Search Results for Michaely, Michael. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dMichaely$00252C$002bMichael.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026pe$003dd$00253A$0026ps$003d300?dt=list2025-10-27T14:43:52ZPrinciples of information securityent://SD_ILS/0/SD_ILS:218702025-10-27T14:43:52Z2025-10-27T14:43:52Zby Whitman, Michael E., 1964- author.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281864&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281864&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2018<br/>Principles of information securityent://SD_ILS/0/SD_ILS:3202025-10-27T14:43:52Z2025-10-27T14:43:52Zby Whitman, Michael E., 1964- author.<br/>Format: Books<br/>Publication Date 2016<br/>Introduction to Computer Security: Pearson New International Editionent://SD_ILS/0/SD_ILS:538712025-10-27T14:43:52Z2025-10-27T14:43:52Zby Goodrich, M. T. (Michael T.)<br/>Format: Books<br/>Publication Date 2014<br/>Principles of information securityent://SD_ILS/0/SD_ILS:164132025-10-27T14:43:52Z2025-10-27T14:43:52Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2012<br/>Principles of information securityent://SD_ILS/0/SD_ILS:432472025-10-27T14:43:52Z2025-10-27T14:43:52Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2009<br/>Management of information securityent://SD_ILS/0/SD_ILS:343582025-10-27T14:43:52Z2025-10-27T14:43:52Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2008<br/>Information security illuminatedent://SD_ILS/0/SD_ILS:434142025-10-27T14:43:52Z2025-10-27T14:43:52Zby Solomon, Michael (Michael G.), 1963-<br/>Format: Books<br/>Publication Date 2005<br/>Computer forensics jumpstartent://SD_ILS/0/SD_ILS:364522025-10-27T14:43:52Z2025-10-27T14:43:52Zby Solomon, Michael (Michael G.), 1963-<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html</a><br/>Format: Books<br/>Publication Date 2005<br/>Writing secure codeent://SD_ILS/0/SD_ILS:402502025-10-27T14:43:52Z2025-10-27T14:43:52Zby Howard, Michael, 1965-<br/>Format: Books<br/>Publication Date 2003<br/>Secure electronic commerce : building the infrastructure for digital signatures and encryptionent://SD_ILS/0/SD_ILS:263242025-10-27T14:43:52Z2025-10-27T14:43:52Zby Ford, Warwick.<br/>Format: Books<br/>Publication Date 2000<br/>