IT Security, data Security
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 51 - 60 of total 158 results.- 51APACHE SPARK IN 24 HOURS
Author(s): JEFFREY AVEN
Publisher: SAMS (Publication Year:2017)
Subject(s): COMPUTER SOFTWARE
Call No: 005.8 AVE
Accession No: 94106 - 52THE HACKER AND THE STATE: CYBER ATTACKS AND THE NEW NORMAL OF GEOPOLITICS
Author(s): BEN BUCHANAN
Publisher: HARVARD UNIVERSITY PRESS (Publication Year:2022)
Subject(s): COMPUTER SECURITY, POLITICAL ASPECTS, CYBERTERRORISM, CYBER INTELLIGENCE, CYBERSPACE, HACKING
Call No: 005.8 BUC
Accession No: 104477 - 53BLOCKCHAIN AND THE LAW: THE RULE OF CODE
Author(s): AARON WRIGHT, PRIMAVERA DE FILIPPI
Publisher: HARVARD UNIVERSITY PRESS (Publication Year:2018)
Subject(s): BLOCKCHAIN, DATA ENCRYPTION (COMPUTER SCIENCE)
Call No: 005.8 WRI
Accession No: 97598 - 54BLOCKCHAIN AND THE LAW: THE RULE OF CODE
Author(s): AARON WRIGHT, PRIMAVERA DE FILIPPI
Publisher: HARVARD UNIVERSITY PRESS (Publication Year:2018)
Subject(s): BLOCKCHAIN, DATA ENCRYPTION (COMPUTER SCIENCE)
Call No: 005.8 WRI
Accession No: 97622 - 55CISSP VIDEO COURSE: (DVD-ROM)
Author(s): SHON HARRIS
Publisher: PEARSON (Publication Year:2009)
Subject(s): EXAMINATIONS-STUDY GUIDES, ELECTRONIC DATA PROCESSING, COMPUTER SECURITY, COMPUTER CERTIFICATION
Call No: 005.8 HAR
Accession No: 82922 - 56COMPUTER AND CYBER SECURITY: PRINCIPLES, ALGORITHM, APPLICATIONS, AND PERSPECTIVES
Author(s): BRIJ B. GUPTA, DHARMA P. AGRAWAL, HAOXIANG WANG
Publisher: CRC PRESS (Publication Year:2019)
Subject(s): COMPUTER SECURITY
Call No: 005.8 GUP
Accession No: 98967 - 57HOW TO ACHIEVE 27001 CERTIFICATION: AN EXAMPLE OF APPLIED COMPLIANCE MANAGEMENT
Author(s): KEITH D. WILLETT, SIGURJON THOR ARNASON
Publisher: SOCIAL INSURANCE ADMINISTRATION (Publication Year:2008)
Subject(s): STUDY AND TEACHING, ELECTRONIC DATA PROCESSING, COMPUTER SECURITY MANAGEMENT
Call No: 005.8 ARN
Accession No: 77920 - 58INFORMATION SECURITY: DESIGN, IMPLEMENTATION, MEASUREMENT AND COMPLIANCE
Author(s): TIMOTHY P. LAYTON
Publisher: TAYLOR AND FRANCIS (Publication Year:2007)
Subject(s): INFORMATION SECURITY, COMPUTER SECURITY, DATA PROTECTION
Call No: 005.8 LAY
Accession No: 80238 - 59CISSP EXAM PREP: QUESTIONS, ANSWERS & EXPLANATIONS
Publisher: S.S.I. LOGIC (Publication Year:2010)
Subject(s): EXAMINATIONS-STUDY GUIDES, ELECTRONIC DATA PROCESSING, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 CIS
Accession No: 83087 - 60PRIVACY PROGRAM MANAGEMENT: TOOLS FOR MANAGING PRIVACY WITHIN YOUR ORGANISZATION
Author(s): RUSSELL R. DENSMORE
Publisher: INTERNATIONAL ASSOCIATION OF PRIVACY PROFESSIONALS (Publication Year:2013)
Subject(s): ORGANIZATIONAL MANAGEMENT, PRIVACY, RIGHT OF
Call No: 005.8 DEN
Accession No: 96077