Search Results for Computer security -- Management. - Narrowed by: RC BraamfonteinSirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bsecurity$002b--$002bManagement.$0026qf$003dLIBRARY$002509Library$0025091$00253ARCBMF$002509RC$002bBraamfontein$0026ps$003d300?2025-11-21T01:51:28ZSecurity risk management : building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:3502025-11-21T01:51:28Z2025-11-21T01:51:28Zby Wheeler, Evan.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site</a><br/>Format: Books<br/>Publication Date 2011<br/>Management of information technologyent://SD_ILS/0/SD_ILS:158832025-11-21T01:51:28Z2025-11-21T01:51:28Zby Frenzel, Carroll W.<br/>Format: Books<br/>Publication Date 2004<br/>E-business & e-commerce : how to programent://SD_ILS/0/SD_ILS:127282025-11-21T01:51:28Z2025-11-21T01:51:28Zby Deitel, Harvey M., 1945-<br/>Format: Books<br/>Publication Date 2001<br/>