Search Results for Computer Security. - Narrowed by: 2010-2016 SirsiDynix Enterprise https://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010-2016$0025092010-2016$0026ps$003d300?dt=list 2025-12-26T22:23:24Z The essential guide to home computer security ent://SD_ILS/0/SD_ILS:53912 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Rowlingson, Robert.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Introduction to Computer Security: Pearson New International Edition ent://SD_ILS/0/SD_ILS:53871 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Goodrich, M. T. (Michael T.)<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Computer security literacy : staying safe in a digital world ent://SD_ILS/0/SD_ILS:50223 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Jacobson, Douglas.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Principles of computer security : CompTIA security+ and beyond ent://SD_ILS/0/SD_ILS:41498 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Conklin, Wm. Arthur (William Arthur)<br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2010<br/> Firewall design and analysis ent://SD_ILS/0/SD_ILS:53750 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Liu, Alex X.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Principles of information security ent://SD_ILS/0/SD_ILS:320 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Whitman, Michael E., 1964- author.<br/>Format:&#160;Books<br/>Publication Date&#160;2016<br/> Data communications and computer networks : a business user's approach ent://SD_ILS/0/SD_ILS:10814 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;White, Curt M.<br/>Format:&#160;Books<br/>Publication Date&#160;2016<br/> CompTIA security+ guide to network security fundamentals ent://SD_ILS/0/SD_ILS:347 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Ciampa, Mark D., author.<br/>Format:&#160;Books<br/>Publication Date&#160;2015<br/> Ethical hacking and penetration testing guide ent://SD_ILS/0/SD_ILS:53332 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Baloch, Rafay.<br/>Cover image <a href="http://images.tandf.co.uk/common/jackets/websmall/978148223/9781482231618.jpg">http://images.tandf.co.uk/common/jackets/websmall/978148223/9781482231618.jpg</a><br/>Format:&#160;Books<br/>Publication Date&#160;2015<br/> Security and privacy ent://SD_ILS/0/SD_ILS:53766 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Savirimuthu, Joseph, editor.<br/>Format:&#160;Books<br/>Publication Date&#160;2015<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:54286 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Mukhopadhyay, Debdeep.<br/>Format:&#160;Books<br/>Publication Date&#160;2015<br/> Teachers discovering computers : integrating technology in a changing world ent://SD_ILS/0/SD_ILS:9793 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Gunter, Glenda A., author.<br/>Format:&#160;Books<br/>Publication Date&#160;2015<br/> Security in computing ent://SD_ILS/0/SD_ILS:55788 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Pfleeger, Charles P., 1948- author.<br/><a href="http://catalogue.londonmet.ac.uk/record=b1680851~S1">E-book</a><br/>Format:&#160;Regular print<br/>Publication Date&#160;2015<br/> Emerging trends in ICT security ent://SD_ILS/0/SD_ILS:50878 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Akhgar, Babak, editor of compilation.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Professional Java for web applications : featuring WebSockets, Spring Framework, JPA Hibernate, and Spring Security ent://SD_ILS/0/SD_ILS:51182 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Williams, Nicholas S. author.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Network security, firewalls, and VPNs ent://SD_ILS/0/SD_ILS:52193 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Stewart, James Michael.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Security awareness : applying practical security in your world ent://SD_ILS/0/SD_ILS:50225 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Ciampa, Mark.<br/>Format:&#160;Regular print<br/>Publication Date&#160;2014&#160;2013<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:50496 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Stallings, William, author.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Hacking exposed : unified communications &amp;amp; VoIP security secrets &amp;amp; solutions ent://SD_ILS/0/SD_ILS:51453 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Collier, Mark D., author.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> The basics of IT audit Purposes, processes, and practical information. ent://SD_ILS/0/SD_ILS:51755 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Gantz, Stephen D.<br/><a href="http://esc-web.lib.cbs.dk/login?url=http://www.sciencedirect.com/science/book/9780124171596">Campus and remote access</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780124171596">Available by subscription from Safari Books Online</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780124171596">http://proquest.tech.safaribooksonline.de/9780124171596</a><br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2014<br/> Managing cyber attacks in international law, business, and relations : in search of cyber peace ent://SD_ILS/0/SD_ILS:53638 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Shackelford, Scott J. author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Security management of next generation telecommunications networks and services ent://SD_ILS/0/SD_ILS:53817 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Jacobs, Stuart.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:56500 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Andress, Jason.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site</a><br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Cyber power : Crime, conflict and security in cyberspace. ent://SD_ILS/0/SD_ILS:50041 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Ghernaouti-H&eacute;lie, Solange, 1958-....<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Cyber attacks : protecting national infrastructure ent://SD_ILS/0/SD_ILS:49861 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Amoroso, Edward.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Android security : attacks and defenses ent://SD_ILS/0/SD_ILS:50224 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Misra, Anmol.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Hacking exposed : mobile security secrets &amp;amp; solutions ent://SD_ILS/0/SD_ILS:50511 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Bergman, Neil.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Network security : a beginner's guide ent://SD_ILS/0/SD_ILS:51556 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Maiwald, Eric.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Advanced DPA theory and practice : towards the security limits of secure embedded circuits ent://SD_ILS/0/SD_ILS:53791 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Peeters, Eric, author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Understanding computers : today and tomorrow : introductory ent://SD_ILS/0/SD_ILS:22355 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Morley, Deborah.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> MacBook all-in-one for dummies ent://SD_ILS/0/SD_ILS:1355 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Chambers, Mark L.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Security+ guide to network security fundamentals ent://SD_ILS/0/SD_ILS:1969 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Ciampa, Mark D.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html</a> Table of contents only <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Low tech hacking : street smarts for security professionals ent://SD_ILS/0/SD_ILS:17787 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Wiles, Jack.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Security fundamentals : exam 98-367 ent://SD_ILS/0/SD_ILS:22502 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Gambrel, Bryan.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Hacking web apps : detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:50711 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Shema, Mike, author.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Safety health and security in wastewater systems ent://SD_ILS/0/SD_ILS:50735 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Water Environment Federation<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:50554 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Mj&oslash;lsnes, Stig F.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Role mining in business : taming role-based access control administration ent://SD_ILS/0/SD_ILS:54647 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Colantonio, Alessandro.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Principles of information security ent://SD_ILS/0/SD_ILS:16413 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Whitman, Michael E., 1964-<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Cybersecurity : the essential body of knowledge ent://SD_ILS/0/SD_ILS:55849 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Shoemaker, Dan.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Security risk management : building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:350 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Wheeler, Evan.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site</a><br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Frameworks for ICT policy : government, social and legal issues ent://SD_ILS/0/SD_ILS:42393 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Adomi, Esharenana E.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Cybercrime and espionage : an analysis of subversive multivector threats ent://SD_ILS/0/SD_ILS:45498 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Gragido, Will.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Cybercrime : investigating high-technology computer crime ent://SD_ILS/0/SD_ILS:46219 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Moore, Robert, 1976-<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices ent://SD_ILS/0/SD_ILS:50709 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Hoog, Andrew.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Android forensics : investigation, analysis, and mobile security for Google Android ent://SD_ILS/0/SD_ILS:50712 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Hoog, Andrew.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Managing risk in information systems ent://SD_ILS/0/SD_ILS:52192 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Gibson, Darril.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Handbook of security and networks ent://SD_ILS/0/SD_ILS:53748 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Xiao, Yang, 1966-<br/>Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;doc_number=018713193&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;doc_number=018713193&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</a> Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=serviceetdoc_library=BVB01etdoc_number=018713193etline_number=0001etfunc_code=DB_RECORDSetservice_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=serviceetdoc_library=BVB01etdoc_number=018713193etline_number=0001etfunc_code=DB_RECORDSetservice_type=MEDIA</a><br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:43689 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Stallings, William.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Ethics for the information age ent://SD_ILS/0/SD_ILS:43933 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Quinn, Michael J. (Michael Jay)<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Computer networks. ent://SD_ILS/0/SD_ILS:45625 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Tanenbaum, Andrew S., 1944-<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:51544 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Harper, Allen.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Architecture of network systems ent://SD_ILS/0/SD_ILS:32 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Serpanos, Dimitrios Nikolaou.<br/>EBSCOhost <a href="http://search.ebscohost.com.ezproxy.iielearn.ac.za/login.aspx?direct=true&db=nlebk&AN=353481&site=ehost-live">http://search.ebscohost.com.ezproxy.iielearn.ac.za/login.aspx?direct=true&db=nlebk&AN=353481&site=ehost-live</a><br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Succeeding with technology : computer system concepts for your life ent://SD_ILS/0/SD_ILS:22361 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Baldauf, Ken.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Security 2020 : reduce security risks this decade ent://SD_ILS/0/SD_ILS:22500 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Howard, Doug.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Hacking exposed computer forensics : secrets &amp;amp; solutions ent://SD_ILS/0/SD_ILS:41497 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Davis, Chris.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Internet fraud casebook : the World Wide Web of deceit ent://SD_ILS/0/SD_ILS:41839 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Wells, Joseph T.<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy1007/2010013506-d.html">http://www.loc.gov/catdir/enhancements/fy1007/2010013506-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html">http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:43086 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Merkow, Mark S.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Introduction to information systems ent://SD_ILS/0/SD_ILS:43865 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;O'Brien, James A., 1936-<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:44880 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Moeller, Robert R.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:46362 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Timm, Carl.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:46364 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Shema, Mike.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Wireshark network analysis : the official Wireshark certified network analyst study guide ent://SD_ILS/0/SD_ILS:40776 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Chappell, Laura.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Mobile device security : a comprehensive guide to securing your information in a moving world ent://SD_ILS/0/SD_ILS:43280 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Fried, Stephen, 1962-<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Discovering computers 2010 : living in a digital world : complete ent://SD_ILS/0/SD_ILS:19335 2025-12-26T22:23:24Z 2025-12-26T22:23:24Z by&#160;Shelly, Gary B.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/>