Search Results for Management. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dManagement.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026dt$003dlist$0026ps$003d300$0026isd$003dtrue?2025-06-17T02:21:38ZManagement of information securityent://SD_ILS/0/SD_ILS:343582025-06-17T02:21:38Z2025-06-17T02:21:38Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2008<br/>Information technology security &amp; risk managementent://SD_ILS/0/SD_ILS:357182025-06-17T02:21:38Z2025-06-17T02:21:38Zby Slay, Jill.<br/>Format: Books<br/>Publication Date 2006<br/>Digital rights management for e-commerce systemsent://SD_ILS/0/SD_ILS:351432025-06-17T02:21:38Z2025-06-17T02:21:38Zby Drossos, Lambros, 1961-<br/>Format: Books<br/>Publication Date 2009<br/>Professional ASP.NET 2.0 security, membership, and role managementent://SD_ILS/0/SD_ILS:332352025-06-17T02:21:38Z2025-06-17T02:21:38Zby Schackow, Stefan, 1970-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip063/2005032278.html">http://www.loc.gov/catdir/toc/ecip063/2005032278.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Information security policies, procedures, and standards : guidelines for effective information security managementent://SD_ILS/0/SD_ILS:249352025-06-17T02:21:38Z2025-06-17T02:21:38Zby Peltier, Thomas R.<br/>Format: Books<br/>Publication Date 2001<br/>Computer security : principles and practiceent://SD_ILS/0/SD_ILS:565142025-06-17T02:21:38Z2025-06-17T02:21:38Zby Stallings, William, author.<br/>Format: Books<br/>Publication Date 2018<br/>Cyber Security : A practitioner's guideent://SD_ILS/0/SD_ILS:557782025-06-17T02:21:38Z2025-06-17T02:21:38Zby Sutton, David (Information security practitioner), author.<br/><a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2017<br/>Security in computingent://SD_ILS/0/SD_ILS:557882025-06-17T02:21:38Z2025-06-17T02:21:38Zby Pfleeger, Charles P., 1948- author.<br/><a href="http://catalogue.londonmet.ac.uk/record=b1680851~S1">E-book</a><br/>Format: Regular print<br/>Publication Date 2015<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:565002025-06-17T02:21:38Z2025-06-17T02:21:38Zby Andress, Jason.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site</a><br/>Format: Books<br/>Publication Date 2014<br/>Computer security literacy : staying safe in a digital worldent://SD_ILS/0/SD_ILS:502232025-06-17T02:21:38Z2025-06-17T02:21:38Zby Jacobson, Douglas.<br/>Format: Books<br/>Publication Date 2013<br/>Hacking exposed : mobile security secrets &amp; solutionsent://SD_ILS/0/SD_ILS:505112025-06-17T02:21:38Z2025-06-17T02:21:38Zby Bergman, Neil.<br/>Format: Books<br/>Publication Date 2013<br/>Principles of information securityent://SD_ILS/0/SD_ILS:164132025-06-17T02:21:38Z2025-06-17T02:21:38Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2012<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:505542025-06-17T02:21:38Z2025-06-17T02:21:38Zby Mjølsnes, Stig F.<br/>Format: Books<br/>Publication Date 2012<br/>Principles of information securityent://SD_ILS/0/SD_ILS:432472025-06-17T02:21:38Z2025-06-17T02:21:38Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2009<br/>Microsoft® Windows server 2008 security resource kitent://SD_ILS/0/SD_ILS:66792025-06-17T02:21:38Z2025-06-17T02:21:38Zby Johansson, Jesper M.<br/>Format: Books<br/>Publication Date 2008<br/>IT governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:370402025-06-17T02:21:38Z2025-06-17T02:21:38Zby Calder, Alan, 1957-<br/>Format: Books<br/>Publication Date 2008<br/>Privacy protection for e-servicesent://SD_ILS/0/SD_ILS:319872025-06-17T02:21:38Z2025-06-17T02:21:38Zby Yee, George.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip063/2005032104.html">http://www.loc.gov/catdir/toc/ecip063/2005032104.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Software security : building security inent://SD_ILS/0/SD_ILS:549712025-06-17T02:21:38Z2025-06-17T02:21:38Zby McGraw, Gary, 1966-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip062/2005031598.html">http://www.loc.gov/catdir/toc/ecip062/2005031598.html</a><br/>Format: Books<br/>Publication Date 2006<br/>The executive guide to information security : threats, challenges, and solutionsent://SD_ILS/0/SD_ILS:290222025-06-17T02:21:38Z2025-06-17T02:21:38Zby Egan, Mark.<br/>Format: Books<br/>Publication Date 2005<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:200802025-06-17T02:21:38Z2025-06-17T02:21:38Zby Stallings, William.<br/>Format: Books<br/>Publication Date 2003<br/>Security in computingent://SD_ILS/0/SD_ILS:252272025-06-17T02:21:38Z2025-06-17T02:21:38Zby Pfleeger, Charles P., 1948-<br/>Format: Books<br/>Publication Date 1997<br/>Practical UNIX and Internet securityent://SD_ILS/0/SD_ILS:143192025-06-17T02:21:38Z2025-06-17T02:21:38Zby Garfinkel, Simson.<br/>Table of contents <a href="http://www.gbv.de/dms/bowker/toc/9781565921481.pdf">http://www.gbv.de/dms/bowker/toc/9781565921481.pdf</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html">http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html">http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html</a>
Umschlagbild <a href="http://swbplus.bsz-bw.de/bsz048310409cov.htm">http://swbplus.bsz-bw.de/bsz048310409cov.htm</a><br/>Format: Books<br/>Publication Date 1996<br/>Computer securityent://SD_ILS/0/SD_ILS:252292025-06-17T02:21:38Z2025-06-17T02:21:38Zby Carroll, John Millar.<br/>Format: Books<br/>Publication Date 1996<br/>