Search Results for - Narrowed by: Computer security. SirsiDynix Enterprise https://libraryconnect.iie.ac.za/client/en_US/iie/iie/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026av$003d0$0026ps$003d300$0026isd$003dtrue? 2025-06-03T02:59:04Z Principles of information security ent://SD_ILS/0/SD_ILS:21870 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Whitman, Michael E., 1964- author.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281864&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281864&site=ehost-live</a><br/>Format:&#160;Books<br/>Publication Date&#160;2018<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:55010 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Stallings, William author.<br/>Format:&#160;Books<br/>Publication Date&#160;2017<br/> Cyber Security : A practitioner's guide ent://SD_ILS/0/SD_ILS:55778 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Sutton, David (Information security practitioner), author.<br/><a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live</a><br/>Format:&#160;Books<br/>Publication Date&#160;2017<br/> Principles of information security ent://SD_ILS/0/SD_ILS:320 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Whitman, Michael E., 1964- author.<br/>Format:&#160;Books<br/>Publication Date&#160;2016<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:54286 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Mukhopadhyay, Debdeep.<br/>Format:&#160;Books<br/>Publication Date&#160;2015<br/> Security in computing ent://SD_ILS/0/SD_ILS:55788 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Pfleeger, Charles P., 1948- author.<br/><a href="http://catalogue.londonmet.ac.uk/record=b1680851~S1">E-book</a><br/>Format:&#160;Regular print<br/>Publication Date&#160;2015<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:50496 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Stallings, William, author.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> The basics of IT audit Purposes, processes, and practical information. ent://SD_ILS/0/SD_ILS:51755 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Gantz, Stephen D.<br/><a href="http://esc-web.lib.cbs.dk/login?url=http://www.sciencedirect.com/science/book/9780124171596">Campus and remote access</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780124171596">Available by subscription from Safari Books Online</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780124171596">http://proquest.tech.safaribooksonline.de/9780124171596</a><br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2014<br/> Introduction to Computer Security: Pearson New International Edition ent://SD_ILS/0/SD_ILS:53871 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Goodrich, M. T. (Michael T.)<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Computer security literacy : staying safe in a digital world ent://SD_ILS/0/SD_ILS:50223 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Jacobson, Douglas.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Hacking exposed : mobile security secrets &amp;amp; solutions ent://SD_ILS/0/SD_ILS:50511 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Bergman, Neil.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Network security : a beginner's guide ent://SD_ILS/0/SD_ILS:51556 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Maiwald, Eric.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Principles of information security ent://SD_ILS/0/SD_ILS:16413 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Whitman, Michael E., 1964-<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Hacking web apps : detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:50711 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Shema, Mike, author.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:50554 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Mj&oslash;lsnes, Stig F.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Role mining in business : taming role-based access control administration ent://SD_ILS/0/SD_ILS:54647 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Colantonio, Alessandro.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:43689 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Stallings, William.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:51544 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Harper, Allen.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Managing risk in information systems ent://SD_ILS/0/SD_ILS:52192 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Gibson, Darril.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> The essential guide to home computer security ent://SD_ILS/0/SD_ILS:53912 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Rowlingson, Robert.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:44880 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Moeller, Robert R.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Hacking exposed computer forensics : secrets &amp;amp; solutions ent://SD_ILS/0/SD_ILS:41497 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Davis, Chris.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:43086 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Merkow, Mark S.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Mobile device security : a comprehensive guide to securing your information in a moving world ent://SD_ILS/0/SD_ILS:43280 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Fried, Stephen, 1962-<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:46362 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Timm, Carl.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Digital rights management for e-commerce systems ent://SD_ILS/0/SD_ILS:35143 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Drossos, Lambros, 1961-<br/>Format:&#160;Books<br/>Publication Date&#160;2009<br/> Principles of information security ent://SD_ILS/0/SD_ILS:43247 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Whitman, Michael E., 1964-<br/>Format:&#160;Books<br/>Publication Date&#160;2009<br/> Management of information security ent://SD_ILS/0/SD_ILS:34358 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Whitman, Michael E., 1964-<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Guide to computer forensics and investigations ent://SD_ILS/0/SD_ILS:35367 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Nelson, Bill.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Microsoft&reg; Windows server 2008 security resource kit ent://SD_ILS/0/SD_ILS:6679 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Johansson, Jesper M.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Security and software for cybercafes ent://SD_ILS/0/SD_ILS:34772 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Adomi, Esharenana E.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> IT governance : a manager's guide to data security and ISO 27001/ISO 27002 ent://SD_ILS/0/SD_ILS:37040 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Calder, Alan, 1957-<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Security in computing ent://SD_ILS/0/SD_ILS:34329 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Pfleeger, Charles P., 1948-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0619/2006026798.html">http://www.loc.gov/catdir/toc/ecip0619/2006026798.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:34332 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Stallings, William.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0706/2006287096.html">http://www.loc.gov/catdir/toc/fy0706/2006287096.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Windows Vista security : securing Vista against malicious attacks ent://SD_ILS/0/SD_ILS:36285 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Grimes, Roger A.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0718/2007020135.html">http://www.loc.gov/catdir/toc/ecip0718/2007020135.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Network security hacks ent://SD_ILS/0/SD_ILS:33761 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Lockhart, Andrew.<br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Risks, controls, and security : concepts and applications ent://SD_ILS/0/SD_ILS:39947 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Raval, Vasant H. (Vasant Harishanker), 1940-<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0714/2007273982-d.html">http://www.loc.gov/catdir/enhancements/fy0714/2007273982-d.html</a> Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0740/2007273982-b.html">http://www.loc.gov/catdir/enhancements/fy0740/2007273982-b.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0740/2007273982-t.html">http://www.loc.gov/catdir/enhancements/fy0740/2007273982-t.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> The unofficial guide to ethical hacking ent://SD_ILS/0/SD_ILS:9017 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Fadia, Ankit, 1985-<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Professional ASP.NET 2.0 security, membership, and role management ent://SD_ILS/0/SD_ILS:33235 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Schackow, Stefan, 1970-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip063/2005032278.html">http://www.loc.gov/catdir/toc/ecip063/2005032278.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Information technology security &amp;amp; risk management ent://SD_ILS/0/SD_ILS:35718 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Slay, Jill.<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:31545 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Stallings, William.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0608/2006276085.html">http://www.loc.gov/catdir/toc/fy0608/2006276085.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Privacy protection for e-services ent://SD_ILS/0/SD_ILS:31987 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Yee, George.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip063/2005032104.html">http://www.loc.gov/catdir/toc/ecip063/2005032104.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Look both ways : help protect your family on the Internet ent://SD_ILS/0/SD_ILS:33840 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Criddle, Linda.<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Computer security ent://SD_ILS/0/SD_ILS:35968 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Gollmann, Dieter.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0519/2005026866.html">http://www.loc.gov/catdir/toc/ecip0519/2005026866.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Software security : building security in ent://SD_ILS/0/SD_ILS:54971 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;McGraw, Gary, 1966-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip062/2005031598.html">http://www.loc.gov/catdir/toc/ecip062/2005031598.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> The executive guide to information security : threats, challenges, and solutions ent://SD_ILS/0/SD_ILS:29022 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Egan, Mark.<br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Implementing database security and auditing ent://SD_ILS/0/SD_ILS:29347 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Ben-Natan, Ron.<br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Computer forensics jumpstart ent://SD_ILS/0/SD_ILS:36452 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Solomon, Michael (Michael G.), 1963-<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Information security illuminated ent://SD_ILS/0/SD_ILS:43414 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Solomon, Michael (Michael G.), 1963-<br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Security for mobility ent://SD_ILS/0/SD_ILS:28202 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Mitchell, Chris, 1953-<br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Software forensics : collecting evidence from the scene of a digital crime ent://SD_ILS/0/SD_ILS:28510 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Slade, Robert M.<br/>Publisher description <a href="http://www.loc.gov/catdir/description/mh041/2003070176.html">http://www.loc.gov/catdir/description/mh041/2003070176.html</a> Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003070176.html">http://www.loc.gov/catdir/bios/mh042/2003070176.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/mh041/2003070176.html">http://www.loc.gov/catdir/toc/mh041/2003070176.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Digital fortress ent://SD_ILS/0/SD_ILS:11763 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Brown, Dan, 1964-<br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Security in computing ent://SD_ILS/0/SD_ILS:27981 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Pfleeger, Charles P., 1948-<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Practical UNIX and Internet security. ent://SD_ILS/0/SD_ILS:31544 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Garfinkel, Simson.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Network security : a practical guide ent://SD_ILS/0/SD_ILS:34327 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Poole, Owen.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Internet security ent://SD_ILS/0/SD_ILS:36371 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Holden, Greg.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> PC disaster and recovery ent://SD_ILS/0/SD_ILS:10310 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Chase, Kate.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-t.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-t.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-b.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-d.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:20080 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Stallings, William.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Web services security ent://SD_ILS/0/SD_ILS:26083 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;O'Neill, Mark.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Building open source network security tools : components and techniques ent://SD_ILS/0/SD_ILS:29673 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Schiffman, Mike.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/wiley031/2002011320.html">http://www.loc.gov/catdir/toc/wiley031/2002011320.html</a> Publisher description <a href="http://www.loc.gov/catdir/description/wiley036/2002011320.html">http://www.loc.gov/catdir/description/wiley036/2002011320.html</a> Contributor biographical information <a href="http://www.loc.gov/catdir/bios/wiley043/2002011320.html">http://www.loc.gov/catdir/bios/wiley043/2002011320.html</a><br/>Format:&#160;Regular print<br/>Publication Date&#160;2003<br/> Writing secure code ent://SD_ILS/0/SD_ILS:40250 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Howard, Michael, 1965-<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Planning for PKI : best practices guide for deploying public key infrastructure ent://SD_ILS/0/SD_ILS:23889 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Housley, Russ, 1959-<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Maximum security ent://SD_ILS/0/SD_ILS:24151 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z Format:&#160;Books<br/>Publication Date&#160;2001<br/> Auditing and security : AS/400, NT, UNIX, networks, and disaster recovery plans ent://SD_ILS/0/SD_ILS:24164 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Musaji, Yusufali F.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Cryptography and e-commerce : a Wiley tech brief ent://SD_ILS/0/SD_ILS:24286 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Graff, Jon.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Security transformation : digital defense strategies to protect your company's reputation and market share ent://SD_ILS/0/SD_ILS:24555 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;McCarthy, Mary Pat.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Information security policies, procedures, and standards : guidelines for effective information security management ent://SD_ILS/0/SD_ILS:24935 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Peltier, Thomas R.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Security engineering : a guide to building dependable distributed systems ent://SD_ILS/0/SD_ILS:31543 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Anderson, Ross, 1956-<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Electronic government and electronic signatures ent://SD_ILS/0/SD_ILS:24384 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Relyea, Harold.<br/>Format:&#160;Books<br/>Publication Date&#160;2000<br/> Secure electronic commerce : building the infrastructure for digital signatures and encryption ent://SD_ILS/0/SD_ILS:26324 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Ford, Warwick.<br/>Format:&#160;Books<br/>Publication Date&#160;2000<br/> Secrets and lies : digital security in a networked world ent://SD_ILS/0/SD_ILS:14171 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Schneier, Bruce, 1963-<br/>Table of contents <a href="http://www.gbv.de/dms/ilmenau/toc/314774726.PDF">Kostenfrei</a> Table of contents <a href="http://catdir.loc.gov/catdir/toc/onix04/00042252.html">http://catdir.loc.gov/catdir/toc/onix04/00042252.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html">http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/description/wiley0310/00042252.html">http://catdir.loc.gov/catdir/description/wiley0310/00042252.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2000<br/> Security technologies for the World Wide Web ent://SD_ILS/0/SD_ILS:23263 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Oppliger, Rolf.<br/>Format:&#160;Books<br/>Publication Date&#160;1999<br/> Computer security ent://SD_ILS/0/SD_ILS:25226 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Gollmann, Dieter.<br/>Table of Contents <a href="http://www.loc.gov/catdir/toc/onix05/98042538.html">http://www.loc.gov/catdir/toc/onix05/98042538.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;1999<br/> Security in computing ent://SD_ILS/0/SD_ILS:25227 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Pfleeger, Charles P., 1948-<br/>Format:&#160;Books<br/>Publication Date&#160;1997<br/> Computer security ent://SD_ILS/0/SD_ILS:25229 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Carroll, John Millar.<br/>Format:&#160;Books<br/>Publication Date&#160;1996<br/> Computers, ethics &amp;amp; social values ent://SD_ILS/0/SD_ILS:26311 2025-06-03T02:59:04Z 2025-06-03T02:59:04Z by&#160;Johnson, Deborah G., 1945-<br/>Format:&#160;Books<br/>Publication Date&#160;1995<br/>