Search Results for Data processing - Narrowed by: Computer securitySirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dData$002bprocessing$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026pe$003dd$00253A$0026ps$003d300?2025-11-11T09:31:09ZThe new school information securityent://SD_ILS/0/SD_ILS:999922025-11-11T09:31:09Z2025-11-11T09:31:09ZShostack, Adam<br/>2008<br/>ISBN 9780321502780<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:831112025-11-11T09:31:09Z2025-11-11T09:31:09ZLayton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849370878<br/>Managing cybersecurity resources : a cost-benefit analysisent://SD_ILS/0/SD_ILS:584412025-11-11T09:31:09Z2025-11-11T09:31:09ZGordon, Lawrence A.<br/>2006<br/>ISBN 9780071452854<br/>The ciso handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:709612025-11-11T09:31:09Z2025-11-11T09:31:09ZGentile, Michael<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849319525<br/>Protecting your library's digital source : The essential guide to planning and preservationent://SD_ILS/0/SD_ILS:1200112025-11-11T09:31:09Z2025-11-11T09:31:09ZKahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838908730<br/>