461. Security planning & disaster recovery
Author: Maiwald, Eric
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Management ، Computer security,، Data protection,، Emergency management
Classification :
QA
76
.
9
.
A25
M315
2002


462. Security planning & disaster recovery
Author: / Eric Maiwald, William Sieglein
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management,Data protection,Emergency management
Classification :
QA76
.
9
.
A25
,
M315
2002


463. Security planning & disaster recovery /
Author: Eric Maiwald, William Sieglein.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management.,Data protection.,Emergency management.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Emergency management.
Classification :
QA76
.
9
.
A25
M315
2002eb


464. Security planning & disaster recovery
Author: / Eric Maiwald, William Sieglein
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Management,Data protection.,Emergency management.
Classification :
QA
,
76
.
9
,.
A25
,
M315
,
2002


465. Security, privacy, and anonymity in computation, communication, and storage :
Author: Guojun Wang, Jinjun Chen, Laurence T. Yang (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25


466. Security strategy
Author: / Bill Stackpole and Eric Oksendahl
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Information technology--Security measures,Data protection.,Business--Data processing--Security measures

467. Security strategy
Author: Bill Stackpole and Eric Oksendahl
Library: Library and Information Center of Ayatollah Imani of Salman Farsi University (Fars)
Subject: Computer security,Information technology, Security measures,Data protection,Business, Data processing, Security measures
Classification :
QA
76
,.
9
.
S78S4
2011


468. Security strategy : from requirements to reality
Author: Stackpole, Bill
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security ► Information technology- Security measures ► Data protection ► Business- Data processing Security measures
Classification :
S775s

469. Security strategy: <from requirements to reality>
Author: / Bill Stackpole and Eric Oksendahl
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Information technology,Data protection,Business,-- Security measures,-- Data processing -- Security measures
Classification :
005
.
8
S775S
2011


470. Security without obscurity :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data protection-- Standards.,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25


471. Simple computer security : disinfect your PC
Author: CA, with Eric Geier and Jim Geier
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data protection
Classification :
QA
76
.
9
.
A25G44


472. Simple computer security :disinfect your PC
Author: Eric Geier, Jim Geier
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Data protection
Classification :
QA
76
.
9
.
A25
G45
2007


473. SmartData
Author: Inman Harvey ... [et al.], editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Data protection
Classification :
QA76
.
9
.
A25
S63
2013


474. Solving Cyber Risk :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Insurance-- Risk Assessment & Management.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25
C577
2018


475. StorageSS '05 : proceedings of the 2005 ACM Workshop on Storage Security and Survivability, November 11, 2005, Fairfax, Virginia, USA )co-located with CCS 2005(
Author: William Yurcik, Larry Brumbaugh, & Yuanyuan Zhou, editors; sponsored by ACM Special Interest Group on Security, Audit & Control ) SIGSAC(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection
Classification :
QA
76
.
9
.
A25A367
2005


476. System Administration Ethics
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data protection. ; Business ethics. ; Computer security. ; Security. ;

477. Techniques and applications for advanced information privacy and securit
Author: / Hamid R. Nemati, [editor]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information technology--Security measures,Electronic commerce--Security measures,Computer security.,Data protection.
Classification :
HF
,
5548
.
37
,.
T43
,
2009


478. Techniques and applications for advanced information privacy and security :
Author: Hamid R. Nemati, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Electronic commerce-- Security measures.,Information technology-- Security measures.,Computer security.,Data protection.,Electronic commerce-- Security measures.,Information technology-- Security measures.
Classification :
HF5548
.
37
.
T43
2009


479. Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues
Author: ]edited by[ Hamid R. Nemati
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Electronic commerce,Security measures ، Information technology,، Computer security,، Data protection
Classification :
HF
5548
.
37
.
T43
2009


480. Techniques and applications of digital watermarking and content protection
Author: / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Digital watermarking,Data protection
Classification :
QA76
.
9
.
A25
,
A76
2003

