IT Security, data Security
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 91 - 100 of total 163 results.- 91IT AUDITING : USING CONTROLS TO PROTECT INFORMATION ASSETS
Author(s): CHRIS DAVIS, MIKE SCHILLER, MIKE KEGERREIS
Publisher: MCGRAW-HILL BOOK COMPANY (Publication Year:2020)
Subject(s): AUDITING, ELECTRONIC DATA PROCESSING, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 KEG
Accession No: 102754 - 92CSSLP CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL: ALL-IN-ONE EXAM GUIDE
Author(s): WM. ARTHUR CONKLIN, DANIEL SHOEMAKER
Publisher: MCGRAW-HILL BOOK COMPANY (Publication Year:2022)
Subject(s): COMPUTER SECURITY, COMPUTER CERTIFICATION, EXAMINATIONS
Call No: 005.8 CON
Accession No: 104596 - 93MANAGING RISK IN INFORMATION SYSTEMS
Author(s): DARRIL GIBSON
Publisher: JONES AND BARTLETT PUBLISHERS (Publication Year:2015)
Subject(s): COMPUTER SECURITY, ELECTRONIC INFORMATION RESOURCES
Call No: 005.8 GIB
Accession No: 94174 - 94AUDITING IT INFRASTRUCTURE FOR COMPLIANCE
Author(s): MARTIN D. WEISS
Publisher: JONES AND BARTLETT PUBLISHERS (Publication Year:2016)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 WEI
Accession No: 95303 - 95AUDITING IT INFRASTRUCTURES FOR COMPLIANCE
Author(s): MARTY M. WEISS, MICHAEL G. SOLOMON
Publisher: JONES AND BARTLETT PUBLISHERS (Publication Year:2016)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 WEI
Accession No: 95370 - 96SECURING THE AWS CLOUD: A GUIDE FOR LEARNING TO SECURE AWS INFRASTRUCTURE
Author(s): BRANDON CARROLL
Publisher: JOHN WILEY & SONS INC (Publication Year:2025)
Subject(s): NETWORKING, NETWORK SECURITY, CLOUD COMPUTING, AMAZON WEB SERVICES
Call No: 005.8 CAR
Accession No: 106782 - 97ORACLE IDENTITY MANAGEMENT: GOVERNANCE, RISK AND COMPLIANCE ARCHITECTURE
Author(s): MARLIN B. POHLMAN
Publisher: CRC PRESS (Publication Year:2008)
Subject(s): COMPUTER, ORACLE, COMPUTER SECURITY
Call No: 005.8 POH
Accession No: 79567 - 98INFORMATION SECURITY MANAGEMENT: CONCEPTS AND PRACTICE
Author(s): BEL G. RAGGAD
Publisher: CRC PRESS (Publication Year:2008)
Subject(s): COMPUTER SECURITY, COMPUTER SECURITY MANAGEMENT, DATA PROTECTION
Call No: 005.8 RAG
Accession No: 80582 - 99INFORMATION SECURITY MANAGEMENT HANDBOOK
Author(s): HAROLD.F TIPTON, MICKI KRAUSE
Publisher: CRC PRESS (Publication Year:2009)
Subject(s): BUSINESS ECONOMICS, COMPUTER SECURITY, DATA PROTECTION
Call No: 005.8 TIP
Accession No: 78217 - 100MACHINE LEARNING FOR HACKERS
Author(s): DREW CONWAY, JOHN MYLES WHITE
Publisher: O'REILLY MEDIA (Publication Year:2012)
Subject(s): ELECTRONIC DATA PROCESSING, ARTIFICIAL INTELLIGENCE, COMPUTER ALGORITHMS
Call No: 005.8 CON
Accession No: 87946