Search Results for - Narrowed by: O'Reilly (Firm), publisher. - Computer Security SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509O$002527Reilly$002b$002528Firm$002529$00252C$002bpublisher.$002509O$002527Reilly$002b$002528Firm$002529$00252C$002bpublisher.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bSecurity$002509Computer$002bSecurity$0026ps$003d300? 2024-05-31T05:08:37Z Case study : how Tools &amp; Solutions survived a ransomware attack. ent://SD_ILS/0/SD_ILS:2332364 2024-05-31T05:08:37Z 2024-05-31T05:08:37Z by&#160;Majumdar, Partha, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar">https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0636920673859">https://learning.oreilly.com/library/view/~/0636920673859</a> <a href="https://learning.oreilly.com/library/view/~/0636920673859/?ar">https://learning.oreilly.com/library/view/~/0636920673859/?ar</a><br/>Format:&#160;Video recording<br/> Securing AI. ent://SD_ILS/0/SD_ILS:2332134 2024-05-31T05:08:37Z 2024-05-31T05:08:37Z by&#160;Manjengwa, Shingai, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar">https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920672319/?ar">https://learning.oreilly.com/videos/~/0636920672319/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920672319">https://learning.oreilly.com/videos/~/0636920672319</a><br/>Format:&#160;Video recording<br/>