Log In
|
My Account
|
My Lists
|
Enable Accessibility Mode
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
Library Search
Library Favorites Search
Rooms Content Search
DiXML Search
PDF Search
Other Marc Search
Asset Search
Electronic Resources Search
Rooms Restriction Values
All Fields
Author
Keyword in Author headings
Title
Subject
Keyword in Subject headings
ISBN
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
IIE
Teaching and Learning
Library Events
Faculty of Commerce
Faculty of Humanities
Faculty of ICT
Faculty of Social Science
Distance Education
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
85 Results Found
1
..
4
5
6
7
8
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
IIE
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
85.
Computers, ethics & social values
Computers, ethics & social values
by
Johnson, Deborah G., 1945-
Format:
Books
Publication Date
1995
Excerpt:
Computer security.
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
..
4
5
6
7
8
Limit Search Results
Narrowed by:
Included
Subject: Computer security.
Access Level
Include
Exclude
0
1
2
3
4
Author
Include
Exclude
Stallings, William.
(4)
Garfinkel, Simson.
(3)
Mattord, Herbert J.
(3)
Pfleeger, Charles P., 1948-
(3)
Spafford, Gene.
(3)
Whitman, Michael E., 1964-
(3)
Gollmann, Dieter.
(2)
Johansson, Jesper M.
(2)
Mattord, Herbert J., author.
(2)
Pfleeger, Shari Lawrence.
(2)
Solomon, Michael (Michael G.), 1963-
(2)
Stallings, William, author.
(2)
Whitman, Michael E., 1964- author.
(2)
Adomi, Esharenana E.
(1)
Anderson, Ross, 1956-
(1)
Andress, Jason.
(1)
Andrews, Chip.
(1)
Barrett, Diane.
(1)
Baum, Michael S.
(1)
Ben-Natan, Ron.
(1)
Bergman, Neil.
(1)
Brenton, Chris.
(1)
Broom, Neil.
(1)
Brown, Dan, 1964-
(1)
Brown, Lawrie, author.
(1)
Brownstein, Rob.
(1)
Calder, Alan, 1957-
(1)
Campbell, Stuart.
(1)
Carroll, John Millar.
(1)
Chakraborty, Rajat Subhra.
(1)
Chandavarkar, B.R., contributor.
(1)
Chapple, Mike.
(1)
Chase, Kate.
(1)
Colantonio, Alessandro.
(1)
Cowen, David.
(1)
Criddle, Linda.
(1)
Davis, Chris.
(1)
Dewan, Sheena.
(1)
Di Pietro, Roberto (Computer scientist)
(1)
Drossos, Lambros, 1961-
(1)
Egan, Mark.
(1)
Ely, Adam.
(1)
Fadia, Ankit, 1985-
(1)
Fichadia, Ashok.
(1)
Ford, Warwick.
(1)
Fried, Stephen, 1962-
(1)
Gantz, Stephen D.
(1)
Garfinkel, Simson. Practical UNIX security.
(1)
Gauntlett, Andrew.
(1)
Gibson, Darril.
(1)
Goodrich, M. T. (Michael T.)
(1)
Graff, Jon.
(1)
Grimes, Roger A.
(1)
Harper, Allen.
(1)
Holden, Greg.
(1)
Housley, Russ, 1959-
(1)
Howard, Doug.
(1)
Howard, Michael, 1965-
(1)
Howard, Michael, 1965-.
(1)
Hunt, Cameron.
(1)
Idziorek, Joseph.
(1)
Institution of Electrical Engineers.
(1)
Jacobson, Douglas.
(1)
Johnson, Deborah G., 1945-
(1)
Koronios, Andy.
(1)
LeBlanc, David, 1960-
(1)
Lockhart, Andrew.
(1)
Maiwald, Eric.
(1)
Margulies, Jonathan, author.
(1)
Mather, Tim.
(1)
McCarthy, Mary Pat.
(1)
McGraw, Gary, 1966-
(1)
Merkow, Mark S.
(1)
Microsoft Security Team.
(1)
Mitchell, Chris, 1953-
(1)
Mjølsnes, Stig F.
(1)
Moeller, Robert R.
(1)
Muir, Nancy.
(1)
Mukhopadhyay, Debdeep.
(1)
Musaji, Yusufali F.
(1)
Nelson, Bill.
(1)
Nissenbaum, Helen.
(1)
Nunno, Richard M.
(1)
O'Neill, Mark.
(1)
Ocello, Alberto.
(1)
Oppliger, Rolf.
(1)
Peltier, Thomas R.
(1)
Perez, Richard, 1969 October 17-
(1)
Pfleeger, Charles P., 1948- author.
(1)
Pfleeger, Shari Lawrence, author.
(1)
Philipp, Aaron.
(1)
Polk, Tim, 1962-
(1)
Poole, Owen.
(1)
Prince, Kevin.
(1)
Raghavan, Lakshmikanth.
(1)
Raval, Vasant H. (Vasant Harishanker), 1940-
(1)
Relyea, Harold.
(1)
Rouse, Jason.
(1)
Rowlingson, Robert.
(1)
Scambray, Joel.
(1)
Schackow, Stefan, 1970-
(1)
Schiffman, Mike.
(1)
Schneier, Bruce, 1963-
(1)
Schwartz, Alan, 1970-
(1)
Shema, Mike, author.
(1)
Slade, Robert M.
(1)
Slay, Jill.
(1)
Stallings, William author.
(1)
Stanfield, Mike.
(1)
Sutton, David (Information security practitioner), author.
(1)
Tamassia, Roberto, 1960-
(1)
Timm, Carl.
(1)
Watkins, Steve, 1970-
(1)
Wiles, Jack.
(1)
Wyler, Neil.
(1)
Yee, George.
(1)
More
View All
Fewer
Collapse All
Format
Include
Exclude
Books
(80)
Regular print
(3)
Electronic Resources
(2)
Item Category 1
Include
Exclude
1:DESK-COPY
1:FICTION
1:LEC-BOOK
1:NON-FICT
1:PRES-BOOK
1:REC-BOOK
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
1:AV-EQUIP
1:GEN-BOOK
1:LEC-BOOK
1:PRES-BOOK
1:REC-BOOK
1:UNKNOWN
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(85)
Library
Include
Exclude
1:IIEMSA
1:IIESDN
1:MAIN
1:RCBMF
1:RCBT
1:RCCT
1:RCDBN
1:RCPE
1:RCPMB
1:RCPO
1:RCPTA
1:VCCT
1:VCDBN
1:VCDW
1:VCPE
1:VCPMB
1:VCPT
1:VCSD
1:VCWF
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
1:DISCARD
1:OS-BBLEARN
1:OS-FAC-ICT
1:OS-LECT
1:OS-STUDENT
1:SHORT-LOAN
1:STACKS
1:STORE
More
View All
Fewer
Collapse All
Publication Date
Include
Exclude
1991-1997
1999-2003
2004-2008
2009-2013
2014-2018
Subject
Include
Exclude
Computer networks -- Security measures.
(33)
Data protection.
(11)
Privacy, Right of.
(6)
Computer crimes -- Prevention.
(4)
Hackers.
(4)
cryptographie.
(4)
Business enterprises -- Computer networks -- Security measures.
(3)
Datensicherung.
(3)
Forensic sciences.
(3)
Internet -- Security measures.
(3)
Operating systems (Computers)
(3)
sécurité réseau.
(3)
Computer crimes -- Investigation.
(2)
Computer crimes.
(2)
Computers -- Access control.
(2)
Data encryption (Computer science)
(2)
Database security.
(2)
Electronic commerce.
(2)
Firewalls (Computer security)
(2)
Information technology -- Auditing.
(2)
Internet.
(2)
Microsoft Windows (Computer file)
(2)
Mobile communication systems -- Security measures.
(2)
UNIX (Computer file)
(2)
UNIX.
(2)
authentification.
(2)
Active server pages.
(1)
Adventure fiction.
(1)
Application software -- Security measures.
(1)
COMPUTERS / Computer Engineering.
(1)
COMPUTERS / Networking / General.
(1)
COMPUTERS / Networking / Security.
(1)
COMPUTERS / Security / Cryptography.
(1)
COMPUTERS / Security / General.
(1)
Cell phone systems -- Security measures.
(1)
Coding theory.
(1)
Computer fraud & hacking.
(1)
Computer networks.
(1)
Computer scientists -- Professional ethics.
(1)
Computer security
(1)
Computer security -- Fiction.
(1)
Computer security -- Forecasting.
(1)
Computer software -- Development.
(1)
Computer software -- Reliability.
(1)
Computerbeveiliging.
(1)
Computerkriminalität.
(1)
Computernetwerken.
(1)
Computers -- Circuits -- Design and construction.
(1)
Computers -- Moral and ethical aspects.
(1)
Computers and civilization.
(1)
Computers and families.
(1)
Computersicherheit.
(1)
Copyright and electronic data processing.
(1)
Cryptographers -- Fiction.
(1)
Cryptography.
(1)
Cyber intelligence (Computer security)
(1)
Cybercafes -- Security measures.
(1)
Data encryption (Computer science).
(1)
Data recovery (Computer science)
(1)
Data security.
(1)
Databescherming.
(1)
Eindringerkennung.
(1)
Electronic books.
(1)
Electronic commerce -- Security measures.
(1)
Electronic commerce -- Technological innovations.
(1)
Electronic data processing -- Auditing.
(1)
Electronic data processing -- Distributed processing.
(1)
Electronic data processing departments -- Auditing.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronic government information.
(1)
Electronic information resources -- Access control.
(1)
Entreprises -- Réseaux d'ordinateurs -- Mesures de sûreté.
(1)
Fiction.
(1)
Information resources management.
(1)
Information technology -- Management.
(1)
Information technology -- Security measures.
(1)
Integrated circuits -- Design and construction.
(1)
Intelligence officers -- United States -- Fiction.
(1)
Internet -- Congresses.
(1)
Internet -- Safety measures.
(1)
Internet and children.
(1)
KERBEROS.
(1)
Malware (Computer software) -- Prevention.
(1)
Management information systems -- Security measures.
(1)
Management information systems.
(1)
Microcomputers -- Maintenance and repair.
(1)
Microsoft .NET Framework.
(1)
Mobile communication systems.
(1)
Mobile computing -- Security measures.
(1)
Mobile computing.
(1)
Multidisciplinary design optimization.
(1)
NFS.
(1)
Online social networks -- Security measures.
(1)
Ordinateurs -- Accès -- Contrôle.
(1)
RPC.
(1)
Rechnernetz.
(1)
Réseaux d'ordinateurs -- Mesures de sûreté.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(1)
SQL server.
(1)
Sicherheit.
(1)
Suspense fiction -- gsafd.
(1)
Sécurité informatique.
(1)
TCP-IP.
(1)
TECHNOLOGY & ENGINEERING / Electrical.
(1)
UNIX (système d'exploitation des ordinateurs)
(1)
UNIX. (Computer file)
(1)
UUCP.
(1)
United States. National Security Agency -- Fiction.
(1)
United States. National Security Agency.
(1)
WWW.
(1)
Web 2.0 -- Security measures.
(1)
Web site development -- Security measures.
(1)
Web site development.
(1)
Web sites -- Security measures.
(1)
Windows (Computer programs)
(1)
World Wide Web -- Security measures.
(1)
droit informatique.
(1)
fiabilité logiciel.
(1)
identification.
(1)
internet.
(1)
mur pare-feu.
(1)
protection incendie.
(1)
sécurité information.
(1)
sécurité informatique.
(1)
sécurité ordinateur.
(1)
sécurité système exploitation.
(1)
sécurité système.
(1)
sécurité télécommunication.
(1)
More
View All
Fewer
Collapse All
Item Available
Include
Exclude
0
1
Advanced Search Location
Include
Exclude
1:IIEMSA
1:IIESDN
1:MAIN
1:RCBMF
1:RCBT
1:RCCT
1:RCDBN
1:RCPE
1:RCPMB
1:RCPO
1:RCPTA
1:VCCT
1:VCDBN
1:VCDW
1:VCPE
1:VCPMB
1:VCPT
1:VCSD
1:VCWF
More
View All
Fewer
Collapse All
true
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}