IT Security, data Security
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 91 - 100 of total 160 results.- 91MANAGING RISK IN INFORMATION SYSTEMS
Author(s): DARRIL GIBSON
Publisher: JONES AND BARTLETT PUBLISHERS (Publication Year:2015)
Subject(s): COMPUTER SECURITY, ELECTRONIC INFORMATION RESOURCES
Call No: 005.8 GIB
Accession No: 94174 - 92AUDITING IT INFRASTRUCTURE FOR COMPLIANCE
Author(s): MARTIN D. WEISS
Publisher: JONES AND BARTLETT PUBLISHERS (Publication Year:2016)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 WEI
Accession No: 95303 - 93AUDITING IT INFRASTRUCTURES FOR COMPLIANCE
Author(s): MARTY M. WEISS, MICHAEL G. SOLOMON
Publisher: JONES AND BARTLETT PUBLISHERS (Publication Year:2016)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 WEI
Accession No: 95370 - 94ORACLE IDENTITY MANAGEMENT: GOVERNANCE, RISK AND COMPLIANCE ARCHITECTURE
Author(s): MARLIN B. POHLMAN
Publisher: CRC PRESS (Publication Year:2008)
Subject(s): COMPUTER, ORACLE, COMPUTER SECURITY
Call No: 005.8 POH
Accession No: 79567 - 95INFORMATION SECURITY MANAGEMENT: CONCEPTS AND PRACTICE
Author(s): BEL G. RAGGAD
Publisher: CRC PRESS (Publication Year:2008)
Subject(s): COMPUTER SECURITY, COMPUTER SECURITY MANAGEMENT, DATA PROTECTION
Call No: 005.8 RAG
Accession No: 80582 - 96INFORMATION SECURITY MANAGEMENT HANDBOOK
Author(s): HAROLD.F TIPTON, MICKI KRAUSE
Publisher: CRC PRESS (Publication Year:2009)
Subject(s): BUSINESS ECONOMICS, COMPUTER SECURITY, DATA PROTECTION
Call No: 005.8 TIP
Accession No: 78217 - 97MACHINE LEARNING FOR HACKERS
Author(s): DREW CONWAY, JOHN MYLES WHITE
Publisher: O'REILLY MEDIA (Publication Year:2012)
Subject(s): ELECTRONIC DATA PROCESSING, ARTIFICIAL INTELLIGENCE, COMPUTER ALGORITHMS
Call No: 005.8 CON
Accession No: 87946 - 98OFFICIAL (ISC)2 GUIDE TO THE CISSP CBK
Author(s): HAROLD.F TIPTON, STEVEN HERNANDEZ
Publisher: CRC PRESS (Publication Year:2013)
Subject(s): EXAMINATIONS-STUDY GUIDES, COMPUTER NETWORKS, INFORMATION SYSTEMS, COMPUTER SECURITY
Call No: 005.8 TIP
Accession No: 86623 - 99OFFICIAL (ISC)2 GUIDE TO THE CSSLP CBK
Author(s): MANO PAUL
Publisher: CRC PRESS (Publication Year:2014)
Subject(s): COMPUTER SECURITY, COMPUTER SOFTWARE DEVELOPMENT MANAGEMENT
Call No: 005.8 PAU
Accession No: 98947 - 100INFORMATION SECURITY POLICY DEVELOPMENT FOR COMPLIANCE: ISO/IEC 27001, NIST SP 800-53, HIPAA STANDARD, PCI DSS V2.0, AND AUP V5.0
Author(s): BARRY WILLIAMS
Publisher: CRC PRESS (Publication Year:2013)
Subject(s): COMPUTER SECURITY, DATA PROTECTION, SECURITY MEASURES
Call No: 005.8 WIL
Accession No: 100840