Search Results for Information resources. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dInformation$002bresources.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2025-05-12T22:06:31ZThe basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:565002025-05-12T22:06:31Z2025-05-12T22:06:31Zby Andress, Jason.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site</a><br/>Format: Books<br/>Publication Date 2014<br/>Managing risk in information systemsent://SD_ILS/0/SD_ILS:521922025-05-12T22:06:31Z2025-05-12T22:06:31Zby Gibson, Darril.<br/>Format: Books<br/>Publication Date 2011<br/>Microsoft® Windows server 2008 security resource kitent://SD_ILS/0/SD_ILS:66792025-05-12T22:06:31Z2025-05-12T22:06:31Zby Johansson, Jesper M.<br/>Format: Books<br/>Publication Date 2008<br/>IT governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:370402025-05-12T22:06:31Z2025-05-12T22:06:31Zby Calder, Alan, 1957-<br/>Format: Books<br/>Publication Date 2008<br/>