Search Results for Computer Security. - Narrowed by: Data protection. SirsiDynix Enterprise https://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?dt=list 2025-05-08T06:55:28Z Security in computing ent://SD_ILS/0/SD_ILS:55788 2025-05-08T06:55:28Z 2025-05-08T06:55:28Z by&#160;Pfleeger, Charles P., 1948- author.<br/><a href="http://catalogue.londonmet.ac.uk/record=b1680851~S1">E-book</a><br/>Format:&#160;Regular print<br/>Publication Date&#160;2015<br/> Mobile device security : a comprehensive guide to securing your information in a moving world ent://SD_ILS/0/SD_ILS:43280 2025-05-08T06:55:28Z 2025-05-08T06:55:28Z by&#160;Fried, Stephen, 1962-<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Digital rights management for e-commerce systems ent://SD_ILS/0/SD_ILS:35143 2025-05-08T06:55:28Z 2025-05-08T06:55:28Z by&#160;Drossos, Lambros, 1961-<br/>Format:&#160;Books<br/>Publication Date&#160;2009<br/> IT governance : a manager's guide to data security and ISO 27001/ISO 27002 ent://SD_ILS/0/SD_ILS:37040 2025-05-08T06:55:28Z 2025-05-08T06:55:28Z by&#160;Calder, Alan, 1957-<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Security in computing ent://SD_ILS/0/SD_ILS:34329 2025-05-08T06:55:28Z 2025-05-08T06:55:28Z by&#160;Pfleeger, Charles P., 1948-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0619/2006026798.html">http://www.loc.gov/catdir/toc/ecip0619/2006026798.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Privacy protection for e-services ent://SD_ILS/0/SD_ILS:31987 2025-05-08T06:55:28Z 2025-05-08T06:55:28Z by&#160;Yee, George.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip063/2005032104.html">http://www.loc.gov/catdir/toc/ecip063/2005032104.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Implementing database security and auditing ent://SD_ILS/0/SD_ILS:29347 2025-05-08T06:55:28Z 2025-05-08T06:55:28Z by&#160;Ben-Natan, Ron.<br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Defending the digital frontier : practical security for management ent://SD_ILS/0/SD_ILS:29420 2025-05-08T06:55:28Z 2025-05-08T06:55:28Z by&#160;Babiak, Jan.<br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Software forensics : collecting evidence from the scene of a digital crime ent://SD_ILS/0/SD_ILS:28510 2025-05-08T06:55:28Z 2025-05-08T06:55:28Z by&#160;Slade, Robert M.<br/>Publisher description <a href="http://www.loc.gov/catdir/description/mh041/2003070176.html">http://www.loc.gov/catdir/description/mh041/2003070176.html</a> Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003070176.html">http://www.loc.gov/catdir/bios/mh042/2003070176.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/mh041/2003070176.html">http://www.loc.gov/catdir/toc/mh041/2003070176.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Security in computing ent://SD_ILS/0/SD_ILS:27981 2025-05-08T06:55:28Z 2025-05-08T06:55:28Z by&#160;Pfleeger, Charles P., 1948-<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Information security policies, procedures, and standards : guidelines for effective information security management ent://SD_ILS/0/SD_ILS:24935 2025-05-08T06:55:28Z 2025-05-08T06:55:28Z by&#160;Peltier, Thomas R.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Security in computing ent://SD_ILS/0/SD_ILS:25227 2025-05-08T06:55:28Z 2025-05-08T06:55:28Z by&#160;Pfleeger, Charles P., 1948-<br/>Format:&#160;Books<br/>Publication Date&#160;1997<br/>