1. ......................
Author: Pfleeger, Charles P.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Data protection,، Privacy, Right of
Classification :
QA
76
.
9
.
A25
P45
1997


2. A business guide to information security :
Author: Alan Calder
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures,Computer security,Data protection,Information resources management-- Security measures,Information technology-- Security measures
Classification :
QA76
.
9
.
A25
C34188
2005


3. A business guide to information security. how to protect your company's IT assets, reduce risks and understand the law
Author: Calder, Alan
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Information technology- Security measures,، Data protection,، Business- Data processing- Security measures
Classification :
QA
76
.
9
.
A25
C34188
2005


4. A practical guide to managing information securit
Author: / Steve Purser
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Management,Data protection.
Classification :
QA
,
76
.
9
,.
A25
,
P88
,
2004eb


5. A practical guide to managing information security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ; Data protection. ;

6. A practical guide to security engineering and information assurance
پدیدآورنده : Herrmann, Debra S
موضوع : ، Computer security,، Data protection
۳ نسخه از این کتاب در ۳ کتابخانه موجود است.
7. <A> practical guide to security engineering and information assurance
Author: Herrmann, Debra S.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,، Data protection
Classification :
QA
76
.
9
.
A25
H47


8. A practical guide to security engineering and information assurance
Author: Herrmann, Debra S.
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security ► Data protection
Classification :
H568p

9. A process for developing a common vocabulary in the information security area /
Author: edited by Jan von Knop, Alexey A. Salnikov, and Valeriy V. Yaschenko.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
N28
2007eb


10. ANTI HAKER TOOL KIT
Author: SHEMA,MICK
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، data Protection,، computer networks--security measurs
Classification :
TK
5105
.
59
S32


11. Accountability and Security in the Cloud
Author: \ Massimo Felici , Carmen Fernández-Gago (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Cloud computing -- Security measures -- Congresses.,Data protection -- Congresses,Data encryption (Computer science) -- Congresses.,محاسبات ابری -- تدابیر ایمنی -- کنگره ها ,حفاظت اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
585
.
A25
2015
E-Book
,


12. Advanced API Security :
Author: Prabath Siriwardena.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Security measures.,Computer security.,Computers, Special purpose.,Data protection.,Programming languages (Electronic computers)
Classification :
QA75
.
5-76
.
95


13. Advances in cryptology-- ASIACRYPT 2011 :
Author: edited by Dong Hoon Lee, Xiaoyun Wang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
.
I58
2011


14. Advances in cryptology-Asiacrypt'98 : International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October, 1998 : proceedings
Author: Kazuo Ohta, Dingyi Pei )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
1514


15. Advances in enterprise information technology security /
Author: Djamel Khadraoui, Francine Herrmann [editors]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Computer security,Data protection,Information technology-- Security measures
Classification :
HF5548
.
37
.
A38
2007


16. Advances in enterprise information technology security
Author: Djamel Khadraoui, Francine Herrmann ]editors[
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Business enterprises , Computer networks , Security measures,، Information technology , Security measures,، Computer security,، Data protection

17. Advances in information security and its application :third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009. proceedings
Author:
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: Congresses. ، Information technology--securithy measures,Congresses. ، Computer security,Congresses. ، Data protection
Classification :
QA
76
.
9
.
A25
I51
2009


18. Analyzing computer security
Author: Charles P. Pfleeger, Shari Lawrence Pfleeger
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Data protection
Classification :
QA76
.
9
.
A25
P4485
2011


19. Anti-Hacher tool kit
Author: / Mike shema, Bradley C. Johnson
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Data protection,Computer networks,-- Security measures
Classification :
005
.
8
S545A
2004


20. Anti-hacker tool kit
Author: / Keith J. Jones, Mike Shema, Bradley C. Johnson
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Data protection,Computer networks- Security measures
Classification :
TK5105
.
59
.
J65
2002

