1. Big data analytics in cybersecurity
Author: edited by Onur Savas, Julia Deng.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security.,Big data.,Database security.,Computer networks,Information technology,Security measures.,Management.
Classification :
QA76
.
9
.
A25
B538
2017


2. Big data analytics in cybersecurity /
Author: edited by Onur Savas, Julia Deng.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Information technology-- Management.,Big Data,Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Datenanalyse,Datensicherung,Information technology-- Management.
Classification :
QA76
.
9
.
A25
B54
2017


3. Building a comprehensive IT security program :
Author: Jeremy Wittkop
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management.,Information technology-- Security measures-- Management.
Classification :
HD30
.
2


4. Building a comprehensive IT security program :
Author: Jeremy Wittkop
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management,Information technology-- Security measures-- Management
Classification :
HD30
.
2


5. CISO compass :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ; Information networks ; Security measures. ; Information technology ; Security measures. ;

6. Collaboration with cloud computing : security, social media, and unified communications
Author: Ric Messier
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Information technology,Management ، Information technology,، Cloud computing,، Computer security,Prevention ، Computer crimes
Classification :
QA
76
.
9
.
A25M47


7. Cyber-security and global information assuranc
Author: / Kenneth J. Knapp, editor
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information technology--Security measures,Computer security--Management,Cyberspace--Security measures,Data protection.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
C918
,
2009


8. Cyber-security and global information assurance
Author: / Kenneth J. Knapp, editor
Library: Insurance Research Institute Library (Tehran)
Subject: Information technology, Security measures,Computer security, Management,Cyberspace, Security measures,Data protection,Computer networks, Security measures
Classification :
QA76
.
9
.
C9
2009


9. Cyber-security and global information assurance: threat analysis and response solutions
Author: Kenneth J. Knapp, editor
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Information technology,Management ، Computer security,Security measures ، Cyberspace,، Data protection,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
C918


10. Hands-on security in DevOps :
Author: Tony Hsu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Information technology-- Management.,Computer networks-- Access control.,Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Information technology-- Management.
Classification :
HD30
.
2


11. How to cheat at managing information security /
Author: Mark Osborne ; Paul M. Summitt, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management.,Information technology-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
O83
2006eb


12. IT compliance and control
Author: / James J. DeLuccia IV
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer networks--Standards,Information technology--Management
Classification :
HD
,
30
.
2
,.
D456
,
2008eb


13. IT compliance and control
Author: / James J. DeLuccia
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Computer networks- Standards,Information technology- Management
Classification :
TK5105
.
875
.
D45
2008


14. IT compliance and controls
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Information technology ; Management. ; Computer networks ; Security measures. ; Computer networks ; Standards. ;

15. IT compliance and controls: best practices for implementation
Author: Deluccia, James J.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Management ، Information technology,Security measures ، Computer networks,Standards ، Computer networks
Classification :
HD
30
.
2
.
D456
2008


16. IT security governance innovations
Author: / Daniel Mellado ... [et al.], editors
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security -- Management,Information technology -- Security measures,Business enterprises -- Security measures,Data protection
Classification :
QA
76
.
9
.
A25
I8
2013


17. IT security risk control management :
Author: Raymond Pompon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Information technology-- Security measures-- Management.
Classification :
QA76
.
9
.
A25


18. IT security risk control management :
Author: Raymond Pompon
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Information technology-- Security measures-- Management
Classification :
QA76
.
9
.
A25


19. Implementing the ISO/IEC 27001 information security management system standard
Author: Edward Humphreys
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer security -- Management -- Standards,Computer networks -- Security measures -- Standards,Data protection -- Standards,Information technology -- Standards
Classification :
QA
،
76
.
9
،.
A25
,
H855
،
2007


20. Information assurance architecture
Author: / Keith D. WIllett
Library: Insurance Research Institute Library (Tehran)
Subject: Computer security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection
Classification :
QA76
.
9
.
W3I5
2008

