81. Information technology risk management in enterprise environments :
Author: Jake Kouns, Daniel Minoli.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.

82. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Ilam University Central Library (Ilam)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


83. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


84. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
658
.
478
K88i
2010


85. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Data protection.,Computer security.,Risk management.
Classification :
HF
,
5548
.
37
,.
K68
,
2010


86. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Farabi Faculty Library, University of Tehran (Qom)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF
5548
.
37
.
K68
2010


87. Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
Author: / Jake Kouns, Daniel Minoli
Library: Insurance Research Institute Library (Tehran)
Subject: Business enterprises --Computer networks --Security measures,Information technology --Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K6I5
2010


88. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
Author: / Jake Kouns, Daniel Minoli
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


89. Instant Netcat starter
Author: K.C. Yerrid
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data protection,TCP/IP (Computer network protocol)
Classification :
TK5105
.
59
.
Y47
2013


90. International CIIP handbook 2006 :
Author: Isabelle Abele-Wigert and Myriam Dunn ; series editors, Andreas Wenger and Victor Mauer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Government policy.,Data protection-- Government policy.,Information policy.,Information superhighway-- Government policy.,National security.,Security, International.,Computer networks-- Security measures-- Government policy.,Data protection-- Government policy.,Information policy.,Information superhighway-- Government policy.,National security.,Security, International.

91. Introduction to computer and network security :
Author: Richard R. Brooks, Clemson University, South Carolina, USA
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection
Classification :
QA76
.
9
.
A25
B7745
2014


92. Introduction to hardware security and trust
Author: Mohammad Tehranipoor
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Computer security,، Computer input-output equipment,، Data protection,Security measures ، Computer networks,Security measures ، Information technology,، Computer input-output equipment,Security measures ، Computer networks
Classification :
QA
76
.
9
.
I58


93. Kali Linux Cookbook - Second Edition.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
.
S385
2017eb


94. LAN times guide to security and data integrity
Author: Farley, Marc.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Local area networks )Computer networks( - Security measures , Computer security , Data protection
Classification :
TK
5105
.
59
.
F37
1996


95. LAN times guide to security and data integrity
Author: / Marc Farley, Tom Stearns, and Jeffrey Hsu
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Local area networks (Computer networks)- Security measures,Computer security,Data protection
Classification :
TK5105
.
59
.
F37
1996


96. Mastering network security /
Author: Chris Brenton
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data protection
Classification :
QA76
.
9
.
A25
B757
1998


97. Metasploit Penetration Testing Cookbook :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.
Classification :
QA76
.
9
.
A25
.
T459
2018eb


98. Netcat power tool
Author: / Jan Kanclirz Jr., technical editor
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data protection.,Computer networks--Security measures,TCP/IP (Computer network protocol)
Classification :
TK
,
5105
.
59
,.
N335
,
2008eb


99. Netcat power tools
Author: / Jan Kanclirz Jr., technical editor
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Data protection,TCP/IP (Computer network protocol)
Classification :
E-BOOK
