Search Results for Business -- Computer networks -- Security measures.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dBusiness$002b--$002bComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2025-11-19T09:36:08ZManaging cyber attacks in international law, business, and relations : in search of cyber peaceent://SD_ILS/0/SD_ILS:536382025-11-19T09:36:08Z2025-11-19T09:36:08Zby Shackelford, Scott J. author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html</a><br/>Format: Books<br/>Publication Date 2014<br/>Cyber security : economic strategies and public policy alternativesent://SD_ILS/0/SD_ILS:362122025-11-19T09:36:08Z2025-11-19T09:36:08Zby Gallaher, Michael P.<br/>Format: Books<br/>Publication Date 2008<br/>IT governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:370402025-11-19T09:36:08Z2025-11-19T09:36:08Zby Calder, Alan, 1957-<br/>Format: Books<br/>Publication Date 2008<br/>Securing business information : strategies to protect the enterprise and its networkent://SD_ILS/0/SD_ILS:255432025-11-19T09:36:08Z2025-11-19T09:36:08Zby Byrnes, F. Christian.<br/>Format: Books<br/>Publication Date 2002<br/>Internet security made easy : a plain-English guide to protecting yourself and your company onlineent://SD_ILS/0/SD_ILS:122032025-11-19T09:36:08Z2025-11-19T09:36:08Zby Schweitzer, Douglas.<br/>Format: Books<br/>Publication Date 2002<br/>Securing e-business systems : a guide for managers and executivesent://SD_ILS/0/SD_ILS:461222025-11-19T09:36:08Z2025-11-19T09:36:08Zby Braithwaite, Timothy, 1942-<br/>Format: Books<br/>Publication Date 2002<br/>Planning for PKI : best practices guide for deploying public key infrastructureent://SD_ILS/0/SD_ILS:238892025-11-19T09:36:08Z2025-11-19T09:36:08Zby Housley, Russ, 1959-<br/>Format: Books<br/>Publication Date 2001<br/>Internet trust and security : the way aheadent://SD_ILS/0/SD_ILS:244782025-11-19T09:36:08Z2025-11-19T09:36:08Zby Essinger, James.<br/>Format: Books<br/>Publication Date 2001<br/>Security transformation : digital defense strategies to protect your company's reputation and market shareent://SD_ILS/0/SD_ILS:245552025-11-19T09:36:08Z2025-11-19T09:36:08Zby McCarthy, Mary Pat.<br/>Format: Books<br/>Publication Date 2001<br/>