Search Results for - Narrowed by: ProQuest (Firm) - 2013 - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509ProQuest$002b$002528Firm$002529$002509ProQuest$002b$002528Firm$002529$0026qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-06-20T10:17:31Z Cyber security for educational leaders a guide to understanding and implementing technology policies ent://SD_ILS/0/SD_ILS:2129705 2024-06-20T10:17:31Z 2024-06-20T10:17:31Z by&#160;Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1143733">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:2051712 2024-06-20T10:17:31Z 2024-06-20T10:17:31Z by&#160;O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073021">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Technocrime, policing and surveillance ent://SD_ILS/0/SD_ILS:2128128 2024-06-20T10:17:31Z 2024-06-20T10:17:31Z by&#160;Leman-Langlois, St&eacute;phane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1016143">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:2129336 2024-06-20T10:17:31Z 2024-06-20T10:17:31Z by&#160;Baker, Paul R., 1958-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1112600">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Pragmatic security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:2129847 2024-06-20T10:17:31Z 2024-06-20T10:17:31Z by&#160;Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1153198">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:2206165 2024-06-20T10:17:31Z 2024-06-20T10:17:31Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:2206005 2024-06-20T10:17:31Z 2024-06-20T10:17:31Z by&#160;Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1047930">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Simple steps to data encryption a practical guide to secure computing ent://SD_ILS/0/SD_ILS:2206169 2024-06-20T10:17:31Z 2024-06-20T10:17:31Z by&#160;Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115182">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions ent://SD_ILS/0/SD_ILS:2206164 2024-06-20T10:17:31Z 2024-06-20T10:17:31Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115164">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:2206216 2024-06-20T10:17:31Z 2024-06-20T10:17:31Z by&#160;Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1133729">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:2206025 2024-06-20T10:17:31Z 2024-06-20T10:17:31Z by&#160;Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1058152">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols ent://SD_ILS/0/SD_ILS:2206043 2024-06-20T10:17:31Z 2024-06-20T10:17:31Z by&#160;Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073014">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Logging and log management the authoritative guide to understanding the concepts surrounding logging and log management ent://SD_ILS/0/SD_ILS:2206060 2024-06-20T10:17:31Z 2024-06-20T10:17:31Z by&#160;Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1077419">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The dark side of personalization online privacy concerns influence customer behavior ent://SD_ILS/0/SD_ILS:2237976 2024-06-20T10:17:31Z 2024-06-20T10:17:31Z by&#160;Ziesak, J&ouml;rg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1324048">Click to View</a><br/>Format:&#160;Electronic Resources<br/>