Search Results for Risk. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dRisk.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?dt=list2025-05-14T19:32:52ZInformation technology security &amp; risk managementent://SD_ILS/0/SD_ILS:357182025-05-14T19:32:52Z2025-05-14T19:32:52Zby Slay, Jill.<br/>Format: Books<br/>Publication Date 2006<br/>Managing risk in information systemsent://SD_ILS/0/SD_ILS:521922025-05-14T19:32:52Z2025-05-14T19:32:52Zby Gibson, Darril.<br/>Format: Books<br/>Publication Date 2011<br/>Cyber Security : A practitioner's guideent://SD_ILS/0/SD_ILS:557782025-05-14T19:32:52Z2025-05-14T19:32:52Zby Sutton, David (Information security practitioner), author.<br/><a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2017<br/>Hacking exposed : mobile security secrets &amp; solutionsent://SD_ILS/0/SD_ILS:505112025-05-14T19:32:52Z2025-05-14T19:32:52Zby Bergman, Neil.<br/>Format: Books<br/>Publication Date 2013<br/>Network security : a beginner's guideent://SD_ILS/0/SD_ILS:515562025-05-14T19:32:52Z2025-05-14T19:32:52Zby Maiwald, Eric.<br/>Format: Books<br/>Publication Date 2013<br/>Low tech hacking : street smarts for security professionalsent://SD_ILS/0/SD_ILS:177872025-05-14T19:32:52Z2025-05-14T19:32:52Zby Wiles, Jack.<br/>Format: Books<br/>Publication Date 2012<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:505542025-05-14T19:32:52Z2025-05-14T19:32:52Zby Mjølsnes, Stig F.<br/>Format: Books<br/>Publication Date 2012<br/>Principles of information securityent://SD_ILS/0/SD_ILS:164132025-05-14T19:32:52Z2025-05-14T19:32:52Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2012<br/>Principles of information securityent://SD_ILS/0/SD_ILS:432472025-05-14T19:32:52Z2025-05-14T19:32:52Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2009<br/>Management of information securityent://SD_ILS/0/SD_ILS:343582025-05-14T19:32:52Z2025-05-14T19:32:52Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2008<br/>IT governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:370402025-05-14T19:32:52Z2025-05-14T19:32:52Zby Calder, Alan, 1957-<br/>Format: Books<br/>Publication Date 2008<br/>Look both ways : help protect your family on the Internetent://SD_ILS/0/SD_ILS:338402025-05-14T19:32:52Z2025-05-14T19:32:52Zby Criddle, Linda.<br/>Format: Books<br/>Publication Date 2006<br/>Software security : building security inent://SD_ILS/0/SD_ILS:549712025-05-14T19:32:52Z2025-05-14T19:32:52Zby McGraw, Gary, 1966-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip062/2005031598.html">http://www.loc.gov/catdir/toc/ecip062/2005031598.html</a><br/>Format: Books<br/>Publication Date 2006<br/>PC disaster and recoveryent://SD_ILS/0/SD_ILS:103102025-05-14T19:32:52Z2025-05-14T19:32:52Zby Chase, Kate.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-t.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-b.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-d.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-d.html</a><br/>Format: Books<br/>Publication Date 2003<br/>Computer securityent://SD_ILS/0/SD_ILS:252292025-05-14T19:32:52Z2025-05-14T19:32:52Zby Carroll, John Millar.<br/>Format: Books<br/>Publication Date 1996<br/>