Search Results for - Narrowed by: ProQuest (Firm) - 2013 - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509ProQuest$002b$002528Firm$002529$002509ProQuest$002b$002528Firm$002529$0026qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-06-20T10:17:31ZCyber security for educational leaders a guide to understanding and implementing technology policiesent://SD_ILS/0/SD_ILS:21297052024-06-20T10:17:31Z2024-06-20T10:17:31Zby Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1143733">Click to View</a><br/>Format: Electronic Resources<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:20517122024-06-20T10:17:31Z2024-06-20T10:17:31Zby O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073021">Click to View</a><br/>Format: Electronic Resources<br/>Technocrime, policing and surveillanceent://SD_ILS/0/SD_ILS:21281282024-06-20T10:17:31Z2024-06-20T10:17:31Zby Leman-Langlois, Stéphane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1016143">Click to View</a><br/>Format: Electronic Resources<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:21293362024-06-20T10:17:31Z2024-06-20T10:17:31Zby Baker, Paul R., 1958-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1112600">Click to View</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:21298472024-06-20T10:17:31Z2024-06-20T10:17:31Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1153198">Click to View</a><br/>Format: Electronic Resources<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:22061652024-06-20T10:17:31Z2024-06-20T10:17:31Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115167">Click to View</a><br/>Format: Electronic Resources<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:22060052024-06-20T10:17:31Z2024-06-20T10:17:31Zby Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1047930">Click to View</a><br/>Format: Electronic Resources<br/>Simple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:22061692024-06-20T10:17:31Z2024-06-20T10:17:31Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115182">Click to View</a><br/>Format: Electronic Resources<br/>Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutionsent://SD_ILS/0/SD_ILS:22061642024-06-20T10:17:31Z2024-06-20T10:17:31Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115164">Click to View</a><br/>Format: Electronic Resources<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:22062162024-06-20T10:17:31Z2024-06-20T10:17:31Zby Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1133729">Click to View</a><br/>Format: Electronic Resources<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:22060252024-06-20T10:17:31Z2024-06-20T10:17:31Zby Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1058152">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocolsent://SD_ILS/0/SD_ILS:22060432024-06-20T10:17:31Z2024-06-20T10:17:31Zby Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073014">Click to View</a><br/>Format: Electronic Resources<br/>Logging and log management the authoritative guide to understanding the concepts surrounding logging and log managementent://SD_ILS/0/SD_ILS:22060602024-06-20T10:17:31Z2024-06-20T10:17:31Zby Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1077419">Click to View</a><br/>Format: Electronic Resources<br/>The dark side of personalization online privacy concerns influence customer behaviorent://SD_ILS/0/SD_ILS:22379762024-06-20T10:17:31Z2024-06-20T10:17:31Zby Ziesak, Jörg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1324048">Click to View</a><br/>Format: Electronic Resources<br/>