Search Results for Data processing - Narrowed by: Computer securitySirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dData$002bprocessing$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300$0026isd$003dtrue?2026-02-21T01:22:10ZThe new school information securityent://SD_ILS/0/SD_ILS:999922026-02-21T01:22:10Z2026-02-21T01:22:10ZShostack, Adam<br/>2008<br/>ISBN 9780321502780<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:831112026-02-21T01:22:10Z2026-02-21T01:22:10ZLayton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849370878<br/>Managing cybersecurity resources : a cost-benefit analysisent://SD_ILS/0/SD_ILS:584412026-02-21T01:22:10Z2026-02-21T01:22:10ZGordon, Lawrence A.<br/>2006<br/>ISBN 9780071452854<br/>The ciso handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:709612026-02-21T01:22:10Z2026-02-21T01:22:10ZGentile, Michael<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849319525<br/>Protecting your library's digital source : The essential guide to planning and preservationent://SD_ILS/0/SD_ILS:1200112026-02-21T01:22:10Z2026-02-21T01:22:10ZKahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838908730<br/>