Search Results for Business networks. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dBusiness$002bnetworks.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026pe$003dd$00253A$0026ps$003d300?dt=list2025-10-21T06:01:28ZRole mining in business : taming role-based access control administrationent://SD_ILS/0/SD_ILS:546472025-10-21T06:01:28Z2025-10-21T06:01:28Zby Colantonio, Alessandro.<br/>Format: Books<br/>Publication Date 2012<br/>IT governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:370402025-10-21T06:01:28Z2025-10-21T06:01:28Zby Calder, Alan, 1957-<br/>Format: Books<br/>Publication Date 2008<br/>Planning for PKI : best practices guide for deploying public key infrastructureent://SD_ILS/0/SD_ILS:238892025-10-21T06:01:28Z2025-10-21T06:01:28Zby Housley, Russ, 1959-<br/>Format: Books<br/>Publication Date 2001<br/>Security transformation : digital defense strategies to protect your company's reputation and market shareent://SD_ILS/0/SD_ILS:245552025-10-21T06:01:28Z2025-10-21T06:01:28Zby McCarthy, Mary Pat.<br/>Format: Books<br/>Publication Date 2001<br/>