Search Results for Computer security -- Management. - Narrowed by: RC BraamfonteinSirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bsecurity$002b--$002bManagement.$0026qf$003dLIBRARY$002509Library$0025091$00253ARCBMF$002509RC$002bBraamfontein$0026ps$003d300?dt=list2026-02-28T13:32:34ZSecurity risk management : building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:3502026-02-28T13:32:34Z2026-02-28T13:32:34Zby Wheeler, Evan.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site</a><br/>Format: Books<br/>Publication Date 2011<br/>Management of information technologyent://SD_ILS/0/SD_ILS:158832026-02-28T13:32:34Z2026-02-28T13:32:34Zby Frenzel, Carroll W.<br/>Format: Books<br/>Publication Date 2004<br/>E-business & e-commerce : how to programent://SD_ILS/0/SD_ILS:127282026-02-28T13:32:34Z2026-02-28T13:32:34Zby Deitel, Harvey M., 1945-<br/>Format: Books<br/>Publication Date 2001<br/>