Search Results for Planning. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dPlanning.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2025-10-07T03:14:48ZPlanning for PKI : best practices guide for deploying public key infrastructureent://SD_ILS/0/SD_ILS:238892025-10-07T03:14:48Z2025-10-07T03:14:48Zby Housley, Russ, 1959-<br/>Format: Books<br/>Publication Date 2001<br/>Principles of information securityent://SD_ILS/0/SD_ILS:164132025-10-07T03:14:48Z2025-10-07T03:14:48Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2012<br/>Principles of information securityent://SD_ILS/0/SD_ILS:432472025-10-07T03:14:48Z2025-10-07T03:14:48Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2009<br/>Management of information securityent://SD_ILS/0/SD_ILS:343582025-10-07T03:14:48Z2025-10-07T03:14:48Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2008<br/>Microsoft® Windows server 2008 security resource kitent://SD_ILS/0/SD_ILS:66792025-10-07T03:14:48Z2025-10-07T03:14:48Zby Johansson, Jesper M.<br/>Format: Books<br/>Publication Date 2008<br/>