Library - State Bank of Pakistan

IT Security, data Security

⇐ Back to Main Subjects

Sort results by:

Showing 81 - 90 of total 158 results.
  • 81
    CYBER SMART: FIVE HABITS TO PROTECT YOUR FAMILY, MONEY, AND IDENTITY FROM CYBER CRIMINALS
    Author(s): BART R. MCDONOUGH
    Publisher: JOHN WILEY (Publication Year:2019)
    Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
    Call No: 005.8 MCD
    Accession No: 101869
  • 82
    CYBERSECURITY FOR DUMMIES
    Author(s): JOSEPH B STEINBERG
    Publisher: FOR DUMMIES (Publication Year:2020)
    Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
    Call No: 005.8 STE
    Accession No: 102628
  • 83
    OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE
    Author(s): STEVEN DEFINO
    Publisher: COURSE TECHNOLOGY - THOMSON LEARNING (Publication Year:2013)
    Subject(s): ELECTRONIC DATA PROCESSING-SECURITY MEASURES, COMPUTER SECURITY
    Call No: 005.8 DEF
    Accession No: 92812
  • 84
    CYBERSPACE AND CYBERSECURITY
    Author(s): GEORGE KOSTOPOULOS
    Publisher: CRC PRESS (Publication Year:2018)
    Subject(s): COMPUTER CRIMES, COMPUTER NETWORKS SECURITY MEASURES, CYBERSPACE
    Call No: 005.8 KOS
    Accession No: 98236
  • 85
    CISSP PRACTICE EXAMS (WITH CD ROM)
    Author(s): SHON HARRIS, JONATHAN HAM
    Publisher: MCGRAW-HILL BOOK COMPANY (Publication Year:2016)
    Subject(s): ELECTRONIC DATA PROCESSING-SECURITY MEASURES, COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES, EXAMINATIONS
    Call No: 005.8 HAR
    Accession No: 96083
  • 86
    GRAY HAT HACKING: THE ETHICAL HACKER'S HANDBOOK
    Author(s): ALLEN A. HARPER, DANIEL REGALADO, RYAN LINN, STEPHEN SIMS
    Publisher: MCGRAW HILL EDUCATION (Publication Year:2018)
    Subject(s): COMPUTER SECURITY HANDBOOK MANUALS
    Call No: 005.8 HAR
    Accession No: 97915
  • 87
    CISSP ALL-IN-ONE EXAM GUIDE
    Author(s): SHON HARRIS, FERNANDO MAYMI
    Publisher: MCGRAW-HILL BOOK COMPANY (Publication Year:2019)
    Subject(s): TELECOMUNICATIONS, COMPUTER NETWORKS, ENGINEERING, EXAMINATIONS
    Call No: 005.8 HAR
    Accession No: 99000
  • 88
    IT AUDITING : USING CONTROLS TO PROTECT INFORMATION ASSETS
    Author(s): CHRIS DAVIS, MIKE SCHILLER, MIKE KEGERREIS
    Publisher: MCGRAW-HILL BOOK COMPANY (Publication Year:2020)
    Subject(s): AUDITING, ELECTRONIC DATA PROCESSING, COMPUTER NETWORKS SECURITY MEASURES
    Call No: 005.8 KEG
    Accession No: 102754
  • 89
    CSSLP CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL: ALL-IN-ONE EXAM GUIDE
    Author(s): WM. ARTHUR CONKLIN, DANIEL SHOEMAKER
    Publisher: MCGRAW-HILL BOOK COMPANY (Publication Year:2022)
    Subject(s): COMPUTER SECURITY, COMPUTER CERTIFICATION, EXAMINATIONS
    Call No: 005.8 CON
    Accession No: 104596
  • 90
    MANAGING RISK IN INFORMATION SYSTEMS
    Author(s): DARRIL GIBSON
    Publisher: JONES AND BARTLETT PUBLISHERS (Publication Year:2015)
    Subject(s): COMPUTER SECURITY, ELECTRONIC INFORMATION RESOURCES
    Call No: 005.8 GIB
    Accession No: 94174
Showing 81 - 90 of total 158 results.