Search Results for Planning. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dPlanning.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2025-11-26T05:58:04ZPlanning for PKI : best practices guide for deploying public key infrastructureent://SD_ILS/0/SD_ILS:238892025-11-26T05:58:04Z2025-11-26T05:58:04Zby Housley, Russ, 1959-<br/>Format: Books<br/>Publication Date 2001<br/>Principles of information securityent://SD_ILS/0/SD_ILS:164132025-11-26T05:58:04Z2025-11-26T05:58:04Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2012<br/>Principles of information securityent://SD_ILS/0/SD_ILS:432472025-11-26T05:58:04Z2025-11-26T05:58:04Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2009<br/>Microsoft® Windows server 2008 security resource kitent://SD_ILS/0/SD_ILS:66792025-11-26T05:58:04Z2025-11-26T05:58:04Zby Johansson, Jesper M.<br/>Format: Books<br/>Publication Date 2008<br/>Management of information securityent://SD_ILS/0/SD_ILS:343582025-11-26T05:58:04Z2025-11-26T05:58:04Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2008<br/>