-
1by Warricker, Anina M.Subjects: “...Information networks -- Security measures...”
Published 2012
Get full text
Others -
2by Myburgh, GustavSubjects: “...Neural networks (Computer science)...”
Published 2012
Get full text
Others -
3by Parbanath, Steven.Subjects: “...Computer networks--Security measures....”
Published 2013
Get full text
-
4by Storey, QuiranSubjects: “...Local area networks (Computer networks) -- Security measures...”
Published 2013
Get full text
Others -
5by Kruger, Richard CarlSubjects: “...Computer networks -- Security measures...”
Published 2010
Get full text
-
6by Coetzee, Dirk BadenhorstSubjects: “...Information security...”
Published 2013
Get full text
Others -
7by Bhoola, Nisha.Subjects: “...Social networks--Security measures--KwaZulu-Natal....”
Published 2013
Get full text
-
8by Swartz, EleanorSubjects: “...Food security -- South Africa -- Paternoster...”
Published 2013
Get full text
Others -
9by Sahd, Lize-MarieSubjects: “...Business enterprises -- Computer networks -- Security measures...”
Published 2015
Get full text
Others -
10Addressing the incremental risks associated with social media by using the cobit 5 control frameworkby Gerber, PetroSubjects: “...Business enterprises -- Computer networks -- Security measures...”
Published 2015
Get full text
Others -
11by Weber, LyleSubjects: “...Computer networks -- Security measures...”
Published 2014
Get full text
Others -
12by Smeda, JorinaSubjects: “...Business enterprises -- Computer networks -- Security measures...”
Published 2015
Get full text
Others -
13
-
14by Mansingh, Silesh.“... efficient lighting roll out programmes as a cost effective short to medium term supply security solution...”
Published 2014
Get full text
-
15by Balmahoon, Reevana.Subjects: “...Ad hoc networks (Computer networks)...”
Published 2013
Get full text
-
16
-
17by Ryan, Morgan.“...South African medium voltage underground electrical networks consist mainly of cables of paper...”
Published 2013
Get full text
-
18by Olivier, David WilliamSubjects: “...Food security -- South Africa -- Cape Town...”
Published 2015
Get full text
Others -
19by Bruwer, Hendrik JacobusSubjects: “...World Wide Web -- Security measures...”
Published 2014
Get full text
Others -
20by Mirza, Abdul R.“... exploits the principles of quantum physics to underpin a physical security against any form...”
Published 2014
Get full text