Search Results for Data protection. - Narrowed by: 2003-2006SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dData$002bprotection.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092003-2006$0025092003-2006$0026dt$003dlist$0026ps$003d300?2025-07-19T10:59:17ZInformation, ethics and the law : a guide for information practitioners, students and the corporate environmentent://SD_ILS/0/SD_ILS:193312025-07-19T10:59:17Z2025-07-19T10:59:17Zby Ackermann, M. F.<br/>Format: Books<br/>Publication Date 2006<br/>Getting real about knowledge networks : unlocking corporate knowledge assetsent://SD_ILS/0/SD_ILS:324482025-07-19T10:59:17Z2025-07-19T10:59:17Zby Back, Andrea.<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0624/2005043287-b.html">http://www.loc.gov/catdir/enhancements/fy0624/2005043287-b.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0624/2005043287-d.html">http://www.loc.gov/catdir/enhancements/fy0624/2005043287-d.html</a>
Table of contents <a href="http://www.loc.gov/catdir/enhancements/fy0624/2005043287-t.html">http://www.loc.gov/catdir/enhancements/fy0624/2005043287-t.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedingsent://SD_ILS/0/SD_ILS:338252025-07-19T10:59:17Z2025-07-19T10:59:17Zby ACISP 2006 (2006 : Melbourne, Vic.)<br/><a href="http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=4058">Restricted to SpringerLink subscribers</a><br/>Format: Books<br/>Publication Date 2006<br/>Privacy protection for e-servicesent://SD_ILS/0/SD_ILS:319872025-07-19T10:59:17Z2025-07-19T10:59:17Zby Yee, George.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip063/2005032104.html">http://www.loc.gov/catdir/toc/ecip063/2005032104.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Digital rights management : monetizing and protecting contentent://SD_ILS/0/SD_ILS:347002025-07-19T10:59:17Z2025-07-19T10:59:17Zby Van Tassel, Joan M.<br/>Format: Books<br/>Publication Date 2006<br/>Neethling's law of personalityent://SD_ILS/0/SD_ILS:175372025-07-19T10:59:17Z2025-07-19T10:59:17Zby Neethling, J.<br/>Format: Books<br/>Publication Date 2005<br/>Implementing database security and auditingent://SD_ILS/0/SD_ILS:293472025-07-19T10:59:17Z2025-07-19T10:59:17Zby Ben-Natan, Ron.<br/>Format: Books<br/>Publication Date 2005<br/>Defending the digital frontier : practical security for managementent://SD_ILS/0/SD_ILS:294202025-07-19T10:59:17Z2025-07-19T10:59:17Zby Babiak, Jan.<br/>Format: Books<br/>Publication Date 2005<br/>Testing people at work : competencies in psychometric testingent://SD_ILS/0/SD_ILS:327352025-07-19T10:59:17Z2025-07-19T10:59:17Zby Smith, Mike (J. Mike)<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip051/2004022192.html">http://www.loc.gov/catdir/toc/ecip051/2004022192.html</a><br/>Format: Books<br/>Publication Date 2005<br/>Market intelligence : how and why organizations use market researchent://SD_ILS/0/SD_ILS:101952025-07-19T10:59:17Z2025-07-19T10:59:17Zby Callingham, Martin.<br/>123Library <a href="http://www.123library.org/book_details/?id=98811">http://www.123library.org/book_details/?id=98811</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=242855">http://public.eblib.com/choice/publicfullrecord.aspx?p=242855</a>
ebrary <a href="http://site.ebrary.com/id/10084453">http://site.ebrary.com/id/10084453</a>
EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=130559">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=130559</a>
MyiLibrary <a href="http://www.myilibrary.com?id=22253">http://www.myilibrary.com?id=22253</a><br/>Format: Electronic Resources<br/>Publication Date 2004<br/>Management of information technologyent://SD_ILS/0/SD_ILS:158832025-07-19T10:59:17Z2025-07-19T10:59:17Zby Frenzel, Carroll W.<br/>Format: Books<br/>Publication Date 2004<br/>Software forensics : collecting evidence from the scene of a digital crimeent://SD_ILS/0/SD_ILS:285102025-07-19T10:59:17Z2025-07-19T10:59:17Zby Slade, Robert M.<br/>Publisher description <a href="http://www.loc.gov/catdir/description/mh041/2003070176.html">http://www.loc.gov/catdir/description/mh041/2003070176.html</a>
Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003070176.html">http://www.loc.gov/catdir/bios/mh042/2003070176.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/mh041/2003070176.html">http://www.loc.gov/catdir/toc/mh041/2003070176.html</a><br/>Format: Books<br/>Publication Date 2004<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:291662025-07-19T10:59:17Z2025-07-19T10:59:17Zby Wallace, Michael, 1960-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0415/2004003905.html">http://www.loc.gov/catdir/toc/ecip0415/2004003905.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Computer security : 20 things every employee should knowent://SD_ILS/0/SD_ILS:284432025-07-19T10:59:17Z2025-07-19T10:59:17Zby Rothke, Ben.<br/>Format: Books<br/>Publication Date 2004 2003<br/>Information security management handbookent://SD_ILS/0/SD_ILS:277962025-07-19T10:59:17Z2025-07-19T10:59:17Zby Tipton, Harold F.<br/>Format: Books<br/>Publication Date 2003<br/>Security in computingent://SD_ILS/0/SD_ILS:279812025-07-19T10:59:17Z2025-07-19T10:59:17Zby Pfleeger, Charles P., 1948-<br/>Format: Books<br/>Publication Date 2003<br/>Operating systems principlesent://SD_ILS/0/SD_ILS:280442025-07-19T10:59:17Z2025-07-19T10:59:17Zby Bic, Lubomir, 1951-<br/>Format: Books<br/>Publication Date 2003<br/>Child protection work : beyond rhetoricent://SD_ILS/0/SD_ILS:413792025-07-19T10:59:17Z2025-07-19T10:59:17Zby Buckley, Helen, 1951-<br/>Format: Books<br/>Publication Date 2003<br/>