Library - State Bank of Pakistan

IT Security, data Security

⇐ Back to Main Subjects

Sort results by:

Showing 91 - 100 of total 161 results.
  • 91
    MANAGING RISK IN INFORMATION SYSTEMS
    Author(s): DARRIL GIBSON
    Publisher: JONES AND BARTLETT PUBLISHERS (Publication Year:2015)
    Subject(s): COMPUTER SECURITY, ELECTRONIC INFORMATION RESOURCES
    Call No: 005.8 GIB
    Accession No: 94174
  • 92
    AUDITING IT INFRASTRUCTURE FOR COMPLIANCE
    Author(s): MARTIN D. WEISS
    Publisher: JONES AND BARTLETT PUBLISHERS (Publication Year:2016)
    Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
    Call No: 005.8 WEI
    Accession No: 95303
  • 93
    AUDITING IT INFRASTRUCTURES FOR COMPLIANCE
    Author(s): MARTY M. WEISS, MICHAEL G. SOLOMON
    Publisher: JONES AND BARTLETT PUBLISHERS (Publication Year:2016)
    Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
    Call No: 005.8 WEI
    Accession No: 95370
  • 94
    SECURING THE AWS CLOUD: A GUIDE FOR LEARNING TO SECURE AWS INFRASTRUCTURE
    Author(s): BRANDON CARROLL
    Publisher: JOHN WILEY & SONS INC (Publication Year:2025)
    Subject(s): NETWORKING, NETWORK SECURITY, CLOUD COMPUTING, AMAZON WEB SERVICES
    Call No: 005.8 CAR
    Accession No: 106782
  • 95
    ORACLE IDENTITY MANAGEMENT: GOVERNANCE, RISK AND COMPLIANCE ARCHITECTURE
    Author(s): MARLIN B. POHLMAN
    Publisher: CRC PRESS (Publication Year:2008)
    Subject(s): COMPUTER, ORACLE, COMPUTER SECURITY
    Call No: 005.8 POH
    Accession No: 79567
  • 96
    INFORMATION SECURITY MANAGEMENT: CONCEPTS AND PRACTICE
    Author(s): BEL G. RAGGAD
    Publisher: CRC PRESS (Publication Year:2008)
    Subject(s): COMPUTER SECURITY, COMPUTER SECURITY MANAGEMENT, DATA PROTECTION
    Call No: 005.8 RAG
    Accession No: 80582
  • 97
    INFORMATION SECURITY MANAGEMENT HANDBOOK
    Author(s): HAROLD.F TIPTON, MICKI KRAUSE
    Publisher: CRC PRESS (Publication Year:2009)
    Subject(s): BUSINESS ECONOMICS, COMPUTER SECURITY, DATA PROTECTION
    Call No: 005.8 TIP
    Accession No: 78217
  • 98
    MACHINE LEARNING FOR HACKERS
    Author(s): DREW CONWAY, JOHN MYLES WHITE
    Publisher: O'REILLY MEDIA (Publication Year:2012)
    Subject(s): ELECTRONIC DATA PROCESSING, ARTIFICIAL INTELLIGENCE, COMPUTER ALGORITHMS
    Call No: 005.8 CON
    Accession No: 87946
  • 99
    OFFICIAL (ISC)2 GUIDE TO THE CISSP CBK
    Author(s): HAROLD.F TIPTON, STEVEN HERNANDEZ
    Publisher: CRC PRESS (Publication Year:2013)
    Subject(s): EXAMINATIONS-STUDY GUIDES, COMPUTER NETWORKS, INFORMATION SYSTEMS, COMPUTER SECURITY
    Call No: 005.8 TIP
    Accession No: 86623
  • 100
    OFFICIAL (ISC)2 GUIDE TO THE CSSLP CBK
    Author(s): MANO PAUL
    Publisher: CRC PRESS (Publication Year:2014)
    Subject(s): COMPUTER SECURITY, COMPUTER SOFTWARE DEVELOPMENT MANAGEMENT
    Call No: 005.8 PAU
    Accession No: 98947
Showing 91 - 100 of total 161 results.