Search Results for Data processing - Narrowed by: Computer securitySirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dData$002bprocessing$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ic$003dtrue$0026ps$003d300?dt=list2025-09-12T00:02:34ZThe new school information securityent://SD_ILS/0/SD_ILS:999922025-09-12T00:02:34Z2025-09-12T00:02:34ZShostack, Adam<br/>2008<br/>ISBN 9780321502780<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:831112025-09-12T00:02:34Z2025-09-12T00:02:34ZLayton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849370878<br/>Managing cybersecurity resources : a cost-benefit analysisent://SD_ILS/0/SD_ILS:584412025-09-12T00:02:34Z2025-09-12T00:02:34ZGordon, Lawrence A.<br/>2006<br/>ISBN 9780071452854<br/>The ciso handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:709612025-09-12T00:02:34Z2025-09-12T00:02:34ZGentile, Michael<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849319525<br/>Protecting your library's digital source : The essential guide to planning and preservationent://SD_ILS/0/SD_ILS:1200112025-09-12T00:02:34Z2025-09-12T00:02:34ZKahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838908730<br/>