Search Results for Computer security -- Management. - Narrowed by: IIEMSASirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bsecurity$002b--$002bManagement.$0026qf$003dLIBRARY$002509Library$0025091$00253AIIEMSA$002509IIEMSA$0026ps$003d300?2025-11-22T03:02:00ZData communications & computer networks : a business user's approach.ent://SD_ILS/0/SD_ILS:571072025-11-22T03:02:00Z2025-11-22T03:02:00Zby West, Jill (Author of CompTIA Network+ guide to networks), author.<br/>Format: Books<br/>Publication Date 2023<br/>Data communications and computer networks : a business user's approachent://SD_ILS/0/SD_ILS:108142025-11-22T03:02:00Z2025-11-22T03:02:00Zby White, Curt M.<br/>Format: Books<br/>Publication Date 2016<br/>Security management of next generation telecommunications networks and servicesent://SD_ILS/0/SD_ILS:538172025-11-22T03:02:00Z2025-11-22T03:02:00Zby Jacobs, Stuart.<br/>Format: Books<br/>Publication Date 2014<br/>Security risk management : building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:3502025-11-22T03:02:00Z2025-11-22T03:02:00Zby Wheeler, Evan.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site</a><br/>Format: Books<br/>Publication Date 2011<br/>Discovering computers 2010 : living in a digital world : completeent://SD_ILS/0/SD_ILS:193352025-11-22T03:02:00Z2025-11-22T03:02:00Zby Shelly, Gary B.<br/>Format: Books<br/>Publication Date 2010<br/>Introduction to information systemsent://SD_ILS/0/SD_ILS:438652025-11-22T03:02:00Z2025-11-22T03:02:00Zby O'Brien, James A., 1936-<br/>Format: Books<br/>Publication Date 2010<br/>Digital rights management for e-commerce systemsent://SD_ILS/0/SD_ILS:351432025-11-22T03:02:00Z2025-11-22T03:02:00Zby Drossos, Lambros, 1961-<br/>Format: Books<br/>Publication Date 2009<br/>Database systems : design, implementation, and managementent://SD_ILS/0/SD_ILS:358072025-11-22T03:02:00Z2025-11-22T03:02:00Zby Rob, Peter.<br/>Format: Books<br/>Publication Date 2009<br/>Administrative assistant's and secretary's handbookent://SD_ILS/0/SD_ILS:98622025-11-22T03:02:00Z2025-11-22T03:02:00Zby Stroman, James.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/toc/ecip0718/2007020971.html">http://catdir.loc.gov/catdir/toc/ecip0718/2007020971.html</a><br/>Format: Books<br/>Publication Date 2008<br/>Introduction to information systems : supporting and transforming businessent://SD_ILS/0/SD_ILS:310972025-11-22T03:02:00Z2025-11-22T03:02:00Zby Rainer, R. Kelly, Jr., 1949-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0518/2005022367.html">http://www.loc.gov/catdir/toc/ecip0518/2005022367.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0645/2005022367-d.html">http://www.loc.gov/catdir/enhancements/fy0645/2005022367-d.html</a><br/>Format: Books<br/>Publication Date 2007<br/>Computer forensics : evidence collection and managementent://SD_ILS/0/SD_ILS:446032025-11-22T03:02:00Z2025-11-22T03:02:00Zby Newman, Robert C.<br/>Format: Books<br/>Publication Date 2007<br/>Professional ASP.NET 2.0 security, membership, and role managementent://SD_ILS/0/SD_ILS:332352025-11-22T03:02:00Z2025-11-22T03:02:00Zby Schackow, Stefan, 1970-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip063/2005032278.html">http://www.loc.gov/catdir/toc/ecip063/2005032278.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Information technology security &amp; risk managementent://SD_ILS/0/SD_ILS:357182025-11-22T03:02:00Z2025-11-22T03:02:00Zby Slay, Jill.<br/>Format: Books<br/>Publication Date 2006<br/>The executive guide to information security : threats, challenges, and solutionsent://SD_ILS/0/SD_ILS:290222025-11-22T03:02:00Z2025-11-22T03:02:00Zby Egan, Mark.<br/>Format: Books<br/>Publication Date 2005<br/>Defending the digital frontier : practical security for managementent://SD_ILS/0/SD_ILS:294202025-11-22T03:02:00Z2025-11-22T03:02:00Zby Babiak, Jan.<br/>Format: Books<br/>Publication Date 2005<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:291662025-11-22T03:02:00Z2025-11-22T03:02:00Zby Wallace, Michael, 1960-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0415/2004003905.html">http://www.loc.gov/catdir/toc/ecip0415/2004003905.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Computer networking : a top-down approach featuring the Internetent://SD_ILS/0/SD_ILS:257772025-11-22T03:02:00Z2025-11-22T03:02:00Zby Kurose, James F.<br/>Format: Books<br/>Publication Date 2003<br/>Information security management handbookent://SD_ILS/0/SD_ILS:277962025-11-22T03:02:00Z2025-11-22T03:02:00Zby Tipton, Harold F.<br/>Format: Books<br/>Publication Date 2003<br/>Computer networking : a top-down approach featuring the Internetent://SD_ILS/0/SD_ILS:280402025-11-22T03:02:00Z2025-11-22T03:02:00Zby Kurose, James F.<br/>Format: Books<br/>Publication Date 2003<br/>Securing business information : strategies to protect the enterprise and its networkent://SD_ILS/0/SD_ILS:255432025-11-22T03:02:00Z2025-11-22T03:02:00Zby Byrnes, F. Christian.<br/>Format: Books<br/>Publication Date 2002<br/>Operating system conceptsent://SD_ILS/0/SD_ILS:224902025-11-22T03:02:00Z2025-11-22T03:02:00Zby Silberschatz, Abraham.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/toc/wiley021/2001276306.html">http://catdir.loc.gov/catdir/toc/wiley021/2001276306.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/description/wiley035/2001276306.html">http://catdir.loc.gov/catdir/description/wiley035/2001276306.html</a>
The Alumni and Friends Memorial Book Fund Home Page <a href="http://hdl.library.upenn.edu/1017.12/366295">http://hdl.library.upenn.edu/1017.12/366295</a><br/>Format: Books<br/>Publication Date 2002<br/>Understanding operating systemsent://SD_ILS/0/SD_ILS:133642025-11-22T03:02:00Z2025-11-22T03:02:00Zby Flynn, Ida M., 1942-<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-t.html">http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-b.html">http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-d.html">http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-d.html</a><br/>Format: Books<br/>Publication Date 2001<br/>Information security policies, procedures, and standards : guidelines for effective information security managementent://SD_ILS/0/SD_ILS:249352025-11-22T03:02:00Z2025-11-22T03:02:00Zby Peltier, Thomas R.<br/>Format: Books<br/>Publication Date 2001<br/>Accounting information systemsent://SD_ILS/0/SD_ILS:99102025-11-22T03:02:00Z2025-11-22T03:02:00Zby Bodnar, George H.<br/>Format: Books<br/>Publication Date 2001<br/>Data and computer communicationsent://SD_ILS/0/SD_ILS:142212025-11-22T03:02:00Z2025-11-22T03:02:00Zby Stallings, William.<br/>Table of contents <a href="http://www3.ub.tu-berlin.de/ihv/000740460.pdf">http://www3.ub.tu-berlin.de/ihv/000740460.pdf</a><br/>Format: Books<br/>Publication Date 2000<br/>Operating system conceptsent://SD_ILS/0/SD_ILS:234582025-11-22T03:02:00Z2025-11-22T03:02:00Zby Silberschatz, Abraham.<br/>Format: Books<br/>Publication Date 1999<br/>Computer securityent://SD_ILS/0/SD_ILS:252292025-11-22T03:02:00Z2025-11-22T03:02:00Zby Carroll, John Millar.<br/>Format: Books<br/>Publication Date 1996<br/>