Search Results for - Narrowed by: Safari, an O'Reilly Media Company. - S&eacute;curit&eacute; informatique -- Gestion. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509Safari$00252C$002ban$002bO$002527Reilly$002bMedia$002bCompany.$002509Safari$00252C$002ban$002bO$002527Reilly$002bMedia$002bCompany.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique$002b--$002bGestion.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique$002b--$002bGestion.$0026ps$003d300? 2024-06-14T11:51:05Z ISO 27001 ISMS Lead Implementer Training Course ent://SD_ILS/0/SD_ILS:2330903 2024-06-14T11:51:05Z 2024-06-14T11:51:05Z by&#160;Watkins, Steve, 1970- presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781787783478">https://learning.oreilly.com/videos/~/9781787783478</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787783478/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783478/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781787783478/?ar">https://learning.oreilly.com/videos/~/9781787783478/?ar</a><br/>Format:&#160;Electronic Resources<br/> Take Control of 1Password, 4th Edition ent://SD_ILS/0/SD_ILS:2319474 2024-06-14T11:51:05Z 2024-06-14T11:51:05Z by&#160;Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format:&#160;Electronic Resources<br/> Distributed Networks ent://SD_ILS/0/SD_ILS:2319907 2024-06-14T11:51:05Z 2024-06-14T11:51:05Z by&#160;Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information Security Management Handbook, Volume 6, 6th Edition ent://SD_ILS/0/SD_ILS:2323397 2024-06-14T11:51:05Z 2024-06-14T11:51:05Z by&#160;Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a> <a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Science and Technology of Counterterrorism ent://SD_ILS/0/SD_ILS:2319961 2024-06-14T11:51:05Z 2024-06-14T11:51:05Z by&#160;Young, Carl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124200562">https://learning.oreilly.com/library/view/~/9780124200562</a> <a href="https://learning.oreilly.com/library/view/~/9780124200562/?ar">https://learning.oreilly.com/library/view/~/9780124200562/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated Security Systems Design, 2nd Edition ent://SD_ILS/0/SD_ILS:2320974 2024-06-14T11:51:05Z 2024-06-14T11:51:05Z by&#160;Norman, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000229/?ar">https://learning.oreilly.com/library/view/~/9780128000229/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000229">https://learning.oreilly.com/library/view/~/9780128000229</a><br/>Format:&#160;Electronic Resources<br/> Strategic Information Management, 3rd Edition ent://SD_ILS/0/SD_ILS:2319914 2024-06-14T11:51:05Z 2024-06-14T11:51:05Z by&#160;Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format:&#160;Electronic Resources<br/> Microsoft ent://SD_ILS/0/SD_ILS:2321069 2024-06-14T11:51:05Z 2024-06-14T11:51:05Z by&#160;Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format:&#160;Electronic Resources<br/> Firewalls and Internet Security : Repelling the Wily Hacker, Second Edition ent://SD_ILS/0/SD_ILS:2324785 2024-06-14T11:51:05Z 2024-06-14T11:51:05Z by&#160;Cheswick, William, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/020163466X/?ar">https://go.oreilly.com/library-access/library/view/-/020163466X/?ar</a> <a href="https://learning.oreilly.com/library/view/~/020163466X/?ar">https://learning.oreilly.com/library/view/~/020163466X/?ar</a> <a href="https://learning.oreilly.com/library/view/~/020163466X">https://learning.oreilly.com/library/view/~/020163466X</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security Risks : the OCTAVESM Approach ent://SD_ILS/0/SD_ILS:2321582 2024-06-14T11:51:05Z 2024-06-14T11:51:05Z by&#160;Alberts, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/0321118863/?ar">https://learning.oreilly.com/library/view/~/0321118863/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321118863/?ar">https://go.oreilly.com/library-access/library/view/-/0321118863/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321118863">https://learning.oreilly.com/library/view/~/0321118863</a><br/>Format:&#160;Electronic Resources<br/> Understanding PKI : Concepts, Standards, and Deployment Considerations, Second Edition ent://SD_ILS/0/SD_ILS:2321625 2024-06-14T11:51:05Z 2024-06-14T11:51:05Z by&#160;Adams, Carlisle, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672323915/?ar">https://go.oreilly.com/library-access/library/view/-/0672323915/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672323915/?ar">https://learning.oreilly.com/library/view/~/0672323915/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672323915">https://learning.oreilly.com/library/view/~/0672323915</a><br/>Format:&#160;Electronic Resources<br/>