{"id":770,"date":"2021-08-17T21:29:56","date_gmt":"2021-08-17T16:59:56","guid":{"rendered":"https:\/\/khan.ir\/?post_type=product&#038;p=770"},"modified":"2021-08-20T20:06:45","modified_gmt":"2021-08-20T15:36:45","slug":"%da%a9%d8%aa%d8%a7%d8%a8-%d8%aa%d8%ae%d8%b5%d8%b5%db%8c-managing-risk-and-information-security","status":"publish","type":"product","link":"https:\/\/khan.ir\/fr\/product\/%da%a9%d8%aa%d8%a7%d8%a8-%d8%aa%d8%ae%d8%b5%d8%b5%db%8c-managing-risk-and-information-security\/","title":{"rendered":"\u06a9\u062a\u0627\u0628 \u062a\u062e\u0635\u0635\u06cc Managing Risk and Information Security"},"content":{"rendered":"<p>[vc_row][vc_column][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">\u06a9\u062a\u0627\u0628 \u062a\u062e\u0635\u0635\u06cc <a href=\"https:\/\/www.amazon.com\/Managing-Risk-Information-Security-Protect-ebook-dp-B078158B8Q\/dp\/B078158B8Q\/\" target=\"_blank\" rel=\"noopener\">Managing Risk and Information Security<\/a> \u060c \u0631\u06cc\u0633\u06a9 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0646\u0648\u0634\u062a\u0647 \u06cc \u0647\u0627\u0631\u06a9\u06cc\u0646\u0632\u060c \u0645\u0627\u0644\u06a9\u0648\u0645 (<a href=\"https:\/\/www.linkedin.com\/in\/malcolmharkins\" target=\"_blank\" rel=\"noopener\">Harkins, Malcolm<\/a>) \u06a9\u0647 \u062f\u0631 \u0628\u0639\u0636\u06cc \u0627\u0632 \u062a\u0631\u062c\u0645\u0647 \u0647\u0627 \u0628\u0647 \u0631\u06cc\u0633\u06a9 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062a\u0631\u062c\u0645\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a\u060c \u06cc\u06a9\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0627\u0635\u0644\u06cc \u0622\u0632\u0645\u0648\u0646 \u062c\u0627\u0645\u0639 \u062f\u06a9\u062a\u0631\u06cc \u062f\u0631 \u0631\u0634\u062a\u0647 <a href=\"https:\/\/khan.ir\/product-category\/book\/itm\/\">\u0645\u062f\u06cc\u0631\u06cc\u062a \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a<\/a> \u0628\u0627 \u06af\u0631\u0627\u06cc\u0634 \u0647\u0627\u06cc \u0645\u062a\u0639\u062f\u062f \u0627\u0633\u062a.<\/p>\n<p style=\"text-align: justify;\">\u0627\u06cc\u0646 \u06a9\u062a\u0627\u0628 \u06cc\u06a9\u06cc \u0627\u0632 \u0633\u0631\u0641\u0635\u0644 \u0647\u0627\u06cc \u062f\u0631\u0633\u06cc \u0645\u0647\u0645 \u0627\u06cc\u0646 \u0631\u0634\u062a\u0647 \u0645\u062d\u0633\u0648\u0628 \u0634\u062f\u0647 \u0648 \u0645\u0639\u0645\u0648\u0644\u0627 \u062f\u0631 \u0648\u0627\u062d\u062f \u062f\u0631\u0633\u06cc \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062f\u0631 \u062f\u0648\u0631\u0647 \u062f\u06a9\u062a\u0631\u06cc \u062a\u062f\u0631\u06cc\u0633 \u0645\u06cc \u0634\u0648\u062f. \u0627\u06cc\u0646 \u06a9\u062a\u0627\u0628 \u062f\u0631 \u0648\u0631\u0698\u0646 \u0647\u0627\u06cc \u0645\u062a\u0639\u062f\u062f \u062f\u0631 \u0633\u0627\u0644\u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 \u0686\u0627\u067e \u0634\u062f\u0647 \u0627\u0633\u062a \u0648 \u0628\u0647 \u0645\u0631\u0648\u0631 \u0627\u0632 8 \u0641\u0635\u0644 \u0628\u0647 \u06cc\u0627\u0632\u062f\u0647 \u0641\u0635\u0644 \u0627\u0641\u0632\u0627\u06cc\u0634 \u062f\u0627\u062f\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a.<\/p>\n<p style=\"text-align: justify;\">\u0627\u06cc\u0646 \u06a9\u062a\u0627\u0628 \u062a\u0648\u0633\u0637 \u0686\u0646\u062f \u0646\u0627\u0634\u0631 \u0648 \u0645\u062a\u0631\u062c\u0645 \u062f\u0631 \u0633\u0647 \u062f\u0648\u0631\u0647 \u0637\u06cc \u0633\u0627\u0644\u0647\u0627\u06cc 94 \u062a\u0627 98 \u062a\u0631\u062c\u0645\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a.<\/p>\n<p style=\"text-align: justify;\">\u0646\u0648\u06cc\u0633\u0646\u062f\u0647 \u062a\u0648\u0635\u06cc\u0647 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0627\u06cc\u0646 \u06a9\u062a\u0627\u0628 \u0628\u0631\u0627\u06cc \u0686\u0647 \u0627\u0634\u062e\u0627\u0635\u06cc \u0645\u0647\u0645 \u0648 \u062a\u062f\u0627\u0631\u06a9 \u062f\u06cc\u062f\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a:<\/p>\n<p style=\"text-align: left;\">The primary audience is CIOs and other IT leaders, CISOs and other information security leaders, IT auditors, and other leaders of corporate governance and risk functions. The secondary audience is CEOs, board members, privacy professionals, and less senior-level information security and risk professionals<\/p>\n<p style=\"text-align: left;\">\u00ab\u00a0Harkins\u2019 logical, methodical approach as a CISO to solving the most complex cybersecurity problems is reflected in the lucid style of this book. His enlightened approach to intelligence-based security infrastructure and risk mitigation is our best path forward if we are ever to realize the vast potential of the innovative digital world we are creating while reducing the threats to manageable levels. The author shines a light on that path in a comprehensive yet very readable way.\u00a0\u00bb \u2014Art Coviello, Former CEO and Executive Chairman, RSA<\/p>\n<p style=\"text-align: justify;\">\u062f\u0631 \u0627\u06cc\u0646 \u0635\u0641\u062d\u0647 \u0622\u062e\u0631\u06cc\u0646 \u0648\u0631\u0698\u0646 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0627\u0648\u0631\u062c\u06cc\u0646\u0627\u0644 \u0648 \u0627\u0635\u0644\u06cc Managing Risk and Information Security \u0627\u0631\u0627\u0626\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0645\u06cc \u062a\u0648\u0627\u0646\u06cc\u062f \u0628\u0627 \u067e\u0631\u062f\u0627\u062e\u062a \u0622\u0646\u0644\u0627\u06cc\u0646 \u0628\u0647 \u0635\u0648\u0631\u062a \u0622\u0646\u06cc \u062f\u0631 \u0642\u0627\u0644\u0628 PDF \u0622\u0646 \u0631\u0627 \u062f\u0627\u0646\u0644\u0648\u062f \u0646\u0645\u0627\u06cc\u06cc\u062f.<\/p>\n<p>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1629473801620{background-color: #d7fcbf !important;}\u00a0\u00bb]<\/p>\n<ul>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%da%a9%d8%aa%d8%a7%d8%a8-managing-risk-and-information-security\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%a7%d9%88%d9%84-%d8%af%d9%88%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-managing-risk-information-security\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0627\u0648\u0644 \u0648 \u0641\u0635\u0644 \u062f\u0648\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%b3%d9%88%d9%85-%da%86%d9%87%d8%a7%d8%b1%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0633\u0648\u0645 \u0648 \u0641\u0635\u0644 \u0686\u0647\u0627\u0631\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d9%be%d9%86%d8%ac%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9-%d9%88-%d8%a7%d9%85%d9%86%db%8c%d8%aa\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u067e\u0646\u062c\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%b4%d8%b4%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-managing-risk-and-information-security\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0634\u0634\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d9%87%d9%81%d8%aa%d9%85-%d9%88-%d9%87%d8%b4%d8%aa%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-managing-risk-and-information-security\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0647\u0641\u062a\u0645 \u0648 \u0641\u0635\u0644 \u0647\u0634\u062a\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d9%86%d9%87%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9-%d9%88-%d8%a7%d9%85%d9%86%db%8c%d8%aa\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0646\u0647\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%af%d9%87%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9-%d9%88-%d8%a7%d9%85%d9%86%db%8c%d8%aa\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u062f\u0647\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%db%8c%d8%a7%d8%b2%d8%af%d9%87%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-managing-risk-and-information-security\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u06cc\u0627\u0632\u062f\u0647\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\"cz_gap clr \" style=\"height: 50px\"><\/div>[vc_column_text css=\u00a0\u00bb.vc_custom_1629472350286{background-color: #848484 !important;}\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">\u06a9\u0644\u06cc\u0647 \u06cc \u062f\u0631\u0622\u0645\u062f \u062d\u0627\u0635\u0644 \u0627\u0632 \u0641\u0631\u0648\u0634 \u0641\u0627\u06cc\u0644\u0647\u0627\u060c \u0635\u0631\u0641 \u062a\u0647\u06cc\u0647 \u0645\u0642\u0627\u0644\u0627\u062a \u0648 \u0686\u0627\u067e \u06a9\u062a\u0628 \u0639\u0644\u0645\u06cc \u0648 \u062f\u0627\u0646\u0634\u06af\u0627\u0647\u06cc \u062e\u0648\u0627\u0647\u062f \u0634\u062f.<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] \u06a9\u062a\u0627\u0628 \u062a\u062e\u0635\u0635\u06cc Managing Risk and Information Security \u060c \u0631\u06cc\u0633\u06a9 \u0645\u062f\u06cc\u0631\u06cc\u062a &#8230; <\/p>\n","protected":false},"featured_media":771,"comment_status":"open","ping_status":"closed","template":"","meta":[],"product_brand":[],"product_cat":[15,84],"product_tag":[105,104,103,101,102],"yst_prominent_words":[],"class_list":{"0":"post-770","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-book","7":"product_cat-itm","8":"product_tag---managing-risk-security","9":"product_tag---information-security","10":"product_tag---managing-risk","11":"product_tag-101","12":"product_tag-102","14":"first","15":"instock","16":"sale","17":"downloadable","18":"sold-individually","19":"shipping-taxable","20":"purchasable","21":"product-type-simple"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v14.4.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u06a9\u062a\u0627\u0628 \u062a\u062e\u0635\u0635\u06cc Managing Risk and Information Security<\/title>\n<meta name=\"description\" content=\"\u062f\u0627\u0646\u0644\u0648\u062f \u06a9\u062a\u0627\u0628 \u062a\u062e\u0635\u0635\u06cc Managing Risk and Information Security \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062a\u0631\u062c\u0645\u0647 \u06a9\u062a\u0627\u0628 \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0628\u0647 \u0641\u0635\u0644 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a\" \/>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/khan.ir\/fr\/product\/%da%a9%d8%aa%d8%a7%d8%a8-%d8%aa%d8%ae%d8%b5%d8%b5%db%8c-managing-risk-and-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u06a9\u062a\u0627\u0628 \u062a\u062e\u0635\u0635\u06cc Managing Risk and Information Security\" \/>\n<meta property=\"og:description\" content=\"\u062f\u0627\u0646\u0644\u0648\u062f \u06a9\u062a\u0627\u0628 \u062a\u062e\u0635\u0635\u06cc Managing Risk and Information Security \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062a\u0631\u062c\u0645\u0647 \u06a9\u062a\u0627\u0628 \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0628\u0647 \u0641\u0635\u0644 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/khan.ir\/fr\/product\/%da%a9%d8%aa%d8%a7%d8%a8-%d8%aa%d8%ae%d8%b5%d8%b5%db%8c-managing-risk-and-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0648\u0628 \u0633\u0627\u06cc\u062a \u0631\u0633\u0645\u06cc \u062f\u06a9\u062a\u0631 \u0645\u062d\u0645\u062f \u062e\u0627\u0646 \u0645\u06cc\u0631\u0632\u0627\u0626\u06cc\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/khanmirzaei.official\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/khanmirzaei.official\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-20T15:36:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/khan.ir\/wp-content\/uploads\/Managing.Risk_.and_.Information.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dr_khanmirzaei\" \/>\n<meta name=\"twitter:site\" content=\"@dr_khanmirzaei\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/khan.ir\/fr\/#organization\",\"name\":\"\\u0645\\u062d\\u0645\\u062f \\u062e\\u0627\\u0646 \\u0645\\u06cc\\u0631\\u0632\\u0627\\u06cc\\u06cc\",\"url\":\"https:\/\/khan.ir\/fr\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/khanmirzaei.official\",\"https:\/\/www.instagram.com\/khanmirzaei.official\",\"https:\/\/linkedin.com\/in\/khanmirzaei\",\"https:\/\/twitter.com\/dr_khanmirzaei\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/khan.ir\/fr\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/khan.ir\/wp-content\/uploads\/Mohammad_khanmirzaei.jpg\",\"width\":400,\"height\":400,\"caption\":\"\\u0645\\u062d\\u0645\\u062f \\u062e\\u0627\\u0646 \\u0645\\u06cc\\u0631\\u0632\\u0627\\u06cc\\u06cc\"},\"image\":{\"@id\":\"https:\/\/khan.ir\/fr\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/khan.ir\/fr\/#website\",\"url\":\"https:\/\/khan.ir\/fr\/\",\"name\":\"\\u0648\\u0628 \\u0633\\u0627\\u06cc\\u062a \\u0631\\u0633\\u0645\\u06cc \\u062f\\u06a9\\u062a\\u0631 \\u0645\\u062d\\u0645\\u062f \\u062e\\u0627\\u0646 \\u0645\\u06cc\\u0631\\u0632\\u0627\\u0626\\u06cc\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/khan.ir\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/khan.ir\/fr\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/khan.ir\/fr\/product\/%da%a9%d8%aa%d8%a7%d8%a8-%d8%aa%d8%ae%d8%b5%d8%b5%db%8c-managing-risk-and-information-security\/#primaryimage\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/khan.ir\/wp-content\/uploads\/Managing.Risk_.and_.Information.jpg\",\"width\":900,\"height\":900,\"caption\":\"\\u06a9\\u062a\\u0627\\u0628 \\u062a\\u062e\\u0635\\u0635\\u06cc Managing Risk and Information Security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/khan.ir\/fr\/product\/%da%a9%d8%aa%d8%a7%d8%a8-%d8%aa%d8%ae%d8%b5%d8%b5%db%8c-managing-risk-and-information-security\/#webpage\",\"url\":\"https:\/\/khan.ir\/fr\/product\/%da%a9%d8%aa%d8%a7%d8%a8-%d8%aa%d8%ae%d8%b5%d8%b5%db%8c-managing-risk-and-information-security\/\",\"name\":\"\\u06a9\\u062a\\u0627\\u0628 \\u062a\\u062e\\u0635\\u0635\\u06cc Managing Risk and Information Security\",\"isPartOf\":{\"@id\":\"https:\/\/khan.ir\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/khan.ir\/fr\/product\/%da%a9%d8%aa%d8%a7%d8%a8-%d8%aa%d8%ae%d8%b5%d8%b5%db%8c-managing-risk-and-information-security\/#primaryimage\"},\"datePublished\":\"2021-08-17T16:59:56+00:00\",\"dateModified\":\"2021-08-20T15:36:45+00:00\",\"description\":\"\\u062f\\u0627\\u0646\\u0644\\u0648\\u062f \\u06a9\\u062a\\u0627\\u0628 \\u062a\\u062e\\u0635\\u0635\\u06cc Managing Risk and Information Security \\u06a9\\u062a\\u0627\\u0628 \\u0645\\u062f\\u06cc\\u0631\\u06cc\\u062a \\u0631\\u06cc\\u0633\\u06a9 \\u0648 \\u0627\\u0645\\u0646\\u06cc\\u062a \\u0627\\u0637\\u0644\\u0627\\u0639\\u0627\\u062a \\u062a\\u0631\\u062c\\u0645\\u0647 \\u06a9\\u062a\\u0627\\u0628 \\u062a\\u0631\\u062c\\u0645\\u0647 \\u0641\\u0635\\u0644 \\u0628\\u0647 \\u0641\\u0635\\u0644 \\u06a9\\u062a\\u0627\\u0628 \\u0645\\u062f\\u06cc\\u0631\\u06cc\\u062a \\u0631\\u06cc\\u0633\\u06a9 \\u0648 \\u0627\\u0645\\u0646\\u06cc\\u062a \\u0627\\u0637\\u0644\\u0627\\u0639\\u0627\\u062a\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/khan.ir\/fr\/product\/%da%a9%d8%aa%d8%a7%d8%a8-%d8%aa%d8%ae%d8%b5%d8%b5%db%8c-managing-risk-and-information-security\/\"]}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/product\/770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/comments?post=770"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/media\/771"}],"wp:attachment":[{"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/media?parent=770"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/product_brand?post=770"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/product_cat?post=770"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/product_tag?post=770"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/yst_prominent_words?post=770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}