IT Security, data Security
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 141 - 150 of total 158 results.- 141MASTERING BLOCKCHAIN: DISTRIBUTED LEDGERS, DECENTRALIZATION, AND SMART CONTRACTS EXPLAINED
Author(s): IMRAN BASHIR
Publisher: PACKT PUBLISHING (Publication Year:2018)
Subject(s): ELECTRONIC FUNDS TRANSFERS, BITCOIN, BLOCKCHAIN
Call No: 005.8 BAS
Accession No: 98951 - 142KEYCLOAK - IDENTITY AND ACCESS MANAGEMENT FOR MODERN APPLICATIONS: HARNESS THE POWER OF KEYCLOAK, OPENID CONNECT, AND OAUTH 2.0 TO SECURE APPLICATIONS
Author(s): STIAN THORGERSEN, PEDRO IGOR SILVA
Publisher: PACKT PUBLISHING (Publication Year:2023)
Subject(s): WEB APPLICATIONS
Call No: 005.8 THO
Accession No: 106021 - 143TRANSFORMING INFORMATION SECURITY : OPTIMIZING FIVE CONCURRENT TRENDS TO REDUCE RESOURCE DRAIN
Author(s): KATHLEEN M. MORIARTY
Publisher: EMERALD GROUP PUBLISHING LIMITED (Publication Year:2020)
Subject(s): INFORMATION TECHNOLOGY, INFORMATION RESOURCE MANAGEMENT, SECURITY MEASURES, INFORMATION NETWORKS
Call No: 005.8 MOR
Accession No: 102271 - 144THE CYBERSECURITY DILEMMA: HACKING, TRUST AND FEAR BETWEEN NATIONS
Author(s): BEN BUCHANAN
Publisher: C. HURST AND COMPANY (Publication Year:2016)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 BUC
Accession No: 101620 - 145SECURITY IN THE DIGITAL WORLD: FOR THE HOME USER, PARENT, CONSUMER AND HOME OFFICE
Author(s): GRAHAM DAY
Publisher: ITGP (Publication Year:2017)
Subject(s): COMPUTER SECURITY, DATA PROTECTION
Call No: 005.8 DAY
Accession No: 97775 - 146IBM WEBSPHERE APPLICATION SERVER 8.0 ADMINISTRATION GUIDE
Author(s): STEVE ROBINSON
Publisher: PACKT PUBLISHING (Publication Year:2011)
Subject(s): WEB SITE DEVELOPMENT
Call No: 005.8 ROB
Accession No: 99045 - 147INFORMATION SECURITY POLICIES MADE EASY: A COMPREHENSIVE SET OF INFORMATION SECURITY POLICIES (WITH CD-ROM)
Author(s): CHARLES CRESSON WOOD
Publisher: INFORMATION SHIELD (Publication Year:2005)
Subject(s): COMPUTERS, DATABASE SECURITY, INFORMATION STORAGE AND RETRIEVAL SYSTEMS
Call No: 005.8 WOO
Accession No: 74380 - 148NETWORK SECURITY AND CRYPTOGRAPHY: A SELF-TEACHING INTRODUCTION
Author(s): SARHAN M. MUSA
Publisher: MERCURY BOOKS (Publication Year:2018)
Subject(s): COMPUTER NETWORKS SECURITY MEASURES, INFORMATION THEORY, CRYPTOGRAPHY
Call No: 005.8 MUS
Accession No: 100300 - 149THE HACKER PLAYBOOK 3: PRACTICAL GUIDE TO PENETRATION TESTING
Author(s): PETER KIM
Publisher: INDEPENDENTLY PUBLISHED (Publication Year:2018)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 KIM
Accession No: 102595 - 150NAVIGATING NEW CYBER RISKS: HOW BUSINESSES CAN PLAN, BUILD AND MANAGE SAFE SPACES IN THE DIGITAL AGE
Author(s): GANNA POGREBNA, MARK SKILTON
Publisher: PALGRAVE (Publication Year:2019)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 POG
Accession No: 102633