Search Results for 2. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003d2.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2025-10-06T17:41:40ZProfessional ASP.NET 2.0 security, membership, and role managementent://SD_ILS/0/SD_ILS:332352025-10-06T17:41:40Z2025-10-06T17:41:40Zby Schackow, Stefan, 1970-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip063/2005032278.html">http://www.loc.gov/catdir/toc/ecip063/2005032278.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Principles of information securityent://SD_ILS/0/SD_ILS:218702025-10-06T17:41:40Z2025-10-06T17:41:40Zby Whitman, Michael E., 1964- author.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281864&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281864&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2018<br/>Cyber Security : A practitioner's guideent://SD_ILS/0/SD_ILS:557782025-10-06T17:41:40Z2025-10-06T17:41:40Zby Sutton, David (Information security practitioner), author.<br/><a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2017<br/>Principles of information securityent://SD_ILS/0/SD_ILS:3202025-10-06T17:41:40Z2025-10-06T17:41:40Zby Whitman, Michael E., 1964- author.<br/>Format: Books<br/>Publication Date 2016<br/>Security in computingent://SD_ILS/0/SD_ILS:557882025-10-06T17:41:40Z2025-10-06T17:41:40Zby Pfleeger, Charles P., 1948- author.<br/><a href="http://catalogue.londonmet.ac.uk/record=b1680851~S1">E-book</a><br/>Format: Regular print<br/>Publication Date 2015<br/>Hardware security : design, threats, and safeguardsent://SD_ILS/0/SD_ILS:542862025-10-06T17:41:40Z2025-10-06T17:41:40Zby Mukhopadhyay, Debdeep.<br/>Format: Books<br/>Publication Date 2015<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:504962025-10-06T17:41:40Z2025-10-06T17:41:40Zby Stallings, William, author.<br/>Format: Books<br/>Publication Date 2014<br/>Introduction to Computer Security: Pearson New International Editionent://SD_ILS/0/SD_ILS:538712025-10-06T17:41:40Z2025-10-06T17:41:40Zby Goodrich, M. T. (Michael T.)<br/>Format: Books<br/>Publication Date 2014<br/>Computer security literacy : staying safe in a digital worldent://SD_ILS/0/SD_ILS:502232025-10-06T17:41:40Z2025-10-06T17:41:40Zby Jacobson, Douglas.<br/>Format: Books<br/>Publication Date 2013<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:505542025-10-06T17:41:40Z2025-10-06T17:41:40Zby Mjølsnes, Stig F.<br/>Format: Books<br/>Publication Date 2012<br/>Principles of information securityent://SD_ILS/0/SD_ILS:164132025-10-06T17:41:40Z2025-10-06T17:41:40Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2012<br/>Hacking web apps : detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:507112025-10-06T17:41:40Z2025-10-06T17:41:40Zby Shema, Mike, author.<br/>Format: Books<br/>Publication Date 2012<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:436892025-10-06T17:41:40Z2025-10-06T17:41:40Zby Stallings, William.<br/>Format: Books<br/>Publication Date 2011<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:463622025-10-06T17:41:40Z2025-10-06T17:41:40Zby Timm, Carl.<br/>Format: Books<br/>Publication Date 2010<br/>Principles of information securityent://SD_ILS/0/SD_ILS:432472025-10-06T17:41:40Z2025-10-06T17:41:40Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2009<br/>Management of information securityent://SD_ILS/0/SD_ILS:343582025-10-06T17:41:40Z2025-10-06T17:41:40Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2008<br/>IT governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:370402025-10-06T17:41:40Z2025-10-06T17:41:40Zby Calder, Alan, 1957-<br/>Format: Books<br/>Publication Date 2008<br/>Microsoft® Windows server 2008 security resource kitent://SD_ILS/0/SD_ILS:66792025-10-06T17:41:40Z2025-10-06T17:41:40Zby Johansson, Jesper M.<br/>Format: Books<br/>Publication Date 2008<br/>Security in computingent://SD_ILS/0/SD_ILS:343292025-10-06T17:41:40Z2025-10-06T17:41:40Zby Pfleeger, Charles P., 1948-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0619/2006026798.html">http://www.loc.gov/catdir/toc/ecip0619/2006026798.html</a><br/>Format: Books<br/>Publication Date 2007<br/>Network security hacksent://SD_ILS/0/SD_ILS:337612025-10-06T17:41:40Z2025-10-06T17:41:40Zby Lockhart, Andrew.<br/>Format: Books<br/>Publication Date 2007<br/>Software security : building security inent://SD_ILS/0/SD_ILS:549712025-10-06T17:41:40Z2025-10-06T17:41:40Zby McGraw, Gary, 1966-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip062/2005031598.html">http://www.loc.gov/catdir/toc/ecip062/2005031598.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Implementing database security and auditingent://SD_ILS/0/SD_ILS:293472025-10-06T17:41:40Z2025-10-06T17:41:40Zby Ben-Natan, Ron.<br/>Format: Books<br/>Publication Date 2005<br/>Digital fortressent://SD_ILS/0/SD_ILS:117632025-10-06T17:41:40Z2025-10-06T17:41:40Zby Brown, Dan, 1964-<br/>Format: Books<br/>Publication Date 2004<br/>Security in computingent://SD_ILS/0/SD_ILS:279812025-10-06T17:41:40Z2025-10-06T17:41:40Zby Pfleeger, Charles P., 1948-<br/>Format: Books<br/>Publication Date 2003<br/>Building open source network security tools : components and techniquesent://SD_ILS/0/SD_ILS:296732025-10-06T17:41:40Z2025-10-06T17:41:40Zby Schiffman, Mike.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/wiley031/2002011320.html">http://www.loc.gov/catdir/toc/wiley031/2002011320.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/wiley036/2002011320.html">http://www.loc.gov/catdir/description/wiley036/2002011320.html</a>
Contributor biographical information <a href="http://www.loc.gov/catdir/bios/wiley043/2002011320.html">http://www.loc.gov/catdir/bios/wiley043/2002011320.html</a><br/>Format: Regular print<br/>Publication Date 2003<br/>Network security : a practical guideent://SD_ILS/0/SD_ILS:343272025-10-06T17:41:40Z2025-10-06T17:41:40Zby Poole, Owen.<br/>Format: Books<br/>Publication Date 2003<br/>Web services securityent://SD_ILS/0/SD_ILS:260832025-10-06T17:41:40Z2025-10-06T17:41:40Zby O'Neill, Mark.<br/>Format: Books<br/>Publication Date 2003<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:200802025-10-06T17:41:40Z2025-10-06T17:41:40Zby Stallings, William.<br/>Format: Books<br/>Publication Date 2003<br/>Active defense : a comprehensive guide to network securityent://SD_ILS/0/SD_ILS:98572025-10-06T17:41:40Z2025-10-06T17:41:40Zby Brenton, Chris.<br/><a href="http://www.contentreserve.com/TitleInfo.asp?ID={C0E06398-F64D-4C14-BAA2-D2ADC889DA37}&Format=50">Click for information</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?isbn=0782129161">http://www.books24x7.com/marc.asp?isbn=0782129161</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=2782">http://www.books24x7.com/marc.asp?bookid=2782</a>
ebrary <a href="http://site.ebrary.com/id/10304303">http://site.ebrary.com/id/10304303</a>
EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=92925">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=92925</a><br/>Format: Electronic Resources<br/>Publication Date 2001<br/>Security in computingent://SD_ILS/0/SD_ILS:252272025-10-06T17:41:40Z2025-10-06T17:41:40Zby Pfleeger, Charles P., 1948-<br/>Format: Books<br/>Publication Date 1997<br/>Practical UNIX and Internet securityent://SD_ILS/0/SD_ILS:143192025-10-06T17:41:40Z2025-10-06T17:41:40Zby Garfinkel, Simson.<br/>Table of contents <a href="http://www.gbv.de/dms/bowker/toc/9781565921481.pdf">http://www.gbv.de/dms/bowker/toc/9781565921481.pdf</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html">http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html">http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html</a>
Umschlagbild <a href="http://swbplus.bsz-bw.de/bsz048310409cov.htm">http://swbplus.bsz-bw.de/bsz048310409cov.htm</a><br/>Format: Books<br/>Publication Date 1996<br/>Computer securityent://SD_ILS/0/SD_ILS:252292025-10-06T17:41:40Z2025-10-06T17:41:40Zby Carroll, John Millar.<br/>Format: Books<br/>Publication Date 1996<br/>