IT Security, data Security
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 71 - 80 of total 163 results.- 71THE DEVELOPER'S PLAYBOOK FOR LARGE LANGUAGE MODEL SECURITY: BUILDING SECURE AI APPLICATIONS
Author(s): STEVE WILSON
Publisher: O'REILLY MEDIA (Publication Year:2024)
Subject(s): ARTIFICIAL INTELLIGENCE, COMPUTER PROGRAM, COMPUTER NETWORKS SECURITY MEASURES, SECURITY MEASURES, NATURAL LANGUAGE PROCESSING (COMPUTER SCIENCE)
Call No: 005.8 WIL
Accession No: 106846 - 72CYBER SECURITY POLICY GUIDEBOOK
Author(s): JENNIFER BAYUK, JASON HEALEY, PAUL ROHMEYER, MARCUS H. SACHS
Publisher: JOHN WILEY (Publication Year:2012)
Subject(s): INFORMATION TECHNOLOGY, COMPUTER SECURITY, GOVERNMENT POLICY, DATA PROTECTION
Call No: 005.8 BAY
Accession No: 96657 - 73CCNA DATA CENTRE: INTRODUCING CISCO DATA CENTRE NETWORKING STUDY GUIDE: EXAM 640-911
Author(s): TODD LAMMLE, JOHN SWARTZ
Publisher: JOHN WILEY (Publication Year:2014)
Subject(s): EXAMINATIONS-STUDY GUIDES, COMPUTER NETWORKS, ELECTRONIC DATA PROCESSING
Call No: 005.8 LAM
Accession No: 88434 - 74CCNA ROUTING AND SWITCHING STUDY GUIDE: EXAMS 100-101, 200-101, AND 200-120
Author(s): TODD LAMMLE
Publisher: SYBEX (Publication Year:2013)
Subject(s): COMPUTER NETWORKS, ELECTRONIC DATA PROCESSING, COMPUTER CERTIFICATION
Call No: 005.8 LAM
Accession No: 89095 - 75CISSP (ISC)2: CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL OFFICIAL STUDY GUIDE
Author(s): JAMES B. STWEART, DARRIL GIBSON, MIKE CHAPPLE
Publisher: SYBEX (Publication Year:2015)
Subject(s): COMPUTER SECURITY, SECURITY MEASURES
Call No: 005.8 STE
Accession No: 93079 - 76CISSP OFFICIAL (ISC)2 PRACTICE TESTS
Author(s): MIKE CHAPPLE, DAVID SEIDL
Publisher: SYBEX (Publication Year:2016)
Subject(s): COMPUTER SECURITY, SECURITY MEASURES
Call No: 005.8 SEI
Accession No: 93517 - 77CYBERSECURITY ESSENTIALS
Author(s): CHARLES J. BROOKS, CHRISTOPHER GROW, PHILIP CRAIG, DONALD SHORT
Publisher: SYBEX (Publication Year:2018)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 BRO
Accession No: 98559 - 78HACKING THE HACKER: LEARN FROM THE EXPERTS WHO TAKE DOWN HACKERS
Author(s): ROGER A. GRIMES
Publisher: JOHN WILEY (Publication Year:2017)
Subject(s): COMPUTER PROGRAMMING
Call No: 005.8 GRI
Accession No: 96498 - 79THE OFFICIAL (ISC)2 GUIDE TO THE CISSP CBK REFERENCE
Author(s): JOHN WARSINSKE
Publisher: SYBEX (Publication Year:2019)
Subject(s): TELECOMUNICATIONS, COMPUTER NETWORKS SECURITY MEASURES, ENGINEERING
Call No: 005.8 WAR
Accession No: 102939 - 80SOCIAL ENGINEERING: THE SCIENCE OF HUMAN HACKING
Author(s): CHRISTOPHER HADNAGY
Publisher: JOHN WILEY (Publication Year:2018)
Subject(s): COMPUTER SECURITY, SOCIAL ENGINEERING
Call No: 005.8 HAD
Accession No: 99587