Search Results for Computer security. - Narrowed by: 2010-2016SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010-2016$0025092010-2016$0026ps$003d300?dt=list2025-12-26T20:49:08ZThe essential guide to home computer securityent://SD_ILS/0/SD_ILS:539122025-12-26T20:49:08Z2025-12-26T20:49:08Zby Rowlingson, Robert.<br/>Format: Books<br/>Publication Date 2011<br/>Introduction to Computer Security: Pearson New International Editionent://SD_ILS/0/SD_ILS:538712025-12-26T20:49:08Z2025-12-26T20:49:08Zby Goodrich, M. T. (Michael T.)<br/>Format: Books<br/>Publication Date 2014<br/>Computer security literacy : staying safe in a digital worldent://SD_ILS/0/SD_ILS:502232025-12-26T20:49:08Z2025-12-26T20:49:08Zby Jacobson, Douglas.<br/>Format: Books<br/>Publication Date 2013<br/>Principles of computer security : CompTIA security+ and beyondent://SD_ILS/0/SD_ILS:414982025-12-26T20:49:08Z2025-12-26T20:49:08Zby Conklin, Wm. Arthur (William Arthur)<br/>Format: Electronic Resources<br/>Publication Date 2010<br/>Firewall design and analysisent://SD_ILS/0/SD_ILS:537502025-12-26T20:49:08Z2025-12-26T20:49:08Zby Liu, Alex X.<br/>Format: Books<br/>Publication Date 2011<br/>Principles of information securityent://SD_ILS/0/SD_ILS:3202025-12-26T20:49:08Z2025-12-26T20:49:08Zby Whitman, Michael E., 1964- author.<br/>Format: Books<br/>Publication Date 2016<br/>Data communications and computer networks : a business user's approachent://SD_ILS/0/SD_ILS:108142025-12-26T20:49:08Z2025-12-26T20:49:08Zby White, Curt M.<br/>Format: Books<br/>Publication Date 2016<br/>CompTIA security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:3472025-12-26T20:49:08Z2025-12-26T20:49:08Zby Ciampa, Mark D., author.<br/>Format: Books<br/>Publication Date 2015<br/>Ethical hacking and penetration testing guideent://SD_ILS/0/SD_ILS:533322025-12-26T20:49:08Z2025-12-26T20:49:08Zby Baloch, Rafay.<br/>Cover image <a href="http://images.tandf.co.uk/common/jackets/websmall/978148223/9781482231618.jpg">http://images.tandf.co.uk/common/jackets/websmall/978148223/9781482231618.jpg</a><br/>Format: Books<br/>Publication Date 2015<br/>Security and privacyent://SD_ILS/0/SD_ILS:537662025-12-26T20:49:08Z2025-12-26T20:49:08Zby Savirimuthu, Joseph, editor.<br/>Format: Books<br/>Publication Date 2015<br/>Hardware security : design, threats, and safeguardsent://SD_ILS/0/SD_ILS:542862025-12-26T20:49:08Z2025-12-26T20:49:08Zby Mukhopadhyay, Debdeep.<br/>Format: Books<br/>Publication Date 2015<br/>Teachers discovering computers : integrating technology in a changing worldent://SD_ILS/0/SD_ILS:97932025-12-26T20:49:08Z2025-12-26T20:49:08Zby Gunter, Glenda A., author.<br/>Format: Books<br/>Publication Date 2015<br/>Security in computingent://SD_ILS/0/SD_ILS:557882025-12-26T20:49:08Z2025-12-26T20:49:08Zby Pfleeger, Charles P., 1948- author.<br/><a href="http://catalogue.londonmet.ac.uk/record=b1680851~S1">E-book</a><br/>Format: Regular print<br/>Publication Date 2015<br/>Emerging trends in ICT securityent://SD_ILS/0/SD_ILS:508782025-12-26T20:49:08Z2025-12-26T20:49:08Zby Akhgar, Babak, editor of compilation.<br/>Format: Books<br/>Publication Date 2014<br/>Professional Java for web applications : featuring WebSockets, Spring Framework, JPA Hibernate, and Spring Securityent://SD_ILS/0/SD_ILS:511822025-12-26T20:49:08Z2025-12-26T20:49:08Zby Williams, Nicholas S. author.<br/>Format: Books<br/>Publication Date 2014<br/>Network security, firewalls, and VPNsent://SD_ILS/0/SD_ILS:521932025-12-26T20:49:08Z2025-12-26T20:49:08Zby Stewart, James Michael.<br/>Format: Books<br/>Publication Date 2014<br/>Security awareness : applying practical security in your worldent://SD_ILS/0/SD_ILS:502252025-12-26T20:49:08Z2025-12-26T20:49:08Zby Ciampa, Mark.<br/>Format: Regular print<br/>Publication Date 2014 2013<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:504962025-12-26T20:49:08Z2025-12-26T20:49:08Zby Stallings, William, author.<br/>Format: Books<br/>Publication Date 2014<br/>Hacking exposed : unified communications &amp; VoIP security secrets &amp; solutionsent://SD_ILS/0/SD_ILS:514532025-12-26T20:49:08Z2025-12-26T20:49:08Zby Collier, Mark D., author.<br/>Format: Books<br/>Publication Date 2014<br/>The basics of IT audit Purposes, processes, and practical information.ent://SD_ILS/0/SD_ILS:517552025-12-26T20:49:08Z2025-12-26T20:49:08Zby Gantz, Stephen D.<br/><a href="http://esc-web.lib.cbs.dk/login?url=http://www.sciencedirect.com/science/book/9780124171596">Campus and remote access</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780124171596">Available by subscription from Safari Books Online</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780124171596">http://proquest.tech.safaribooksonline.de/9780124171596</a><br/>Format: Electronic Resources<br/>Publication Date 2014<br/>Managing cyber attacks in international law, business, and relations : in search of cyber peaceent://SD_ILS/0/SD_ILS:536382025-12-26T20:49:08Z2025-12-26T20:49:08Zby Shackelford, Scott J. author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html</a><br/>Format: Books<br/>Publication Date 2014<br/>Security management of next generation telecommunications networks and servicesent://SD_ILS/0/SD_ILS:538172025-12-26T20:49:08Z2025-12-26T20:49:08Zby Jacobs, Stuart.<br/>Format: Books<br/>Publication Date 2014<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:565002025-12-26T20:49:08Z2025-12-26T20:49:08Zby Andress, Jason.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site</a><br/>Format: Books<br/>Publication Date 2014<br/>Cyber power : Crime, conflict and security in cyberspace.ent://SD_ILS/0/SD_ILS:500412025-12-26T20:49:08Z2025-12-26T20:49:08Zby Ghernaouti-Hélie, Solange, 1958-....<br/>Format: Books<br/>Publication Date 2013<br/>Cyber attacks : protecting national infrastructureent://SD_ILS/0/SD_ILS:498612025-12-26T20:49:08Z2025-12-26T20:49:08Zby Amoroso, Edward.<br/>Format: Books<br/>Publication Date 2013<br/>Android security : attacks and defensesent://SD_ILS/0/SD_ILS:502242025-12-26T20:49:08Z2025-12-26T20:49:08Zby Misra, Anmol.<br/>Format: Books<br/>Publication Date 2013<br/>Hacking exposed : mobile security secrets &amp; solutionsent://SD_ILS/0/SD_ILS:505112025-12-26T20:49:08Z2025-12-26T20:49:08Zby Bergman, Neil.<br/>Format: Books<br/>Publication Date 2013<br/>Network security : a beginner's guideent://SD_ILS/0/SD_ILS:515562025-12-26T20:49:08Z2025-12-26T20:49:08Zby Maiwald, Eric.<br/>Format: Books<br/>Publication Date 2013<br/>Advanced DPA theory and practice : towards the security limits of secure embedded circuitsent://SD_ILS/0/SD_ILS:537912025-12-26T20:49:08Z2025-12-26T20:49:08Zby Peeters, Eric, author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html</a><br/>Format: Books<br/>Publication Date 2013<br/>Understanding computers : today and tomorrow : introductoryent://SD_ILS/0/SD_ILS:223552025-12-26T20:49:08Z2025-12-26T20:49:08Zby Morley, Deborah.<br/>Format: Books<br/>Publication Date 2013<br/>MacBook all-in-one for dummiesent://SD_ILS/0/SD_ILS:13552025-12-26T20:49:08Z2025-12-26T20:49:08Zby Chambers, Mark L.<br/>Format: Books<br/>Publication Date 2012<br/>Security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:19692025-12-26T20:49:08Z2025-12-26T20:49:08Zby Ciampa, Mark D.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html</a>
Table of contents only <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html</a><br/>Format: Books<br/>Publication Date 2012<br/>Low tech hacking : street smarts for security professionalsent://SD_ILS/0/SD_ILS:177872025-12-26T20:49:08Z2025-12-26T20:49:08Zby Wiles, Jack.<br/>Format: Books<br/>Publication Date 2012<br/>Security fundamentals : exam 98-367ent://SD_ILS/0/SD_ILS:225022025-12-26T20:49:08Z2025-12-26T20:49:08Zby Gambrel, Bryan.<br/>Format: Books<br/>Publication Date 2012<br/>Hacking web apps : detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:507112025-12-26T20:49:08Z2025-12-26T20:49:08Zby Shema, Mike, author.<br/>Format: Books<br/>Publication Date 2012<br/>Safety health and security in wastewater systemsent://SD_ILS/0/SD_ILS:507352025-12-26T20:49:08Z2025-12-26T20:49:08Zby Water Environment Federation<br/>Format: Books<br/>Publication Date 2012<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:505542025-12-26T20:49:08Z2025-12-26T20:49:08Zby Mjølsnes, Stig F.<br/>Format: Books<br/>Publication Date 2012<br/>Role mining in business : taming role-based access control administrationent://SD_ILS/0/SD_ILS:546472025-12-26T20:49:08Z2025-12-26T20:49:08Zby Colantonio, Alessandro.<br/>Format: Books<br/>Publication Date 2012<br/>Principles of information securityent://SD_ILS/0/SD_ILS:164132025-12-26T20:49:08Z2025-12-26T20:49:08Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2012<br/>Cybersecurity : the essential body of knowledgeent://SD_ILS/0/SD_ILS:558492025-12-26T20:49:08Z2025-12-26T20:49:08Zby Shoemaker, Dan.<br/>Format: Books<br/>Publication Date 2012<br/>Security risk management : building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:3502025-12-26T20:49:08Z2025-12-26T20:49:08Zby Wheeler, Evan.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site</a><br/>Format: Books<br/>Publication Date 2011<br/>Frameworks for ICT policy : government, social and legal issuesent://SD_ILS/0/SD_ILS:423932025-12-26T20:49:08Z2025-12-26T20:49:08Zby Adomi, Esharenana E.<br/>Format: Books<br/>Publication Date 2011<br/>Cybercrime and espionage : an analysis of subversive multivector threatsent://SD_ILS/0/SD_ILS:454982025-12-26T20:49:08Z2025-12-26T20:49:08Zby Gragido, Will.<br/>Format: Books<br/>Publication Date 2011<br/>Cybercrime : investigating high-technology computer crimeent://SD_ILS/0/SD_ILS:462192025-12-26T20:49:08Z2025-12-26T20:49:08Zby Moore, Robert, 1976-<br/>Format: Books<br/>Publication Date 2011<br/>iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devicesent://SD_ILS/0/SD_ILS:507092025-12-26T20:49:08Z2025-12-26T20:49:08Zby Hoog, Andrew.<br/>Format: Books<br/>Publication Date 2011<br/>Android forensics : investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:507122025-12-26T20:49:08Z2025-12-26T20:49:08Zby Hoog, Andrew.<br/>Format: Books<br/>Publication Date 2011<br/>Managing risk in information systemsent://SD_ILS/0/SD_ILS:521922025-12-26T20:49:08Z2025-12-26T20:49:08Zby Gibson, Darril.<br/>Format: Books<br/>Publication Date 2011<br/>Handbook of security and networksent://SD_ILS/0/SD_ILS:537482025-12-26T20:49:08Z2025-12-26T20:49:08Zby Xiao, Yang, 1966-<br/>Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018713193&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018713193&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a>
Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=serviceetdoc_library=BVB01etdoc_number=018713193etline_number=0001etfunc_code=DB_RECORDSetservice_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=serviceetdoc_library=BVB01etdoc_number=018713193etline_number=0001etfunc_code=DB_RECORDSetservice_type=MEDIA</a><br/>Format: Books<br/>Publication Date 2011<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:436892025-12-26T20:49:08Z2025-12-26T20:49:08Zby Stallings, William.<br/>Format: Books<br/>Publication Date 2011<br/>Ethics for the information ageent://SD_ILS/0/SD_ILS:439332025-12-26T20:49:08Z2025-12-26T20:49:08Zby Quinn, Michael J. (Michael Jay)<br/>Format: Books<br/>Publication Date 2011<br/>Computer networks.ent://SD_ILS/0/SD_ILS:456252025-12-26T20:49:08Z2025-12-26T20:49:08Zby Tanenbaum, Andrew S., 1944-<br/>Format: Books<br/>Publication Date 2011<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:515442025-12-26T20:49:08Z2025-12-26T20:49:08Zby Harper, Allen.<br/>Format: Books<br/>Publication Date 2011<br/>Architecture of network systemsent://SD_ILS/0/SD_ILS:322025-12-26T20:49:08Z2025-12-26T20:49:08Zby Serpanos, Dimitrios Nikolaou.<br/>EBSCOhost <a href="http://search.ebscohost.com.ezproxy.iielearn.ac.za/login.aspx?direct=true&db=nlebk&AN=353481&site=ehost-live">http://search.ebscohost.com.ezproxy.iielearn.ac.za/login.aspx?direct=true&db=nlebk&AN=353481&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2011<br/>Succeeding with technology : computer system concepts for your lifeent://SD_ILS/0/SD_ILS:223612025-12-26T20:49:08Z2025-12-26T20:49:08Zby Baldauf, Ken.<br/>Format: Books<br/>Publication Date 2011<br/>Security 2020 : reduce security risks this decadeent://SD_ILS/0/SD_ILS:225002025-12-26T20:49:08Z2025-12-26T20:49:08Zby Howard, Doug.<br/>Format: Books<br/>Publication Date 2011<br/>Hacking exposed computer forensics : secrets &amp; solutionsent://SD_ILS/0/SD_ILS:414972025-12-26T20:49:08Z2025-12-26T20:49:08Zby Davis, Chris.<br/>Format: Books<br/>Publication Date 2010<br/>Internet fraud casebook : the World Wide Web of deceitent://SD_ILS/0/SD_ILS:418392025-12-26T20:49:08Z2025-12-26T20:49:08Zby Wells, Joseph T.<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy1007/2010013506-d.html">http://www.loc.gov/catdir/enhancements/fy1007/2010013506-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html">http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html</a><br/>Format: Books<br/>Publication Date 2010<br/>Secure and resilient software developmentent://SD_ILS/0/SD_ILS:430862025-12-26T20:49:08Z2025-12-26T20:49:08Zby Merkow, Mark S.<br/>Format: Books<br/>Publication Date 2010<br/>Introduction to information systemsent://SD_ILS/0/SD_ILS:438652025-12-26T20:49:08Z2025-12-26T20:49:08Zby O'Brien, James A., 1936-<br/>Format: Books<br/>Publication Date 2010<br/>IT audit, control, and securityent://SD_ILS/0/SD_ILS:448802025-12-26T20:49:08Z2025-12-26T20:49:08Zby Moeller, Robert R.<br/>Format: Books<br/>Publication Date 2010<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:463622025-12-26T20:49:08Z2025-12-26T20:49:08Zby Timm, Carl.<br/>Format: Books<br/>Publication Date 2010<br/>Seven deadliest web application attacksent://SD_ILS/0/SD_ILS:463642025-12-26T20:49:08Z2025-12-26T20:49:08Zby Shema, Mike.<br/>Format: Books<br/>Publication Date 2010<br/>Wireshark network analysis : the official Wireshark certified network analyst study guideent://SD_ILS/0/SD_ILS:407762025-12-26T20:49:08Z2025-12-26T20:49:08Zby Chappell, Laura.<br/>Format: Books<br/>Publication Date 2010<br/>Mobile device security : a comprehensive guide to securing your information in a moving worldent://SD_ILS/0/SD_ILS:432802025-12-26T20:49:08Z2025-12-26T20:49:08Zby Fried, Stephen, 1962-<br/>Format: Books<br/>Publication Date 2010<br/>Discovering computers 2010 : living in a digital world : completeent://SD_ILS/0/SD_ILS:193352025-12-26T20:49:08Z2025-12-26T20:49:08Zby Shelly, Gary B.<br/>Format: Books<br/>Publication Date 2010<br/>