Search Results for - Narrowed by: Pfleeger, Shari Lawrence. - IYTE Library - Data protection. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509Pfleeger$00252C$002bShari$002bLawrence.$002509Pfleeger$00252C$002bShari$002bLawrence.$0026qf$003dLIBRARY$002509Library$0025091$00253AIYTE$002509IYTE$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300? 2024-06-25T17:34:46Z Analyzing computer security : a threat/vulnerability/countermeasure approach ent://SD_ILS/0/SD_ILS:2291806 2024-06-25T17:34:46Z 2024-06-25T17:34:46Z by&#160;Pfleeger, Charles P., 1948-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar">https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132789493/?ar">https://learning.oreilly.com/library/view/~/9780132789493/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing, Third Edition ent://SD_ILS/0/SD_ILS:2326579 2024-06-25T17:34:46Z 2024-06-25T17:34:46Z by&#160;Pfleeger, Charles, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0130355488/?ar">https://go.oreilly.com/library-access/library/view/-/0130355488/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0130355488/?ar">https://learning.oreilly.com/library/view/~/0130355488/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0130355488">https://learning.oreilly.com/library/view/~/0130355488</a><br/>Format:&#160;Electronic Resources<br/>