{"id":827,"date":"2021-08-19T20:17:48","date_gmt":"2021-08-19T15:47:48","guid":{"rendered":"https:\/\/khan.ir\/?post_type=product&#038;p=827"},"modified":"2021-08-20T20:11:38","modified_gmt":"2021-08-20T15:41:38","slug":"%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%b3%d9%88%d9%85-%da%86%d9%87%d8%a7%d8%b1%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9","status":"publish","type":"product","link":"https:\/\/khan.ir\/fr\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%b3%d9%88%d9%85-%da%86%d9%87%d8%a7%d8%b1%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9\/","title":{"rendered":"\u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0633\u0648\u0645 \u0648 \u0686\u0647\u0627\u0631\u0645 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a"},"content":{"rendered":"<p>[vc_row][vc_column][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">\u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0633\u0648\u0645 \u0648 \u0686\u0647\u0627\u0631\u0645 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0648 \u06cc\u0627 \u0628\u0647 \u0639\u0628\u0627\u0631\u062a\u06cc \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0633\u0648\u0645 \u0648 \u0686\u0647\u0627\u0631\u0645 \u06a9\u062a\u0627\u0628 <a href=\"https:\/\/www.amazon.com\/Managing-Risk-Information-Security-Technology\/dp\/1430251131\" target=\"_blank\" rel=\"noopener\">Managing Risk and Information Security<\/a>\u00a0\u062a\u0647\u06cc\u0647 \u0634\u062f\u0647 \u062f\u0631 \u0642\u0627\u0644\u0628 PDF \u062c\u0647\u062a \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u062f\u0631 \u0627\u0647\u062f\u0627\u0641 \u062a\u062d\u0642\u06cc\u0642\u0627\u062a\u06cc \u0647\u0645 \u0627\u06cc\u0646\u06a9 \u0622\u0645\u0627\u062f\u0647 \u0648 \u062f\u0631 \u0627\u062e\u062a\u06cc\u0627\u0631 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a.<\/p>\n<p style=\"text-align: justify;\">\u0627\u06cc\u0646 \u0641\u0635\u0644 \u0634\u0627\u0645\u0644 \u0627\u062f\u0627\u0631\u0647 \u06a9\u0631\u062f\u0646 \u0648 \u0645\u0634\u0627\u0631\u06a9\u062a \u0647\u0627\u06cc \u062f\u0631\u0648\u0646 \u0633\u0627\u0632\u0645\u0627\u0646\u06cc \u0645\u06cc \u0628\u0627\u0634\u062f. \u0647\u062f\u0641 \u0627\u0632 \u0645\u0637\u0627\u0644\u0639\u0647 \u0627\u06cc\u0646 \u0641\u0635\u0644 \u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u0633\u0627\u062e\u062a\u0627\u0631\u06cc \u062f\u0631\u0633\u062a \u0628\u0631\u0627\u06cc \u0627\u062f\u0627\u0631\u0647 \u06a9\u0631\u062f\u0646 \u0631\u06cc\u0633\u06a9 \u0648 \u0645\u0637\u0627\u0644\u0639\u0647 \u0646\u0645\u0648\u0646\u0647 \u06cc \u0639\u0645\u0644\u06cc \u0622\u0646 \u062f\u0631 <a href=\"https:\/\/fa.wikipedia.org\/wiki\/%D8%A7%DB%8C%D9%86%D8%AA%D9%84\" target=\"_blank\" rel=\"noopener\">\u0627\u06cc\u0646\u062a\u0644<\/a> \u0627\u0633\u062a.<\/p>\n<p style=\"text-align: justify;\">\u0645\u0634\u0627\u0631\u06a9\u062a \u0647\u0627\u06cc \u062f\u0631\u0648\u0646 \u0633\u0627\u0632\u0645\u0627\u0646\u06cc\u060c \u0645\u062f\u06cc\u0631\u06cc\u062a \u0642\u0631\u0627\u0631\u062f\u0627\u062f\u0647\u0627 \u060c \u0645\u0633\u0627\u0626\u0644 \u062d\u0642\u0648\u0642\u06cc\u060c \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a \u0648 \u0647\u0645\u06a9\u0627\u0631\u06cc \u0628\u0627 \u06af\u0631\u0648\u0647 \u0647\u0627\u06cc \u062a\u062c\u0627\u0631\u06cc \u062f\u0631 \u0627\u06cc\u0646 \u0641\u0635\u0644 \u0645\u0648\u0631\u062f \u0628\u0631\u0631\u0633\u06cc \u0642\u0631\u0627\u0631 \u0645\u06cc\u06af\u06cc\u0631\u062f.<\/p>\n<p style=\"text-align: justify;\">\u062f\u0631 \u0641\u0635\u0644 \u0686\u0647\u0627\u0631\u0645 \u0628\u0647 \u0645\u0634\u0627\u0631\u06a9\u062a \u0647\u0627\u06cc \u0628\u0631\u0648\u0646 \u0633\u0627\u0632\u0645\u0627\u0646\u06cc \u067e\u0631\u062f\u0627\u062e\u062a\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a.<\/p>\n<p style=\"text-align: justify;\">\u0647\u062f\u0641 \u0627\u0632 \u0645\u0637\u0627\u0644\u0639\u0647 \u0627\u06cc\u0646 \u0641\u0635\u0644 \u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u0645\u062f\u0644 \u0647\u0627\u06cc \u0645\u0634\u0627\u0631\u06a9\u062a \u0648 \u0648\u06cc\u0698\u06af\u06cc \u0647\u0627\u06cc \u0648\u0634\u0627\u0631\u06a9\u062a \u0647\u0627 \u0648 \u0646\u062d\u0648\u0647 \u0628\u0647 \u0627\u0634\u062a\u0631\u0627\u06a9 \u06af\u0630\u0627\u0631\u06cc \u062f\u0627\u062f\u0647 \u0647\u0627 \u0648 \u0646\u06cc\u0632 \u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u0627\u0646\u062c\u0645\u0646 \u0647\u0627 \u0627\u0633\u062a. \u062a\u0627\u062b\u06cc\u0631\u0627\u062a \u0645\u062a\u0642\u0627\u0628\u0644 \u0627\u0645\u0646\u06cc\u062a \u0648 \u0646\u062d\u0648\u0647 \u0645\u0634\u0627\u0631\u06a9\u062a \u0647\u0627 \u0645\u0648\u0631\u062f \u0628\u0631\u0631\u0633\u06cc \u0642\u0631\u0627\u0631 \u0645\u06cc\u06af\u06cc\u0631\u062f.<\/p>\n<p style=\"text-align: justify;\">\u0634\u0645\u0627 \u0645\u06cc \u062a\u0648\u0627\u0646\u06cc\u062f \u0647\u0645 \u0627\u06cc\u0646\u06a9 \u0628\u0627 \u067e\u0631\u062f\u0627\u062e\u062a \u0622\u0646\u0644\u0627\u06cc\u0646 \u0645\u0628\u0644\u063a \u0622\u0646 \u0628\u0647 \u0635\u0648\u0631\u062a \u0622\u0646\u06cc \u0627\u0642\u062f\u0627\u0645 \u0628\u0647 \u062f\u0627\u0646\u0644\u0648\u062f \u0641\u0627\u06cc\u0644 PDF \u0627\u06cc\u0646 \u0641\u0635\u0644 \u0627\u0632 \u06a9\u062a\u0627\u0628 <a href=\"https:\/\/www.amazon.com\/Managing-Risk-Information-Security-Technology\/dp\/1430251131\" target=\"_blank\" rel=\"noopener\">Managing Risk and Information Security<\/a> \u0646\u0645\u0627\u06cc\u06cc\u062f.<\/p>\n<p>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1629474089839{background-color: #dbfdc8 !important;}\u00a0\u00bb]<\/p>\n<ul>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%da%a9%d8%aa%d8%a7%d8%a8-managing-risk-and-information-security\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%a7%d9%88%d9%84-%d8%af%d9%88%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-managing-risk-information-security\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0627\u0648\u0644 \u0648 \u0641\u0635\u0644 \u062f\u0648\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%b3%d9%88%d9%85-%da%86%d9%87%d8%a7%d8%b1%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0633\u0648\u0645 \u0648 \u0641\u0635\u0644 \u0686\u0647\u0627\u0631\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d9%be%d9%86%d8%ac%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9-%d9%88-%d8%a7%d9%85%d9%86%db%8c%d8%aa\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u067e\u0646\u062c\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%b4%d8%b4%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-managing-risk-and-information-security\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0634\u0634\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d9%87%d9%81%d8%aa%d9%85-%d9%88-%d9%87%d8%b4%d8%aa%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-managing-risk-and-information-security\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0647\u0641\u062a\u0645 \u0648 \u0641\u0635\u0644 \u0647\u0634\u062a\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d9%86%d9%87%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9-%d9%88-%d8%a7%d9%85%d9%86%db%8c%d8%aa\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0646\u0647\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%af%d9%87%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9-%d9%88-%d8%a7%d9%85%d9%86%db%8c%d8%aa\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u062f\u0647\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<li><a href=\"https:\/\/khan.ir\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%db%8c%d8%a7%d8%b2%d8%af%d9%87%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-managing-risk-and-information-security\/\" target=\"_blank\" rel=\"noopener\">\u062f\u0627\u0646\u0644\u0648\u062f \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u06cc\u0627\u0632\u062f\u0647\u0645 \u0627\u0632 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Managing Risk and Information Security)<\/a><\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\"cz_gap clr \" style=\"height: 50px\"><\/div>[vc_column_text css=\u00a0\u00bb.vc_custom_1629472350286{background-color: #848484 !important;}\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">\u06a9\u0644\u06cc\u0647 \u06cc \u062f\u0631\u0622\u0645\u062f \u062d\u0627\u0635\u0644 \u0627\u0632 \u0641\u0631\u0648\u0634 \u0641\u0627\u06cc\u0644\u0647\u0627\u060c \u0635\u0631\u0641 \u062a\u0647\u06cc\u0647 \u0645\u0642\u0627\u0644\u0627\u062a \u0648 \u0686\u0627\u067e \u06a9\u062a\u0628 \u0639\u0644\u0645\u06cc \u0648 \u062f\u0627\u0646\u0634\u06af\u0627\u0647\u06cc \u062e\u0648\u0627\u0647\u062f \u0634\u062f.<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0633\u0648\u0645 \u0648 \u0686\u0647\u0627\u0631\u0645 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a &#8230; <\/p>\n","protected":false},"featured_media":829,"comment_status":"open","ping_status":"closed","template":"","meta":[],"product_brand":[],"product_cat":[111],"product_tag":[116,115,114,113,117],"yst_prominent_words":[],"class_list":{"0":"post-827","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-translation","7":"product_tag---information-security","8":"product_tag---managing-risk","9":"product_tag-114","10":"product_tag-113","11":"product_tag-117","13":"first","14":"instock","15":"sale","16":"downloadable","17":"sold-individually","18":"shipping-taxable","19":"purchasable","20":"product-type-simple"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v14.4.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0633\u0648\u0645 \u0648 \u0686\u0647\u0627\u0631\u0645 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a<\/title>\n<meta name=\"description\" content=\"\u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0633\u0648\u0645 \u0648 \u0686\u0647\u0627\u0631\u0645 \u06a9\u062a\u0627\u0628 Managing Risk and Information Security \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0633\u0648\u0645 \u0686\u0647\u0627\u0631\u0645 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062a\u0631\u062c\u0645\u0647 \u06a9\u062a\u0627\u0628 \u0631\u06cc\u0633\u06a9 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a\" \/>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/khan.ir\/fr\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%b3%d9%88%d9%85-%da%86%d9%87%d8%a7%d8%b1%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0633\u0648\u0645 \u0648 \u0686\u0647\u0627\u0631\u0645 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a\" \/>\n<meta property=\"og:description\" content=\"\u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0633\u0648\u0645 \u0648 \u0686\u0647\u0627\u0631\u0645 \u06a9\u062a\u0627\u0628 Managing Risk and Information Security \u062a\u0631\u062c\u0645\u0647 \u0641\u0635\u0644 \u0633\u0648\u0645 \u0686\u0647\u0627\u0631\u0645 \u06a9\u062a\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062a\u0631\u062c\u0645\u0647 \u06a9\u062a\u0627\u0628 \u0631\u06cc\u0633\u06a9 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/khan.ir\/fr\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%b3%d9%88%d9%85-%da%86%d9%87%d8%a7%d8%b1%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0648\u0628 \u0633\u0627\u06cc\u062a \u0631\u0633\u0645\u06cc \u062f\u06a9\u062a\u0631 \u0645\u062d\u0645\u062f \u062e\u0627\u0646 \u0645\u06cc\u0631\u0632\u0627\u0626\u06cc\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/khanmirzaei.official\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/khanmirzaei.official\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-20T15:41:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/khan.ir\/wp-content\/uploads\/managerisksecurity-fasle3-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dr_khanmirzaei\" \/>\n<meta name=\"twitter:site\" content=\"@dr_khanmirzaei\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/khan.ir\/fr\/#organization\",\"name\":\"\\u0645\\u062d\\u0645\\u062f \\u062e\\u0627\\u0646 \\u0645\\u06cc\\u0631\\u0632\\u0627\\u06cc\\u06cc\",\"url\":\"https:\/\/khan.ir\/fr\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/khanmirzaei.official\",\"https:\/\/www.instagram.com\/khanmirzaei.official\",\"https:\/\/linkedin.com\/in\/khanmirzaei\",\"https:\/\/twitter.com\/dr_khanmirzaei\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/khan.ir\/fr\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/khan.ir\/wp-content\/uploads\/Mohammad_khanmirzaei.jpg\",\"width\":400,\"height\":400,\"caption\":\"\\u0645\\u062d\\u0645\\u062f \\u062e\\u0627\\u0646 \\u0645\\u06cc\\u0631\\u0632\\u0627\\u06cc\\u06cc\"},\"image\":{\"@id\":\"https:\/\/khan.ir\/fr\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/khan.ir\/fr\/#website\",\"url\":\"https:\/\/khan.ir\/fr\/\",\"name\":\"\\u0648\\u0628 \\u0633\\u0627\\u06cc\\u062a \\u0631\\u0633\\u0645\\u06cc \\u062f\\u06a9\\u062a\\u0631 \\u0645\\u062d\\u0645\\u062f \\u062e\\u0627\\u0646 \\u0645\\u06cc\\u0631\\u0632\\u0627\\u0626\\u06cc\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/khan.ir\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/khan.ir\/fr\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/khan.ir\/fr\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%b3%d9%88%d9%85-%da%86%d9%87%d8%a7%d8%b1%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9\/#primaryimage\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/khan.ir\/wp-content\/uploads\/managerisksecurity-fasle3-4.jpg\",\"width\":900,\"height\":900,\"caption\":\"\\u062a\\u0631\\u062c\\u0645\\u0647 \\u0641\\u0635\\u0644 \\u0633\\u0648\\u0645 \\u0648 \\u0686\\u0647\\u0627\\u0631\\u0645 \\u06a9\\u062a\\u0627\\u0628 \\u0645\\u062f\\u06cc\\u0631\\u06cc\\u062a \\u0631\\u06cc\\u0633\\u06a9 \\u0648 \\u0627\\u0645\\u0646\\u06cc\\u062a \\u0627\\u0637\\u0644\\u0627\\u0639\\u0627\\u062a\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/khan.ir\/fr\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%b3%d9%88%d9%85-%da%86%d9%87%d8%a7%d8%b1%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9\/#webpage\",\"url\":\"https:\/\/khan.ir\/fr\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%b3%d9%88%d9%85-%da%86%d9%87%d8%a7%d8%b1%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9\/\",\"name\":\"\\u062a\\u0631\\u062c\\u0645\\u0647 \\u0641\\u0635\\u0644 \\u0633\\u0648\\u0645 \\u0648 \\u0686\\u0647\\u0627\\u0631\\u0645 \\u06a9\\u062a\\u0627\\u0628 \\u0645\\u062f\\u06cc\\u0631\\u06cc\\u062a \\u0631\\u06cc\\u0633\\u06a9 \\u0648 \\u0627\\u0645\\u0646\\u06cc\\u062a \\u0627\\u0637\\u0644\\u0627\\u0639\\u0627\\u062a\",\"isPartOf\":{\"@id\":\"https:\/\/khan.ir\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/khan.ir\/fr\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%b3%d9%88%d9%85-%da%86%d9%87%d8%a7%d8%b1%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9\/#primaryimage\"},\"datePublished\":\"2021-08-19T15:47:48+00:00\",\"dateModified\":\"2021-08-20T15:41:38+00:00\",\"description\":\"\\u062a\\u0631\\u062c\\u0645\\u0647 \\u0641\\u0635\\u0644 \\u0633\\u0648\\u0645 \\u0648 \\u0686\\u0647\\u0627\\u0631\\u0645 \\u06a9\\u062a\\u0627\\u0628 Managing Risk and Information Security \\u062a\\u0631\\u062c\\u0645\\u0647 \\u0641\\u0635\\u0644 \\u0633\\u0648\\u0645 \\u0686\\u0647\\u0627\\u0631\\u0645 \\u06a9\\u062a\\u0627\\u0628 \\u0645\\u062f\\u06cc\\u0631\\u06cc\\u062a \\u0631\\u06cc\\u0633\\u06a9 \\u0648 \\u0627\\u0645\\u0646\\u06cc\\u062a \\u0627\\u0637\\u0644\\u0627\\u0639\\u0627\\u062a \\u062a\\u0631\\u062c\\u0645\\u0647 \\u06a9\\u062a\\u0627\\u0628 \\u0631\\u06cc\\u0633\\u06a9 \\u0645\\u062f\\u06cc\\u0631\\u06cc\\u062a \\u0627\\u0645\\u0646\\u06cc\\u062a \\u0627\\u0637\\u0644\\u0627\\u0639\\u0627\\u062a\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/khan.ir\/fr\/product\/%d8%aa%d8%b1%d8%ac%d9%85%d9%87-%d9%81%d8%b5%d9%84-%d8%b3%d9%88%d9%85-%da%86%d9%87%d8%a7%d8%b1%d9%85-%da%a9%d8%aa%d8%a7%d8%a8-%d9%85%d8%af%db%8c%d8%b1%db%8c%d8%aa-%d8%b1%db%8c%d8%b3%da%a9\/\"]}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/product\/827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/comments?post=827"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/media\/829"}],"wp:attachment":[{"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/media?parent=827"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/product_brand?post=827"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/product_cat?post=827"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/product_tag?post=827"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/khan.ir\/fr\/wp-json\/wp\/v2\/yst_prominent_words?post=827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}