481. Techniques and applications of digital watermarking and content protection
Author: Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Digital watermarking.

482. Techniques and applications of digital watermarking and content protection
Author: / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Digital watermarking,Data protection
Classification :
QA76
.
9
.
A25
,
A76
2003


483. #Techniques and applications of digital watermarking and content protection
Author: #Michael Arnold, Martin Schmucker, Stephen D. Wolthusen
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ،Digital watermarking ،Data protection
Classification :
#
QA
،#.
A25
A76


484. Techniques and applications of digital watermarking and content protection
Author: Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Digital watermarking.

485. <The> Architecture of Privacy
Author: \ Courtney Bowman...[et.al] ; edited by Elissa Lerner.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Information technology-- Security measures.,Software engineering-- Security measures.,Computer security.,Data protection.,Privacy.,تکنولوژی اطلاعات -- تدابیر ایمنی ,مهندسی نرم افزار -- تدابیر ایمنی,امنیت کامپیوتر ,حفاظت دادهها
Classification :
QA
76
.
9
.
A7
2015
E-Book
,


486. The CIO's guide to information security incident management /
Author: Eur Ing Matthew W.A. Pemble, Wendy F. Goucher.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
P46
2019


487. The CISO handbook :
Author: Michael Gentile, Ronald D. Collette, Thomas D. August.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Electronic data processing departments-- Security measures.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Computer security.,Data protection.,Electronic data processing departments-- Security measures.
Classification :
HF5548
.
37
.
G46
2006eb


488. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


489. The NCSA guide to enterprise security : protecting information assets
Author: Kabay, Michel E.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer security , Data protection
Classification :
QA
76
.
9
.
A25
K32
1996


490. The NCSA guide to enterprise security : protecting information assets
Author: Michel E. Kabay
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data protection
Classification :
QA
76
.
9
.
A25K3


491. The art of invisibility :
Author: Kevin Mitnick with Robert Vamosi ; foreword by Mikko Hypponen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Internet-- Security measures.,Privacy, Right of.,Privacy, Right of, Popular works.,Computer security.,COMPUTERS-- Hardware-- Mobile Devices.,COMPUTERS-- Hardware-- Personal Computers.,COMPUTERS-- Internet.,COMPUTERS-- Security-- Online Safety & Privacy.,COMPUTERS-- Social Aspects.,COMPUTERS-- Web-- Social Media.,Data protection.,Internet-- Security measures.,Privacy, Right of.,TECHNOLOGY & ENGINEERING-- Mobile & Wireless Communications.,TECHNOLOGY & ENGINEERING-- Social Aspects.,TECHNOLOGY & ENGINEERING-- Telecommunications.
Classification :
TK5105
.
875
.
I57
M58
2017


492. The art of invisibility :the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data
Author: Mitnick, Kevin D. )Kevin David(
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Internet,، Computer security,، Data protection,، Privacy, Right of
Classification :
TK
5105
.
I57M58
2017


493. The baby harvest :
Author: Chris Rock.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Data protection.,Security, International.

494. The baby harvest :
Author: Chris Rock.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Data protection.,Security, International.

495. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


496. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


497. The chief information security officer
Author: Barry L. Kouns, Jake Kouns.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

498. The complete book of data anonymization :
Author: Balaji Raghunathan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Database management.,Database security.
Classification :
QA76
.
9
.
A25
.
R338
2013


499. The death of the internet
Author: edited by Markus Jakobsson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Data protection,Electronic commerce-- Security measures,Internet-- Security measures
Classification :
TK5105
.
875
.
I57
.
J34
2012


500. The executive MBA in information security
Author: / John J. Trinckes, Jr
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Data protection.,Computer security.,Information technology--Security measures
Classification :
HF5548
.
37
.
T75
2010

