Search Results for - Narrowed by: English - Criminalité informatique. - Sécurité informatique.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Criminalit$0025C3$0025A9$002binformatique.$002509Criminalit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300?2024-09-23T07:58:55ZCyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptionsent://SD_ILS/0/SD_ILS:23297992024-09-23T07:58:55Z2024-09-23T07:58:55Zby Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format: Electronic Resources<br/>Cyber Crisisent://SD_ILS/0/SD_ILS:23313162024-09-23T07:58:55Z2024-09-23T07:58:55Zby Cole, Eric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666125313">https://learning.oreilly.com/library/view/~/9781666125313</a>
<a href="https://learning.oreilly.com/library/view/~/9781666125313/?ar">https://learning.oreilly.com/library/view/~/9781666125313/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar">https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity attacks (Red Team activity)ent://SD_ILS/0/SD_ILS:23159862024-09-23T07:58:55Z2024-09-23T07:58:55Zby Nesterenko, Sergii, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781788478878/?ar">https://learning.oreilly.com/videos/~/9781788478878/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tacticsent://SD_ILS/0/SD_ILS:23157062024-09-23T07:58:55Z2024-09-23T07:58:55Zby Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format: Electronic Resources<br/>Ransomware : defending against digital extortionent://SD_ILS/0/SD_ILS:23119732024-09-23T07:58:55Z2024-09-23T07:58:55Zby Liska, Allan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491967874/?ar">https://learning.oreilly.com/library/view/~/9781491967874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491967874">https://learning.oreilly.com/library/view/~/9781491967874</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar">https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar</a><br/>Format: Electronic Resources<br/>Cyber security : a practitioner's guideent://SD_ILS/0/SD_ILS:23137632024-09-23T07:58:55Z2024-09-23T07:58:55Zby Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format: Electronic Resources<br/>Who are the bad guys and what do they want?ent://SD_ILS/0/SD_ILS:23186382024-09-23T07:58:55Z2024-09-23T07:58:55Zby Fell, Gregory J., 1964- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042464">https://learning.oreilly.com/library/view/~/9781492042464</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042464/?ar">https://learning.oreilly.com/library/view/~/9781492042464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:23092962024-09-23T07:58:55Z2024-09-23T07:58:55Zby Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format: Electronic Resources<br/>Machine Learning Forensics for Law Enforcement, Security, and Intelligenceent://SD_ILS/0/SD_ILS:23135632024-09-23T07:58:55Z2024-09-23T07:58:55Zby Mena, Jesus, author<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439860700/?ar">https://go.oreilly.com/library-access/library/view/-/9781439860700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439860700">https://learning.oreilly.com/library/view/~/9781439860700</a>
<a href="https://learning.oreilly.com/library/view/~/9781439860700/?ar">https://learning.oreilly.com/library/view/~/9781439860700/?ar</a><br/>Format: Electronic Resources<br/>The second economy : the race for trust, treasure and time in the cybersecurity warent://SD_ILS/0/SD_ILS:23125522024-09-23T07:58:55Z2024-09-23T07:58:55Zby Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format: Electronic Resources<br/>The cognitive early warning predictive system using the smart vaccine : the new digital immunity paradigm for smart cities and critical infrastructureent://SD_ILS/0/SD_ILS:23133462024-09-23T07:58:55Z2024-09-23T07:58:55Zby Termanini, Rocky, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781498726535/?ar">https://learning.oreilly.com/library/view/~/9781498726535/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781498726535/?ar">https://go.oreilly.com/library-access/library/view/-/9781498726535/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498726535">https://learning.oreilly.com/library/view/~/9781498726535</a><br/>Format: Electronic Resources<br/>The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memoryent://SD_ILS/0/SD_ILS:23067472024-09-23T07:58:55Z2024-09-23T07:58:55Zby Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9781118824993/?ar">https://learning.oreilly.com/library/view/~/9781118824993/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar">https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar</a><br/>Format: Electronic Resources<br/>Managing information security breaches : studies from real lifeent://SD_ILS/0/SD_ILS:23088362024-09-23T07:58:55Z2024-09-23T07:58:55Zby Krausz, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285964/?ar">https://learning.oreilly.com/library/view/~/9781849285964/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar</a><br/>Format: Electronic Resources<br/>Suits and spooks conference : attacks, threats, and defense in cyberspace : complete video compliation.ent://SD_ILS/0/SD_ILS:23019092024-09-23T07:58:55Z2024-09-23T07:58:55Z<a href="https://learning.oreilly.com/videos/~/9781491946435">https://learning.oreilly.com/videos/~/9781491946435</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar">https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491946435/?ar">https://learning.oreilly.com/videos/~/9781491946435/?ar</a><br/>Format: Electronic Resources<br/>Managing Information Security Breaches : Studies from Real Life.ent://SD_ILS/0/SD_ILS:22906742024-09-23T07:58:55Z2024-09-23T07:58:55Zby Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format: Electronic Resources<br/>Cyber fraud tactics, techniques and proceduresent://SD_ILS/0/SD_ILS:22876512024-09-23T07:58:55Z2024-09-23T07:58:55Zby Howard, Rick.<br/><a href="https://learning.oreilly.com/library/view/~/9781420091281">https://learning.oreilly.com/library/view/~/9781420091281</a>
<a href="https://learning.oreilly.com/library/view/~/9781420091281/?ar">https://learning.oreilly.com/library/view/~/9781420091281/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420091281/?ar">https://go.oreilly.com/library-access/library/view/-/9781420091281/?ar</a><br/>Format: Electronic Resources<br/>Mac OS X, iPod, and iPhone forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:22872012024-09-23T07:58:55Z2024-09-23T07:58:55Zby Kubasiak, Ryan R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080949185/?ar">https://learning.oreilly.com/library/view/~/9780080949185/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080949185">https://learning.oreilly.com/library/view/~/9780080949185</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar">https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar</a><br/>Format: Electronic Resources<br/>Crimeware : understanding new attacks and defensesent://SD_ILS/0/SD_ILS:22855872024-09-23T07:58:55Z2024-09-23T07:58:55Zby Jakobsson, Markus.<br/><a href="https://learning.oreilly.com/library/view/~/9780321553744/?ar">https://learning.oreilly.com/library/view/~/9780321553744/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar">https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar</a><br/>Format: Electronic Resources<br/>The official CHFI study guide (Exam 312-49) : for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:22837092024-09-23T07:58:55Z2024-09-23T07:58:55Zby Kleiman, Dave.<br/><a href="https://www.sciencedirect.com/science/book/9781597491976">https://www.sciencedirect.com/science/book/9781597491976</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491976/?ar">https://learning.oreilly.com/library/view/~/9781597491976/?ar</a><br/>Format: Electronic Resources<br/>How personal & Internet security worksent://SD_ILS/0/SD_ILS:22824442024-09-23T07:58:55Z2024-09-23T07:58:55Zby Gralla, Preston.<br/><a href="https://learning.oreilly.com/library/view/~/0789735539/?ar">https://learning.oreilly.com/library/view/~/0789735539/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0789735539/?ar">https://go.oreilly.com/library-access/library/view/-/0789735539/?ar</a><br/>Format: Electronic Resources<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:22819952024-09-23T07:58:55Z2024-09-23T07:58:55Zby Craig, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266986">https://learning.oreilly.com/library/view/~/9781932266986</a>
<a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266986/?ar">https://learning.oreilly.com/library/view/~/9781932266986/?ar</a><br/>Format: Electronic Resources<br/>Malware : Fighting Malicious Code.ent://SD_ILS/0/SD_ILS:23179832024-09-23T07:58:55Z2024-09-23T07:58:55Zby Skoudis, Ed, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131014056">https://learning.oreilly.com/library/view/~/0131014056</a>
<a href="https://learning.oreilly.com/library/view/~/0131014056/?ar">https://learning.oreilly.com/library/view/~/0131014056/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131014056/?ar">https://go.oreilly.com/library-access/library/view/-/0131014056/?ar</a><br/>Format: Electronic Resources<br/>