Library - State Bank of Pakistan

IT Security, data Security

⇐ Back to Main Subjects

Sort results by:

Showing 131 - 140 of total 160 results.
  • 131
    CGEIT REVIEW MANUAL
    Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2015)
    Subject(s): INFORMATION TECHNOLOGY, KNOWLEDGE MANAGEMENT
    Call No: 005.8 INF
    Accession No: 94779
  • 132
    CGEIT REVIEW QUESTIONS, ANSWERS & EXPLANATIONS
    Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2015)
    Subject(s): INFORMATION TECHNOLOGY, KNOWLEDGE MANAGEMENT
    Call No: 005.8 INF
    Accession No: 94780
  • 133
    CGEIT REVIEW MANUAL
    Author(s): ISACA
    Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2020)
    Subject(s): INFORMATION TECHNOLOGY, KNOWLEDGE MANAGEMENT
    Call No: 005.8 INF
    Accession No: 102578
  • 134
    CGEIT REVIEW QUESTIONS, ANSWERS & EXPLANATIONS
    Author(s): ISACA
    Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2020)
    Subject(s): INFORMATION TECHNOLOGY, KNOWLEDGE MANAGEMENT
    Call No: 005.8 INF
    Accession No: 102579
  • 135
    OAUTH 2 IN ACTION
    Author(s): JUSTIN RICHER
    Publisher: MANNING PUBLICATIONS (Publication Year:2017)
    Subject(s): APPLICATION SOFTWARE--DEVELOPMENT, WORLD WIDE WEB, APPLICATION PROGRAM INTERFACES
    Call No: 005.8 RIC
    Accession No: 97018
  • 136
    SELF-SOVEREIGN IDENTITY: DECENTRALIZED DIGITAL IDENTITY AND VERIFIABLE CREDENTIALS
    Author(s): ALEX PREUKSCHAT, DRUMMOND REED
    Publisher: MANNING PUBLICATIONS (Publication Year:2021)
    Subject(s): TECHNOLOGICAL INNOVATION, ONLINE IDENTITY THEFT, COMPUTER SECURITY, DATABASE SECURITY, DATA PROTECTION, ELECTRONIC FUNDS TRANSFERS, BITCOIN, BLOCKCHAIN
    Call No: 005.8 PRE
    Accession No: 104975
  • 137
    CYBERSECURITY: THE INSIGHTS YOU NEED FROM HARVARD BUSINESS REVIEW.
    Publisher: HARVARD BUSINESS REVIEW PRESS (Publication Year:2019)
    Subject(s): COMPUTER SECURITY, SECURITY MEASURES
    Call No: 005.8 HAR
    Accession No: 102797
  • 138
    THE CYBERSECURITY MINDSET: A VIRTUAL AND TRANSFORMATIONAL THINKING MODE
    Author(s): DEWAYNE HART
    Publisher: BERRETT-KOEHLER PUBLISHERS, INC. (Publication Year:2022)
    Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
    Call No: 005.8 HAR
    Accession No: 105025
  • 139
    ETHICAL HACKING: A HANDS-ON INTRODUCTION TO BREAKING IN
    Author(s): DANIEL G. GRAHAM
    Publisher: NO STARCH PRESS (Publication Year:2021)
    Subject(s): COMPUTER SECURITY
    Call No: 005.8 GRA
    Accession No: 105935
  • 140
    CYBER SECURITY: A PRACTITIONER'S GUIDE
    Author(s): DAVID SUTTON
    Publisher: BCS INSTITUTE (Publication Year:2017)
    Subject(s): DATA PROCESSING, COMPUTER SECURITY, CYBER INTELLIGENCE
    Call No: 005.8 SUT
    Accession No: 96187
Showing 131 - 140 of total 160 results.