• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۱۲۸ پاسخ غیر تکراری از ۱۳۰ پاسخ تکراری در مدت زمان ۱,۲۰ ثانیه یافت شد.

101. Security automation with Ansible 2 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Madhu Akula, Akash Mahajan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Information technology-- Automation.,Information technology-- Management.,Computer networks-- Security measures.,Information technology-- Management.

Classification :
T58
.
5

102. Security of Information and communication networks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kartalopoulos, Stamatios V.

Library: Library of Niroo Research Institue (Tehran)

Subject: ، Management information systems,، Knowledge management,، Computer network protocols,Security measures ، Computer networks

Classification :
T
58
.
6
.
K37
2009

103. Security risk management

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer networks ; Security measures. ; Risk assessment. ; Risk management. ;

Classification :

104. Security risk management :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Evan Wheeler.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Risk assessment.,Risk management.

Classification :

105. Security risk management : building an information security risk management program from the ground up

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Wheeler, Evan.

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: Security measures ، Computer networks,، Risk assessment,، Risk management

Classification :
TK
5105
.
59
.
W48
2011

106. Setting up an it security function

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Partida, Alberto.

Library: Central Library and Documents Center of Al-Zahra University (Tehran)

Subject: management ، Computer security,computer networks--securtiy measures. ، Business enterprises

Classification :
QA
76
.
9
.
A25
P35
2010

107. Social media security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Michael Cross ; technical editor, Rob Shimonski

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security,Online social networks-- Security measures,Risk management-- Social aspects,Social media-- Security measures

Classification :
HM742
.
C77
2014

108. Syngress IT security project management handboo

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Susan Snedaker

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer networks--Security measures--Handbooks, manuals, etc,Computer security--Management--Handbooks, manuals, etc

Classification :
QA
,
76
.
9
,.
A25
,
S655
,
2006eb

109. Syngress IT security project management handbook

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer networks ; Security measures ; Handbooks, manuals, etc. ; Computer security ; Management ; Handbooks, manuals, etc. ;

Classification :

110. The Executive guide to information security: threats, challenges, and solutions

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mark Egan with Tim Mather

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection

Classification :
HF
،
5548
.
32
،.
E325
،
2005

111. The art of enterprise information architecture :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mario Godinez [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Information technology-- Management.,Information technology-- Security measures.,Management information systems.,Business & Economics.,Business enterprises-- Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer Science.,Engineering & Applied Sciences.,Information technology-- Management.,Information technology-- Management.,Information technology-- Security measures.,Information technology-- Security measures.,Management information systems.,Management information systems.,Management Theory.,Management.

Classification :
HD30
.
2
.
A77
2010

112. The basics of information security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jason Andress.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Information resources management.

Classification :

113. The basics of information security : understanding the fundamentals of InfoSec in theory and practice

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Andress, Jason.

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Computer security,Security measures ، Computer networks,، Information resources management

Classification :
QA
76
.
9
.
A25
A5453
2011

114. The business case for network security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Catherine Paquet, Warren Saxe

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management

Classification :
TK5105
.
59
.
P37
2005

115. The business case for network security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Catherine Paquet, Warren Saxe

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management

Classification :
TK5105
.
59
.
P37
2005

116. Transactions on large-scale data- and knowledge-centered systems XXXVII /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Abdelkader Hameurlain, Roland Wagner.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Artificial intelligence.,Artificial intelligence.,Computer networks.,Computer science.,Computer security.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Operating Systems-- General.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data mining.,Data mining.,Network hardware.,Operating systems (Computers),Operating systems.,Software engineering.,Software Engineering.

Classification :
QA76
.
9
.
A25

117. Transactions on large-scale data- and knowledge-centered systems XXXVIII :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Abdelkader Hameurlain, Roland Wagner, Sven Hartmann, Hui Ma (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Computer networks-- Security measures.,Computer security.,Data mining.,Database management.

Classification :
QA76
.
9
.
A25

118. Transformational security awareness :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Perry Carpenter.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Operating Systems-- General.

Classification :
QA76
.
9
.
A25
C37
2019eb

119. Transforming cybersecurity using COBIT 5

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: [by ISACA].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises -- Computer networks -- Security measures.,COBIT (Information technology management standard),Computer security.

Classification :

120. Trust, Privacy and Security in Digital Business

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: \ Simone Fischer-Hübner, Costas Lambrinoudakis, Javier Lopez (eds.)

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Business enterprises -- Computer networks -- Security measures -- Congresses.,Computer security -- Management -- Congresses.,شرکت‌های اقتصادی -- شبکه‌های کامپیوتری -- تدابیر ایمنی -- کنگره ها, کامپیوترها -- ایمنی اطلاعات -- مدیریت -- کنگره ها

Classification :
QA76
.
9
.
A25
T7
2015
E-Book
,
  • »
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival