Search Results for Data protection.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dData$002bprotection.$0026dt$003dlist$0026ps$003d300?dt=list2025-05-11T22:45:42ZCyberlaw @ SA IV : the law of the Internet in South Africaent://SD_ILS/0/SD_ILS:573552025-05-11T22:45:42Z2025-05-11T22:45:42Zby Papadopoulos, Sylvia.<br/>Format: Books<br/>Publication Date 2022<br/>Information and communications technology lawent://SD_ILS/0/SD_ILS:566752025-05-11T22:45:42Z2025-05-11T22:45:42Zby Van der Merwe, D. P.<br/>Format: Books<br/>Publication Date 2021<br/>Neethling on personality rightsent://SD_ILS/0/SD_ILS:577632025-05-11T22:45:42Z2025-05-11T22:45:42Zby Neethling, J., author.<br/>Format: Books<br/>Publication Date 2019<br/>Cyber Security : A practitioner's guideent://SD_ILS/0/SD_ILS:557782025-05-11T22:45:42Z2025-05-11T22:45:42Zby Sutton, David (Information security practitioner), author.<br/><a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2017<br/>Information and communications technology lawent://SD_ILS/0/SD_ILS:1462025-05-11T22:45:42Z2025-05-11T22:45:42Zby Van der Merwe, D. P.<br/>Format: Books<br/>Publication Date 2016<br/>Introduction to research and medical literature for health professionalsent://SD_ILS/0/SD_ILS:529322025-05-11T22:45:42Z2025-05-11T22:45:42Zby Forister, J. Glenn, editor.<br/>Format: Books<br/>Publication Date 2016<br/>Evaluation fundamentals : insights into program effectiveness, quality, and valueent://SD_ILS/0/SD_ILS:506142025-05-11T22:45:42Z2025-05-11T22:45:42Zby Fink, Arlene, author.<br/>Format: Books<br/>Publication Date 2015<br/>Computer forensics : cybercriminals, laws, and evidenceent://SD_ILS/0/SD_ILS:519842025-05-11T22:45:42Z2025-05-11T22:45:42Zby Maras, Marie-Helen, 1979- author.<br/>Format: Books<br/>Publication Date 2015<br/>Essentials of public health ethicsent://SD_ILS/0/SD_ILS:525582025-05-11T22:45:42Z2025-05-11T22:45:42Zby Bernheim, Ruth Gaare, author.<br/>Format: Books<br/>Publication Date 2015<br/>Social media marketing : theories &amp; applicationsent://SD_ILS/0/SD_ILS:540502025-05-11T22:45:42Z2025-05-11T22:45:42Zby Dahl, Stephan, author.<br/>Format: Books<br/>Publication Date 2015<br/>Security in computingent://SD_ILS/0/SD_ILS:557882025-05-11T22:45:42Z2025-05-11T22:45:42Zby Pfleeger, Charles P., 1948- author.<br/><a href="http://catalogue.londonmet.ac.uk/record=b1680851~S1">E-book</a><br/>Format: Regular print<br/>Publication Date 2015<br/>Privacy in the information societyent://SD_ILS/0/SD_ILS:537622025-05-11T22:45:42Z2025-05-11T22:45:42Zby Leith, Philip, 1954- editor.<br/>Table of contents only <a href="http://catdir.loc.gov/catdir/toc/fy16pdf02/2014946839.html">http://catdir.loc.gov/catdir/toc/fy16pdf02/2014946839.html</a><br/>Format: Books<br/>Publication Date 2015<br/>Security and privacyent://SD_ILS/0/SD_ILS:537662025-05-11T22:45:42Z2025-05-11T22:45:42Zby Savirimuthu, Joseph, editor.<br/>Format: Books<br/>Publication Date 2015<br/>The individual and privacyent://SD_ILS/0/SD_ILS:537672025-05-11T22:45:42Z2025-05-11T22:45:42Zby Cannataci, Joseph A., 1961- editor.<br/>Format: Books<br/>Publication Date 2015<br/>Databases for small business : essentials of database management, data analysis, and staff training for entrepreneurs and professionalsent://SD_ILS/0/SD_ILS:552342025-05-11T22:45:42Z2025-05-11T22:45:42Zby Manning, Anna (Company director), author.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=1102108&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=1102108&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2015<br/>Integrity in government through records management : essays in honour of Anne Thurstonent://SD_ILS/0/SD_ILS:535662025-05-11T22:45:42Z2025-05-11T22:45:42Zby Lowry, James, 1978-<br/>Format: Books<br/>Publication Date 2014<br/>Power systems signal processing for smart gridsent://SD_ILS/0/SD_ILS:530472025-05-11T22:45:42Z2025-05-11T22:45:42Zby Ribeiro, Paulo F.<br/>Format: Books<br/>Publication Date 2014<br/>Electrical power transmission system engineering : analysis and designent://SD_ILS/0/SD_ILS:532882025-05-11T22:45:42Z2025-05-11T22:45:42Zby Gönen, Turan, author<br/>Format: Books<br/>Publication Date 2014<br/>Cyberlaw @ SA III : the law of the Internet in South Africaent://SD_ILS/0/SD_ILS:722025-05-11T22:45:42Z2025-05-11T22:45:42Zby Papadopoulos, Sylvia.<br/>Format: Books<br/>Publication Date 2012<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:505542025-05-11T22:45:42Z2025-05-11T22:45:42Zby Mjølsnes, Stig F.<br/>Format: Books<br/>Publication Date 2012<br/>Membrane technologies for water reuse.ent://SD_ILS/0/SD_ILS:507202025-05-11T22:45:42Z2025-05-11T22:45:42Zby Wachinski, Anthony M.<br/>Format: Books<br/>Publication Date 2012<br/>The business of therapy : how to run a successful private practiceent://SD_ILS/0/SD_ILS:507702025-05-11T22:45:42Z2025-05-11T22:45:42Zby Hodson, Pauline L, author.<br/>Format: Books<br/>Publication Date 2012<br/>Environmental consulting fundamentals : investigation and remediationent://SD_ILS/0/SD_ILS:489222025-05-11T22:45:42Z2025-05-11T22:45:42Zby Alter, Benjamin.<br/>Format: Books<br/>Publication Date 2012<br/>Safety health and security in wastewater systemsent://SD_ILS/0/SD_ILS:507352025-05-11T22:45:42Z2025-05-11T22:45:42Zby Water Environment Federation<br/>Format: Books<br/>Publication Date 2012<br/>Health informatics : practical guide for healthcare and information technology professionalsent://SD_ILS/0/SD_ILS:521222025-05-11T22:45:42Z2025-05-11T22:45:42Zby Hoyt, Robert E., 1945-<br/>Format: Books<br/>Publication Date 2012<br/>Human trafficking : exploring the international nature, concerns, and complexitiesent://SD_ILS/0/SD_ILS:493082025-05-11T22:45:42Z2025-05-11T22:45:42Zby Winterdyk, John.<br/>Format: Books<br/>Publication Date 2012<br/>Internet and surveillance : the challenges of Web 2.0 and social mediaent://SD_ILS/0/SD_ILS:493332025-05-11T22:45:42Z2025-05-11T22:45:42Zby Fuchs, Christian, 1976-<br/>Format: Books<br/>Publication Date 2012<br/>Writing skills for public relations : style and technique for mainstream and social mediaent://SD_ILS/0/SD_ILS:495592025-05-11T22:45:42Z2025-05-11T22:45:42Zby Foster, John, 1926-<br/>Format: Books<br/>Publication Date 2012<br/>Mobile device security : a comprehensive guide to securing your information in a moving worldent://SD_ILS/0/SD_ILS:432802025-05-11T22:45:42Z2025-05-11T22:45:42Zby Fried, Stephen, 1962-<br/>Format: Books<br/>Publication Date 2010<br/>Law and ethics in children's nursingent://SD_ILS/0/SD_ILS:495202025-05-11T22:45:42Z2025-05-11T22:45:42Zby Hendrick, Judith.<br/>Format: Books<br/>Publication Date 2010<br/>Digital rights management for e-commerce systemsent://SD_ILS/0/SD_ILS:351432025-05-11T22:45:42Z2025-05-11T22:45:42Zby Drossos, Lambros, 1961-<br/>Format: Books<br/>Publication Date 2009<br/>A dictionary of business and management.ent://SD_ILS/0/SD_ILS:220472025-05-11T22:45:42Z2025-05-11T22:45:42ZOxford Reference Online <a href="http://www.oxfordreference.com/view/10.1093/acref/9780199234899.001.0001/acref-9780199234899">http://www.oxfordreference.com/view/10.1093/acref/9780199234899.001.0001/acref-9780199234899</a>
Table of contents <a href="https://www.loc.gov/catdir/enhancements/fy1612/2009497014-t.html">https://www.loc.gov/catdir/enhancements/fy1612/2009497014-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1001/2009497014-b.html">http://catdir.loc.gov/catdir/enhancements/fy1001/2009497014-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1001/2009497014-d.html">http://catdir.loc.gov/catdir/enhancements/fy1001/2009497014-d.html</a><br/>Format: Electronic Resources<br/>Publication Date 2009<br/>IT governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:370402025-05-11T22:45:42Z2025-05-11T22:45:42Zby Calder, Alan, 1957-<br/>Format: Books<br/>Publication Date 2008<br/>Child welfare research : advances for practice and policyent://SD_ILS/0/SD_ILS:415532025-05-11T22:45:42Z2025-05-11T22:45:42Zby Lindsey, Duncan, 1947-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0719/2007022492.html">http://www.loc.gov/catdir/toc/ecip0719/2007022492.html</a><br/>Format: Books<br/>Publication Date 2008<br/>Statistical methods in e-commerce researchent://SD_ILS/0/SD_ILS:404912025-05-11T22:45:42Z2025-05-11T22:45:42Zby Jank, Wolfgang, 1970-<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0808/2007050394-d.html">http://www.loc.gov/catdir/enhancements/fy0808/2007050394-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0808/2007050394-t.html">http://www.loc.gov/catdir/enhancements/fy0808/2007050394-t.html</a><br/>Format: Books<br/>Publication Date 2008<br/>Information and communications technology lawent://SD_ILS/0/SD_ILS:538822025-05-11T22:45:42Z2025-05-11T22:45:42Zby Van der Merwe, D. P.<br/>Format: Books<br/>Publication Date 2008<br/>Security in computingent://SD_ILS/0/SD_ILS:343292025-05-11T22:45:42Z2025-05-11T22:45:42Zby Pfleeger, Charles P., 1948-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0619/2006026798.html">http://www.loc.gov/catdir/toc/ecip0619/2006026798.html</a><br/>Format: Books<br/>Publication Date 2007<br/>Epidemiology, biostatistics, and preventive medicineent://SD_ILS/0/SD_ILS:403282025-05-11T22:45:42Z2025-05-11T22:45:42Zby Jekel, James F.<br/><a href="http://www.loc.gov/catdir/toc/ecip074/2006037449.html">Table of contents only</a><br/>Format: Books<br/>Publication Date 2007<br/>Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedingsent://SD_ILS/0/SD_ILS:338252025-05-11T22:45:42Z2025-05-11T22:45:42Zby ACISP 2006 (2006 : Melbourne, Vic.)<br/><a href="http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=4058">Restricted to SpringerLink subscribers</a><br/>Format: Books<br/>Publication Date 2006<br/>Digital rights management : monetizing and protecting contentent://SD_ILS/0/SD_ILS:347002025-05-11T22:45:42Z2025-05-11T22:45:42Zby Van Tassel, Joan M.<br/>Format: Books<br/>Publication Date 2006<br/>Information, ethics and the law : a guide for information practitioners, students and the corporate environmentent://SD_ILS/0/SD_ILS:193312025-05-11T22:45:42Z2025-05-11T22:45:42Zby Ackermann, M. F.<br/>Format: Books<br/>Publication Date 2006<br/>Privacy protection for e-servicesent://SD_ILS/0/SD_ILS:319872025-05-11T22:45:42Z2025-05-11T22:45:42Zby Yee, George.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip063/2005032104.html">http://www.loc.gov/catdir/toc/ecip063/2005032104.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Getting real about knowledge networks : unlocking corporate knowledge assetsent://SD_ILS/0/SD_ILS:324482025-05-11T22:45:42Z2025-05-11T22:45:42Zby Back, Andrea.<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0624/2005043287-b.html">http://www.loc.gov/catdir/enhancements/fy0624/2005043287-b.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0624/2005043287-d.html">http://www.loc.gov/catdir/enhancements/fy0624/2005043287-d.html</a>
Table of contents <a href="http://www.loc.gov/catdir/enhancements/fy0624/2005043287-t.html">http://www.loc.gov/catdir/enhancements/fy0624/2005043287-t.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Neethling's law of personalityent://SD_ILS/0/SD_ILS:175372025-05-11T22:45:42Z2025-05-11T22:45:42Zby Neethling, J.<br/>Format: Books<br/>Publication Date 2005<br/>Implementing database security and auditingent://SD_ILS/0/SD_ILS:293472025-05-11T22:45:42Z2025-05-11T22:45:42Zby Ben-Natan, Ron.<br/>Format: Books<br/>Publication Date 2005<br/>Defending the digital frontier : practical security for managementent://SD_ILS/0/SD_ILS:294202025-05-11T22:45:42Z2025-05-11T22:45:42Zby Babiak, Jan.<br/>Format: Books<br/>Publication Date 2005<br/>Testing people at work : competencies in psychometric testingent://SD_ILS/0/SD_ILS:327352025-05-11T22:45:42Z2025-05-11T22:45:42Zby Smith, Mike (J. Mike)<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip051/2004022192.html">http://www.loc.gov/catdir/toc/ecip051/2004022192.html</a><br/>Format: Books<br/>Publication Date 2005<br/>Software forensics : collecting evidence from the scene of a digital crimeent://SD_ILS/0/SD_ILS:285102025-05-11T22:45:42Z2025-05-11T22:45:42Zby Slade, Robert M.<br/>Publisher description <a href="http://www.loc.gov/catdir/description/mh041/2003070176.html">http://www.loc.gov/catdir/description/mh041/2003070176.html</a>
Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003070176.html">http://www.loc.gov/catdir/bios/mh042/2003070176.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/mh041/2003070176.html">http://www.loc.gov/catdir/toc/mh041/2003070176.html</a><br/>Format: Books<br/>Publication Date 2004<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:291662025-05-11T22:45:42Z2025-05-11T22:45:42Zby Wallace, Michael, 1960-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0415/2004003905.html">http://www.loc.gov/catdir/toc/ecip0415/2004003905.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Market intelligence : how and why organizations use market researchent://SD_ILS/0/SD_ILS:101952025-05-11T22:45:42Z2025-05-11T22:45:42Zby Callingham, Martin.<br/>123Library <a href="http://www.123library.org/book_details/?id=98811">http://www.123library.org/book_details/?id=98811</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=242855">http://public.eblib.com/choice/publicfullrecord.aspx?p=242855</a>
ebrary <a href="http://site.ebrary.com/id/10084453">http://site.ebrary.com/id/10084453</a>
EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=130559">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=130559</a>
MyiLibrary <a href="http://www.myilibrary.com?id=22253">http://www.myilibrary.com?id=22253</a><br/>Format: Electronic Resources<br/>Publication Date 2004<br/>Management of information technologyent://SD_ILS/0/SD_ILS:158832025-05-11T22:45:42Z2025-05-11T22:45:42Zby Frenzel, Carroll W.<br/>Format: Books<br/>Publication Date 2004<br/>Computer security : 20 things every employee should knowent://SD_ILS/0/SD_ILS:284432025-05-11T22:45:42Z2025-05-11T22:45:42Zby Rothke, Ben.<br/>Format: Books<br/>Publication Date 2004 2003<br/>Information security management handbookent://SD_ILS/0/SD_ILS:277962025-05-11T22:45:42Z2025-05-11T22:45:42Zby Tipton, Harold F.<br/>Format: Books<br/>Publication Date 2003<br/>Security in computingent://SD_ILS/0/SD_ILS:279812025-05-11T22:45:42Z2025-05-11T22:45:42Zby Pfleeger, Charles P., 1948-<br/>Format: Books<br/>Publication Date 2003<br/>Operating systems principlesent://SD_ILS/0/SD_ILS:280442025-05-11T22:45:42Z2025-05-11T22:45:42Zby Bic, Lubomir, 1951-<br/>Format: Books<br/>Publication Date 2003<br/>Child protection work : beyond rhetoricent://SD_ILS/0/SD_ILS:413792025-05-11T22:45:42Z2025-05-11T22:45:42Zby Buckley, Helen, 1951-<br/>Format: Books<br/>Publication Date 2003<br/>The complete PC upgrade and maintenance guideent://SD_ILS/0/SD_ILS:146672025-05-11T22:45:42Z2025-05-11T22:45:42Zby Minasi, Mark.<br/>Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002104866-d.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002104866-d.html</a><br/>Format: Electronic Resources<br/>Publication Date 2002<br/>Readings in cyberethicsent://SD_ILS/0/SD_ILS:169392025-05-11T22:45:42Z2025-05-11T22:45:42Zby Spinello, Richard A.<br/>Format: Books<br/>Publication Date 2001<br/>Information security policies, procedures, and standards : guidelines for effective information security managementent://SD_ILS/0/SD_ILS:249352025-05-11T22:45:42Z2025-05-11T22:45:42Zby Peltier, Thomas R.<br/>Format: Books<br/>Publication Date 2001<br/>The complete PC upgrade and maintenance guideent://SD_ILS/0/SD_ILS:184022025-05-11T22:45:42Z2025-05-11T22:45:42Zby Minasi, Mark.<br/>Format: Books<br/>Publication Date 1997<br/>Security in computingent://SD_ILS/0/SD_ILS:252272025-05-11T22:45:42Z2025-05-11T22:45:42Zby Pfleeger, Charles P., 1948-<br/>Format: Books<br/>Publication Date 1997<br/>Advanced concepts in operating systems : distributed, database, and multiprocessor operating systemsent://SD_ILS/0/SD_ILS:261012025-05-11T22:45:42Z2025-05-11T22:45:42Zby Singhal, Mukesh.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/mh022/93029812.html">http://www.loc.gov/catdir/toc/mh022/93029812.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/mh022/93029812.html">http://www.loc.gov/catdir/description/mh022/93029812.html</a><br/>Format: Books<br/>Publication Date 1994<br/>