Log In
|
My Account
|
My Lists
|
Enable Accessibility Mode
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
Library Search
Library Favorites Search
Rooms Content Search
DiXML Search
PDF Search
Other Marc Search
Asset Search
Electronic Resources Search
Rooms Restriction Values
All Fields
Author
Keyword in Author headings
Title
Subject
Keyword in Subject headings
ISBN
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
IIE
Teaching and Learning
Library Events
Faculty of Commerce
Faculty of Humanities
Faculty of ICT
Faculty of Social Science
Distance Education
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
14 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
00
IIE
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
Information security policies, procedures, and standards : guidelines for effective information security management
Information security policies, procedures, and standards : guidelines for effective information security management
by
Peltier, Thomas R.
Format:
Books
Publication Date
2001
Excerpt:
Data protection.
Available:
Copies:
14.
Security in computing
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
1997
Excerpt:
Data protection.
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
Limit Search Results
Narrowed by:
Included
Subject: Data protection.
Access Level
Include
Exclude
0
1
2
3
4
Author
Include
Exclude
Pfleeger, Charles P., 1948-
(3)
Pfleeger, Shari Lawrence.
(2)
Babiak, Jan.
(1)
Ben-Natan, Ron.
(1)
Butters, John.
(1)
Calder, Alan, 1957-
(1)
Doll, Mark W.
(1)
Drossos, Lambros, 1961-
(1)
Fried, Stephen, 1962-
(1)
Fuchs, Christian, 1976-
(1)
Margulies, Jonathan, author.
(1)
Peltier, Thomas R.
(1)
Pfleeger, Charles P., 1948- author.
(1)
Pfleeger, Shari Lawrence, author.
(1)
Slade, Robert M.
(1)
Van Tassel, Joan M.
(1)
Watkins, Steve, 1970-
(1)
Yee, George.
(1)
More
View All
Fewer
Collapse All
Format
Include
Exclude
Books
(13)
Regular print
(1)
Item Category 1
Include
Exclude
1:PRES-BOOK
1:REC-BOOK
Material Type
Include
Exclude
1:GEN-BOOK
1:PRES-BOOK
1:REC-BOOK
Language
Include
Exclude
English
(14)
Library
Include
Exclude
1:IIEMSA
1:RCBMF
1:RCPE
1:RCPMB
1:RCPTA
Shelf Location
Include
Exclude
1:OS-STUDENT
1:SHORT-LOAN
Publication Date
Include
Exclude
1997-2001
2003-2004
2005-2006
2007-2009
2010-2015
Subject
Include
Exclude
Computer security.
(11)
Privacy, Right of.
(6)
Copyright and electronic data processing.
(2)
Business enterprises -- Computer networks -- Security measures.
(1)
Computer networks -- Security measures.
(1)
Database security.
(1)
Electronic commerce -- Security measures.
(1)
Electronic commerce -- Technological innovations.
(1)
Electronic surveillance.
(1)
Forensic sciences.
(1)
Internet -- Social aspects
(1)
Internet industry -- Security measures.
(1)
Mobile communication systems -- Security measures.
(1)
Social media.
(1)
More
View All
Fewer
Collapse All
Item Available
Include
Exclude
0
Advanced Search Location
Include
Exclude
1:IIEMSA
1:RCBMF
1:RCPE
1:RCPMB
1:RCPTA
true
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}