Search Results for - Narrowed by: English - Business -- Data processing -- Security measures. - Sécurité informatique.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Business$002b--$002bData$002bprocessing$002b--$002bSecurity$002bmeasures.$002509Business$002b--$002bData$002bprocessing$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300?2024-09-23T07:12:45ZData breaches : crisis and opportunityent://SD_ILS/0/SD_ILS:23222222024-09-23T07:12:45Z2024-09-23T07:12:45Zby Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format: Electronic Resources<br/>Information security policies, procedures, and standards : a practitioner's referenceent://SD_ILS/0/SD_ILS:23107492024-09-23T07:12:45Z2024-09-23T07:12:45Zby Landoll, Douglas J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482245912/?ar">https://learning.oreilly.com/library/view/~/9781482245912/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar">https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar</a><br/>Format: Electronic Resources<br/>The CISO Handbookent://SD_ILS/0/SD_ILS:23236772024-09-23T07:12:45Z2024-09-23T07:12:45Zby Gentile, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031379">https://learning.oreilly.com/library/view/~/9781420031379</a>
<a href="https://learning.oreilly.com/library/view/~/9781420031379/?ar">https://learning.oreilly.com/library/view/~/9781420031379/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar</a><br/>Format: Electronic Resources<br/>Information security : a practical guide : bridging the gap between IT and managementent://SD_ILS/0/SD_ILS:23088522024-09-23T07:12:45Z2024-09-23T07:12:45Zby Mooney, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849287418/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287418/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849287418/?ar">https://learning.oreilly.com/library/view/~/9781849287418/?ar</a><br/>Format: Electronic Resources<br/>The security risk assessment handbook : a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:22916532024-09-23T07:12:45Z2024-09-23T07:12:45Zby Landoll, Douglas J.<br/><a href="https://learning.oreilly.com/library/view/~/9781439821497">https://learning.oreilly.com/library/view/~/9781439821497</a>
<a href="https://learning.oreilly.com/library/view/~/9781439821497/?ar">https://learning.oreilly.com/library/view/~/9781439821497/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar">https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar</a><br/>Format: Electronic Resources<br/>The new school of information securityent://SD_ILS/0/SD_ILS:22850322024-09-23T07:12:45Z2024-09-23T07:12:45Zby Shostack, Adam.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321562753/?ar">https://go.oreilly.com/library-access/library/view/-/9780321562753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321562753/?ar">https://learning.oreilly.com/library/view/~/9780321562753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321562753">https://learning.oreilly.com/library/view/~/9780321562753</a><br/>Format: Electronic Resources<br/>Ten rules of information security for the smaller business : a plain English guideent://SD_ILS/0/SD_ILS:22896292024-09-23T07:12:45Z2024-09-23T07:12:45Zby Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781905356553/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356553/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356553/?ar">https://learning.oreilly.com/library/view/~/9781905356553/?ar</a><br/>Format: Electronic Resources<br/>Deployment guide series. IBM Tivoli Identity Manager 5.0ent://SD_ILS/0/SD_ILS:22858442024-09-23T07:12:45Z2024-09-23T07:12:45Zby Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738432067/?ar">https://go.oreilly.com/library-access/library/view/-/0738432067/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738432067/?ar">https://learning.oreilly.com/library/view/~/0738432067/?ar</a><br/>Format: Electronic Resources<br/>