Search Results for Data processing - Narrowed by: Computer securitySirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dData$002bprocessing$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ic$003dtrue$0026ps$003d300?2026-02-21T03:38:04ZThe new school information securityent://SD_ILS/0/SD_ILS:999922026-02-21T03:38:04Z2026-02-21T03:38:04ZShostack, Adam<br/>2008<br/>ISBN 9780321502780<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:831112026-02-21T03:38:04Z2026-02-21T03:38:04ZLayton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849370878<br/>Managing cybersecurity resources : a cost-benefit analysisent://SD_ILS/0/SD_ILS:584412026-02-21T03:38:04Z2026-02-21T03:38:04ZGordon, Lawrence A.<br/>2006<br/>ISBN 9780071452854<br/>The ciso handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:709612026-02-21T03:38:04Z2026-02-21T03:38:04ZGentile, Michael<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849319525<br/>Protecting your library's digital source : The essential guide to planning and preservationent://SD_ILS/0/SD_ILS:1200112026-02-21T03:38:04Z2026-02-21T03:38:04ZKahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838908730<br/>