Search Results for - Narrowed by: E-Book - Computer crimes -- Prevention. - Internet videos. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dITYPE$002509Material$002bType$0025091$00253AE-BOOKS$002509E-Book$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes$002b--$002bPrevention.$002509Computer$002bcrimes$002b--$002bPrevention.$0026qf$003dSUBJECT$002509Subject$002509Internet$002bvideos.$002509Internet$002bvideos.$0026ps$003d300? 2024-09-24T22:01:06Z Ransomware ent://SD_ILS/0/SD_ILS:2332705 2024-09-24T22:01:06Z 2024-09-24T22:01:06Z by&#160;Messdaghi, Chlo&eacute;, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar">https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920702641/?ar">https://learning.oreilly.com/videos/~/0636920702641/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920702641">https://learning.oreilly.com/videos/~/0636920702641</a><br/>Format:&#160;Video recording<br/> Case study : how Tools &amp; Solutions survived a ransomware attack. ent://SD_ILS/0/SD_ILS:2332364 2024-09-24T22:01:06Z 2024-09-24T22:01:06Z by&#160;Majumdar, Partha, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar">https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0636920673859">https://learning.oreilly.com/library/view/~/0636920673859</a> <a href="https://learning.oreilly.com/library/view/~/0636920673859/?ar">https://learning.oreilly.com/library/view/~/0636920673859/?ar</a><br/>Format:&#160;Video recording<br/> Security superstream : zero trust ent://SD_ILS/0/SD_ILS:2334748 2024-09-24T22:01:06Z 2024-09-24T22:01:06Z by&#160;Messdaghi, Chlo&eacute;, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920817680">https://learning.oreilly.com/videos/~/0636920817680</a> <a href="https://learning.oreilly.com/videos/~/0636920817680/?ar">https://learning.oreilly.com/videos/~/0636920817680/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920817680/?ar">https://go.oreilly.com/library-access/library/view/-/0636920817680/?ar</a><br/>Format:&#160;Video recording<br/> Security superstream : security in the cloud. ent://SD_ILS/0/SD_ILS:2334923 2024-09-24T22:01:06Z 2024-09-24T22:01:06Z by&#160;Messdaghi, Chlo&eacute;, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920835578/?ar">https://go.oreilly.com/library-access/library/view/-/0636920835578/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920835578/?ar">https://learning.oreilly.com/videos/~/0636920835578/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920835578">https://learning.oreilly.com/videos/~/0636920835578</a><br/>Format:&#160;Video recording<br/>