Search Results for - Narrowed by: Safari, an O'Reilly Media Company. - Sécurité informatique -- Gestion.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509Safari$00252C$002ban$002bO$002527Reilly$002bMedia$002bCompany.$002509Safari$00252C$002ban$002bO$002527Reilly$002bMedia$002bCompany.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique$002b--$002bGestion.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique$002b--$002bGestion.$0026ps$003d300?
2024-06-14T11:51:05Z
ISO 27001 ISMS Lead Implementer Training Course
ent://SD_ILS/0/SD_ILS:2330903
2024-06-14T11:51:05Z
2024-06-14T11:51:05Z
by Watkins, Steve, 1970- presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781787783478">https://learning.oreilly.com/videos/~/9781787783478</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787783478/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783478/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781787783478/?ar">https://learning.oreilly.com/videos/~/9781787783478/?ar</a><br/>Format: Electronic Resources<br/>
Take Control of 1Password, 4th Edition
ent://SD_ILS/0/SD_ILS:2319474
2024-06-14T11:51:05Z
2024-06-14T11:51:05Z
by Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format: Electronic Resources<br/>
Distributed Networks
ent://SD_ILS/0/SD_ILS:2319907
2024-06-14T11:51:05Z
2024-06-14T11:51:05Z
by Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format: Electronic Resources<br/>
Information Security Management Handbook, Volume 6, 6th Edition
ent://SD_ILS/0/SD_ILS:2323397
2024-06-14T11:51:05Z
2024-06-14T11:51:05Z
by Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a>
<a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format: Electronic Resources<br/>
The Science and Technology of Counterterrorism
ent://SD_ILS/0/SD_ILS:2319961
2024-06-14T11:51:05Z
2024-06-14T11:51:05Z
by Young, Carl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562">https://learning.oreilly.com/library/view/~/9780124200562</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562/?ar">https://learning.oreilly.com/library/view/~/9780124200562/?ar</a><br/>Format: Electronic Resources<br/>
Integrated Security Systems Design, 2nd Edition
ent://SD_ILS/0/SD_ILS:2320974
2024-06-14T11:51:05Z
2024-06-14T11:51:05Z
by Norman, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000229/?ar">https://learning.oreilly.com/library/view/~/9780128000229/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000229">https://learning.oreilly.com/library/view/~/9780128000229</a><br/>Format: Electronic Resources<br/>
Strategic Information Management, 3rd Edition
ent://SD_ILS/0/SD_ILS:2319914
2024-06-14T11:51:05Z
2024-06-14T11:51:05Z
by Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format: Electronic Resources<br/>
Microsoft
ent://SD_ILS/0/SD_ILS:2321069
2024-06-14T11:51:05Z
2024-06-14T11:51:05Z
by Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format: Electronic Resources<br/>
Firewalls and Internet Security : Repelling the Wily Hacker, Second Edition
ent://SD_ILS/0/SD_ILS:2324785
2024-06-14T11:51:05Z
2024-06-14T11:51:05Z
by Cheswick, William, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/020163466X/?ar">https://go.oreilly.com/library-access/library/view/-/020163466X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/020163466X/?ar">https://learning.oreilly.com/library/view/~/020163466X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/020163466X">https://learning.oreilly.com/library/view/~/020163466X</a><br/>Format: Electronic Resources<br/>
Managing Information Security Risks : the OCTAVESM Approach
ent://SD_ILS/0/SD_ILS:2321582
2024-06-14T11:51:05Z
2024-06-14T11:51:05Z
by Alberts, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/0321118863/?ar">https://learning.oreilly.com/library/view/~/0321118863/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321118863/?ar">https://go.oreilly.com/library-access/library/view/-/0321118863/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321118863">https://learning.oreilly.com/library/view/~/0321118863</a><br/>Format: Electronic Resources<br/>
Understanding PKI : Concepts, Standards, and Deployment Considerations, Second Edition
ent://SD_ILS/0/SD_ILS:2321625
2024-06-14T11:51:05Z
2024-06-14T11:51:05Z
by Adams, Carlisle, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672323915/?ar">https://go.oreilly.com/library-access/library/view/-/0672323915/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672323915/?ar">https://learning.oreilly.com/library/view/~/0672323915/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672323915">https://learning.oreilly.com/library/view/~/0672323915</a><br/>Format: Electronic Resources<br/>