Search Results for Cryptography. - Narrowed by: Computer security. SirsiDynix Enterprise https://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dCryptography.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?dt=list 2025-06-23T22:16:25Z Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:31545 2025-06-23T22:16:25Z 2025-06-23T22:16:25Z by&#160;Stallings, William.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0608/2006276085.html">http://www.loc.gov/catdir/toc/fy0608/2006276085.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Cryptography and e-commerce : a Wiley tech brief ent://SD_ILS/0/SD_ILS:24286 2025-06-23T22:16:25Z 2025-06-23T22:16:25Z by&#160;Graff, Jon.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Security in computing ent://SD_ILS/0/SD_ILS:55788 2025-06-23T22:16:25Z 2025-06-23T22:16:25Z by&#160;Pfleeger, Charles P., 1948- author.<br/><a href="http://catalogue.londonmet.ac.uk/record=b1680851~S1">E-book</a><br/>Format:&#160;Regular print<br/>Publication Date&#160;2015<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:56500 2025-06-23T22:16:25Z 2025-06-23T22:16:25Z by&#160;Andress, Jason.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site</a><br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Computer security literacy : staying safe in a digital world ent://SD_ILS/0/SD_ILS:50223 2025-06-23T22:16:25Z 2025-06-23T22:16:25Z by&#160;Jacobson, Douglas.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Principles of information security ent://SD_ILS/0/SD_ILS:16413 2025-06-23T22:16:25Z 2025-06-23T22:16:25Z by&#160;Whitman, Michael E., 1964-<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:50554 2025-06-23T22:16:25Z 2025-06-23T22:16:25Z by&#160;Mj&oslash;lsnes, Stig F.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Principles of information security ent://SD_ILS/0/SD_ILS:43247 2025-06-23T22:16:25Z 2025-06-23T22:16:25Z by&#160;Whitman, Michael E., 1964-<br/>Format:&#160;Books<br/>Publication Date&#160;2009<br/> Security in computing ent://SD_ILS/0/SD_ILS:34329 2025-06-23T22:16:25Z 2025-06-23T22:16:25Z by&#160;Pfleeger, Charles P., 1948-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0619/2006026798.html">http://www.loc.gov/catdir/toc/ecip0619/2006026798.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> The unofficial guide to ethical hacking ent://SD_ILS/0/SD_ILS:9017 2025-06-23T22:16:25Z 2025-06-23T22:16:25Z by&#160;Fadia, Ankit, 1985-<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Security in computing ent://SD_ILS/0/SD_ILS:27981 2025-06-23T22:16:25Z 2025-06-23T22:16:25Z by&#160;Pfleeger, Charles P., 1948-<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:20080 2025-06-23T22:16:25Z 2025-06-23T22:16:25Z by&#160;Stallings, William.<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Secrets and lies : digital security in a networked world ent://SD_ILS/0/SD_ILS:14171 2025-06-23T22:16:25Z 2025-06-23T22:16:25Z by&#160;Schneier, Bruce, 1963-<br/>Table of contents <a href="http://www.gbv.de/dms/ilmenau/toc/314774726.PDF">Kostenfrei</a> Table of contents <a href="http://catdir.loc.gov/catdir/toc/onix04/00042252.html">http://catdir.loc.gov/catdir/toc/onix04/00042252.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html">http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/description/wiley0310/00042252.html">http://catdir.loc.gov/catdir/description/wiley0310/00042252.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2000<br/> Practical UNIX and Internet security ent://SD_ILS/0/SD_ILS:14319 2025-06-23T22:16:25Z 2025-06-23T22:16:25Z by&#160;Garfinkel, Simson.<br/>Table of contents <a href="http://www.gbv.de/dms/bowker/toc/9781565921481.pdf">http://www.gbv.de/dms/bowker/toc/9781565921481.pdf</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html">http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html">http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html</a> Umschlagbild <a href="http://swbplus.bsz-bw.de/bsz048310409cov.htm">http://swbplus.bsz-bw.de/bsz048310409cov.htm</a><br/>Format:&#160;Books<br/>Publication Date&#160;1996<br/> Practical UNIX security : computer security ent://SD_ILS/0/SD_ILS:15590 2025-06-23T22:16:25Z 2025-06-23T22:16:25Z by&#160;Garfinkel, Simson.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0912/92195509-b.html">http://catdir.loc.gov/catdir/enhancements/fy0912/92195509-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0715/92195509-d.html">http://catdir.loc.gov/catdir/enhancements/fy0715/92195509-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;1991<br/>