Log In
|
My Account
|
My Lists
|
Enable Accessibility Mode
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
Library Search
Library Favorites Search
Rooms Content Search
DiXML Search
PDF Search
Other Marc Search
Asset Search
Electronic Resources Search
Rooms Restriction Values
All Fields
Author
Keyword in Author headings
Title
Subject
Keyword in Subject headings
ISBN
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
74 Results Found
1
..
3
4
5
6
7
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
00
IIE
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
1.
Computer security
by
Carroll, John Millar.
Format:
Books
Publication Date
1996
Excerpt:
1:OS-STUDENT
Available:
Copies:
2.
Computers, ethics & social values
by
Johnson, Deborah G., 1945-
Format:
Books
Publication Date
1995
Excerpt:
1:OS-STUDENT
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
..
3
4
5
6
7
Limit Search Results
Narrowed by:
Included
Subject: Computer security.
Access Level
Include
Exclude
0
1
2
3
4
Author
Include
Exclude
Stallings, William.
(4)
Pfleeger, Charles P., 1948-
(3)
Gollmann, Dieter.
(2)
Johansson, Jesper M.
(2)
Mattord, Herbert J.
(2)
Mattord, Herbert J., author.
(2)
Pfleeger, Shari Lawrence.
(2)
Solomon, Michael (Michael G.), 1963-
(2)
Whitman, Michael E., 1964-
(2)
Whitman, Michael E., 1964- author.
(2)
Adomi, Esharenana E.
(1)
Anderson, Ross, 1956-
(1)
Barrett, Diane.
(1)
Baum, Michael S.
(1)
Ben-Natan, Ron.
(1)
Bergman, Neil.
(1)
Broom, Neil.
(1)
Brown, Dan, 1964-
(1)
Brownstein, Rob.
(1)
Calder, Alan, 1957-
(1)
Campbell, Stuart.
(1)
Carroll, John Millar.
(1)
Chakraborty, Rajat Subhra.
(1)
Chandavarkar, B.R., contributor.
(1)
Chapple, Mike.
(1)
Chase, Kate.
(1)
Colantonio, Alessandro.
(1)
Cowen, David.
(1)
Criddle, Linda.
(1)
Davis, Chris.
(1)
Di Pietro, Roberto (Computer scientist)
(1)
Drossos, Lambros, 1961-
(1)
Egan, Mark.
(1)
Ely, Adam.
(1)
Fadia, Ankit, 1985-
(1)
Fichadia, Ashok.
(1)
Ford, Warwick.
(1)
Fried, Stephen, 1962-
(1)
Gantz, Stephen D.
(1)
Garfinkel, Simson.
(1)
Gibson, Darril.
(1)
Goodrich, M. T. (Michael T.)
(1)
Graff, Jon.
(1)
Grimes, Roger A.
(1)
Harper, Allen.
(1)
Holden, Greg.
(1)
Housley, Russ, 1959-
(1)
Howard, Michael, 1965-
(1)
Howard, Michael, 1965-.
(1)
Idziorek, Joseph.
(1)
Institution of Electrical Engineers.
(1)
Jacobson, Douglas.
(1)
Johnson, Deborah G., 1945-
(1)
Koronios, Andy.
(1)
LeBlanc, David, 1960-
(1)
Maiwald, Eric.
(1)
Margulies, Jonathan, author.
(1)
Mather, Tim.
(1)
McCarthy, Mary Pat.
(1)
McGraw, Gary, 1966-
(1)
Merkow, Mark S.
(1)
Microsoft Security Team.
(1)
Mitchell, Chris, 1953-
(1)
Mjølsnes, Stig F.
(1)
Moeller, Robert R.
(1)
Muir, Nancy.
(1)
Mukhopadhyay, Debdeep.
(1)
Musaji, Yusufali F.
(1)
Nelson, Bill.
(1)
Nissenbaum, Helen.
(1)
Nunno, Richard M.
(1)
O'Neill, Mark.
(1)
Ocello, Alberto.
(1)
Oppliger, Rolf.
(1)
Peltier, Thomas R.
(1)
Perez, Richard, 1969 October 17-
(1)
Pfleeger, Charles P., 1948- author.
(1)
Pfleeger, Shari Lawrence, author.
(1)
Philipp, Aaron.
(1)
Polk, Tim, 1962-
(1)
Poole, Owen.
(1)
Raghavan, Lakshmikanth.
(1)
Raval, Vasant H. (Vasant Harishanker), 1940-
(1)
Relyea, Harold.
(1)
Rouse, Jason.
(1)
Rowlingson, Robert.
(1)
Scambray, Joel.
(1)
Schackow, Stefan, 1970-
(1)
Schiffman, Mike.
(1)
Schneier, Bruce, 1963-
(1)
Schwartz, Alan, 1970-
(1)
Shema, Mike, author.
(1)
Slade, Robert M.
(1)
Slay, Jill.
(1)
Spafford, Gene.
(1)
Stallings, William author.
(1)
Stallings, William, author.
(1)
Stanfield, Mike.
(1)
Sutton, David (Information security practitioner), author.
(1)
Tamassia, Roberto, 1960-
(1)
Timm, Carl.
(1)
Watkins, Steve, 1970-
(1)
Yee, George.
(1)
More
View All
Fewer
Collapse All
Format
Include
Exclude
Books
(71)
Regular print
(2)
Electronic Resources
(1)
Item Category 1
Include
Exclude
Developer Books
Fiction Books
Lecturer Books
Non-Fiction Books
Prescribed Books
Recommended Books
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Audio-visual equipment
General Books
Lecturer Books
Prescribed books
Recommended Books
Unknown
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(74)
Library
Include
Exclude
Cataloguing
IIE Sandton
IIEMSA
RC Bloemfontein
RC Braamfontein
RC Cape Town
RC Durban
RC Nelson Mandela Bay
RC Pietermaritzburg
RC Polokwane
RC Pretoria CBD
VC Cape Town
VC Durban North
VC Nelson Mandela Bay
VC Pietermaritzburg
VC Pretoria
VC Sandton
VC Waterfall
VC Westville
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
On-Shelf Blackboard Learn (IIE CAT only)
On-Shelf Faculty ICT (IIE CAT only)
On-Shelf Lecturer
On-Shelf Student
Short Loans
Standard shelving location
More
View All
Fewer
Collapse All
Publication Date
Include
Exclude
1995-1999
2000-2004
2005-2008
2009-2013
2014-2018
Subject
Include
Exclude
Computer networks -- Security measures.
(27)
Data protection.
(11)
Privacy, Right of.
(5)
Computer crimes -- Prevention.
(4)
Business enterprises -- Computer networks -- Security measures.
(3)
Forensic sciences.
(3)
Hackers.
(3)
Computer crimes -- Investigation.
(2)
Computer crimes.
(2)
Computers -- Access control.
(2)
Data encryption (Computer science)
(2)
Datensicherung.
(2)
Electronic commerce.
(2)
Firewalls (Computer security)
(2)
Information technology -- Auditing.
(2)
Internet.
(2)
Microsoft Windows (Computer file)
(2)
Mobile communication systems -- Security measures.
(2)
cryptographie.
(2)
sécurité réseau.
(2)
Active server pages.
(1)
Adventure fiction.
(1)
Application software -- Security measures.
(1)
COMPUTERS / Computer Engineering.
(1)
COMPUTERS / Networking / General.
(1)
COMPUTERS / Networking / Security.
(1)
COMPUTERS / Security / Cryptography.
(1)
COMPUTERS / Security / General.
(1)
Cell phone systems -- Security measures.
(1)
Coding theory.
(1)
Computer fraud & hacking.
(1)
Computer networks.
(1)
Computer scientists -- Professional ethics.
(1)
Computer security -- Fiction.
(1)
Computer software -- Development.
(1)
Computer software -- Reliability.
(1)
Computerkriminalität.
(1)
Computernetwerken.
(1)
Computers -- Circuits -- Design and construction.
(1)
Computers -- Moral and ethical aspects.
(1)
Computers and civilization.
(1)
Computers and families.
(1)
Computersicherheit.
(1)
Copyright and electronic data processing.
(1)
Cryptographers -- Fiction.
(1)
Cryptography.
(1)
Cyber intelligence (Computer security)
(1)
Cybercafes -- Security measures.
(1)
Data encryption (Computer science).
(1)
Data recovery (Computer science)
(1)
Data security.
(1)
Database security.
(1)
Databescherming.
(1)
Eindringerkennung.
(1)
Electronic books.
(1)
Electronic commerce -- Security measures.
(1)
Electronic commerce -- Technological innovations.
(1)
Electronic data processing -- Auditing.
(1)
Electronic data processing -- Distributed processing.
(1)
Electronic data processing departments -- Auditing.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronic government information.
(1)
Electronic information resources -- Access control.
(1)
Entreprises -- Réseaux d'ordinateurs -- Mesures de sûreté.
(1)
Fiction.
(1)
Information technology -- Management.
(1)
Information technology -- Security measures.
(1)
Integrated circuits -- Design and construction.
(1)
Intelligence officers -- United States -- Fiction.
(1)
Internet -- Safety measures.
(1)
Internet -- Security measures.
(1)
Internet and children.
(1)
Malware (Computer software) -- Prevention.
(1)
Management information systems.
(1)
Microcomputers -- Maintenance and repair.
(1)
Microsoft .NET Framework.
(1)
Mobile communication systems.
(1)
Mobile computing -- Security measures.
(1)
Mobile computing.
(1)
Multidisciplinary design optimization.
(1)
Online social networks -- Security measures.
(1)
Operating systems (Computers)
(1)
Rechnernetz.
(1)
Réseaux d'ordinateurs -- Mesures de sûreté.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(1)
Suspense fiction -- gsafd.
(1)
Sécurité informatique.
(1)
TECHNOLOGY & ENGINEERING / Electrical.
(1)
UNIX. (Computer file)
(1)
United States. National Security Agency -- Fiction.
(1)
United States. National Security Agency.
(1)
Web 2.0 -- Security measures.
(1)
Web site development -- Security measures.
(1)
Web site development.
(1)
Web sites -- Security measures.
(1)
Windows (Computer programs)
(1)
World Wide Web -- Security measures.
(1)
authentification.
(1)
fiabilité logiciel.
(1)
identification.
(1)
sécurité information.
(1)
sécurité ordinateur.
(1)
sécurité système.
(1)
More
View All
Fewer
Collapse All
Item Available
Include
Exclude
0
Advanced Search Location
Include
Exclude
Cataloguing
IIE Sandton
IIEMSA
RC Bloemfontein
RC Braamfontein
RC Cape Town
RC Durban
RC Nelson Mandela Bay
RC Pietermaritzburg
RC Polokwane
RC Pretoria CBD
VC Cape Town
VC Durban North
VC Nelson Mandela Bay
VC Pietermaritzburg
VC Pretoria
VC Sandton
VC Waterfall
VC Westville
More
View All
Fewer
Collapse All
true
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}