IT Security, data Security
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 91 - 100 of total 158 results.- 91AUDITING IT INFRASTRUCTURE FOR COMPLIANCE
Author(s): MARTIN D. WEISS
Publisher: JONES AND BARTLETT PUBLISHERS (Publication Year:2016)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 WEI
Accession No: 95303 - 92AUDITING IT INFRASTRUCTURES FOR COMPLIANCE
Author(s): MARTY M. WEISS, MICHAEL G. SOLOMON
Publisher: JONES AND BARTLETT PUBLISHERS (Publication Year:2016)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 WEI
Accession No: 95370 - 93ORACLE IDENTITY MANAGEMENT: GOVERNANCE, RISK AND COMPLIANCE ARCHITECTURE
Author(s): MARLIN B. POHLMAN
Publisher: CRC PRESS (Publication Year:2008)
Subject(s): COMPUTER, ORACLE, COMPUTER SECURITY
Call No: 005.8 POH
Accession No: 79567 - 94INFORMATION SECURITY MANAGEMENT: CONCEPTS AND PRACTICE
Author(s): BEL G. RAGGAD
Publisher: CRC PRESS (Publication Year:2008)
Subject(s): COMPUTER SECURITY, COMPUTER SECURITY MANAGEMENT, DATA PROTECTION
Call No: 005.8 RAG
Accession No: 80582 - 95INFORMATION SECURITY MANAGEMENT HANDBOOK
Author(s): HAROLD.F TIPTON, MICKI KRAUSE
Publisher: CRC PRESS (Publication Year:2009)
Subject(s): BUSINESS ECONOMICS, COMPUTER SECURITY, DATA PROTECTION
Call No: 005.8 TIP
Accession No: 78217 - 96MACHINE LEARNING FOR HACKERS
Author(s): DREW CONWAY, JOHN MYLES WHITE
Publisher: O'REILLY MEDIA (Publication Year:2012)
Subject(s): ELECTRONIC DATA PROCESSING, ARTIFICIAL INTELLIGENCE, COMPUTER ALGORITHMS
Call No: 005.8 CON
Accession No: 87946 - 97OFFICIAL (ISC)2 GUIDE TO THE CISSP CBK
Author(s): HAROLD.F TIPTON, STEVEN HERNANDEZ
Publisher: CRC PRESS (Publication Year:2013)
Subject(s): EXAMINATIONS-STUDY GUIDES, COMPUTER NETWORKS, INFORMATION SYSTEMS, COMPUTER SECURITY
Call No: 005.8 TIP
Accession No: 86623 - 98OFFICIAL (ISC)2 GUIDE TO THE CSSLP CBK
Author(s): MANO PAUL
Publisher: CRC PRESS (Publication Year:2014)
Subject(s): COMPUTER SECURITY, COMPUTER SOFTWARE DEVELOPMENT MANAGEMENT
Call No: 005.8 PAU
Accession No: 98947 - 99INFORMATION SECURITY POLICY DEVELOPMENT FOR COMPLIANCE: ISO/IEC 27001, NIST SP 800-53, HIPAA STANDARD, PCI DSS V2.0, AND AUP V5.0
Author(s): BARRY WILLIAMS
Publisher: CRC PRESS (Publication Year:2013)
Subject(s): COMPUTER SECURITY, DATA PROTECTION, SECURITY MEASURES
Call No: 005.8 WIL
Accession No: 100840 - 100CYBERSECURITY: CURRENT WRITINGS ON THREATS AND PROTECTION
Author(s): ROGER L. KEMP, JOAQUIN JAY GONZALEZ
Publisher: MCFARLAND & COMPANY, INC., PUBLISHERS (Publication Year:2019)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 GON
Accession No: 102630