IT Security, data Security
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 131 - 140 of total 160 results.- 131CGEIT REVIEW MANUAL
Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2015)
Subject(s): INFORMATION TECHNOLOGY, KNOWLEDGE MANAGEMENT
Call No: 005.8 INF
Accession No: 94779 - 132CGEIT REVIEW QUESTIONS, ANSWERS & EXPLANATIONS
Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2015)
Subject(s): INFORMATION TECHNOLOGY, KNOWLEDGE MANAGEMENT
Call No: 005.8 INF
Accession No: 94780 - 133CGEIT REVIEW MANUAL
Author(s): ISACA
Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2020)
Subject(s): INFORMATION TECHNOLOGY, KNOWLEDGE MANAGEMENT
Call No: 005.8 INF
Accession No: 102578 - 134CGEIT REVIEW QUESTIONS, ANSWERS & EXPLANATIONS
Author(s): ISACA
Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2020)
Subject(s): INFORMATION TECHNOLOGY, KNOWLEDGE MANAGEMENT
Call No: 005.8 INF
Accession No: 102579 - 135OAUTH 2 IN ACTION
Author(s): JUSTIN RICHER
Publisher: MANNING PUBLICATIONS (Publication Year:2017)
Subject(s): APPLICATION SOFTWARE--DEVELOPMENT, WORLD WIDE WEB, APPLICATION PROGRAM INTERFACES
Call No: 005.8 RIC
Accession No: 97018 - 136SELF-SOVEREIGN IDENTITY: DECENTRALIZED DIGITAL IDENTITY AND VERIFIABLE CREDENTIALS
Author(s): ALEX PREUKSCHAT, DRUMMOND REED
Publisher: MANNING PUBLICATIONS (Publication Year:2021)
Subject(s): TECHNOLOGICAL INNOVATION, ONLINE IDENTITY THEFT, COMPUTER SECURITY, DATABASE SECURITY, DATA PROTECTION, ELECTRONIC FUNDS TRANSFERS, BITCOIN, BLOCKCHAIN
Call No: 005.8 PRE
Accession No: 104975 - 137CYBERSECURITY: THE INSIGHTS YOU NEED FROM HARVARD BUSINESS REVIEW.
Publisher: HARVARD BUSINESS REVIEW PRESS (Publication Year:2019)
Subject(s): COMPUTER SECURITY, SECURITY MEASURES
Call No: 005.8 HAR
Accession No: 102797 - 138THE CYBERSECURITY MINDSET: A VIRTUAL AND TRANSFORMATIONAL THINKING MODE
Author(s): DEWAYNE HART
Publisher: BERRETT-KOEHLER PUBLISHERS, INC. (Publication Year:2022)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 HAR
Accession No: 105025 - 139ETHICAL HACKING: A HANDS-ON INTRODUCTION TO BREAKING IN
Author(s): DANIEL G. GRAHAM
Publisher: NO STARCH PRESS (Publication Year:2021)
Subject(s): COMPUTER SECURITY
Call No: 005.8 GRA
Accession No: 105935 - 140CYBER SECURITY: A PRACTITIONER'S GUIDE
Author(s): DAVID SUTTON
Publisher: BCS INSTITUTE (Publication Year:2017)
Subject(s): DATA PROCESSING, COMPUTER SECURITY, CYBER INTELLIGENCE
Call No: 005.8 SUT
Accession No: 96187