Search Results for Software. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dSoftware.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2025-05-22T18:00:05ZSoftware security : building security inent://SD_ILS/0/SD_ILS:549712025-05-22T18:00:05Z2025-05-22T18:00:05Zby McGraw, Gary, 1966-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip062/2005031598.html">http://www.loc.gov/catdir/toc/ecip062/2005031598.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Secure and resilient software developmentent://SD_ILS/0/SD_ILS:430862025-05-22T18:00:05Z2025-05-22T18:00:05Zby Merkow, Mark S.<br/>Format: Books<br/>Publication Date 2010<br/>Security and software for cybercafesent://SD_ILS/0/SD_ILS:347722025-05-22T18:00:05Z2025-05-22T18:00:05Zby Adomi, Esharenana E.<br/>Format: Books<br/>Publication Date 2008<br/>Software forensics : collecting evidence from the scene of a digital crimeent://SD_ILS/0/SD_ILS:285102025-05-22T18:00:05Z2025-05-22T18:00:05Zby Slade, Robert M.<br/>Publisher description <a href="http://www.loc.gov/catdir/description/mh041/2003070176.html">http://www.loc.gov/catdir/description/mh041/2003070176.html</a>
Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003070176.html">http://www.loc.gov/catdir/bios/mh042/2003070176.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/mh041/2003070176.html">http://www.loc.gov/catdir/toc/mh041/2003070176.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Computer security : principles and practiceent://SD_ILS/0/SD_ILS:565142025-05-22T18:00:05Z2025-05-22T18:00:05Zby Stallings, William, author.<br/>Format: Books<br/>Publication Date 2018<br/>Security in computingent://SD_ILS/0/SD_ILS:557882025-05-22T18:00:05Z2025-05-22T18:00:05Zby Pfleeger, Charles P., 1948- author.<br/><a href="http://catalogue.londonmet.ac.uk/record=b1680851~S1">E-book</a><br/>Format: Regular print<br/>Publication Date 2015<br/>Computer security literacy : staying safe in a digital worldent://SD_ILS/0/SD_ILS:502232025-05-22T18:00:05Z2025-05-22T18:00:05Zby Jacobson, Douglas.<br/>Format: Books<br/>Publication Date 2013<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:505542025-05-22T18:00:05Z2025-05-22T18:00:05Zby Mjølsnes, Stig F.<br/>Format: Books<br/>Publication Date 2012<br/>Hacking web apps : detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:507112025-05-22T18:00:05Z2025-05-22T18:00:05Zby Shema, Mike, author.<br/>Format: Books<br/>Publication Date 2012<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:463622025-05-22T18:00:05Z2025-05-22T18:00:05Zby Timm, Carl.<br/>Format: Books<br/>Publication Date 2010<br/>IT governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:370402025-05-22T18:00:05Z2025-05-22T18:00:05Zby Calder, Alan, 1957-<br/>Format: Books<br/>Publication Date 2008<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:200802025-05-22T18:00:05Z2025-05-22T18:00:05Zby Stallings, William.<br/>Format: Books<br/>Publication Date 2003<br/>Secrets and lies : digital security in a networked worldent://SD_ILS/0/SD_ILS:141712025-05-22T18:00:05Z2025-05-22T18:00:05Zby Schneier, Bruce, 1963-<br/>Table of contents <a href="http://www.gbv.de/dms/ilmenau/toc/314774726.PDF">Kostenfrei</a>
Table of contents <a href="http://catdir.loc.gov/catdir/toc/onix04/00042252.html">http://catdir.loc.gov/catdir/toc/onix04/00042252.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html">http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/description/wiley0310/00042252.html">http://catdir.loc.gov/catdir/description/wiley0310/00042252.html</a><br/>Format: Books<br/>Publication Date 2000<br/>