Search Results for Data processing - Narrowed by: Computer security SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dData$002bprocessing$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300?dt=list 2025-09-11T14:45:01Z The new school information security ent://SD_ILS/0/SD_ILS:99992 2025-09-11T14:45:01Z 2025-09-11T14:45:01Z Shostack, Adam<br/>2008<br/>ISBN&#160;9780321502780<br/> Information security : design, implementation, measurement and compliance ent://SD_ILS/0/SD_ILS:83111 2025-09-11T14:45:01Z 2025-09-11T14:45:01Z Layton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780849370878<br/> Managing cybersecurity resources : a cost-benefit analysis ent://SD_ILS/0/SD_ILS:58441 2025-09-11T14:45:01Z 2025-09-11T14:45:01Z Gordon, Lawrence A.<br/>2006<br/>ISBN&#160;9780071452854<br/> The ciso handbook : a practical guide to securing your company ent://SD_ILS/0/SD_ILS:70961 2025-09-11T14:45:01Z 2025-09-11T14:45:01Z Gentile, Michael<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780849319525<br/> Protecting your library's digital source : The essential guide to planning and preservation ent://SD_ILS/0/SD_ILS:120011 2025-09-11T14:45:01Z 2025-09-11T14:45:01Z Kahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780838908730<br/>