Search Results for Computer science - Narrowed by: Computer security.
SirsiDynix Enterprise
https://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bscience$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?
2025-06-15T06:04:53Z
Computer security
ent://SD_ILS/0/SD_ILS:25226
2025-06-15T06:04:53Z
2025-06-15T06:04:53Z
by Gollmann, Dieter.<br/>Table of Contents <a href="http://www.loc.gov/catdir/toc/onix05/98042538.html">http://www.loc.gov/catdir/toc/onix05/98042538.html</a><br/>Format: Books<br/>Publication Date 1999<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:55010
2025-06-15T06:04:53Z
2025-06-15T06:04:53Z
by Stallings, William author.<br/>Format: Books<br/>Publication Date 2017<br/>
Hardware security : design, threats, and safeguards
ent://SD_ILS/0/SD_ILS:54286
2025-06-15T06:04:53Z
2025-06-15T06:04:53Z
by Mukhopadhyay, Debdeep.<br/>Format: Books<br/>Publication Date 2015<br/>
Hacking exposed computer forensics : secrets &amp; solutions
ent://SD_ILS/0/SD_ILS:41497
2025-06-15T06:04:53Z
2025-06-15T06:04:53Z
by Davis, Chris.<br/>Format: Books<br/>Publication Date 2010<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:31545
2025-06-15T06:04:53Z
2025-06-15T06:04:53Z
by Stallings, William.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0608/2006276085.html">http://www.loc.gov/catdir/toc/fy0608/2006276085.html</a><br/>Format: Books<br/>Publication Date 2006<br/>
Computer forensics jumpstart
ent://SD_ILS/0/SD_ILS:36452
2025-06-15T06:04:53Z
2025-06-15T06:04:53Z
by Solomon, Michael (Michael G.), 1963-<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html</a><br/>Format: Books<br/>Publication Date 2005<br/>
Software forensics : collecting evidence from the scene of a digital crime
ent://SD_ILS/0/SD_ILS:28510
2025-06-15T06:04:53Z
2025-06-15T06:04:53Z
by Slade, Robert M.<br/>Publisher description <a href="http://www.loc.gov/catdir/description/mh041/2003070176.html">http://www.loc.gov/catdir/description/mh041/2003070176.html</a>
Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003070176.html">http://www.loc.gov/catdir/bios/mh042/2003070176.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/mh041/2003070176.html">http://www.loc.gov/catdir/toc/mh041/2003070176.html</a><br/>Format: Books<br/>Publication Date 2004<br/>
PC disaster and recovery
ent://SD_ILS/0/SD_ILS:10310
2025-06-15T06:04:53Z
2025-06-15T06:04:53Z
by Chase, Kate.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-t.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-b.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-d.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-d.html</a><br/>Format: Books<br/>Publication Date 2003<br/>
Writing secure code
ent://SD_ILS/0/SD_ILS:40250
2025-06-15T06:04:53Z
2025-06-15T06:04:53Z
by Howard, Michael, 1965-<br/>Format: Books<br/>Publication Date 2003<br/>