IT Security, data Security
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 131 - 140 of total 158 results.- 131CGEIT REVIEW QUESTIONS, ANSWERS & EXPLANATIONS
Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2015)
Subject(s): INFORMATION TECHNOLOGY, KNOWLEDGE MANAGEMENT
Call No: 005.8 INF
Accession No: 94780 - 132CGEIT REVIEW MANUAL
Author(s): ISACA
Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2020)
Subject(s): INFORMATION TECHNOLOGY, KNOWLEDGE MANAGEMENT
Call No: 005.8 INF
Accession No: 102578 - 133CGEIT REVIEW QUESTIONS, ANSWERS & EXPLANATIONS
Author(s): ISACA
Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2020)
Subject(s): INFORMATION TECHNOLOGY, KNOWLEDGE MANAGEMENT
Call No: 005.8 INF
Accession No: 102579 - 134OAUTH 2 IN ACTION
Author(s): JUSTIN RICHER
Publisher: MANNING PUBLICATIONS (Publication Year:2017)
Subject(s): APPLICATION SOFTWARE--DEVELOPMENT, WORLD WIDE WEB, APPLICATION PROGRAM INTERFACES
Call No: 005.8 RIC
Accession No: 97018 - 135SELF-SOVEREIGN IDENTITY: DECENTRALIZED DIGITAL IDENTITY AND VERIFIABLE CREDENTIALS
Author(s): ALEX PREUKSCHAT, DRUMMOND REED
Publisher: MANNING PUBLICATIONS (Publication Year:2021)
Subject(s): TECHNOLOGICAL INNOVATION, ONLINE IDENTITY THEFT, COMPUTER SECURITY, DATABASE SECURITY, DATA PROTECTION, ELECTRONIC FUNDS TRANSFERS, BITCOIN, BLOCKCHAIN
Call No: 005.8 PRE
Accession No: 104975 - 136CYBERSECURITY: THE INSIGHTS YOU NEED FROM HARVARD BUSINESS REVIEW.
Publisher: HARVARD BUSINESS REVIEW PRESS (Publication Year:2019)
Subject(s): COMPUTER SECURITY, SECURITY MEASURES
Call No: 005.8 HAR
Accession No: 102797 - 137THE CYBERSECURITY MINDSET: A VIRTUAL AND TRANSFORMATIONAL THINKING MODE
Author(s): DEWAYNE HART
Publisher: BERRETT-KOEHLER PUBLISHERS, INC. (Publication Year:2022)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 HAR
Accession No: 105025 - 138ETHICAL HACKING: A HANDS-ON INTRODUCTION TO BREAKING IN
Author(s): DANIEL G. GRAHAM
Publisher: NO STARCH PRESS (Publication Year:2021)
Subject(s): COMPUTER SECURITY
Call No: 005.8 GRA
Accession No: 105935 - 139CYBER SECURITY: A PRACTITIONER'S GUIDE
Author(s): DAVID SUTTON
Publisher: BCS INSTITUTE (Publication Year:2017)
Subject(s): DATA PROCESSING, COMPUTER SECURITY, CYBER INTELLIGENCE
Call No: 005.8 SUT
Accession No: 96187 - 140MACHINE LEARNING WITH R: LEARN HOW TO USE R TO APPLY POWERFUL MACHINE LEARNING METHODS AND GAIN AN INSIGHT INTO REAL-WORLD APPLICATIONS
Author(s): BRETT LANTZ
Publisher: PACKT PUBLISHING (Publication Year:2013)
Subject(s): STATISTICAL METHODS, R COMPUTER PROGRAMME LANGUAGE, MACHINE LEARNING
Call No: 005.8 LAN
Accession No: 91847