81. First IEEE International Workshop on Critical Infrastructure Protection: proceedings: IWCIP 2005, 3-4 November 2005, Darmstadt, Germany
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks-- Security measures,Prevention ، Cyberterrorism,Congresses ، Emergency management
Classification :
QA
76
.
9
.
A25
.
I339
2005


82. Game theory for security and risk management :
Author: Stefan Rass, Stefan Schauer, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Game theory.,Risk management.,BUSINESS & ECONOMICS-- Economics-- General.,BUSINESS & ECONOMICS-- Reference.,Computer security.,Game theory.,Game theory.,Operational research.,Risk management.
Classification :
HB144


83. Guide to computer network security /
Author: Joseph Migga Kizza.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Business & Economics-- Information Management.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- System Administration-- Storage & Retrieval.,Data mining.,Information architecture.,Information retrieval.,Network hardware.
Classification :
TK5105
.
59


84. Handbook of e-business security /
Author: editors, João Manuel R.S. Tavares [and four others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Business enterprises-- Computer networks-- Security measures.,Computer security.
Classification :
HD30
.
38


85. Handbook of information security management
Author: / Micki Krause, Harold F. Tipton, editors
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management- Handbooks, manuals, etc,Data protection- Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
,
H36
1998


86. Handbook of information security management
Author: / Micki Krause, Harold F. Tipton, editors
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management- Handbooks, manuals, etc,Data protection- Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
,
H36
1998


87. Hands-on cybersecurity for finance :
Author: Dr. Erdal Ozkaya, Milad Aslaner.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Management.,Cyber intelligence (Computer security),Financial institutions-- Effect of technological innovations on.,Internet-- Security measures.,Cyber intelligence (Computer security),Financial institutions-- Effect of technological innovations on.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25


88. Hands-on security in DevOps :
Author: Tony Hsu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Information technology-- Management.,Computer networks-- Access control.,Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Information technology-- Management.
Classification :
HD30
.
2


89. How healthcare data privacy is almost dead... and what can be done to revive it!
Author: / John J. Trinckes, Jr.,Trinckes, John J.,
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Health Information Management,Computer Security,Electronic Health Records,Medical Errors,Privacy,-- methods,-- standards,-- prevention & control,United States

90. How to achieve 27001 certification : an example of applied compliance management
Author: Arnason, Sigurjon Thor
Library: Central Library and Documentation Center (Kerman)
Subject: Certification ، Electronic data processing personnel,Management - Examinations - study guides ، Computer security
Classification :
QA
76
.
3
.
A77
2008


91. How to achieve 27001 certification: an example of applied compliance management
Author: Arnason, Sigurjon Thor.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Certification ، Electronic data processing personnel,Management - Examinations - Study guides ، Computer security
Classification :
QA
76
.
3
.
A77
2008


92. How to build a cyber-resilient organization /
Author: Dan Shoemaker, Anne Kohnke, Ken Sigler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Management.,Business enterprises-- Computer networks-- Security measures.,Cyberspace-- Security measures.,Risk management.,Business enterprises-- Computer networks-- Management.,Business enterprises-- Computer networks-- Security measures.,Risk management.,TECHNOLOGY & ENGINEERING-- Industrial Engineering.,TECHNOLOGY & ENGINEERING-- Manufacturing.,TECHNOLOGY-- Engineering-- General.,TECHNOLOGY-- Engineering-- Industrial.,TECHNOLOGY-- Manufacturing.
Classification :
QA76
.
9
.
A25


93. How to cheat at managing information security /
Author: Mark Osborne ; Paul M. Summitt, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management.,Information technology-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
O83
2006eb


94. IT-Risikomanagement mit System :
Author: Hans-Peter Königs.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security -- Management.,Information technology -- Management.,Risk management.

95. IT compliance and control
Author: / James J. DeLuccia IV
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer networks--Standards,Information technology--Management
Classification :
HD
,
30
.
2
,.
D456
,
2008eb


96. IT compliance and control
Author: / James J. DeLuccia
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Computer networks- Standards,Information technology- Management
Classification :
TK5105
.
875
.
D45
2008


97. IT compliance and controls
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Information technology ; Management. ; Computer networks ; Security measures. ; Computer networks ; Standards. ;

98. IT compliance and controls: best practices for implementation
Author: Deluccia, James J.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Management ، Information technology,Security measures ، Computer networks,Standards ، Computer networks
Classification :
HD
30
.
2
.
D456
2008


99. IT risk management guide :
Author: Gerard Blokdijk, Claire Engle & Jackie Brewster.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises -- Computer networks -- Security measures -- Handbooks, manuals, etc.,Computer security -- Management -- Handbooks, manuals, etc.,Electronic data processing departments -- Security measures -- Handbooks, manuals, etc.
Classification :
HF5548
.
37
G473
2008


100. IT security governance innovations
Author: / Daniel Mellado ... [et al.], editors
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security -- Management,Information technology -- Security measures,Business enterprises -- Security measures,Data protection
Classification :
QA
76
.
9
.
A25
I8
2013

