Search Results for Risk assessment. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dRisk$002bassessment.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026pe$003dd$00253A$0026ps$003d300?dt=list2025-10-13T18:07:47ZHacking exposed : mobile security secrets &amp; solutionsent://SD_ILS/0/SD_ILS:505112025-10-13T18:07:47Z2025-10-13T18:07:47Zby Bergman, Neil.<br/>Format: Books<br/>Publication Date 2013<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:505542025-10-13T18:07:47Z2025-10-13T18:07:47Zby Mjølsnes, Stig F.<br/>Format: Books<br/>Publication Date 2012<br/>IT governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:370402025-10-13T18:07:47Z2025-10-13T18:07:47Zby Calder, Alan, 1957-<br/>Format: Books<br/>Publication Date 2008<br/>Computer securityent://SD_ILS/0/SD_ILS:252292025-10-13T18:07:47Z2025-10-13T18:07:47Zby Carroll, John Millar.<br/>Format: Books<br/>Publication Date 1996<br/>