Search Results for Reference. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dReference.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026pe$003dd$00253A$0026dt$003dlist$0026ps$003d300?dt=list2025-10-13T10:21:59ZDigital rights management for e-commerce systemsent://SD_ILS/0/SD_ILS:351432025-10-13T10:21:59Z2025-10-13T10:21:59Zby Drossos, Lambros, 1961-<br/>Format: Books<br/>Publication Date 2009<br/>Security and software for cybercafesent://SD_ILS/0/SD_ILS:347722025-10-13T10:21:59Z2025-10-13T10:21:59Zby Adomi, Esharenana E.<br/>Format: Books<br/>Publication Date 2008<br/>Microsoft® Windows server 2008 security resource kitent://SD_ILS/0/SD_ILS:66792025-10-13T10:21:59Z2025-10-13T10:21:59Zby Johansson, Jesper M.<br/>Format: Books<br/>Publication Date 2008<br/>Security in computingent://SD_ILS/0/SD_ILS:252272025-10-13T10:21:59Z2025-10-13T10:21:59Zby Pfleeger, Charles P., 1948-<br/>Format: Books<br/>Publication Date 1997<br/>