Search Results for Science. - Narrowed by: Computer security. SirsiDynix Enterprise https://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dScience.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?dt=list 2025-05-12T22:06:52Z Computer security ent://SD_ILS/0/SD_ILS:25226 2025-05-12T22:06:52Z 2025-05-12T22:06:52Z by&#160;Gollmann, Dieter.<br/>Table of Contents <a href="http://www.loc.gov/catdir/toc/onix05/98042538.html">http://www.loc.gov/catdir/toc/onix05/98042538.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;1999<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:55010 2025-05-12T22:06:52Z 2025-05-12T22:06:52Z by&#160;Stallings, William author.<br/>Format:&#160;Books<br/>Publication Date&#160;2017<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:54286 2025-05-12T22:06:52Z 2025-05-12T22:06:52Z by&#160;Mukhopadhyay, Debdeep.<br/>Format:&#160;Books<br/>Publication Date&#160;2015<br/> The basics of IT audit Purposes, processes, and practical information. ent://SD_ILS/0/SD_ILS:51755 2025-05-12T22:06:52Z 2025-05-12T22:06:52Z by&#160;Gantz, Stephen D.<br/><a href="http://esc-web.lib.cbs.dk/login?url=http://www.sciencedirect.com/science/book/9780124171596">Campus and remote access</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780124171596">Available by subscription from Safari Books Online</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780124171596">http://proquest.tech.safaribooksonline.de/9780124171596</a><br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2014<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:50554 2025-05-12T22:06:52Z 2025-05-12T22:06:52Z by&#160;Mj&oslash;lsnes, Stig F.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Hacking exposed computer forensics : secrets &amp;amp; solutions ent://SD_ILS/0/SD_ILS:41497 2025-05-12T22:06:52Z 2025-05-12T22:06:52Z by&#160;Davis, Chris.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Digital rights management for e-commerce systems ent://SD_ILS/0/SD_ILS:35143 2025-05-12T22:06:52Z 2025-05-12T22:06:52Z by&#160;Drossos, Lambros, 1961-<br/>Format:&#160;Books<br/>Publication Date&#160;2009<br/> Security and software for cybercafes ent://SD_ILS/0/SD_ILS:34772 2025-05-12T22:06:52Z 2025-05-12T22:06:52Z by&#160;Adomi, Esharenana E.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:31545 2025-05-12T22:06:52Z 2025-05-12T22:06:52Z by&#160;Stallings, William.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0608/2006276085.html">http://www.loc.gov/catdir/toc/fy0608/2006276085.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Computer forensics jumpstart ent://SD_ILS/0/SD_ILS:36452 2025-05-12T22:06:52Z 2025-05-12T22:06:52Z by&#160;Solomon, Michael (Michael G.), 1963-<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Software forensics : collecting evidence from the scene of a digital crime ent://SD_ILS/0/SD_ILS:28510 2025-05-12T22:06:52Z 2025-05-12T22:06:52Z by&#160;Slade, Robert M.<br/>Publisher description <a href="http://www.loc.gov/catdir/description/mh041/2003070176.html">http://www.loc.gov/catdir/description/mh041/2003070176.html</a> Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003070176.html">http://www.loc.gov/catdir/bios/mh042/2003070176.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/mh041/2003070176.html">http://www.loc.gov/catdir/toc/mh041/2003070176.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> PC disaster and recovery ent://SD_ILS/0/SD_ILS:10310 2025-05-12T22:06:52Z 2025-05-12T22:06:52Z by&#160;Chase, Kate.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-t.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-t.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-b.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-d.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Writing secure code ent://SD_ILS/0/SD_ILS:40250 2025-05-12T22:06:52Z 2025-05-12T22:06:52Z by&#160;Howard, Michael, 1965-<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/>