IT Security, data Security
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 41 - 50 of total 158 results.- 41ENTERPRISE LEVEL SECURITY 2: ADVANCED TECHNIQUES FOR INFORMATION TECHNOLOGY IN AN UNCERTAIN WORLD
Author(s): KEVIN E. FOLTZ, WILLIAM R. SIMPSON
Publisher: ROUTLEDGE (Publication Year:2020)
Subject(s): COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 FOL
Accession No: 102392 - 42DATA AND GOLIATH: THE HIDDEN BATTLES TO COLLECT YOUR DATA AND CONTROL YOUR WORLD
Author(s): BRUCE SCHNEIER
Publisher: W.W.NORTON & COMPANY (Publication Year:2015)
Subject(s): INFORMATION TECHNOLOGY, COMPUTER SECURITY, RIGHTS
Call No: 005.8 SCH
Accession No: 92960 - 43CRYPTOGRAPHY: THE KEY TO DIGITAL SECURITY, HOW IT WORKS, AND WHY IT MATTERS
Author(s): KEITH MARTIN
Publisher: W.W.NORTON & COMPANY (Publication Year:2020)
Subject(s): CRYPTOCURRENCY, DATA ENCRYPTION (COMPUTER SCIENCE), CRYPTOGRAPHY
Call No: 005.8 MAR
Accession No: 103498 - 44DEFEATING THE HACKER: A NON TECHNICAL GUIDE TO COMPUTER SECURITY
Author(s): ROBERT SCHIFREEN
Publisher: JOHN WILEY (Publication Year:2006)
Subject(s): COMPUTER SECURITY
Call No: 005.8 SCH
Accession No: 79924 - 45THE ORACLE HACKER'S HANDBOOK: HACKING AND DEFENDING ORACLE
Author(s): DAVID LITCHFIELD
Publisher: JOHN WILEY (Publication Year:2007)
Call No: 005.8 LIT
Accession No: 74879 - 46ADMINISTERING WINDOWS VISTA SECURITY: THE BIG SURPRISES
Author(s): MARK MINASI
Publisher: JOHN WILEY (Publication Year:2006)
Call No: 005.8 MIN
Accession No: 74878 - 47DATA PROTECTION FOR VIRTUAL DATA CENTERS
Author(s): JASON BUFFINGTON
Publisher: JOHN WILEY (Publication Year:2010)
Subject(s): DATA PROTECTION, VIRTUAL COMPUTER SYSTEMS, MICROSOFT WINDOWS SERVER
Call No: 005.8 BUF
Accession No: 81370 - 48AUDITING CLOUD COMPUTING: A SECURITY AND PRIVACY GUIDE
Author(s): BEN HALPERT
Publisher: JOHN WILEY (Publication Year:2011)
Subject(s): INFORMATION TECHNOLOGY, DATA PROTECTION, COMPUTER NETWORKS SECURITY MEASURES, SECURITY MEASURES, CLOUD COMPUTING, BUSINESS ENTERPRISES - SECURITY MEASURES
Call No: 005.8 HAL
Accession No: 104130 - 49CISSP PREPARATION GUIDE (WITH CD-ROM)
Author(s): RONALD.L KRUTZ, RUSSELL DEAN VINES
Publisher: JOHN WILEY (Publication Year:2003)
Subject(s): EXAMINATIONS-STUDY GUIDES, COMPUTER NETWORKS, ELECTRONIC DATA PROCESSING
Call No: 005.8 KRU
Accession No: 69498 - 50PRIVACY IS POWER: WHY AND HOW YOU SHOULD TAKE BACK CONTROL OF YOUR DATA
Author(s): CARISSA VELIZ
Publisher: CORGI BOOKS (Publication Year:2020)
Subject(s): COMPUTER SECURITY, DATA PROTECTION, INTERNET - SECURITY MEASURES, BIG DATA, PRIVACY, RIGHT OF
Call No: 005.8 VEL
Accession No: 103864