Search Results for Computer Security. - Narrowed by: Data protection.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?dt=list2025-05-08T06:55:28ZSecurity in computingent://SD_ILS/0/SD_ILS:557882025-05-08T06:55:28Z2025-05-08T06:55:28Zby Pfleeger, Charles P., 1948- author.<br/><a href="http://catalogue.londonmet.ac.uk/record=b1680851~S1">E-book</a><br/>Format: Regular print<br/>Publication Date 2015<br/>Mobile device security : a comprehensive guide to securing your information in a moving worldent://SD_ILS/0/SD_ILS:432802025-05-08T06:55:28Z2025-05-08T06:55:28Zby Fried, Stephen, 1962-<br/>Format: Books<br/>Publication Date 2010<br/>Digital rights management for e-commerce systemsent://SD_ILS/0/SD_ILS:351432025-05-08T06:55:28Z2025-05-08T06:55:28Zby Drossos, Lambros, 1961-<br/>Format: Books<br/>Publication Date 2009<br/>IT governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:370402025-05-08T06:55:28Z2025-05-08T06:55:28Zby Calder, Alan, 1957-<br/>Format: Books<br/>Publication Date 2008<br/>Security in computingent://SD_ILS/0/SD_ILS:343292025-05-08T06:55:28Z2025-05-08T06:55:28Zby Pfleeger, Charles P., 1948-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0619/2006026798.html">http://www.loc.gov/catdir/toc/ecip0619/2006026798.html</a><br/>Format: Books<br/>Publication Date 2007<br/>Privacy protection for e-servicesent://SD_ILS/0/SD_ILS:319872025-05-08T06:55:28Z2025-05-08T06:55:28Zby Yee, George.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip063/2005032104.html">http://www.loc.gov/catdir/toc/ecip063/2005032104.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Implementing database security and auditingent://SD_ILS/0/SD_ILS:293472025-05-08T06:55:28Z2025-05-08T06:55:28Zby Ben-Natan, Ron.<br/>Format: Books<br/>Publication Date 2005<br/>Defending the digital frontier : practical security for managementent://SD_ILS/0/SD_ILS:294202025-05-08T06:55:28Z2025-05-08T06:55:28Zby Babiak, Jan.<br/>Format: Books<br/>Publication Date 2005<br/>Software forensics : collecting evidence from the scene of a digital crimeent://SD_ILS/0/SD_ILS:285102025-05-08T06:55:28Z2025-05-08T06:55:28Zby Slade, Robert M.<br/>Publisher description <a href="http://www.loc.gov/catdir/description/mh041/2003070176.html">http://www.loc.gov/catdir/description/mh041/2003070176.html</a>
Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003070176.html">http://www.loc.gov/catdir/bios/mh042/2003070176.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/mh041/2003070176.html">http://www.loc.gov/catdir/toc/mh041/2003070176.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Security in computingent://SD_ILS/0/SD_ILS:279812025-05-08T06:55:28Z2025-05-08T06:55:28Zby Pfleeger, Charles P., 1948-<br/>Format: Books<br/>Publication Date 2003<br/>Information security policies, procedures, and standards : guidelines for effective information security managementent://SD_ILS/0/SD_ILS:249352025-05-08T06:55:28Z2025-05-08T06:55:28Zby Peltier, Thomas R.<br/>Format: Books<br/>Publication Date 2001<br/>Security in computingent://SD_ILS/0/SD_ILS:252272025-05-08T06:55:28Z2025-05-08T06:55:28Zby Pfleeger, Charles P., 1948-<br/>Format: Books<br/>Publication Date 1997<br/>