61. Penetration testing fundamentals /
Author: Chuck Easttom.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)
Classification :
TK5105
.
59


62. Principles of computer security CompTIA security+ and beyond lab manual
Author: / Vincent Nestler ... [et al.]
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security --Management --Handbooks, manuals, etc,Data protection --Handbooks, manuals, etc,COMPUTERS / Certification Guides / General
Classification :
QA
76
.
9
.
A2
C6
2011


63. Privacy-preserving data mining :
Author: edited by Charu C. Aggarwal and Philip S. Yu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data mining.,Data protection.,Computer security.,Computer security.,COMPUTERS-- Database Management-- Data Mining.,Data mining.,Data mining.,Data protection.,Data protection.,Informatique.
Classification :
QA76
.
9
.
D343
P75
2008eb


64. Risk centric threat modeling :
Author: Tony Uceda Vélez and Marco M. Morana
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data protection,Management information systems-- Security measures,Risk assessment
Classification :
HF5548
.
37


65. Securing digital video
Author: / Eric Diehl
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Digital video--Security measures,Digital rights management.,Data protection.,Data encryption (Computer science)
Classification :
TK6680
.
5
.
D54
2012


66. Securing digital video
Author: Eric Diehl
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Digital rights management,Digital video-- Security measures
Classification :
TK6680
.
5
.
D54
2012eb


67. Security planning and disaster recovery
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management ; Data protection ; Emergency management ;

68. Security planning & disaster recovery
Author: / Eric Maiwald, William Sieglein
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management,Data protection,Emergency management
Classification :
QA76
.
9
.
A25
,
M315
2002


69. Security planning & disaster recovery
Author: Maiwald, Eric
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Management ، Computer security,، Data protection,، Emergency management
Classification :
QA
76
.
9
.
A25
M315
2002


70. Security planning & disaster recovery
Author: / Eric Maiwald, William Sieglein
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management,Data protection,Emergency management
Classification :
QA76
.
9
.
A25
,
M315
2002


71. Security planning & disaster recovery
Author: / Eric Maiwald, William Sieglein
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Management,Data protection.,Emergency management.
Classification :
QA
,
76
.
9
,.
A25
,
M315
,
2002


72. Security planning & disaster recovery /
Author: Eric Maiwald, William Sieglein.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management.,Data protection.,Emergency management.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Emergency management.
Classification :
QA76
.
9
.
A25
M315
2002eb


73. Solving Cyber Risk :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Insurance-- Risk Assessment & Management.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25
C577
2018


74. The CIO's guide to information security incident management /
Author: Eur Ing Matthew W.A. Pemble, Wendy F. Goucher.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
P46
2019


75. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


76. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


77. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


78. The chief information security officer
Author: Barry L. Kouns, Jake Kouns.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

79. The complete book of data anonymization :
Author: Balaji Raghunathan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Database management.,Database security.
Classification :
QA76
.
9
.
A25
.
R338
2013


80. Understanding forensics in IT
Author: / With NIIT
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Data protection,-- Management
Classification :
658
.
0558
U55
2005

