Search Results for Computers -- Access control.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputers$002b--$002bAccess$002bcontrol.$0026ps$003d300?2025-05-02T12:12:40ZMCSA guide to networking with Windows Server 2016 : MCSE/MCSA exam #70-741ent://SD_ILS/0/SD_ILS:216012025-05-02T12:12:40Z2025-05-02T12:12:40Zby Tomsho, Greg, author.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281870&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281870&site=ehost-live&scope=site</a><br/>Format: Books<br/>Publication Date 2018<br/>MCSA guide to installation, storage, and computer with Windows Server 2016 : MCSE/MCSA exam #70-741ent://SD_ILS/0/SD_ILS:216032025-05-02T12:12:40Z2025-05-02T12:12:40Zby Tomsho, Greg, author.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281869&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281869&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2018<br/>Computer organization and architecture : designing for performanceent://SD_ILS/0/SD_ILS:563832025-05-02T12:12:40Z2025-05-02T12:12:40Zby Stallings, William.<br/>Format: Books<br/>Publication Date 2016<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:505542025-05-02T12:12:40Z2025-05-02T12:12:40Zby Mjølsnes, Stig F.<br/>Format: Books<br/>Publication Date 2012<br/>Role mining in business : taming role-based access control administrationent://SD_ILS/0/SD_ILS:546472025-05-02T12:12:40Z2025-05-02T12:12:40Zby Colantonio, Alessandro.<br/>Format: Books<br/>Publication Date 2012<br/>CompTIA A+ certification exam guide : exams 220-801 & 220-802ent://SD_ILS/0/SD_ILS:562025-05-02T12:12:40Z2025-05-02T12:12:40Zby Meyers, Mike, 1961-<br/>Format: Books<br/>Publication Date 2012<br/>MacBook all-in-one for dummiesent://SD_ILS/0/SD_ILS:13552025-05-02T12:12:40Z2025-05-02T12:12:40Zby Chambers, Mark L.<br/>Format: Books<br/>Publication Date 2012<br/>The net delusion : how not to liberate the worldent://SD_ILS/0/SD_ILS:451512025-05-02T12:12:40Z2025-05-02T12:12:40Zby Morozov, Evgeny.<br/>Format: Books<br/>Publication Date 2011<br/>Managing risk in information systemsent://SD_ILS/0/SD_ILS:521922025-05-02T12:12:40Z2025-05-02T12:12:40Zby Gibson, Darril.<br/>Format: Books<br/>Publication Date 2011<br/>Windows server 2008 : networking and Network Access Protection (NAP)ent://SD_ILS/0/SD_ILS:354702025-05-02T12:12:40Z2025-05-02T12:12:40Zby Davies, Joseph, 1962-<br/>Format: Books<br/>Publication Date 2008<br/>Self-defending networks : the next generation of network securityent://SD_ILS/0/SD_ILS:338412025-05-02T12:12:40Z2025-05-02T12:12:40Zby De Capite, Duane.<br/>Format: Books<br/>Publication Date 2007 2006<br/>Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedingsent://SD_ILS/0/SD_ILS:338252025-05-02T12:12:40Z2025-05-02T12:12:40Zby ACISP 2006 (2006 : Melbourne, Vic.)<br/><a href="http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=4058">Restricted to SpringerLink subscribers</a><br/>Format: Books<br/>Publication Date 2006<br/>Coding and cryptography : international workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papersent://SD_ILS/0/SD_ILS:338312025-05-02T12:12:40Z2025-05-02T12:12:40Zby International Workshop on Coding and Cryptography (2005 : Bergen, Norway)<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0706/2006927431.html">http://www.loc.gov/catdir/toc/fy0706/2006927431.html</a><br/>Format: Books<br/>Publication Date 2006<br/>The hacker's handbook : the strategy behind breaking into and defending Networksent://SD_ILS/0/SD_ILS:584702025-05-02T12:12:40Z2025-05-02T12:12:40Zby Young, Susan (Susan Elizabeth), 1968-<br/>Format: Books<br/>Publication Date 2003<br/>An information security handbookent://SD_ILS/0/SD_ILS:240242025-05-02T12:12:40Z2025-05-02T12:12:40Zby Hunter, John M. D., 1940-<br/>Format: Books<br/>Publication Date 2001<br/>Computer securityent://SD_ILS/0/SD_ILS:252292025-05-02T12:12:40Z2025-05-02T12:12:40Zby Carroll, John Millar.<br/>Format: Books<br/>Publication Date 1996<br/>