21. Information assurance architecture
Author: / Keith D. WIllett
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Computer networks--Security measures,Information resources management.,Information technology--Management,Business enterprises--Communication systems--Management,Data protection.
Classification :
QA76
.
9
.
A25
,
W5487
2008


22. Information assurance architecture
Author: / Keith D. WIllett
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Computer security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection
Classification :
005
.
8
W713i
2008


23. Information security governance :
Author: Krag Brotby
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management,Data protection,Information technology-- Security measures

24. Information security governance. a practical development and implementation approach
Author: Brotby, W. Krag
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Data protection,، Computer security- Management,، Information technology- Security measures
Classification :
HF
5548
.
37
.
B76
2009


25. Information security governance: a practical development and implementation approach
Author: Brotby, W. Krag
Library: Central Library and Documentation Center (Golestan)
Subject: ، Data protection,Management ، Computer security,Security measures ، Information technology
Classification :
HF
5548
.
37
.
B76
I54


26. Information security management, education and privacy :
Author: edited by Yves Deswarte ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I468
2004


27. Information warfare
Author: / Daniel Ventre
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business intelligence,Trade secrets,Information technology, Security measures,Computer security, Management,Data protection
Classification :
HD38
.
7
.
V4713
2009


28. Information warfare
Author: / Daniel Ventre
Library: Library of Entrepreneurship (Tehran)
Subject: Business intelligence,Trade secrets,Information technology -- Security measures,Computer security -- Management,Data protection
Classification :
HD
38
.
7
.
V4713
2009


29. Management of information security /
Author: Michael E. Whitman, Herbert J. Mattord.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Management.,Computer security-- Management.,Computer security.,Information technology-- Security measures.,Computer security-- Management.,Computer security.,Computersicherheit,Information technology-- Security measures.,Kryptologie,Risikomanagement
Classification :
TK5105
.
59
.
W45
2019


30. Managing information systems security and privacy
Author: / Denis Trcek
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Computer security, Management,Information technology, Security measures
Classification :
005
.
8068
T783m
2006


31. Managing information systems security and privacy
Author: / Denis Trcek
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Computer security, Management,Information technology, Security measures
Classification :
005
.
8068
T783
m


32. Network Scanning Cookbook /
Author: Jetty, Sairam.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

33. Penetration testing fundamentals /
Author: Chuck Easttom.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)
Classification :
TK5105
.
59


34. Security automation with Ansible 2 :
Author: Madhu Akula, Akash Mahajan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Information technology-- Automation.,Information technology-- Management.,Computer networks-- Security measures.,Information technology-- Management.
Classification :
T58
.
5


35. Security in e-learning /
Author: by Edgar R. Weippl
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management,Computer-assisted instruction-- Security measures,Information technology-- Management
Classification :
HD30
.
2
.
W524
2005


36. Security management, integrity, and internal control in information systems
Author: edited by Paul Dowland ... [et.al.].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management, Congresses.,Information technology-- Security measures, Congresses.

37. Security management, integrity, and internal control in information systems
Author: / edited by Paul Dowland ... [et al.]
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security -- Management -- Congresses,Information technology -- Security measures -- Congresses
Classification :
QA76
.
9
.
A25I468
2004


38. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


39. The art of enterprise information architecture :
Author: Mario Godinez [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Information technology-- Management.,Information technology-- Security measures.,Management information systems.,Business & Economics.,Business enterprises-- Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer Science.,Engineering & Applied Sciences.,Information technology-- Management.,Information technology-- Management.,Information technology-- Security measures.,Information technology-- Security measures.,Management information systems.,Management information systems.,Management Theory.,Management.
Classification :
HD30
.
2
.
A77
2010


40. The chief information security officer
Author: Barry L. Kouns, Jake Kouns.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.
