Search Results for Data processing - Narrowed by: Computer securitySirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dData$002bprocessing$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300?dt=list2025-09-11T14:45:01ZThe new school information securityent://SD_ILS/0/SD_ILS:999922025-09-11T14:45:01Z2025-09-11T14:45:01ZShostack, Adam<br/>2008<br/>ISBN 9780321502780<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:831112025-09-11T14:45:01Z2025-09-11T14:45:01ZLayton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849370878<br/>Managing cybersecurity resources : a cost-benefit analysisent://SD_ILS/0/SD_ILS:584412025-09-11T14:45:01Z2025-09-11T14:45:01ZGordon, Lawrence A.<br/>2006<br/>ISBN 9780071452854<br/>The ciso handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:709612025-09-11T14:45:01Z2025-09-11T14:45:01ZGentile, Michael<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849319525<br/>Protecting your library's digital source : The essential guide to planning and preservationent://SD_ILS/0/SD_ILS:1200112025-09-11T14:45:01Z2025-09-11T14:45:01ZKahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838908730<br/>