azarbaijan)
Subject: Local area networks (Computer networks)- Management,Computer networks- Security measures
Classification :
TK
,
5105
.
7
,.
M535


32. Enterprise information systems assurance and system security
Author: / [edited by] Merrill Warkentin and Rayford Vaughn
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer security,Computer networks -- Security measures,Management information systems
Classification :
QA
76
.
9
.
A25
E5


33. Enterprise information systems assurance and system security
Author: / [edited by] Merrill Warkentin and Rayford Vaughn
Library: Library of Entrepreneurship (Tehran)
Subject: Computer security,Computer networks -- Security measures,Management information systems
Classification :
QA
76
.
9
.
A25
E545
2006


34. Enterprise information systems assurance and system security: managerial and technical issues
پدیدآورنده :
موضوع : ، Computer security,، Computer networks-- Security measures,، Management information systems
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
35. Enterprise information systems assurance and system security: managerial and technical issues
Author: / [edited by] Merrill Warkentin and Rayford Vaughn
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Computer networks,Management information systems,-- Security measures
Classification :
005
.
8
E61
2006


36. First IEEE International Workshop on Critical Infrastructure Protection: proceedings: IWCIP 2005, 3-4 November 2005, Darmstadt, Germany
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks-- Security measures,Prevention ، Cyberterrorism,Congresses ، Emergency management
Classification :
QA
76
.
9
.
A25
.
I339
2005


37. Guide to computer network security /
Author: Joseph Migga Kizza.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Business & Economics-- Information Management.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- System Administration-- Storage & Retrieval.,Data mining.,Information architecture.,Information retrieval.,Network hardware.
Classification :
TK5105
.
59


38. Handbook of e-business security /
Author: editors, João Manuel R.S. Tavares [and four others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Business enterprises-- Computer networks-- Security measures.,Computer security.
Classification :
HD30
.
38


39. Hands-on cybersecurity for finance :
Author: Dr. Erdal Ozkaya, Milad Aslaner.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Management.,Cyber intelligence (Computer security),Financial institutions-- Effect of technological innovations on.,Internet-- Security measures.,Cyber intelligence (Computer security),Financial institutions-- Effect of technological innovations on.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25


40. Hands-on security in DevOps :
Author: Tony Hsu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Information technology-- Management.,Computer networks-- Access control.,Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Information technology-- Management.
Classification :
HD30
.
2

