• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۴۳ پاسخ غیر تکراری از ۴۳ پاسخ تکراری در مدت زمان ۰,۶۱ ثانیه یافت شد.

1. Big data analytics in cybersecurity

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Onur Savas, Julia Deng.

Library: Library of College of Science University of Tehran (Tehran)

Subject: Computer security.,Big data.,Database security.,Computer networks,Information technology,Security measures.,Management.

Classification :
QA76
.
9
.
A25
B538
2017

2. Big data analytics in cybersecurity /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Onur Savas, Julia Deng.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Information technology-- Management.,Big Data,Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Datenanalyse,Datensicherung,Information technology-- Management.

Classification :
QA76
.
9
.
A25
B54
2017

3. Building a comprehensive IT security program :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jeremy Wittkop

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Management.,Information technology-- Security measures-- Management.

Classification :
HD30
.
2

4. Building a comprehensive IT security program :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jeremy Wittkop

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Management,Information technology-- Security measures-- Management

Classification :
HD30
.
2

5. CISO compass :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security ; Management. ; Information networks ; Security measures. ; Information technology ; Security measures. ;

Classification :

6. Collaboration with cloud computing : security, social media, and unified communications

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ric Messier

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Security measures ، Information technology,Management ، Information technology,، Cloud computing,، Computer security,Prevention ، Computer crimes

Classification :
QA
76
.
9
.
A25M47

7. Cyber-security and global information assuranc

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Kenneth J. Knapp, editor

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Information technology--Security measures,Computer security--Management,Cyberspace--Security measures,Data protection.,Computer networks--Security measures

Classification :
QA
,
76
.
9
,.
A25
,
C918
,
2009

8. Cyber-security and global information assurance

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Kenneth J. Knapp, editor

Library: Insurance Research Institute Library (Tehran)

Subject: Information technology, Security measures,Computer security, Management,Cyberspace, Security measures,Data protection,Computer networks, Security measures

Classification :
QA76
.
9
.
C9
2009

9. Cyber-security and global information assurance: threat analysis and response solutions

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kenneth J. Knapp, editor

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: Security measures ، Information technology,Management ، Computer security,Security measures ، Cyberspace,، Data protection,Security measures ، Computer networks

Classification :
QA
76
.
9
.
A25
C918

10. Hands-on security in DevOps :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Tony Hsu.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Information technology-- Management.,Computer networks-- Access control.,Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Information technology-- Management.

Classification :
HD30
.
2

11. How to cheat at managing information security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mark Osborne ; Paul M. Summitt, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Management.,Information technology-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Information technology-- Security measures.

Classification :
QA76
.
9
.
A25
O83
2006eb

12. IT compliance and control

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / James J. DeLuccia IV

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer networks--Security measures,Computer networks--Standards,Information technology--Management

Classification :
HD
,
30
.
2
,.
D456
,
2008eb

13. IT compliance and control

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / James J. DeLuccia

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks- Security measures,Computer networks- Standards,Information technology- Management

Classification :
TK5105
.
875
.
D45
2008

14. IT compliance and controls

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Information technology ; Management. ; Computer networks ; Security measures. ; Computer networks ; Standards. ;

Classification :

15. IT compliance and controls: best practices for implementation

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Deluccia, James J.

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: Management ، Information technology,Security measures ، Computer networks,Standards ، Computer networks

Classification :
HD
30
.
2
.
D456
2008

16. IT security governance innovations

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Daniel Mellado ... [et al.], editors

Library: Campus International Library of Kish University of Tehran (Hormozgan)

Subject: Computer security -- Management,Information technology -- Security measures,Business enterprises -- Security measures,Data protection

Classification :
QA
76
.
9
.
A25
I8
2013

17. IT security risk control management :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Raymond Pompon.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Information technology-- Security measures-- Management.

Classification :
QA76
.
9
.
A25

18. IT security risk control management :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Raymond Pompon

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security,Information technology-- Security measures-- Management

Classification :
QA76
.
9
.
A25

19. Implementing the ISO/IEC 27001 information security management system standard

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Edward Humphreys

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Computer security -- Management -- Standards,Computer networks -- Security measures -- Standards,Data protection -- Standards,Information technology -- Standards

Classification :
QA
،
76
.
9
،.
A25
,
H855
،
2007

20. Information assurance architecture

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Keith D. WIllett

Library: Insurance Research Institute Library (Tehran)

Subject: Computer security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection

Classification :
QA76
.
9
.
W3I5
2008
  • »
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival