281. Setting up an it security function
Author: Partida, Alberto.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: management ، Computer security,computer networks--securtiy measures. ، Business enterprises
Classification :
QA
76
.
9
.
A25
P35
2010


282. Social media security
Author: Michael Cross ; technical editor, Rob Shimonski
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Online social networks-- Security measures,Risk management-- Social aspects,Social media-- Security measures
Classification :
HM742
.
C77
2014


283. Solving Cyber Risk :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Insurance-- Risk Assessment & Management.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25
C577
2018


284. Sustainable Logistics and Production in Industry 4.0
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Engineering economics. ; Engineering economy. ; Production management. ; Computer security. ; Engineering Economics, Organization, Logistics, Marketing. ;

285. Syngress IT security project management handboo
Author: / Susan Snedaker
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Handbooks, manuals, etc,Computer security--Management--Handbooks, manuals, etc
Classification :
QA
,
76
.
9
,.
A25
,
S655
,
2006eb


286. Syngress IT security project management handbook
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Handbooks, manuals, etc. ; Computer security ; Management ; Handbooks, manuals, etc. ;

287. The CIO's guide to information security incident management /
Author: Eur Ing Matthew W.A. Pemble, Wendy F. Goucher.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
P46
2019


288. The CISM prep guide
Author: / Ronald L. Krutz, Russell Dean Vines
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic data processing personnel- Certification,Computer security- Management- Examinations Study guides
Classification :
QA76
.
3
.
K79
2003


289. The CISM prep guide : mastering the five domains of information security management
Author: Krutz, Ronald L.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Certification ، Electronic data processing personnel,Study guides ، Computer security - Management Examinations
Classification :
QA
76
.
3
.
K79
2003


290. The CISO's transformation :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ;

291. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


292. The NICE cyber security framework :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ;

293. The Science and Technology of Counterterrorism
Author: Carl S. Young.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Risk management.,Security systems.,Terrorism-- Prevention.

294. The art of enterprise information architecture
Author: / Mario Godinez ... [et al.]
Library: Farabi Faculty Library, University of Tehran (Qom)
Subject: Information technology, Management,Management information systems,Business enterprises, Computer networks, Security measures,Information technology, Security measures
Classification :
HD
30
.
2
.
A77
2010


295. The art of enterprise information architecture :
Author: Mario Godinez [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Information technology-- Management.,Information technology-- Security measures.,Management information systems.,Business & Economics.,Business enterprises-- Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer Science.,Engineering & Applied Sciences.,Information technology-- Management.,Information technology-- Management.,Information technology-- Security measures.,Information technology-- Security measures.,Management information systems.,Management information systems.,Management Theory.,Management.
Classification :
HD30
.
2
.
A77
2010


296. The art of enterprise information architecture. a systems-based approach for unlocking business insight
Author: Mario Godinez ... ]et al.[
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Information technology- Management,، Management information systems,، Business enterprises- Computer networks- Security measures,، Information technology- Security measures
Classification :
HD
30
.
2
.
A77
2010


297. The basics of information security
Author: Jason Andress.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Information resources management.

298. The basics of information security : understanding the fundamentals of InfoSec in theory and practice
Author: Andress, Jason.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,، Information resources management
Classification :
QA
76
.
9
.
A25
A5453
2011


299. The best damn IT security management book perio
Author: / Bryan Cunningham...[et al]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Management
Classification :
QA
,
76
.
9
,.
A25
,
B486
,
2007eb


300. The best damn IT security management book period
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ;
