Search Results for Computer security. SirsiDynix Enterprise https://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bsecurity.$0026ps$003d300? 2025-04-30T09:22:00Z Computer security ent://SD_ILS/0/SD_ILS:35968 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Gollmann, Dieter.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0519/2005026866.html">http://www.loc.gov/catdir/toc/ecip0519/2005026866.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Computer security ent://SD_ILS/0/SD_ILS:25226 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Gollmann, Dieter.<br/>Table of Contents <a href="http://www.loc.gov/catdir/toc/onix05/98042538.html">http://www.loc.gov/catdir/toc/onix05/98042538.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;1999<br/> Computer security ent://SD_ILS/0/SD_ILS:25229 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Carroll, John Millar.<br/>Format:&#160;Books<br/>Publication Date&#160;1996<br/> Practical computer security ent://SD_ILS/0/SD_ILS:6985 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Spafford, G &amp; Garfinkel, S<br/>Format:&#160;Books<br/>Publication Date&#160;1991<br/> Practical UNIX security : computer security ent://SD_ILS/0/SD_ILS:15590 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Garfinkel, Simson.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0912/92195509-b.html">http://catdir.loc.gov/catdir/enhancements/fy0912/92195509-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0715/92195509-d.html">http://catdir.loc.gov/catdir/enhancements/fy0715/92195509-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;1991<br/> Computer security : principles and practice ent://SD_ILS/0/SD_ILS:56514 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Stallings, William, author.<br/>Format:&#160;Books<br/>Publication Date&#160;2018<br/> Computer network security : theory and practice ent://SD_ILS/0/SD_ILS:44483 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Wang, Jie.<br/>Format:&#160;Books<br/>Publication Date&#160;2009<br/> The essential guide to home computer security ent://SD_ILS/0/SD_ILS:53912 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Rowlingson, Robert.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Security of e-systems and computer networks ent://SD_ILS/0/SD_ILS:43478 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Obaidat, Mohammad S. (Mohammad Salameh), 1952-<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0803/2007279861-b.html">http://www.loc.gov/catdir/enhancements/fy0803/2007279861-b.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0803/2007279861-d.html">http://www.loc.gov/catdir/enhancements/fy0803/2007279861-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0803/2007279861-t.html">http://www.loc.gov/catdir/enhancements/fy0803/2007279861-t.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Introduction to Computer Security: Pearson New International Edition ent://SD_ILS/0/SD_ILS:53871 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Goodrich, M. T. (Michael T.)<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Computer security literacy : staying safe in a digital world ent://SD_ILS/0/SD_ILS:50223 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Jacobson, Douglas.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Principles of computer security : CompTIA security+ and beyond ent://SD_ILS/0/SD_ILS:41498 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Conklin, Wm. Arthur (William Arthur)<br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2010<br/> Network control and engineering for QoS, security and mobility, V : IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chile ent://SD_ILS/0/SD_ILS:33816 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;IFIP TC6/WG6.2, 6.6, 6.7, and 6.8 International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile)<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Computer security : 20 things every employee should know ent://SD_ILS/0/SD_ILS:28443 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Rothke, Ben.<br/>Format:&#160;Books<br/>Publication Date&#160;2004&#160;2003<br/> Firewall design and analysis ent://SD_ILS/0/SD_ILS:53750 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Liu, Alex X.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Security in distributed and networking systems ent://SD_ILS/0/SD_ILS:43025 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Xiao, Yang, 1966-<br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Practical UNIX and Internet security ent://SD_ILS/0/SD_ILS:14319 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Garfinkel, Simson.<br/>Table of contents <a href="http://www.gbv.de/dms/bowker/toc/9781565921481.pdf">http://www.gbv.de/dms/bowker/toc/9781565921481.pdf</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html">http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html">http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html</a> Umschlagbild <a href="http://swbplus.bsz-bw.de/bsz048310409cov.htm">http://swbplus.bsz-bw.de/bsz048310409cov.htm</a><br/>Format:&#160;Books<br/>Publication Date&#160;1996<br/> CompTIA&reg; security+ : guide to network security fundamentals ent://SD_ILS/0/SD_ILS:59242 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z Format:&#160;Books<br/>Publication Date&#160;2025<br/> Management information systems : harnessing technologies for business &amp; society ent://SD_ILS/0/SD_ILS:59326 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Issa, Tomayess, author.<br/>Format:&#160;Books<br/>Publication Date&#160;2024<br/> Data communications &amp; computer networks : a business user's approach. ent://SD_ILS/0/SD_ILS:57107 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;West, Jill (Author of CompTIA Network+ guide to networks), author.<br/>Format:&#160;Books<br/>Publication Date&#160;2023<br/> Principles of information security ent://SD_ILS/0/SD_ILS:57106 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Whitman, Michael E., 1964- author.<br/>Format:&#160;Books<br/>Publication Date&#160;2022<br/> Computer networking : a top-down approach ent://SD_ILS/0/SD_ILS:59264 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Kurose, James F., author.<br/>Format:&#160;Books<br/>Publication Date&#160;2022<br/> CompTIA Security+ guide to network security fundamentals ent://SD_ILS/0/SD_ILS:56524 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Ciampa, Mark D., author.<br/>Format:&#160;Books<br/>Publication Date&#160;2021<br/> Construction drawings and details for interiors ent://SD_ILS/0/SD_ILS:57208 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Kilmer, Rosemary, author.<br/>Format:&#160;Books<br/>Publication Date&#160;2021<br/> Operating systems : internals and design principles ent://SD_ILS/0/SD_ILS:56515 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Stallings, William, author.<br/>Format:&#160;Books<br/>Publication Date&#160;2018<br/> Principles of information security ent://SD_ILS/0/SD_ILS:21870 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Whitman, Michael E., 1964- author.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281864&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281864&site=ehost-live</a><br/>Format:&#160;Books<br/>Publication Date&#160;2018<br/> CompTIA security+ guide to network security fundamentals ent://SD_ILS/0/SD_ILS:21995 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Ciampa, Mark D., author.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281867&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281867&site=ehost-live</a><br/>Format:&#160;Books<br/>Publication Date&#160;2018<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:55010 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Stallings, William author.<br/>Format:&#160;Books<br/>Publication Date&#160;2017<br/> Cyber Security : A practitioner's guide ent://SD_ILS/0/SD_ILS:55778 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Sutton, David (Information security practitioner), author.<br/><a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live</a><br/>Format:&#160;Books<br/>Publication Date&#160;2017<br/> Principles of information security ent://SD_ILS/0/SD_ILS:320 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Whitman, Michael E., 1964- author.<br/>Format:&#160;Books<br/>Publication Date&#160;2016<br/> Data communications and computer networks : a business user's approach ent://SD_ILS/0/SD_ILS:10814 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;White, Curt M.<br/>Format:&#160;Books<br/>Publication Date&#160;2016<br/> CompTIA security+ guide to network security fundamentals ent://SD_ILS/0/SD_ILS:347 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Ciampa, Mark D., author.<br/>Format:&#160;Books<br/>Publication Date&#160;2015<br/> Security and privacy ent://SD_ILS/0/SD_ILS:53766 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Savirimuthu, Joseph, editor.<br/>Format:&#160;Books<br/>Publication Date&#160;2015<br/> Ethical hacking and penetration testing guide ent://SD_ILS/0/SD_ILS:53332 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Baloch, Rafay.<br/>Cover image <a href="http://images.tandf.co.uk/common/jackets/websmall/978148223/9781482231618.jpg">http://images.tandf.co.uk/common/jackets/websmall/978148223/9781482231618.jpg</a><br/>Format:&#160;Books<br/>Publication Date&#160;2015<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:54286 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Mukhopadhyay, Debdeep.<br/>Format:&#160;Books<br/>Publication Date&#160;2015<br/> Teachers discovering computers : integrating technology in a changing world ent://SD_ILS/0/SD_ILS:9793 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Gunter, Glenda A., author.<br/>Format:&#160;Books<br/>Publication Date&#160;2015<br/> Security in computing ent://SD_ILS/0/SD_ILS:55788 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Pfleeger, Charles P., 1948- author.<br/><a href="http://catalogue.londonmet.ac.uk/record=b1680851~S1">E-book</a><br/>Format:&#160;Regular print<br/>Publication Date&#160;2015<br/> Security awareness : applying practical security in your world ent://SD_ILS/0/SD_ILS:50225 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Ciampa, Mark.<br/>Format:&#160;Regular print<br/>Publication Date&#160;2014&#160;2013<br/> Professional Java for web applications : featuring WebSockets, Spring Framework, JPA Hibernate, and Spring Security ent://SD_ILS/0/SD_ILS:51182 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Williams, Nicholas S. author.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> The basics of IT audit Purposes, processes, and practical information. ent://SD_ILS/0/SD_ILS:51755 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Gantz, Stephen D.<br/><a href="http://esc-web.lib.cbs.dk/login?url=http://www.sciencedirect.com/science/book/9780124171596">Campus and remote access</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780124171596">Available by subscription from Safari Books Online</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780124171596">http://proquest.tech.safaribooksonline.de/9780124171596</a><br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2014<br/> Network security, firewalls, and VPNs ent://SD_ILS/0/SD_ILS:52193 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Stewart, James Michael.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Security management of next generation telecommunications networks and services ent://SD_ILS/0/SD_ILS:53817 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Jacobs, Stuart.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:50496 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Stallings, William, author.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Emerging trends in ICT security ent://SD_ILS/0/SD_ILS:50878 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Akhgar, Babak, editor of compilation.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Hacking exposed : unified communications &amp;amp; VoIP security secrets &amp;amp; solutions ent://SD_ILS/0/SD_ILS:51453 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Collier, Mark D., author.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Managing cyber attacks in international law, business, and relations : in search of cyber peace ent://SD_ILS/0/SD_ILS:53638 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Shackelford, Scott J. author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:56500 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Andress, Jason.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site</a><br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Android security : attacks and defenses ent://SD_ILS/0/SD_ILS:50224 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Misra, Anmol.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Hacking exposed : mobile security secrets &amp;amp; solutions ent://SD_ILS/0/SD_ILS:50511 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Bergman, Neil.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Advanced DPA theory and practice : towards the security limits of secure embedded circuits ent://SD_ILS/0/SD_ILS:53791 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Peeters, Eric, author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Cyber attacks : protecting national infrastructure ent://SD_ILS/0/SD_ILS:49861 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Amoroso, Edward.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Cyber power : Crime, conflict and security in cyberspace. ent://SD_ILS/0/SD_ILS:50041 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Ghernaouti-H&eacute;lie, Solange, 1958-....<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Network security : a beginner's guide ent://SD_ILS/0/SD_ILS:51556 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Maiwald, Eric.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Understanding computers : today and tomorrow : introductory ent://SD_ILS/0/SD_ILS:22355 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Morley, Deborah.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Security fundamentals : exam 98-367 ent://SD_ILS/0/SD_ILS:22502 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Gambrel, Bryan.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Hacking web apps : detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:50711 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Shema, Mike, author.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Safety health and security in wastewater systems ent://SD_ILS/0/SD_ILS:50735 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Water Environment Federation<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:50554 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Mj&oslash;lsnes, Stig F.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Role mining in business : taming role-based access control administration ent://SD_ILS/0/SD_ILS:54647 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Colantonio, Alessandro.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> MacBook all-in-one for dummies ent://SD_ILS/0/SD_ILS:1355 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Chambers, Mark L.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Security+ guide to network security fundamentals ent://SD_ILS/0/SD_ILS:1969 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Ciampa, Mark D.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html</a> Table of contents only <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Principles of information security ent://SD_ILS/0/SD_ILS:16413 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Whitman, Michael E., 1964-<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Low tech hacking : street smarts for security professionals ent://SD_ILS/0/SD_ILS:17787 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Wiles, Jack.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Cybersecurity : the essential body of knowledge ent://SD_ILS/0/SD_ILS:55849 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Shoemaker, Dan.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Architecture of network systems ent://SD_ILS/0/SD_ILS:32 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Serpanos, Dimitrios Nikolaou.<br/>EBSCOhost <a href="http://search.ebscohost.com.ezproxy.iielearn.ac.za/login.aspx?direct=true&db=nlebk&AN=353481&site=ehost-live">http://search.ebscohost.com.ezproxy.iielearn.ac.za/login.aspx?direct=true&db=nlebk&AN=353481&site=ehost-live</a><br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Security risk management : building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:350 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Wheeler, Evan.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site</a><br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Frameworks for ICT policy : government, social and legal issues ent://SD_ILS/0/SD_ILS:42393 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Adomi, Esharenana E.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:43689 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Stallings, William.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Cybercrime and espionage : an analysis of subversive multivector threats ent://SD_ILS/0/SD_ILS:45498 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Gragido, Will.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Computer networks. ent://SD_ILS/0/SD_ILS:45625 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Tanenbaum, Andrew S., 1944-<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Cybercrime : investigating high-technology computer crime ent://SD_ILS/0/SD_ILS:46219 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Moore, Robert, 1976-<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Android forensics : investigation, analysis, and mobile security for Google Android ent://SD_ILS/0/SD_ILS:50712 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Hoog, Andrew.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Managing risk in information systems ent://SD_ILS/0/SD_ILS:52192 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Gibson, Darril.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Ethics for the information age ent://SD_ILS/0/SD_ILS:43933 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Quinn, Michael J. (Michael Jay)<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices ent://SD_ILS/0/SD_ILS:50709 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Hoog, Andrew.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:51544 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Harper, Allen.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Handbook of security and networks ent://SD_ILS/0/SD_ILS:53748 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Xiao, Yang, 1966-<br/>Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;doc_number=018713193&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;doc_number=018713193&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</a> Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=serviceetdoc_library=BVB01etdoc_number=018713193etline_number=0001etfunc_code=DB_RECORDSetservice_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=serviceetdoc_library=BVB01etdoc_number=018713193etline_number=0001etfunc_code=DB_RECORDSetservice_type=MEDIA</a><br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Succeeding with technology : computer system concepts for your life ent://SD_ILS/0/SD_ILS:22361 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Baldauf, Ken.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Security 2020 : reduce security risks this decade ent://SD_ILS/0/SD_ILS:22500 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Howard, Doug.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Discovering computers 2010 : living in a digital world : complete ent://SD_ILS/0/SD_ILS:19335 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Shelly, Gary B.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Wireshark network analysis : the official Wireshark certified network analyst study guide ent://SD_ILS/0/SD_ILS:40776 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Chappell, Laura.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Internet fraud casebook : the World Wide Web of deceit ent://SD_ILS/0/SD_ILS:41839 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Wells, Joseph T.<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy1007/2010013506-d.html">http://www.loc.gov/catdir/enhancements/fy1007/2010013506-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html">http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:43086 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Merkow, Mark S.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Mobile device security : a comprehensive guide to securing your information in a moving world ent://SD_ILS/0/SD_ILS:43280 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Fried, Stephen, 1962-<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:44880 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Moeller, Robert R.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:46362 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Timm, Carl.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:46364 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Shema, Mike.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Hacking exposed computer forensics : secrets &amp;amp; solutions ent://SD_ILS/0/SD_ILS:41497 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Davis, Chris.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Introduction to information systems ent://SD_ILS/0/SD_ILS:43865 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;O'Brien, James A., 1936-<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Networking ent://SD_ILS/0/SD_ILS:1115 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Beasley, Jeffrey S., 1955-<br/>Table of contents <a href="http://catdir.loc.gov/catdir/toc/ecip0824/2008032371.html">http://catdir.loc.gov/catdir/toc/ecip0824/2008032371.html</a><br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2009<br/> CompTIA security+ certification ent://SD_ILS/0/SD_ILS:15481 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Samuelle, T. J.<br/>ebrary <a href="http://site.ebrary.com/id/10274005">http://site.ebrary.com/id/10274005</a><br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2009<br/> Digital rights management for e-commerce systems ent://SD_ILS/0/SD_ILS:35143 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Drossos, Lambros, 1961-<br/>Format:&#160;Books<br/>Publication Date&#160;2009<br/> Database systems : design, implementation, and management ent://SD_ILS/0/SD_ILS:35807 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Rob, Peter.<br/>Format:&#160;Books<br/>Publication Date&#160;2009<br/> Security in wireless ad hoc and sensor networks ent://SD_ILS/0/SD_ILS:38460 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Cayirci, E. (Erdal)<br/>Format:&#160;Books<br/>Publication Date&#160;2009<br/> Security in a Web 2.0+ world : a standards based approach ent://SD_ILS/0/SD_ILS:38479 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Solari, C. (Carlos)<br/>Format:&#160;Books<br/>Publication Date&#160;2009<br/> Introduction to network security ent://SD_ILS/0/SD_ILS:46451 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Jacobson, Douglas.<br/>Format:&#160;Books<br/>Publication Date&#160;2009<br/> Principles of information security ent://SD_ILS/0/SD_ILS:43247 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Whitman, Michael E., 1964-<br/>Format:&#160;Books<br/>Publication Date&#160;2009<br/> Security+ guide to network security fundamentals ent://SD_ILS/0/SD_ILS:1522 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Ciampa, Mark D.<br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2009<br/> Capturing the criminal image : from mug shot to surveillance society ent://SD_ILS/0/SD_ILS:9184 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Finn, Jonathan M. (Jonathan Mathew), 1972- author.<br/>Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=496591">http://public.eblib.com/choice/publicfullrecord.aspx?p=496591</a> ebrary <a href="http://site.ebrary.com/id/10372228">http://site.ebrary.com/id/10372228</a> EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=315458">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=315458</a> JSTOR <a href="http://www.jstor.org/stable/10.5749/j.ctttv09q">http://www.jstor.org/stable/10.5749/j.ctttv09q</a> MyiLibrary <a href="http://www.myilibrary.com?id=525770">http://www.myilibrary.com?id=525770</a><br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2009<br/> CompTIA A+ complete study guide ent://SD_ILS/0/SD_ILS:22603 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Docter, Quentin.<br/>Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9780470486498.jpg">http://catalogimages.wiley.com/images/db/jimages/9780470486498.jpg</a><br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2009<br/> Discovering computers : fundamentals ent://SD_ILS/0/SD_ILS:2150 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Shelly, Gary B.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Computer networking : a top-down approach ent://SD_ILS/0/SD_ILS:2238 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Kurose, James F.<br/>Table of contents <a href="http://www.gbv.de/dms/ilmenau/toc/52436754X.PDF">Kostenfrei</a> Table of contents <a href="http://catdir.loc.gov/catdir/toc/ecip078/2007002094.html">http://catdir.loc.gov/catdir/toc/ecip078/2007002094.html</a> Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=015583995&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=015583995&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a> Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015583995&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015583995&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a><br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Discovering computers 2008 : introductory ent://SD_ILS/0/SD_ILS:9003 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Shelly, Gary B.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Management of information security ent://SD_ILS/0/SD_ILS:34358 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Whitman, Michael E., 1964-<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Security and software for cybercafes ent://SD_ILS/0/SD_ILS:34772 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Adomi, Esharenana E.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Windows server 2008 : networking and Network Access Protection (NAP) ent://SD_ILS/0/SD_ILS:35470 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Davies, Joseph, 1962-<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Encyclopedia of information ethics and security ent://SD_ILS/0/SD_ILS:35701 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Quigley, Marian.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0711/2007007277.html">http://www.loc.gov/catdir/toc/ecip0711/2007007277.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2008&#160;2007<br/> IT governance : a manager's guide to data security and ISO 27001/ISO 27002 ent://SD_ILS/0/SD_ILS:37040 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Calder, Alan, 1957-<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Guide to computer forensics and investigations ent://SD_ILS/0/SD_ILS:35367 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Nelson, Bill.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Cyber security : economic strategies and public policy alternatives ent://SD_ILS/0/SD_ILS:36212 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Gallaher, Michael P.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> FPGA-based implementation of signal processing systems ent://SD_ILS/0/SD_ILS:38430 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Wood, Roger.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Malware forensics : investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:46217 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Aquilina, James M.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Microsoft&reg; Windows server 2008 security resource kit ent://SD_ILS/0/SD_ILS:6679 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Johansson, Jesper M.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Administrative assistant's and secretary's handbook ent://SD_ILS/0/SD_ILS:9862 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Stroman, James.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/toc/ecip0718/2007020971.html">http://catdir.loc.gov/catdir/toc/ecip0718/2007020971.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Self-defending networks : the next generation of network security ent://SD_ILS/0/SD_ILS:33841 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;De Capite, Duane.<br/>Format:&#160;Books<br/>Publication Date&#160;2007&#160;2006<br/> Security in computing ent://SD_ILS/0/SD_ILS:34329 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Pfleeger, Charles P., 1948-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0619/2006026798.html">http://www.loc.gov/catdir/toc/ecip0619/2006026798.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:34332 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Stallings, William.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0706/2006287096.html">http://www.loc.gov/catdir/toc/fy0706/2006287096.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Introduction to information systems : supporting and transforming business ent://SD_ILS/0/SD_ILS:31097 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Rainer, R. Kelly, Jr., 1949-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0518/2005022367.html">http://www.loc.gov/catdir/toc/ecip0518/2005022367.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0645/2005022367-d.html">http://www.loc.gov/catdir/enhancements/fy0645/2005022367-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> SELinux by example : understanding security enhanced Linux ent://SD_ILS/0/SD_ILS:33241 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Mayer, Frank, 1961-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0612/2006012657.html">http://www.loc.gov/catdir/toc/ecip0612/2006012657.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Network security hacks ent://SD_ILS/0/SD_ILS:33761 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Lockhart, Andrew.<br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Windows Vista security : securing Vista against malicious attacks ent://SD_ILS/0/SD_ILS:36285 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Grimes, Roger A.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0718/2007020135.html">http://www.loc.gov/catdir/toc/ecip0718/2007020135.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> IPsec virtual private network fundamentals ent://SD_ILS/0/SD_ILS:36498 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Carmouche, James Henry.<br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> PCs for dummies ent://SD_ILS/0/SD_ILS:36448 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Gookin, Dan.<br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Risks, controls, and security : concepts and applications ent://SD_ILS/0/SD_ILS:39947 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Raval, Vasant H. (Vasant Harishanker), 1940-<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0714/2007273982-d.html">http://www.loc.gov/catdir/enhancements/fy0714/2007273982-d.html</a> Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0740/2007273982-b.html">http://www.loc.gov/catdir/enhancements/fy0740/2007273982-b.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0740/2007273982-t.html">http://www.loc.gov/catdir/enhancements/fy0740/2007273982-t.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors ent://SD_ILS/0/SD_ILS:42718 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Reyes, Anthony.<br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2007<br/> Computer forensics : evidence collection and management ent://SD_ILS/0/SD_ILS:44603 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Newman, Robert C.<br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Digital citizenship in schools ent://SD_ILS/0/SD_ILS:45117 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Ribble, Mike.<br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Discovering computers : fundamentals ent://SD_ILS/0/SD_ILS:1763 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Shelly, Gary B.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1104/2006299619-t.html">http://catdir.loc.gov/catdir/enhancements/fy1104/2006299619-t.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1104/2006299619-b.html">http://catdir.loc.gov/catdir/enhancements/fy1104/2006299619-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1104/2006299619-d.html">http://catdir.loc.gov/catdir/enhancements/fy1104/2006299619-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> The unofficial guide to ethical hacking ent://SD_ILS/0/SD_ILS:9017 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Fadia, Ankit, 1985-<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> CompTIA security+ study guide ent://SD_ILS/0/SD_ILS:15999 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Pastore, Michael A.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-t.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-t.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-b.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0659/2006285691-d.html">http://catdir.loc.gov/catdir/enhancements/fy0659/2006285691-d.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-d.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Privacy protection for e-services ent://SD_ILS/0/SD_ILS:31987 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Yee, George.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip063/2005032104.html">http://www.loc.gov/catdir/toc/ecip063/2005032104.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings ent://SD_ILS/0/SD_ILS:33825 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;ACISP 2006 (2006 : Melbourne, Vic.)<br/><a href="http://www.springerlink.com/openurl.asp?genre=issue&amp;issn=0302-9743&amp;volume=4058">Restricted to SpringerLink subscribers</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Privacy enhancing technologies : 5th international workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005 : revised selected papers ent://SD_ILS/0/SD_ILS:33827 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;PET 2005 (2005 : Cavtat, Croatia)<br/><a href="http://www.springerlink.com/openurl.asp?genre=issue&amp;issn=0302-9743&amp;volume=3856">Restricted to SpringerLink subscribers</a> Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0702/2006926828.html">http://www.loc.gov/catdir/toc/fy0702/2006926828.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0661/2006926828-d.html">http://www.loc.gov/catdir/enhancements/fy0661/2006926828-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Coding and cryptography : international workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papers ent://SD_ILS/0/SD_ILS:33831 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;International Workshop on Coding and Cryptography (2005 : Bergen, Norway)<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0706/2006927431.html">http://www.loc.gov/catdir/toc/fy0706/2006927431.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Emerging trends in information and communication security : international conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006 ; proceedings ent://SD_ILS/0/SD_ILS:33833 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;ETRICS 2006 (2006 : Freiburg im Breisgau, Germany)<br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2006<br/> Look both ways : help protect your family on the Internet ent://SD_ILS/0/SD_ILS:33840 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Criddle, Linda.<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:33863 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Henmi, Anne.<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Quality of protection : security measurements and metrics ent://SD_ILS/0/SD_ILS:33877 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Gollmann, Dieter.<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Information technology security &amp;amp; risk management ent://SD_ILS/0/SD_ILS:35718 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Slay, Jill.<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:31545 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Stallings, William.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0608/2006276085.html">http://www.loc.gov/catdir/toc/fy0608/2006276085.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Technology in action ent://SD_ILS/0/SD_ILS:31805 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Evans, Alan.<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Professional ASP.NET 2.0 security, membership, and role management ent://SD_ILS/0/SD_ILS:33235 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Schackow, Stefan, 1970-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip063/2005032278.html">http://www.loc.gov/catdir/toc/ecip063/2005032278.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Cybercrime : digital cops in a networked environment ent://SD_ILS/0/SD_ILS:33487 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Balkin, J. M.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip071/2006030943.html">http://www.loc.gov/catdir/toc/ecip071/2006030943.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Dictionary of information security ent://SD_ILS/0/SD_ILS:33750 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Slade, Robert.<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Penetration testing and network defense ent://SD_ILS/0/SD_ILS:33762 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Whitaker, Andrew.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/fy0607/2004108262.html">http://www.loc.gov/catdir/toc/fy0607/2004108262.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Ethics for the information age ent://SD_ILS/0/SD_ILS:35347 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Quinn, Michael J. (Michael Jay)<br/><a href="http://www.loc.gov/catdir/toc/ecip0517/2005023442.html">Table of contents</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT ent://SD_ILS/0/SD_ILS:40166 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Seagren, Eric.<br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2006<br/> Software security : building security in ent://SD_ILS/0/SD_ILS:54971 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;McGraw, Gary, 1966-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip062/2005031598.html">http://www.loc.gov/catdir/toc/ecip062/2005031598.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> 70-299 MCSE guide to implementing and administering security in a Microsoft Windows Server 2003 network ent://SD_ILS/0/SD_ILS:17101 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Barrett, Diane.<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Small business management : an entrepreneur's guidebook ent://SD_ILS/0/SD_ILS:19735 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Megginson, Leon C.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004063777-t.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004063777-t.html</a> Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014177431&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014177431&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004063777-d.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004063777-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Linux network security ent://SD_ILS/0/SD_ILS:574 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Smith, Peter G., 1977-<br/>Table of contents <a href="http://catdir.loc.gov/catdir/toc/ecip056/2005000312.html">http://catdir.loc.gov/catdir/toc/ecip056/2005000312.html</a><br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2005<br/> Implementing database security and auditing ent://SD_ILS/0/SD_ILS:29347 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Ben-Natan, Ron.<br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Firewalls : jumpstart for network and systems administrators ent://SD_ILS/0/SD_ILS:28484 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Vacca, John R.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2004063211.html">http://www.loc.gov/catdir/toc/els051/2004063211.html</a> Publisher description <a href="http://www.loc.gov/catdir/description/els051/2004063211.html">http://www.loc.gov/catdir/description/els051/2004063211.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> The executive guide to information security : threats, challenges, and solutions ent://SD_ILS/0/SD_ILS:29022 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Egan, Mark.<br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Defending the digital frontier : practical security for management ent://SD_ILS/0/SD_ILS:29420 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Babiak, Jan.<br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> International e-Conference on Computer Science 2005 ent://SD_ILS/0/SD_ILS:31088 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;International e-Conference on Computer Science (2005)<br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Computer forensics jumpstart ent://SD_ILS/0/SD_ILS:36452 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Solomon, Michael (Michael G.), 1963-<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Information security illuminated ent://SD_ILS/0/SD_ILS:43414 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Solomon, Michael (Michael G.), 1963-<br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> The Tao of network security monitoring : beyond intrusion detection ent://SD_ILS/0/SD_ILS:10014 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Bejtlich, Richard.<br/>Safari Books Online <a href="http://proquest.safaribooksonline.com/0321246772">http://proquest.safaribooksonline.com/0321246772</a> Table of contents <a href="http://catdir.loc.gov/catdir/toc/ecip0416/2004007857.html">http://catdir.loc.gov/catdir/toc/ecip0416/2004007857.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Designing security for a Microsoft Windows Server 2003 Network (70-298) ent://SD_ILS/0/SD_ILS:10081 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Northrup, Tony, 1974-<br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2005<br/> Microsoft official academic course : implementing and administering security in a Microsoft Windows Server 2003 network (70-299) ent://SD_ILS/0/SD_ILS:10176 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Zacker, Craig.<br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Security+ guide to network security fundamentals ent://SD_ILS/0/SD_ILS:12198 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Ciampa, Mark D.<br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> MCSE guide to designing security for a microsoft Windows server 2003 network ent://SD_ILS/0/SD_ILS:17103 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Khnaser, Elias N.<br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2005<br/> MCSA/MCSE self-paced training kit (exam 70-299) : implementing and administering security in a Microsoft Windows Server 2003 network ent://SD_ILS/0/SD_ILS:11724 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Northrup, Anthony.<br/>Safari Books Online <a href="http://proquest.safaribooksonline.com/073562061X">http://proquest.safaribooksonline.com/073562061X</a><br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2004<br/> MCSE self-paced training kit (exam 70-298) : designing security for a Microsoft Windows Server 2003 network ent://SD_ILS/0/SD_ILS:11725 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Bragg, Roberta.<br/>Safari Books Online <a href="http://proquest.safaribooksonline.com/0735619697">http://proquest.safaribooksonline.com/0735619697</a><br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2004<br/> Digital fortress ent://SD_ILS/0/SD_ILS:11763 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Brown, Dan, 1964-<br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Security+ : study guide ent://SD_ILS/0/SD_ILS:18233 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Pastore, Michael A.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-t.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-t.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-b.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-d.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Software forensics : collecting evidence from the scene of a digital crime ent://SD_ILS/0/SD_ILS:28510 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Slade, Robert M.<br/>Publisher description <a href="http://www.loc.gov/catdir/description/mh041/2003070176.html">http://www.loc.gov/catdir/description/mh041/2003070176.html</a> Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003070176.html">http://www.loc.gov/catdir/bios/mh042/2003070176.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/mh041/2003070176.html">http://www.loc.gov/catdir/toc/mh041/2003070176.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Security for mobility ent://SD_ILS/0/SD_ILS:28202 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Mitchell, Chris, 1953-<br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets ent://SD_ILS/0/SD_ILS:29166 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Wallace, Michael, 1960-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0415/2004003905.html">http://www.loc.gov/catdir/toc/ecip0415/2004003905.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Guide to firewalls and network security : with intrusion detection and VPNs ent://SD_ILS/0/SD_ILS:38432 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Holden, Greg.<br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Administrative assistant's &amp; secretary's handbook ent://SD_ILS/0/SD_ILS:9867 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Stroman, James.<br/>Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=242987">http://public.eblib.com/choice/publicfullrecord.aspx?p=242987</a> ebrary <a href="http://site.ebrary.com/id/10044975">http://site.ebrary.com/id/10044975</a> EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=100160">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=100160</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/0814407846">http://proquest.safaribooksonline.com/0814407846</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?uicode=simonfraser&xmlid=0814407846">http://proquest.safaribooksonline.com/?uicode=simonfraser&xmlid=0814407846</a><br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2004<br/> Management of information technology ent://SD_ILS/0/SD_ILS:15883 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Frenzel, Carroll W.<br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> MCSE self-paced training kit (exam 70-298) : designing security for a Microsoft Windows Server 2003 network ent://SD_ILS/0/SD_ILS:17098 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Bragg, Roberta.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1009/2003065183-t.html">http://catdir.loc.gov/catdir/enhancements/fy1009/2003065183-t.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1004/2003065183-b.html">http://catdir.loc.gov/catdir/enhancements/fy1004/2003065183-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1004/2003065183-d.html">http://catdir.loc.gov/catdir/enhancements/fy1004/2003065183-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Network security foundations ent://SD_ILS/0/SD_ILS:22499 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Strebe, Matthew.<br/>04 <a href="http://www.gbv.de/dms/hebis-darmstadt/toc/125038879.pdf">lizenzfrei</a> Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-t.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-t.html</a> Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018737839&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018737839&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-b.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-d.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Computers in your future 2003 ent://SD_ILS/0/SD_ILS:11869 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Pfaffenberger, Bryan, 1949-<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> SQL server security ent://SD_ILS/0/SD_ILS:16012 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Andrews, Chip.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/toc/mh051/2004351704.html">http://catdir.loc.gov/catdir/toc/mh051/2004351704.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/bios/mh051/2004351704.html">http://catdir.loc.gov/catdir/bios/mh051/2004351704.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/description/mh051/2004351704.html">http://catdir.loc.gov/catdir/description/mh051/2004351704.html</a><br/>Format:&#160;Regular print<br/>Publication Date&#160;2003<br/> Computer networking : a top-down approach featuring the Internet ent://SD_ILS/0/SD_ILS:25777 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Kurose, James F.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Web services security ent://SD_ILS/0/SD_ILS:26083 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;O'Neill, Mark.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Wireless hacks ent://SD_ILS/0/SD_ILS:28922 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Flickenger, Rob.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Building open source network security tools : components and techniques ent://SD_ILS/0/SD_ILS:29673 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Schiffman, Mike.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/wiley031/2002011320.html">http://www.loc.gov/catdir/toc/wiley031/2002011320.html</a> Publisher description <a href="http://www.loc.gov/catdir/description/wiley036/2002011320.html">http://www.loc.gov/catdir/description/wiley036/2002011320.html</a> Contributor biographical information <a href="http://www.loc.gov/catdir/bios/wiley043/2002011320.html">http://www.loc.gov/catdir/bios/wiley043/2002011320.html</a><br/>Format:&#160;Regular print<br/>Publication Date&#160;2003<br/> Network security : a practical guide ent://SD_ILS/0/SD_ILS:34327 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Poole, Owen.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:27796 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Tipton, Harold F.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Security in computing ent://SD_ILS/0/SD_ILS:27981 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Pfleeger, Charles P., 1948-<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Computer networking : a top-down approach featuring the Internet ent://SD_ILS/0/SD_ILS:28040 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Kurose, James F.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Practical UNIX and Internet security. ent://SD_ILS/0/SD_ILS:31544 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Garfinkel, Simson.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Internet security ent://SD_ILS/0/SD_ILS:36371 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Holden, Greg.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Writing secure code ent://SD_ILS/0/SD_ILS:40250 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Howard, Michael, 1965-<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> PC disaster and recovery ent://SD_ILS/0/SD_ILS:10310 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Chase, Kate.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-t.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-t.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-b.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-d.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:20080 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Stallings, William.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Mike Meyers' security + certification passport ent://SD_ILS/0/SD_ILS:57645 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Kay, Trevor.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> The hacker's handbook : the strategy behind breaking into and defending Networks ent://SD_ILS/0/SD_ILS:58470 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Young, Susan (Susan Elizabeth), 1968-<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Management information systems : managing information technology in the e-business enterprise ent://SD_ILS/0/SD_ILS:10591 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;O'Brien, James A., 1936-<br/>Format:&#160;Books<br/>Publication Date&#160;2002<br/> Networking complete. ent://SD_ILS/0/SD_ILS:18232 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002108071-t.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002108071-t.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002108071-d.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002108071-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2002<br/> Operating system concepts ent://SD_ILS/0/SD_ILS:22490 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Silberschatz, Abraham.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/toc/wiley021/2001276306.html">http://catdir.loc.gov/catdir/toc/wiley021/2001276306.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/description/wiley035/2001276306.html">http://catdir.loc.gov/catdir/description/wiley035/2001276306.html</a> The Alumni and Friends Memorial Book Fund Home Page <a href="http://hdl.library.upenn.edu/1017.12/366295">http://hdl.library.upenn.edu/1017.12/366295</a><br/>Format:&#160;Books<br/>Publication Date&#160;2002<br/> Securing business information : strategies to protect the enterprise and its network ent://SD_ILS/0/SD_ILS:25543 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Byrnes, F. Christian.<br/>Format:&#160;Books<br/>Publication Date&#160;2002<br/> Web security, privacy, and commerce ent://SD_ILS/0/SD_ILS:34627 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Garfinkel, Simson.<br/>Format:&#160;Books<br/>Publication Date&#160;2002<br/> Securing e-business systems : a guide for managers and executives ent://SD_ILS/0/SD_ILS:46122 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Braithwaite, Timothy, 1942-<br/>Format:&#160;Books<br/>Publication Date&#160;2002<br/> Internet security made easy : a plain-English guide to protecting yourself and your company online ent://SD_ILS/0/SD_ILS:12203 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Schweitzer, Douglas.<br/>Format:&#160;Books<br/>Publication Date&#160;2002<br/> Computing essentials, 2002-2003 ent://SD_ILS/0/SD_ILS:20344 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;O'Leary, Timothy J., 1947-<br/>Format:&#160;Books<br/>Publication Date&#160;2002<br/> E-business &amp; e-commerce : how to program ent://SD_ILS/0/SD_ILS:12728 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Deitel, Harvey M., 1945-<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Operating systems : internals and design principles ent://SD_ILS/0/SD_ILS:13930 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Stallings, William.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> The essential guide to computing ent://SD_ILS/0/SD_ILS:13960 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Walters, E. Garrison.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Planning for PKI : best practices guide for deploying public key infrastructure ent://SD_ILS/0/SD_ILS:23889 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Housley, Russ, 1959-<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> An information security handbook ent://SD_ILS/0/SD_ILS:24024 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Hunter, John M. D., 1940-<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Maximum security ent://SD_ILS/0/SD_ILS:24151 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z Format:&#160;Books<br/>Publication Date&#160;2001<br/> Auditing and security : AS/400, NT, UNIX, networks, and disaster recovery plans ent://SD_ILS/0/SD_ILS:24164 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Musaji, Yusufali F.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Cryptography and e-commerce : a Wiley tech brief ent://SD_ILS/0/SD_ILS:24286 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Graff, Jon.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Internet trust and security : the way ahead ent://SD_ILS/0/SD_ILS:24478 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Essinger, James.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Security transformation : digital defense strategies to protect your company's reputation and market share ent://SD_ILS/0/SD_ILS:24555 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;McCarthy, Mary Pat.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Information security policies, procedures, and standards : guidelines for effective information security management ent://SD_ILS/0/SD_ILS:24935 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Peltier, Thomas R.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Security engineering : a guide to building dependable distributed systems ent://SD_ILS/0/SD_ILS:31543 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Anderson, Ross, 1956-<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Accounting information systems ent://SD_ILS/0/SD_ILS:9910 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Bodnar, George H.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Active defense : a comprehensive guide to network security ent://SD_ILS/0/SD_ILS:9857 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Brenton, Chris.<br/><a href="http://www.contentreserve.com/TitleInfo.asp?ID={C0E06398-F64D-4C14-BAA2-D2ADC889DA37}&Format=50">Click for information</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?isbn=0782129161">http://www.books24x7.com/marc.asp?isbn=0782129161</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=2782">http://www.books24x7.com/marc.asp?bookid=2782</a> ebrary <a href="http://site.ebrary.com/id/10304303">http://site.ebrary.com/id/10304303</a> EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=92925">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=92925</a><br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2001<br/> MCSE training kit : designing Microsoft Windows 2000 network security ent://SD_ILS/0/SD_ILS:13106 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Microsoft Corporation.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1210/00053301-b.html">http://catdir.loc.gov/catdir/enhancements/fy1210/00053301-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1004/00053301-d.html">http://catdir.loc.gov/catdir/enhancements/fy1004/00053301-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Understanding operating systems ent://SD_ILS/0/SD_ILS:13364 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Flynn, Ida M., 1942-<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-t.html">http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-t.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-b.html">http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-d.html">http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Internet marketing ent://SD_ILS/0/SD_ILS:13569 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Hofacker, Charles F.<br/><a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">Inhaltsverzeichnis</a> Table of contents <a href="http://catdir.loc.gov/catdir/toc/onix06/00036498.html">http://catdir.loc.gov/catdir/toc/onix06/00036498.html</a> Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a> Publisher description <a href="http://catdir.loc.gov/catdir/description/wiley035/00036498.html">http://catdir.loc.gov/catdir/description/wiley035/00036498.html</a> Cover <a href="http://swbplus.bsz-bw.de/bsz08739104xcov.htm">http://swbplus.bsz-bw.de/bsz08739104xcov.htm</a><br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Readings in cyberethics ent://SD_ILS/0/SD_ILS:16939 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Spinello, Richard A.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Electronic government and electronic signatures ent://SD_ILS/0/SD_ILS:24384 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Relyea, Harold.<br/>Format:&#160;Books<br/>Publication Date&#160;2000<br/> Secure electronic commerce : building the infrastructure for digital signatures and encryption ent://SD_ILS/0/SD_ILS:26324 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Ford, Warwick.<br/>Format:&#160;Books<br/>Publication Date&#160;2000<br/> Secrets and lies : digital security in a networked world ent://SD_ILS/0/SD_ILS:14171 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Schneier, Bruce, 1963-<br/>Table of contents <a href="http://www.gbv.de/dms/ilmenau/toc/314774726.PDF">Kostenfrei</a> Table of contents <a href="http://catdir.loc.gov/catdir/toc/onix04/00042252.html">http://catdir.loc.gov/catdir/toc/onix04/00042252.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html">http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/description/wiley0310/00042252.html">http://catdir.loc.gov/catdir/description/wiley0310/00042252.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2000<br/> Data and computer communications ent://SD_ILS/0/SD_ILS:14221 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Stallings, William.<br/>Table of contents <a href="http://www3.ub.tu-berlin.de/ihv/000740460.pdf">http://www3.ub.tu-berlin.de/ihv/000740460.pdf</a><br/>Format:&#160;Books<br/>Publication Date&#160;2000<br/> Operating system concepts ent://SD_ILS/0/SD_ILS:23458 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Silberschatz, Abraham.<br/>Format:&#160;Books<br/>Publication Date&#160;1999<br/> Net spies : who's watching you on the Web? ent://SD_ILS/0/SD_ILS:13784 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Gauntlett, Andrew.<br/>Format:&#160;Books<br/>Publication Date&#160;1999<br/> Management information systems : managing information technology in the internetworked enterprise ent://SD_ILS/0/SD_ILS:14839 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;O'Brien, James A., 1936-<br/>Format:&#160;Books<br/>Publication Date&#160;1999<br/> Security technologies for the World Wide Web ent://SD_ILS/0/SD_ILS:23263 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Oppliger, Rolf.<br/>Format:&#160;Books<br/>Publication Date&#160;1999<br/> Operating system concepts ent://SD_ILS/0/SD_ILS:23418 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Silberschatz, Abraham.<br/>Format:&#160;Books<br/>Publication Date&#160;1998<br/> Operating systems : internals and design principles ent://SD_ILS/0/SD_ILS:10416 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Stallings, William.<br/>Format:&#160;Books<br/>Publication Date&#160;1998<br/> Management information systems : the manager's view ent://SD_ILS/0/SD_ILS:19776 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Schultheis, Robert A.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/toc/mh022/97025011.html">http://catdir.loc.gov/catdir/toc/mh022/97025011.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/description/mh023/97025011.html">http://catdir.loc.gov/catdir/description/mh023/97025011.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;1998<br/> Security in computing ent://SD_ILS/0/SD_ILS:25227 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Pfleeger, Charles P., 1948-<br/>Format:&#160;Books<br/>Publication Date&#160;1997<br/> Introduction to information systems ent://SD_ILS/0/SD_ILS:20759 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;O'Brien, James A., 1936-<br/>Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=007578393&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=007578393&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a><br/>Format:&#160;Books<br/>Publication Date&#160;1997<br/> Dictionary of computing. ent://SD_ILS/0/SD_ILS:23076 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Illingworth, Valerie.<br/>Format:&#160;Books<br/>Publication Date&#160;1996<br/> Computers, ethics &amp;amp; social values ent://SD_ILS/0/SD_ILS:26311 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;Johnson, Deborah G., 1945-<br/>Format:&#160;Books<br/>Publication Date&#160;1995<br/> Introduction to information systems ent://SD_ILS/0/SD_ILS:14876 2025-04-30T09:22:00Z 2025-04-30T09:22:00Z by&#160;O'Brien, James A., 1936-<br/>Format:&#160;Books<br/>Publication Date&#160;1994&#160;1993<br/>