Search Results for Computer Security. - Narrowed by: 2010-2016SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010-2016$0025092010-2016$0026ps$003d300?dt=list2026-02-22T07:07:49ZThe essential guide to home computer securityent://SD_ILS/0/SD_ILS:539122026-02-22T07:07:49Z2026-02-22T07:07:49Zby Rowlingson, Robert.<br/>Format: Books<br/>Publication Date 2011<br/>Introduction to Computer Security: Pearson New International Editionent://SD_ILS/0/SD_ILS:538712026-02-22T07:07:49Z2026-02-22T07:07:49Zby Goodrich, M. T. (Michael T.)<br/>Format: Books<br/>Publication Date 2014<br/>Computer security literacy : staying safe in a digital worldent://SD_ILS/0/SD_ILS:502232026-02-22T07:07:49Z2026-02-22T07:07:49Zby Jacobson, Douglas.<br/>Format: Books<br/>Publication Date 2013<br/>Principles of computer security : CompTIA security+ and beyondent://SD_ILS/0/SD_ILS:414982026-02-22T07:07:49Z2026-02-22T07:07:49Zby Conklin, Wm. Arthur (William Arthur)<br/>Format: Electronic Resources<br/>Publication Date 2010<br/>Firewall design and analysisent://SD_ILS/0/SD_ILS:537502026-02-22T07:07:49Z2026-02-22T07:07:49Zby Liu, Alex X.<br/>Format: Books<br/>Publication Date 2011<br/>Principles of information securityent://SD_ILS/0/SD_ILS:3202026-02-22T07:07:49Z2026-02-22T07:07:49Zby Whitman, Michael E., 1964- author.<br/>Format: Books<br/>Publication Date 2016<br/>Data communications and computer networks : a business user's approachent://SD_ILS/0/SD_ILS:108142026-02-22T07:07:49Z2026-02-22T07:07:49Zby White, Curt M.<br/>Format: Books<br/>Publication Date 2016<br/>CompTIA security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:3472026-02-22T07:07:49Z2026-02-22T07:07:49Zby Ciampa, Mark D., author.<br/>Format: Books<br/>Publication Date 2015<br/>Teachers discovering computers : integrating technology in a changing worldent://SD_ILS/0/SD_ILS:97932026-02-22T07:07:49Z2026-02-22T07:07:49Zby Gunter, Glenda A., author.<br/>Format: Books<br/>Publication Date 2015<br/>Ethical hacking and penetration testing guideent://SD_ILS/0/SD_ILS:533322026-02-22T07:07:49Z2026-02-22T07:07:49Zby Baloch, Rafay.<br/>Cover image <a href="http://images.tandf.co.uk/common/jackets/websmall/978148223/9781482231618.jpg">http://images.tandf.co.uk/common/jackets/websmall/978148223/9781482231618.jpg</a><br/>Format: Books<br/>Publication Date 2015<br/>Security and privacyent://SD_ILS/0/SD_ILS:537662026-02-22T07:07:49Z2026-02-22T07:07:49Zby Savirimuthu, Joseph, editor.<br/>Format: Books<br/>Publication Date 2015<br/>Hardware security : design, threats, and safeguardsent://SD_ILS/0/SD_ILS:542862026-02-22T07:07:49Z2026-02-22T07:07:49Zby Mukhopadhyay, Debdeep.<br/>Format: Books<br/>Publication Date 2015<br/>Security in computingent://SD_ILS/0/SD_ILS:557882026-02-22T07:07:49Z2026-02-22T07:07:49Zby Pfleeger, Charles P., 1948- author.<br/><a href="http://catalogue.londonmet.ac.uk/record=b1680851~S1">E-book</a><br/>Format: Regular print<br/>Publication Date 2015<br/>Security awareness : applying practical security in your worldent://SD_ILS/0/SD_ILS:502252026-02-22T07:07:49Z2026-02-22T07:07:49Zby Ciampa, Mark.<br/>Format: Regular print<br/>Publication Date 2014 2013<br/>Security management of next generation telecommunications networks and servicesent://SD_ILS/0/SD_ILS:538172026-02-22T07:07:49Z2026-02-22T07:07:49Zby Jacobs, Stuart.<br/>Format: Books<br/>Publication Date 2014<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:504962026-02-22T07:07:49Z2026-02-22T07:07:49Zby Stallings, William, author.<br/>Format: Books<br/>Publication Date 2014<br/>Emerging trends in ICT securityent://SD_ILS/0/SD_ILS:508782026-02-22T07:07:49Z2026-02-22T07:07:49Zby Akhgar, Babak, editor of compilation.<br/>Format: Books<br/>Publication Date 2014<br/>Professional Java for web applications : featuring WebSockets, Spring Framework, JPA Hibernate, and Spring Securityent://SD_ILS/0/SD_ILS:511822026-02-22T07:07:49Z2026-02-22T07:07:49Zby Williams, Nicholas S. author.<br/>Format: Books<br/>Publication Date 2014<br/>Hacking exposed : unified communications &amp; VoIP security secrets &amp; solutionsent://SD_ILS/0/SD_ILS:514532026-02-22T07:07:49Z2026-02-22T07:07:49Zby Collier, Mark D., author.<br/>Format: Books<br/>Publication Date 2014<br/>The basics of IT audit Purposes, processes, and practical information.ent://SD_ILS/0/SD_ILS:517552026-02-22T07:07:49Z2026-02-22T07:07:49Zby Gantz, Stephen D.<br/><a href="http://esc-web.lib.cbs.dk/login?url=http://www.sciencedirect.com/science/book/9780124171596">Campus and remote access</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780124171596">Available by subscription from Safari Books Online</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780124171596">http://proquest.tech.safaribooksonline.de/9780124171596</a><br/>Format: Electronic Resources<br/>Publication Date 2014<br/>Network security, firewalls, and VPNsent://SD_ILS/0/SD_ILS:521932026-02-22T07:07:49Z2026-02-22T07:07:49Zby Stewart, James Michael.<br/>Format: Books<br/>Publication Date 2014<br/>Managing cyber attacks in international law, business, and relations : in search of cyber peaceent://SD_ILS/0/SD_ILS:536382026-02-22T07:07:49Z2026-02-22T07:07:49Zby Shackelford, Scott J. author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html</a><br/>Format: Books<br/>Publication Date 2014<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:565002026-02-22T07:07:49Z2026-02-22T07:07:49Zby Andress, Jason.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site</a><br/>Format: Books<br/>Publication Date 2014<br/>Cyber power : Crime, conflict and security in cyberspace.ent://SD_ILS/0/SD_ILS:500412026-02-22T07:07:49Z2026-02-22T07:07:49Zby Ghernaouti-Hélie, Solange, 1958-....<br/>Format: Books<br/>Publication Date 2013<br/>Android security : attacks and defensesent://SD_ILS/0/SD_ILS:502242026-02-22T07:07:49Z2026-02-22T07:07:49Zby Misra, Anmol.<br/>Format: Books<br/>Publication Date 2013<br/>Network security : a beginner's guideent://SD_ILS/0/SD_ILS:515562026-02-22T07:07:49Z2026-02-22T07:07:49Zby Maiwald, Eric.<br/>Format: Books<br/>Publication Date 2013<br/>Cyber attacks : protecting national infrastructureent://SD_ILS/0/SD_ILS:498612026-02-22T07:07:49Z2026-02-22T07:07:49Zby Amoroso, Edward.<br/>Format: Books<br/>Publication Date 2013<br/>Hacking exposed : mobile security secrets &amp; solutionsent://SD_ILS/0/SD_ILS:505112026-02-22T07:07:49Z2026-02-22T07:07:49Zby Bergman, Neil.<br/>Format: Books<br/>Publication Date 2013<br/>Advanced DPA theory and practice : towards the security limits of secure embedded circuitsent://SD_ILS/0/SD_ILS:537912026-02-22T07:07:49Z2026-02-22T07:07:49Zby Peeters, Eric, author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html</a><br/>Format: Books<br/>Publication Date 2013<br/>Understanding computers : today and tomorrow : introductoryent://SD_ILS/0/SD_ILS:223552026-02-22T07:07:49Z2026-02-22T07:07:49Zby Morley, Deborah.<br/>Format: Books<br/>Publication Date 2013<br/>Low tech hacking : street smarts for security professionalsent://SD_ILS/0/SD_ILS:177872026-02-22T07:07:49Z2026-02-22T07:07:49Zby Wiles, Jack.<br/>Format: Books<br/>Publication Date 2012<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:505542026-02-22T07:07:49Z2026-02-22T07:07:49Zby Mjølsnes, Stig F.<br/>Format: Books<br/>Publication Date 2012<br/>Hacking web apps : detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:507112026-02-22T07:07:49Z2026-02-22T07:07:49Zby Shema, Mike, author.<br/>Format: Books<br/>Publication Date 2012<br/>Safety health and security in wastewater systemsent://SD_ILS/0/SD_ILS:507352026-02-22T07:07:49Z2026-02-22T07:07:49Zby Water Environment Federation<br/>Format: Books<br/>Publication Date 2012<br/>Role mining in business : taming role-based access control administrationent://SD_ILS/0/SD_ILS:546472026-02-22T07:07:49Z2026-02-22T07:07:49Zby Colantonio, Alessandro.<br/>Format: Books<br/>Publication Date 2012<br/>MacBook all-in-one for dummiesent://SD_ILS/0/SD_ILS:13552026-02-22T07:07:49Z2026-02-22T07:07:49Zby Chambers, Mark L.<br/>Format: Books<br/>Publication Date 2012<br/>Security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:19692026-02-22T07:07:49Z2026-02-22T07:07:49Zby Ciampa, Mark D.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html</a>
Table of contents only <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html</a><br/>Format: Books<br/>Publication Date 2012<br/>Principles of information securityent://SD_ILS/0/SD_ILS:164132026-02-22T07:07:49Z2026-02-22T07:07:49Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2012<br/>Security fundamentals : exam 98-367ent://SD_ILS/0/SD_ILS:225022026-02-22T07:07:49Z2026-02-22T07:07:49Zby Gambrel, Bryan.<br/>Format: Books<br/>Publication Date 2012<br/>Cybersecurity : the essential body of knowledgeent://SD_ILS/0/SD_ILS:558492026-02-22T07:07:49Z2026-02-22T07:07:49Zby Shoemaker, Dan.<br/>Format: Books<br/>Publication Date 2012<br/>Cybercrime and espionage : an analysis of subversive multivector threatsent://SD_ILS/0/SD_ILS:454982026-02-22T07:07:49Z2026-02-22T07:07:49Zby Gragido, Will.<br/>Format: Books<br/>Publication Date 2011<br/>Computer networks.ent://SD_ILS/0/SD_ILS:456252026-02-22T07:07:49Z2026-02-22T07:07:49Zby Tanenbaum, Andrew S., 1944-<br/>Format: Books<br/>Publication Date 2011<br/>Handbook of security and networksent://SD_ILS/0/SD_ILS:537482026-02-22T07:07:49Z2026-02-22T07:07:49Zby Xiao, Yang, 1966-<br/>Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018713193&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018713193&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a>
Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=serviceetdoc_library=BVB01etdoc_number=018713193etline_number=0001etfunc_code=DB_RECORDSetservice_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=serviceetdoc_library=BVB01etdoc_number=018713193etline_number=0001etfunc_code=DB_RECORDSetservice_type=MEDIA</a><br/>Format: Books<br/>Publication Date 2011<br/>Frameworks for ICT policy : government, social and legal issuesent://SD_ILS/0/SD_ILS:423932026-02-22T07:07:49Z2026-02-22T07:07:49Zby Adomi, Esharenana E.<br/>Format: Books<br/>Publication Date 2011<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:436892026-02-22T07:07:49Z2026-02-22T07:07:49Zby Stallings, William.<br/>Format: Books<br/>Publication Date 2011<br/>Ethics for the information ageent://SD_ILS/0/SD_ILS:439332026-02-22T07:07:49Z2026-02-22T07:07:49Zby Quinn, Michael J. (Michael Jay)<br/>Format: Books<br/>Publication Date 2011<br/>Cybercrime : investigating high-technology computer crimeent://SD_ILS/0/SD_ILS:462192026-02-22T07:07:49Z2026-02-22T07:07:49Zby Moore, Robert, 1976-<br/>Format: Books<br/>Publication Date 2011<br/>iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devicesent://SD_ILS/0/SD_ILS:507092026-02-22T07:07:49Z2026-02-22T07:07:49Zby Hoog, Andrew.<br/>Format: Books<br/>Publication Date 2011<br/>Android forensics : investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:507122026-02-22T07:07:49Z2026-02-22T07:07:49Zby Hoog, Andrew.<br/>Format: Books<br/>Publication Date 2011<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:515442026-02-22T07:07:49Z2026-02-22T07:07:49Zby Harper, Allen.<br/>Format: Books<br/>Publication Date 2011<br/>Managing risk in information systemsent://SD_ILS/0/SD_ILS:521922026-02-22T07:07:49Z2026-02-22T07:07:49Zby Gibson, Darril.<br/>Format: Books<br/>Publication Date 2011<br/>Architecture of network systemsent://SD_ILS/0/SD_ILS:322026-02-22T07:07:49Z2026-02-22T07:07:49Zby Serpanos, Dimitrios Nikolaou.<br/>EBSCOhost <a href="http://search.ebscohost.com.ezproxy.iielearn.ac.za/login.aspx?direct=true&db=nlebk&AN=353481&site=ehost-live">http://search.ebscohost.com.ezproxy.iielearn.ac.za/login.aspx?direct=true&db=nlebk&AN=353481&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2011<br/>Security risk management : building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:3502026-02-22T07:07:49Z2026-02-22T07:07:49Zby Wheeler, Evan.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site</a><br/>Format: Books<br/>Publication Date 2011<br/>Succeeding with technology : computer system concepts for your lifeent://SD_ILS/0/SD_ILS:223612026-02-22T07:07:49Z2026-02-22T07:07:49Zby Baldauf, Ken.<br/>Format: Books<br/>Publication Date 2011<br/>Security 2020 : reduce security risks this decadeent://SD_ILS/0/SD_ILS:225002026-02-22T07:07:49Z2026-02-22T07:07:49Zby Howard, Doug.<br/>Format: Books<br/>Publication Date 2011<br/>Mobile device security : a comprehensive guide to securing your information in a moving worldent://SD_ILS/0/SD_ILS:432802026-02-22T07:07:49Z2026-02-22T07:07:49Zby Fried, Stephen, 1962-<br/>Format: Books<br/>Publication Date 2010<br/>Introduction to information systemsent://SD_ILS/0/SD_ILS:438652026-02-22T07:07:49Z2026-02-22T07:07:49Zby O'Brien, James A., 1936-<br/>Format: Books<br/>Publication Date 2010<br/>Wireshark network analysis : the official Wireshark certified network analyst study guideent://SD_ILS/0/SD_ILS:407762026-02-22T07:07:49Z2026-02-22T07:07:49Zby Chappell, Laura.<br/>Format: Books<br/>Publication Date 2010<br/>Hacking exposed computer forensics : secrets &amp; solutionsent://SD_ILS/0/SD_ILS:414972026-02-22T07:07:49Z2026-02-22T07:07:49Zby Davis, Chris.<br/>Format: Books<br/>Publication Date 2010<br/>Internet fraud casebook : the World Wide Web of deceitent://SD_ILS/0/SD_ILS:418392026-02-22T07:07:49Z2026-02-22T07:07:49Zby Wells, Joseph T.<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy1007/2010013506-d.html">http://www.loc.gov/catdir/enhancements/fy1007/2010013506-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html">http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html</a><br/>Format: Books<br/>Publication Date 2010<br/>Secure and resilient software developmentent://SD_ILS/0/SD_ILS:430862026-02-22T07:07:49Z2026-02-22T07:07:49Zby Merkow, Mark S.<br/>Format: Books<br/>Publication Date 2010<br/>IT audit, control, and securityent://SD_ILS/0/SD_ILS:448802026-02-22T07:07:49Z2026-02-22T07:07:49Zby Moeller, Robert R.<br/>Format: Books<br/>Publication Date 2010<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:463622026-02-22T07:07:49Z2026-02-22T07:07:49Zby Timm, Carl.<br/>Format: Books<br/>Publication Date 2010<br/>Seven deadliest web application attacksent://SD_ILS/0/SD_ILS:463642026-02-22T07:07:49Z2026-02-22T07:07:49Zby Shema, Mike.<br/>Format: Books<br/>Publication Date 2010<br/>Discovering computers 2010 : living in a digital world : completeent://SD_ILS/0/SD_ILS:193352026-02-22T07:07:49Z2026-02-22T07:07:49Zby Shelly, Gary B.<br/>Format: Books<br/>Publication Date 2010<br/>