Logging in...
User ID
:
Password
:
Register
Forgot your PIN?
Forgot my PIN
Enter your username and a recovery link will be emailed to the email address on file at your library.
User ID
:
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
All Fields
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
To enable accessibility mode, return to the beginning of the page and use the link in the menu bar.
Advanced Search
Home Room
Book Collection
E-Book Collection
Multimedia Collection
Thesis Collection
Transportation Engineering Collection
Periodicals Collections
Green Campus
15 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Select All
1
2
000
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
How to choose the right digital leader for your company : Striking the right competence-credibility balance for digital leaders depends largely on how the role of the CDO is defined in a particular company
How to choose the right digital leader for your company : Striking the right competence-credibility balance for digital leaders depends largely on how the role of the CDO is defined in a particular company
by
Wade, Michael R., author.
https://learning.oreilly.com/library/view/~/53863MIT60442/?ar
https://learning.oreilly.com/library/view/~/53863MIT60442
https://go.oreilly.com/library-access/library/view/-/53863MIT60442/?ar
Format:
Electronic Resources
14.
GDPR For Dummies
GDPR For Dummies
by
Dibble, Suzanne, author.
https://learning.oreilly.com/library/view/~/9781119546092/?ar
https://go.oreilly.com/library-access/library/view/-/9781119546092/?ar
https://learning.oreilly.com/library/view/~/9781119546092
Format:
Electronic Resources
15.
Mastering Active Directory - Second Edition
Mastering Active Directory - Second Edition
by
Francis, Dishan, author.
https://learning.oreilly.com/library/view/~/9781789800203/?ar
https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar
https://learning.oreilly.com/library/view/~/9781789800203
Format:
Electronic Resources
Select All
1
2
15 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Limit Search Results
Narrowed by:
Included
Publication Date: 2019
Included
Subject: Data protection.
Author
Include
Exclude
Safari, an O'Reilly Media Company.
(2)
Abraham, Chon, author.
(1)
Blinn, Eric, speaker.
(1)
Carey, Marcus J. (Cybersecurity professional), author.
(1)
Carmiel, Yishay, on-screen presenter.
(1)
Carrasco Molina, Manuel, author.
(1)
Chardel, Pierre-Antoine, contributor.
(1)
CyberTraining 365, issuing body.
(1)
Dibble, Suzanne, author.
(1)
Drewitt, Tony, author.
(1)
Feenberg, Andrew, contributor.
(1)
Francis, Dishan, author.
(1)
Gates, Stephen, author.
(1)
IT Governance (Firm)
(1)
International Business Machines Corporation. International Technical Support Organization, publisher.
(1)
Jin, Jennifer, author.
(1)
Kehal, Bally, on-screen presenter.
(1)
Khatchatourov, Armen, author.
(1)
Kissell, Joe.
(1)
O'Reilly & Associates, publisher.
(1)
O'Reilly for Higher Education (Firm), distributor.
(1)
Obwegeser, Nikolaus, author.
(1)
Packt Publishing, publisher.
(1)
Périès, Gabriel, contributor.
(1)
Quintero, Dino, author.
(1)
Scagliarini, Simone, editor.
(1)
Skillsoft Books, Inc.
(1)
Wade, Michael R., author.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
(15)
Language
Include
Exclude
English
(14)
Italian
(1)
Subject
Include
Exclude
Protection de l'information (Informatique)
(12)
Electronic books.
(9)
Computer networks -- Security measures.
(4)
Computer security.
(4)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(4)
Sécurité informatique.
(4)
Privacy, Right of.
(3)
Electronic videos.
(2)
APIs (interfaces)
(1)
Application program interfaces (Computer software)
(1)
Application software -- Development.
(1)
Applications Web -- Sécurité -- Mesures.
(1)
Apprentissage automatique.
(1)
Artificial Intelligence
(1)
Artificial intelligence.
(1)
Audiobooks
(1)
Audiobooks.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Security measures.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
Chefs de direction.
(1)
Chief executive officers.
(1)
Chiffrement (Informatique)
(1)
Computer Security
(1)
Computer networks -- Management.
(1)
Computers -- Access control.
(1)
Computers.
(1)
Confiance -- Aspect social.
(1)
Corporate culture.
(1)
Crisis management
(1)
Crisis management.
(1)
Culture d'entreprise.
(1)
Data encryption (Computer science)
(1)
Data protection
(1)
Data protection -- Government policy -- European Union countries.
(1)
Data protection -- Government policy.
(1)
Data protection -- Law and legislation -- European Union countries.
(1)
Data protection -- Law and legislation.
(1)
Directory services (Computer network technology)
(1)
Electronic digital computers.
(1)
Emergency management.
(1)
Employees -- Training of.
(1)
Entreprises -- Sécurité -- Mesures.
(1)
European Parliament. General Data Protection Regulation.
(1)
European Union countries.
(1)
Films de formation.
(1)
Gestion de crise.
(1)
Gestion de l'information.
(1)
Gestion du risque.
(1)
Information Management
(1)
Information resources management.
(1)
Information technology -- Management.
(1)
Informatique mobile.
(1)
Innovations -- Gestion.
(1)
Instructional films.
(1)
Intelligence artificielle.
(1)
Interfaces de programmation d'applications.
(1)
Internet -- Safety measures.
(1)
Internet -- Security measures -- Government policy -- European Union countries.
(1)
Internet -- Sécurité -- Mesures -- Politique gouvernementale -- Pays de l'Union européenne.
(1)
Internet -- Sécurité -- Mesures.
(1)
Leadership
(1)
Leadership.
(1)
Livres audio.
(1)
Logiciels d'application -- Développement.
(1)
Logiciels malveillants.
(1)
Machine learning.
(1)
Malware (Computer software)
(1)
Microsoft Windows (Computer file)
(1)
Mobile computing.
(1)
O'Reilly Artificial Intelligence Conference (2019 : New York, N.Y.)
(1)
Operating systems (Computers) -- Security measures.
(1)
Ordinateurs -- Accès -- Contrôle.
(1)
Ordinateurs.
(1)
Organizational Culture
(1)
Personnel -- Formation.
(1)
Protection de l'information (Informatique) -- Politique gouvernementale -- Pays de l'Union européenne.
(1)
Risk management.
(1)
Réseaux d'ordinateurs -- Gestion.
(1)
SQL server.
(1)
Services d'annuaires (Technologie des réseaux)
(1)
Systèmes d'exploitation (Ordinateurs) -- Sécurité -- Mesures.
(1)
Systèmes virtuels (Informatique) -- Sécurité -- Mesures.
(1)
Technological innovations -- Management.
(1)
Technologie de l'information -- Gestion.
(1)
Trust -- Social aspects.
(1)
Virtual computer systems -- Security measures.
(1)
Web applications -- Security measures.
(1)
Windows PowerShell (Computer program language)
(1)
Windows PowerShell (Langage de programmation)
(1)
iOS (Electronic resource)
(1)
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
O'reilly E-Books
(13)
Ebrary Collection
(2)
Library
Include
Exclude
IYTE Library
(15)
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}