Log In
|
My Account
|
My Lists
|
Enable Accessibility Mode
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
Library Search
Library Favorites Search
Rooms Content Search
DiXML Search
PDF Search
Other Marc Search
Asset Search
Electronic Resources Search
Rooms Restriction Values
All Fields
Author
Keyword in Author headings
Title
Subject
Keyword in Subject headings
ISBN
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
86 Results Found
1
..
4
5
6
7
8
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
00
IIE
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
1.
Security in computing
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
1997
Excerpt:
Computer security.
Available:
Copies:
2.
Computers, ethics & social values
by
Johnson, Deborah G., 1945-
Format:
Books
Publication Date
1995
Excerpt:
Computer security.
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
..
4
5
6
7
8
Limit Search Results
Narrowed by:
Included
Subject: Computer security.
Access Level
Include
Exclude
0
1
2
3
4
Author
Include
Exclude
Stallings, William.
(4)
Garfinkel, Simson.
(3)
Mattord, Herbert J.
(3)
Pfleeger, Charles P., 1948-
(3)
Spafford, Gene.
(3)
Whitman, Michael E., 1964-
(3)
Gollmann, Dieter.
(2)
Johansson, Jesper M.
(2)
Mattord, Herbert J., author.
(2)
Pfleeger, Shari Lawrence.
(2)
Solomon, Michael (Michael G.), 1963-
(2)
Stallings, William, author.
(2)
Whitman, Michael E., 1964- author.
(2)
Adomi, Esharenana E.
(1)
Anderson, Ross, 1956-
(1)
Andress, Jason.
(1)
Andrews, Chip.
(1)
Barrett, Diane.
(1)
Baum, Michael S.
(1)
Ben-Natan, Ron.
(1)
Bergman, Neil.
(1)
Brenton, Chris.
(1)
Broom, Neil.
(1)
Brown, Dan, 1964-
(1)
Brown, Lawrie, author.
(1)
Brownstein, Rob.
(1)
Calder, Alan, 1957-
(1)
Campbell, Stuart.
(1)
Carroll, John Millar.
(1)
Chakraborty, Rajat Subhra.
(1)
Chandavarkar, B.R., contributor.
(1)
Chapple, Mike.
(1)
Chase, Kate.
(1)
Colantonio, Alessandro.
(1)
Cowen, David.
(1)
Criddle, Linda.
(1)
Davis, Chris.
(1)
Dewan, Sheena.
(1)
Di Pietro, Roberto (Computer scientist)
(1)
Drossos, Lambros, 1961-
(1)
Egan, Mark.
(1)
Ely, Adam.
(1)
Fadia, Ankit, 1985-
(1)
Fichadia, Ashok.
(1)
Ford, Warwick.
(1)
Fried, Stephen, 1962-
(1)
Gantz, Stephen D.
(1)
Garfinkel, Simson. Practical UNIX security.
(1)
Gauntlett, Andrew.
(1)
Gibson, Darril.
(1)
Goodrich, M. T. (Michael T.)
(1)
Graff, Jon.
(1)
Grimes, Roger A.
(1)
Harper, Allen.
(1)
Holden, Greg.
(1)
Housley, Russ, 1959-
(1)
Howard, Doug.
(1)
Howard, Michael, 1965-
(1)
Howard, Michael, 1965-.
(1)
Hunt, Cameron.
(1)
Idziorek, Joseph.
(1)
Institution of Electrical Engineers.
(1)
Jacobson, Douglas.
(1)
Johnson, Deborah G., 1945-
(1)
Koronios, Andy.
(1)
LeBlanc, David, 1960-
(1)
Lockhart, Andrew.
(1)
Maiwald, Eric.
(1)
Margulies, Jonathan, author.
(1)
Mather, Tim.
(1)
McCarthy, Mary Pat.
(1)
McGraw, Gary, 1966-
(1)
Merkow, Mark S.
(1)
Microsoft Security Team.
(1)
Mitchell, Chris, 1953-
(1)
Mjølsnes, Stig F.
(1)
Moeller, Robert R.
(1)
Muir, Nancy.
(1)
Mukhopadhyay, Debdeep.
(1)
Musaji, Yusufali F.
(1)
Nelson, Bill.
(1)
Nissenbaum, Helen.
(1)
Nunno, Richard M.
(1)
O'Neill, Mark.
(1)
Ocello, Alberto.
(1)
Oppliger, Rolf.
(1)
Peltier, Thomas R.
(1)
Perez, Richard, 1969 October 17-
(1)
Pfleeger, Charles P., 1948- author.
(1)
Pfleeger, Shari Lawrence, author.
(1)
Philipp, Aaron.
(1)
Polk, Tim, 1962-
(1)
Poole, Owen.
(1)
Prince, Kevin.
(1)
Raghavan, Lakshmikanth.
(1)
Raval, Vasant H. (Vasant Harishanker), 1940-
(1)
Relyea, Harold.
(1)
Rouse, Jason.
(1)
Rowlingson, Robert.
(1)
Scambray, Joel.
(1)
Schackow, Stefan, 1970-
(1)
Schiffman, Mike.
(1)
Schneier, Bruce, 1963-
(1)
Schwartz, Alan, 1970-
(1)
Shema, Mike, author.
(1)
Slade, Robert M.
(1)
Slay, Jill.
(1)
Stallings, William author.
(1)
Stanfield, Mike.
(1)
Stevens, Alex, author.
(1)
Sutton, David (Information security practitioner), author.
(1)
Tamassia, Roberto, 1960-
(1)
Timm, Carl.
(1)
Watkins, Steve, 1970-
(1)
Wiles, Jack.
(1)
Wyler, Neil.
(1)
Yee, George.
(1)
More
View All
Fewer
Collapse All
Format
Include
Exclude
Books
(81)
Regular print
(3)
Electronic Resources
(2)
Item Category 1
Include
Exclude
Developer Books
Fiction Books
Lecturer Books
Non-Fiction Books
Prescribed Books
Recommended Books
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Audio-visual equipment
General Books
Lecturer Books
Prescribed books
Recommended Books
Unknown
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(86)
Library
Include
Exclude
Cataloguing
IIE Sandton
IIEMSA
RC Bloemfontein
RC Braamfontein
RC Cape Town
RC Durban
RC Nelson Mandela Bay
RC Pietermaritzburg
RC Polokwane
RC Pretoria CBD
VC Cape Town
VC Durban North
VC Nelson Mandela Bay
VC Pietermaritzburg
VC Pretoria
VC Sandton
VC Waterfall
VC Westville
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
On-Shelf Blackboard Learn (IIE CAT only)
On-Shelf Faculty ICT (IIE CAT only)
On-Shelf Lecturer
On-Shelf Student
Short Loans
Standard shelving location
More
View All
Fewer
Collapse All
Publication Date
Include
Exclude
1991-1997
1999-2004
2005-2009
2010-2014
2015-2025
Subject
Include
Exclude
Computer networks -- Security measures.
(33)
Data protection.
(11)
Privacy, Right of.
(6)
Computer crimes -- Prevention.
(4)
Hackers.
(4)
cryptographie.
(4)
Business enterprises -- Computer networks -- Security measures.
(3)
Datensicherung.
(3)
Forensic sciences.
(3)
Internet -- Security measures.
(3)
Operating systems (Computers)
(3)
sécurité réseau.
(3)
Computer crimes -- Investigation.
(2)
Computer crimes.
(2)
Computers -- Access control.
(2)
Data encryption (Computer science)
(2)
Database security.
(2)
Electronic commerce.
(2)
Firewalls (Computer security)
(2)
Information technology -- Auditing.
(2)
Internet.
(2)
Microsoft Windows (Computer file)
(2)
Mobile communication systems -- Security measures.
(2)
UNIX (Computer file)
(2)
UNIX.
(2)
authentification.
(2)
Active server pages.
(1)
Adventure fiction.
(1)
Application software -- Security measures.
(1)
Business -- Data processing.
(1)
COMPUTERS / Computer Engineering.
(1)
COMPUTERS / Networking / General.
(1)
COMPUTERS / Networking / Security.
(1)
COMPUTERS / Security / Cryptography.
(1)
COMPUTERS / Security / General.
(1)
Cell phone systems -- Security measures.
(1)
Coding theory.
(1)
Computer architecture.
(1)
Computer fraud & hacking.
(1)
Computer networks.
(1)
Computer scientists -- Professional ethics.
(1)
Computer security
(1)
Computer security -- Fiction.
(1)
Computer security -- Forecasting.
(1)
Computer software -- Development.
(1)
Computer software -- Reliability.
(1)
Computerbeveiliging.
(1)
Computerkriminalität.
(1)
Computernetwerken.
(1)
Computers -- Circuits -- Design and construction.
(1)
Computers -- Moral and ethical aspects.
(1)
Computers and civilization.
(1)
Computers and families.
(1)
Computersicherheit.
(1)
Copyright and electronic data processing.
(1)
Cryptographers -- Fiction.
(1)
Cryptography.
(1)
Cyber intelligence (Computer security)
(1)
Cybercafes -- Security measures.
(1)
Data encryption (Computer science).
(1)
Data recovery (Computer science)
(1)
Data security.
(1)
Databescherming.
(1)
Eindringerkennung.
(1)
Electronic books.
(1)
Electronic commerce -- Security measures.
(1)
Electronic commerce -- Technological innovations.
(1)
Electronic data processing -- Auditing.
(1)
Electronic data processing -- Distributed processing.
(1)
Electronic data processing departments -- Auditing.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronic government information.
(1)
Electronic information resources -- Access control.
(1)
Entreprises -- Réseaux d'ordinateurs -- Mesures de sûreté.
(1)
Fiction.
(1)
Information resources management.
(1)
Information technology -- Management.
(1)
Information technology -- Security measures.
(1)
Integrated circuits -- Design and construction.
(1)
Intelligence officers -- United States -- Fiction.
(1)
Internet -- Congresses.
(1)
Internet -- Safety measures.
(1)
Internet and children.
(1)
KERBEROS.
(1)
Malware (Computer software) -- Prevention.
(1)
Management information systems -- Security measures.
(1)
Management information systems.
(1)
Microcomputers -- Maintenance and repair.
(1)
Microsoft .NET Framework.
(1)
Mobile communication systems.
(1)
Mobile computing -- Security measures.
(1)
Mobile computing.
(1)
Multidisciplinary design optimization.
(1)
NFS.
(1)
Online social networks -- Security measures.
(1)
Ordinateurs -- Accès -- Contrôle.
(1)
RPC.
(1)
Rechnernetz.
(1)
Réseaux d'ordinateurs -- Mesures de sûreté.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(1)
SQL server.
(1)
Sicherheit.
(1)
Suspense fiction -- gsafd.
(1)
Sécurité informatique.
(1)
TCP-IP.
(1)
TECHNOLOGY & ENGINEERING / Electrical.
(1)
UNIX (système d'exploitation des ordinateurs)
(1)
UNIX. (Computer file)
(1)
UUCP.
(1)
United States. National Security Agency -- Fiction.
(1)
United States. National Security Agency.
(1)
WWW.
(1)
Web 2.0 -- Security measures.
(1)
Web site development -- Security measures.
(1)
Web site development.
(1)
Web sites -- Security measures.
(1)
Windows (Computer programs)
(1)
World Wide Web -- Security measures.
(1)
droit informatique.
(1)
fiabilité logiciel.
(1)
identification.
(1)
internet.
(1)
mur pare-feu.
(1)
protection incendie.
(1)
sécurité information.
(1)
sécurité informatique.
(1)
sécurité ordinateur.
(1)
sécurité système exploitation.
(1)
sécurité système.
(1)
sécurité télécommunication.
(1)
More
View All
Fewer
Collapse All
Item Available
Include
Exclude
0
Advanced Search Location
Include
Exclude
Cataloguing
IIE Sandton
IIEMSA
RC Bloemfontein
RC Braamfontein
RC Cape Town
RC Durban
RC Nelson Mandela Bay
RC Pietermaritzburg
RC Polokwane
RC Pretoria CBD
VC Cape Town
VC Durban North
VC Nelson Mandela Bay
VC Pietermaritzburg
VC Pretoria
VC Sandton
VC Waterfall
VC Westville
More
View All
Fewer
Collapse All
true
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}