• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۵۴۳ پاسخ غیر تکراری از ۵۵۶ پاسخ تکراری در مدت زمان ۰,۳۱ ثانیه یافت شد.

481. Techniques and applications of digital watermarking and content protection

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,Digital watermarking.

Classification :

482. Techniques and applications of digital watermarking and content protection

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security,Digital watermarking,Data protection

Classification :
QA76
.
9
.
A25
,
A76
2003

483. #Techniques and applications of digital watermarking and content protection

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: #Michael Arnold, Martin Schmucker, Stephen D. Wolthusen

Library: Central Library of Esfehan University of Technology (Esfahan)

Subject: Computer security ،Digital watermarking ،Data protection

Classification :
#
QA
،#.
A25
A76

484. Techniques and applications of digital watermarking and content protection

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,Digital watermarking.

Classification :

485. <The> Architecture of Privacy

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: \ Courtney Bowman...[et.al] ; edited by Elissa Lerner.

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Information technology-- Security measures.,Software engineering-- Security measures.,Computer security.,Data protection.,Privacy.,تکنولوژی اطلاعات -- تدابیر ایمنی ,م‍ه‍ن‍دس‍ی‌ ن‍رم‌ اف‍زار -- تدابیر ایمنی,امنیت کامپیوتر ,ح‍ف‍اظت‌ داده‌ه‍ا

Classification :
QA
76
.
9
.
A7
2015
E-Book
,

486. The CIO's guide to information security incident management /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Eur Ing Matthew W.A. Pemble, Wendy F. Goucher.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Security-- General.,Data protection.

Classification :
QA76
.
9
.
A25
P46
2019

487. The CISO handbook :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Michael Gentile, Ronald D. Collette, Thomas D. August.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,Electronic data processing departments-- Security measures.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Computer security.,Data protection.,Electronic data processing departments-- Security measures.

Classification :
HF5548
.
37
.
G46
2006eb

488. The Executive guide to information security: threats, challenges, and solutions

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mark Egan with Tim Mather

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection

Classification :
HF
،
5548
.
32
،.
E325
،
2005

489. The NCSA guide to enterprise security : protecting information assets

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kabay, Michel E.

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Computer security , Data protection

Classification :
QA
76
.
9
.
A25
K32
1996

490. The NCSA guide to enterprise security : protecting information assets

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Michel E. Kabay

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer security,، Data protection

Classification :
QA
76
.
9
.
A25K3

491. The art of invisibility :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kevin Mitnick with Robert Vamosi ; foreword by Mikko Hypponen.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,Internet-- Security measures.,Privacy, Right of.,Privacy, Right of, Popular works.,Computer security.,COMPUTERS-- Hardware-- Mobile Devices.,COMPUTERS-- Hardware-- Personal Computers.,COMPUTERS-- Internet.,COMPUTERS-- Security-- Online Safety & Privacy.,COMPUTERS-- Social Aspects.,COMPUTERS-- Web-- Social Media.,Data protection.,Internet-- Security measures.,Privacy, Right of.,TECHNOLOGY & ENGINEERING-- Mobile & Wireless Communications.,TECHNOLOGY & ENGINEERING-- Social Aspects.,TECHNOLOGY & ENGINEERING-- Telecommunications.

Classification :
TK5105
.
875
.
I57
M58
2017

492. The art of invisibility :the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mitnick, Kevin D. )Kevin David(

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: Security measures ، Internet,، Computer security,، Data protection,، Privacy, Right of

Classification :
TK
5105
.
I57M58
2017

493. The baby harvest :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Chris Rock.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes.,Data protection.,Security, International.

Classification :

494. The baby harvest :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Chris Rock.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes.,Data protection.,Security, International.

Classification :

495. The business case for network security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Catherine Paquet, Warren Saxe

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management

Classification :
TK5105
.
59
.
P37
2005

496. The business case for network security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Catherine Paquet, Warren Saxe

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management

Classification :
TK5105
.
59
.
P37
2005

497. The chief information security officer

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Barry L. Kouns, Jake Kouns.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

Classification :

498. The complete book of data anonymization :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Balaji Raghunathan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,Database management.,Database security.

Classification :
QA76
.
9
.
A25
.
R338
2013

499. The death of the internet

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Markus Jakobsson

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes,Data protection,Electronic commerce-- Security measures,Internet-- Security measures

Classification :
TK5105
.
875
.
I57
.
J34
2012

500. The executive MBA in information security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / John J. Trinckes, Jr

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Data protection.,Computer security.,Information technology--Security measures

Classification :
HF5548
.
37
.
T75
2010
  • »
  • 28
  • 27
  • 26
  • 25
  • 24
  • 23
  • 22
  • 21
  • ...
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival