• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۱۳۵ پاسخ غیر تکراری از ۱۳۶ پاسخ تکراری در مدت زمان ۰,۶۰ ثانیه یافت شد.

81. Information technology risk management in enterprise environments :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jake Kouns, Daniel Minoli.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.

Classification :

82. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Ilam University Central Library (Ilam)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K68
2010

83. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K68
2010

84. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Library and knowledge management of the management schools of Tehran University (Tehran)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
658
.
478
K88i
2010

85. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Data protection.,Computer security.,Risk management.

Classification :
HF
,
5548
.
37
,.
K68
,
2010

86. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Farabi Faculty Library, University of Tehran (Qom)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF
5548
.
37
.
K68
2010

87. Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Insurance Research Institute Library (Tehran)

Subject: Business enterprises --Computer networks --Security measures,Information technology --Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K6I5
2010

88. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Central library and document university of Kurdistan (Kurdistan)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K68
2010

89. Instant Netcat starter

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: K.C. Yerrid

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Data protection,TCP/IP (Computer network protocol)

Classification :
TK5105
.
59
.
Y47
2013

90. International CIIP handbook 2006 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Isabelle Abele-Wigert and Myriam Dunn ; series editors, Andreas Wenger and Victor Mauer.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Government policy.,Data protection-- Government policy.,Information policy.,Information superhighway-- Government policy.,National security.,Security, International.,Computer networks-- Security measures-- Government policy.,Data protection-- Government policy.,Information policy.,Information superhighway-- Government policy.,National security.,Security, International.

Classification :

91. Introduction to computer and network security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Richard R. Brooks, Clemson University, South Carolina, USA

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection

Classification :
QA76
.
9
.
A25
B7745
2014

92. Introduction to hardware security and trust

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mohammad Tehranipoor

Library: Central Library of Hamedan University of Technology (Hamedan)

Subject: ، Computer security,، Computer input-output equipment,، Data protection,Security measures ، Computer networks,Security measures ، Information technology,، Computer input-output equipment,Security measures ، Computer networks

Classification :
QA
76
.
9
.
I58

93. Kali Linux Cookbook - Second Edition.

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
.
S385
2017eb

94. LAN times guide to security and data integrity

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Farley, Marc.

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Local area networks )Computer networks( - Security measures , Computer security , Data protection

Classification :
TK
5105
.
59
.
F37
1996

95. LAN times guide to security and data integrity

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Marc Farley, Tom Stearns, and Jeffrey Hsu

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Local area networks (Computer networks)- Security measures,Computer security,Data protection

Classification :
TK5105
.
59
.
F37
1996

96. Mastering network security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Chris Brenton

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Data protection

Classification :
QA76
.
9
.
A25
B757
1998

97. Metasploit Penetration Testing Cookbook :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.

Classification :
QA76
.
9
.
A25
.
T459
2018eb

98. Netcat power tool

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jan Kanclirz Jr., technical editor

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Data protection.,Computer networks--Security measures,TCP/IP (Computer network protocol)

Classification :
TK
,
5105
.
59
,.
N335
,
2008eb

99. Netcat power tools

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jan Kanclirz Jr., technical editor

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks, Security measures,Data protection,TCP/IP (Computer network protocol)

Classification :
E-BOOK

100. Netcat power tools

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer networks ; Security measures. ; Data protection. ; TCP/IP (Computer network protocol) ;

Classification :
  • »
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival