• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۳۳۷ پاسخ غیر تکراری از ۳۴۵ پاسخ تکراری در مدت زمان ۰,۶۱ ثانیه یافت شد.

81. First IEEE International Workshop on Critical Infrastructure Protection: proceedings: IWCIP 2005, 3-4 November 2005, Darmstadt, Germany

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library of Sharif University of Technology (Tehran)

Subject: Congresses ، Computer security,Congresses ، Computer networks-- Security measures,Prevention ، Cyberterrorism,Congresses ، Emergency management

Classification :
QA
76
.
9
.
A25
.
I339
2005

82. Game theory for security and risk management :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Stefan Rass, Stefan Schauer, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Game theory.,Risk management.,BUSINESS & ECONOMICS-- Economics-- General.,BUSINESS & ECONOMICS-- Reference.,Computer security.,Game theory.,Game theory.,Operational research.,Risk management.

Classification :
HB144

83. Guide to computer network security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Joseph Migga Kizza.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Business & Economics-- Information Management.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- System Administration-- Storage & Retrieval.,Data mining.,Information architecture.,Information retrieval.,Network hardware.

Classification :
TK5105
.
59

84. Handbook of e-business security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: editors, João Manuel R.S. Tavares [and four others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Business enterprises-- Computer networks-- Security measures.,Computer security.

Classification :
HD30
.
38

85. Handbook of information security management

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Micki Krause, Harold F. Tipton, editors

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security- Management- Handbooks, manuals, etc,Data protection- Handbooks, manuals, etc

Classification :
QA76
.
9
.
A25
,
H36
1998

86. Handbook of information security management

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Micki Krause, Harold F. Tipton, editors

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security- Management- Handbooks, manuals, etc,Data protection- Handbooks, manuals, etc

Classification :
QA76
.
9
.
A25
,
H36
1998

87. Hands-on cybersecurity for finance :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Dr. Erdal Ozkaya, Milad Aslaner.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Management.,Cyber intelligence (Computer security),Financial institutions-- Effect of technological innovations on.,Internet-- Security measures.,Cyber intelligence (Computer security),Financial institutions-- Effect of technological innovations on.,Internet-- Security measures.

Classification :
QA76
.
9
.
A25

88. Hands-on security in DevOps :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Tony Hsu.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Information technology-- Management.,Computer networks-- Access control.,Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Information technology-- Management.

Classification :
HD30
.
2

89. How healthcare data privacy is almost dead... and what can be done to revive it!

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / John J. Trinckes, Jr.,Trinckes, John J.,

Library: Central library of medical university of Isfahan (Esfahan)

Subject: Health Information Management,Computer Security,Electronic Health Records,Medical Errors,Privacy,-- methods,-- standards,-- prevention & control,United States

Classification :

90. How to achieve 27001 certification : an example of applied compliance management

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Arnason, Sigurjon Thor

Library: Central Library and Documentation Center (Kerman)

Subject: Certification ، Electronic data processing personnel,Management - Examinations - study guides ، Computer security

Classification :
QA
76
.
3
.
A77
2008

91. How to achieve 27001 certification: an example of applied compliance management

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Arnason, Sigurjon Thor.

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: Certification ، Electronic data processing personnel,Management - Examinations - Study guides ، Computer security

Classification :
QA
76
.
3
.
A77
2008

92. How to build a cyber-resilient organization /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Dan Shoemaker, Anne Kohnke, Ken Sigler.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Management.,Business enterprises-- Computer networks-- Security measures.,Cyberspace-- Security measures.,Risk management.,Business enterprises-- Computer networks-- Management.,Business enterprises-- Computer networks-- Security measures.,Risk management.,TECHNOLOGY & ENGINEERING-- Industrial Engineering.,TECHNOLOGY & ENGINEERING-- Manufacturing.,TECHNOLOGY-- Engineering-- General.,TECHNOLOGY-- Engineering-- Industrial.,TECHNOLOGY-- Manufacturing.

Classification :
QA76
.
9
.
A25

93. How to cheat at managing information security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mark Osborne ; Paul M. Summitt, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Management.,Information technology-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Information technology-- Security measures.

Classification :
QA76
.
9
.
A25
O83
2006eb

94. IT-Risikomanagement mit System :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Hans-Peter Königs.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security -- Management.,Information technology -- Management.,Risk management.

Classification :

95. IT compliance and control

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / James J. DeLuccia IV

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer networks--Security measures,Computer networks--Standards,Information technology--Management

Classification :
HD
,
30
.
2
,.
D456
,
2008eb

96. IT compliance and control

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / James J. DeLuccia

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks- Security measures,Computer networks- Standards,Information technology- Management

Classification :
TK5105
.
875
.
D45
2008

97. IT compliance and controls

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Information technology ; Management. ; Computer networks ; Security measures. ; Computer networks ; Standards. ;

Classification :

98. IT compliance and controls: best practices for implementation

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Deluccia, James J.

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: Management ، Information technology,Security measures ، Computer networks,Standards ، Computer networks

Classification :
HD
30
.
2
.
D456
2008

99. IT risk management guide :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Gerard Blokdijk, Claire Engle & Jackie Brewster.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises -- Computer networks -- Security measures -- Handbooks, manuals, etc.,Computer security -- Management -- Handbooks, manuals, etc.,Electronic data processing departments -- Security measures -- Handbooks, manuals, etc.

Classification :
HF5548
.
37
G473
2008

100. IT security governance innovations

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Daniel Mellado ... [et al.], editors

Library: Campus International Library of Kish University of Tehran (Hormozgan)

Subject: Computer security -- Management,Information technology -- Security measures,Business enterprises -- Security measures,Data protection

Classification :
QA
76
.
9
.
A25
I8
2013
  • »
  • 17
  • 16
  • 15
  • 14
  • 13
  • ...
  • 9
  • 8
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival