Search Results for Data protection. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dData$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2025-07-16T16:08:27ZCyber Security : A practitioner's guideent://SD_ILS/0/SD_ILS:557782025-07-16T16:08:27Z2025-07-16T16:08:27Zby Sutton, David (Information security practitioner), author.<br/><a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2017<br/>Security in computingent://SD_ILS/0/SD_ILS:557882025-07-16T16:08:27Z2025-07-16T16:08:27Zby Pfleeger, Charles P., 1948- author.<br/><a href="http://catalogue.londonmet.ac.uk/record=b1680851~S1">E-book</a><br/>Format: Regular print<br/>Publication Date 2015<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:505542025-07-16T16:08:27Z2025-07-16T16:08:27Zby Mjølsnes, Stig F.<br/>Format: Books<br/>Publication Date 2012<br/>Mobile device security : a comprehensive guide to securing your information in a moving worldent://SD_ILS/0/SD_ILS:432802025-07-16T16:08:27Z2025-07-16T16:08:27Zby Fried, Stephen, 1962-<br/>Format: Books<br/>Publication Date 2010<br/>Digital rights management for e-commerce systemsent://SD_ILS/0/SD_ILS:351432025-07-16T16:08:27Z2025-07-16T16:08:27Zby Drossos, Lambros, 1961-<br/>Format: Books<br/>Publication Date 2009<br/>IT governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:370402025-07-16T16:08:27Z2025-07-16T16:08:27Zby Calder, Alan, 1957-<br/>Format: Books<br/>Publication Date 2008<br/>Security in computingent://SD_ILS/0/SD_ILS:343292025-07-16T16:08:27Z2025-07-16T16:08:27Zby Pfleeger, Charles P., 1948-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0619/2006026798.html">http://www.loc.gov/catdir/toc/ecip0619/2006026798.html</a><br/>Format: Books<br/>Publication Date 2007<br/>Privacy protection for e-servicesent://SD_ILS/0/SD_ILS:319872025-07-16T16:08:27Z2025-07-16T16:08:27Zby Yee, George.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip063/2005032104.html">http://www.loc.gov/catdir/toc/ecip063/2005032104.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Implementing database security and auditingent://SD_ILS/0/SD_ILS:293472025-07-16T16:08:27Z2025-07-16T16:08:27Zby Ben-Natan, Ron.<br/>Format: Books<br/>Publication Date 2005<br/>Software forensics : collecting evidence from the scene of a digital crimeent://SD_ILS/0/SD_ILS:285102025-07-16T16:08:27Z2025-07-16T16:08:27Zby Slade, Robert M.<br/>Publisher description <a href="http://www.loc.gov/catdir/description/mh041/2003070176.html">http://www.loc.gov/catdir/description/mh041/2003070176.html</a>
Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003070176.html">http://www.loc.gov/catdir/bios/mh042/2003070176.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/mh041/2003070176.html">http://www.loc.gov/catdir/toc/mh041/2003070176.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Security in computingent://SD_ILS/0/SD_ILS:279812025-07-16T16:08:27Z2025-07-16T16:08:27Zby Pfleeger, Charles P., 1948-<br/>Format: Books<br/>Publication Date 2003<br/>Information security policies, procedures, and standards : guidelines for effective information security managementent://SD_ILS/0/SD_ILS:249352025-07-16T16:08:27Z2025-07-16T16:08:27Zby Peltier, Thomas R.<br/>Format: Books<br/>Publication Date 2001<br/>Security in computingent://SD_ILS/0/SD_ILS:252272025-07-16T16:08:27Z2025-07-16T16:08:27Zby Pfleeger, Charles P., 1948-<br/>Format: Books<br/>Publication Date 1997<br/>