IT Security, data Security
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 131 - 140 of total 163 results.- 131THE BASICS OF HACKING AND PENETRATION TESTING: ETHICAL HACKING AND PENETRATION TESTING MADE EASY
Author(s): PATRICK ENGEBRETSON
Publisher: SYNGRESS (Publication Year:2011)
Subject(s): COMPUTER CRIMES, COMPUTER SOFTWARE, COMPUTER SECURITY, PREVENTION, COMPUTER HACKERS
Call No: 005.8 ENG
Accession No: 86393 - 132CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT(AN ISACA CERTIFICATION) :CGEIT REVIEW MANUAL 2010
Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2010)
Subject(s): AUDITING, ENTERPRISE, INFORMATION TECHNOLOGY, GOVERNANCE, INFORMATION TECHNOLOGY AUDIT
Call No: 005.8 INF
Accession No: 81230 - 133CGEIT REVIEW MANUAL 2012: CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT
Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2011)
Subject(s): MANAGEMENT, INFORMATION TECHNOLOGY
Call No: 005.8 INF
Accession No: 84483 - 134CGEIT REVIEW MANUAL
Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2015)
Subject(s): INFORMATION TECHNOLOGY, KNOWLEDGE MANAGEMENT
Call No: 005.8 INF
Accession No: 94779 - 135CGEIT REVIEW QUESTIONS, ANSWERS & EXPLANATIONS
Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2015)
Subject(s): INFORMATION TECHNOLOGY, KNOWLEDGE MANAGEMENT
Call No: 005.8 INF
Accession No: 94780 - 136CGEIT REVIEW MANUAL
Author(s): ISACA
Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2020)
Subject(s): INFORMATION TECHNOLOGY, KNOWLEDGE MANAGEMENT
Call No: 005.8 INF
Accession No: 102578 - 137CGEIT REVIEW QUESTIONS, ANSWERS & EXPLANATIONS
Author(s): ISACA
Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2020)
Subject(s): INFORMATION TECHNOLOGY, KNOWLEDGE MANAGEMENT
Call No: 005.8 INF
Accession No: 102579 - 138OAUTH 2 IN ACTION
Author(s): JUSTIN RICHER
Publisher: MANNING PUBLICATIONS (Publication Year:2017)
Subject(s): APPLICATION SOFTWARE--DEVELOPMENT, WORLD WIDE WEB, APPLICATION PROGRAM INTERFACES
Call No: 005.8 RIC
Accession No: 97018 - 139SELF-SOVEREIGN IDENTITY: DECENTRALIZED DIGITAL IDENTITY AND VERIFIABLE CREDENTIALS
Author(s): ALEX PREUKSCHAT, DRUMMOND REED
Publisher: MANNING PUBLICATIONS (Publication Year:2021)
Subject(s): TECHNOLOGICAL INNOVATION, ONLINE IDENTITY THEFT, COMPUTER SECURITY, DATABASE SECURITY, DATA PROTECTION, ELECTRONIC FUNDS TRANSFERS, BITCOIN, BLOCKCHAIN
Call No: 005.8 PRE
Accession No: 104975 - 140CYBERSECURITY: THE INSIGHTS YOU NEED FROM HARVARD BUSINESS REVIEW.
Publisher: HARVARD BUSINESS REVIEW PRESS (Publication Year:2019)
Subject(s): COMPUTER SECURITY, SECURITY MEASURES
Call No: 005.8 HAR
Accession No: 102797