101. Security automation with Ansible 2 :
Author: Madhu Akula, Akash Mahajan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Information technology-- Automation.,Information technology-- Management.,Computer networks-- Security measures.,Information technology-- Management.
Classification :
T58
.
5


102. Security of Information and communication networks
Author: Kartalopoulos, Stamatios V.
Library: Library of Niroo Research Institue (Tehran)
Subject: ، Management information systems,، Knowledge management,، Computer network protocols,Security measures ، Computer networks
Classification :
T
58
.
6
.
K37
2009


103. Security risk management
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ; Risk assessment. ; Risk management. ;

104. Security risk management :
Author: Evan Wheeler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Risk assessment.,Risk management.

105. Security risk management : building an information security risk management program from the ground up
Author: Wheeler, Evan.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Computer networks,، Risk assessment,، Risk management
Classification :
TK
5105
.
59
.
W48
2011


106. Setting up an it security function
Author: Partida, Alberto.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: management ، Computer security,computer networks--securtiy measures. ، Business enterprises
Classification :
QA
76
.
9
.
A25
P35
2010


107. Social media security
Author: Michael Cross ; technical editor, Rob Shimonski
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Online social networks-- Security measures,Risk management-- Social aspects,Social media-- Security measures
Classification :
HM742
.
C77
2014


108. Syngress IT security project management handboo
Author: / Susan Snedaker
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Handbooks, manuals, etc,Computer security--Management--Handbooks, manuals, etc
Classification :
QA
,
76
.
9
,.
A25
,
S655
,
2006eb


109. Syngress IT security project management handbook
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Handbooks, manuals, etc. ; Computer security ; Management ; Handbooks, manuals, etc. ;

110. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


111. The art of enterprise information architecture :
Author: Mario Godinez [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Information technology-- Management.,Information technology-- Security measures.,Management information systems.,Business & Economics.,Business enterprises-- Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer Science.,Engineering & Applied Sciences.,Information technology-- Management.,Information technology-- Management.,Information technology-- Security measures.,Information technology-- Security measures.,Management information systems.,Management information systems.,Management Theory.,Management.
Classification :
HD30
.
2
.
A77
2010


112. The basics of information security
Author: Jason Andress.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Information resources management.

113. The basics of information security : understanding the fundamentals of InfoSec in theory and practice
Author: Andress, Jason.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,، Information resources management
Classification :
QA
76
.
9
.
A25
A5453
2011


114. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


115. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


116. Transactions on large-scale data- and knowledge-centered systems XXXVII /
Author: edited by Abdelkader Hameurlain, Roland Wagner.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Artificial intelligence.,Artificial intelligence.,Computer networks.,Computer science.,Computer security.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Operating Systems-- General.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data mining.,Data mining.,Network hardware.,Operating systems (Computers),Operating systems.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25


117. Transactions on large-scale data- and knowledge-centered systems XXXVIII :
Author: Abdelkader Hameurlain, Roland Wagner, Sven Hartmann, Hui Ma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Computer networks-- Security measures.,Computer security.,Data mining.,Database management.
Classification :
QA76
.
9
.
A25


118. Transformational security awareness :
Author: Perry Carpenter.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Operating Systems-- General.
Classification :
QA76
.
9
.
A25
C37
2019eb


119. Transforming cybersecurity using COBIT 5
Author: [by ISACA].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises -- Computer networks -- Security measures.,COBIT (Information technology management standard),Computer security.

120. Trust, Privacy and Security in Digital Business
Author: \ Simone Fischer-Hübner, Costas Lambrinoudakis, Javier Lopez (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Business enterprises -- Computer networks -- Security measures -- Congresses.,Computer security -- Management -- Congresses.,شرکتهای اقتصادی -- شبکههای کامپیوتری -- تدابیر ایمنی -- کنگره ها, کامپیوترها -- ایمنی اطلاعات -- مدیریت -- کنگره ها
Classification :
QA76
.
9
.
A25
T7
2015
E-Book
,

