Search Results for - Narrowed by: English - Data protection.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?2024-09-25T22:41:20ZData governanceent://SD_ILS/0/SD_ILS:23352012024-09-25T22:41:20Z2024-09-25T22:41:20Zby Reichental, Jonathan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119906773/?ar">https://go.oreilly.com/library-access/library/view/-/9781119906773/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119906773">https://learning.oreilly.com/library/view/~/9781119906773</a>
<a href="https://learning.oreilly.com/library/view/~/9781119906773/?ar">https://learning.oreilly.com/library/view/~/9781119906773/?ar</a><br/>Format: Electronic Resources<br/>Learning digital identity : design, deploy, and manage identity architecturesent://SD_ILS/0/SD_ILS:23347392024-09-25T22:41:20Z2024-09-25T22:41:20Zby Windley, Phillip J., 1958- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098117689/?ar">https://learning.oreilly.com/library/view/~/9781098117689/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098117689">https://learning.oreilly.com/library/view/~/9781098117689</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar">https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar</a><br/>Format: Electronic Resources<br/>Transitioning to quantum-safe cryptography on IBM Zent://SD_ILS/0/SD_ILS:23339332024-09-25T22:41:20Z2024-09-25T22:41:20Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460680">https://learning.oreilly.com/library/view/~/9780738460680</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460680/?ar">https://learning.oreilly.com/library/view/~/9780738460680/?ar</a><br/>Format: Electronic Resources<br/>ASP.NET Core Securityent://SD_ILS/0/SD_ILS:23339622024-09-25T22:41:20Z2024-09-25T22:41:20Zby Wenz, Christian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781633439986/?ar">https://learning.oreilly.com/library/view/~/9781633439986/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781633439986">https://learning.oreilly.com/library/view/~/9781633439986</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781633439986/?ar">https://go.oreilly.com/library-access/library/view/-/9781633439986/?ar</a><br/>Format: Electronic Resources<br/>Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000ent://SD_ILS/0/SD_ILS:23320672024-09-25T22:41:20Z2024-09-25T22:41:20Zby International Business Machines Corporation, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406/?ar">https://learning.oreilly.com/library/view/~/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406">https://learning.oreilly.com/library/view/~/9780738460406</a><br/>Format: Electronic Resources<br/>System and privacy data protection.ent://SD_ILS/0/SD_ILS:23317772024-09-25T22:41:20Z2024-09-25T22:41:20Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a>
<a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format: Video recording<br/>Executive's guide to cyber risk : securing the future todayent://SD_ILS/0/SD_ILS:23332112024-09-25T22:41:20Z2024-09-25T22:41:20Zby Moyo, Siegfried, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119863113">https://learning.oreilly.com/library/view/~/9781119863113</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar">https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119863113/?ar">https://learning.oreilly.com/library/view/~/9781119863113/?ar</a><br/>Format: Electronic Resources<br/>Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflictent://SD_ILS/0/SD_ILS:23346962024-09-25T22:41:20Z2024-09-25T22:41:20Zby Borges, Dan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818/?ar">https://learning.oreilly.com/library/view/~/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818">https://learning.oreilly.com/library/view/~/9781801812818</a><br/>Format: Sound recording<br/>Mastering cyber intelligence : gain comprehensive knowledge and skills to conduct threat intelligence for effective system defenseent://SD_ILS/0/SD_ILS:23326682024-09-25T22:41:20Z2024-09-25T22:41:20Zby Dahj, Jean Nestor M.<br/><a href="https://learning.oreilly.com/library/view/~/9781800209404">https://learning.oreilly.com/library/view/~/9781800209404</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar">https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800209404/?ar">https://learning.oreilly.com/library/view/~/9781800209404/?ar</a><br/>Format: Electronic Resources<br/>Digital Earth : cyber threats, privacy and ethics in an age of paranoiaent://SD_ILS/0/SD_ILS:23328962024-09-25T22:41:20Z2024-09-25T22:41:20Zby Katz, Sarah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783614">https://learning.oreilly.com/library/view/~/9781787783614</a>
<a href="https://learning.oreilly.com/library/view/~/9781787783614/?ar">https://learning.oreilly.com/library/view/~/9781787783614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar</a><br/>Format: Electronic Resources<br/>Data Privacy : a Runbook for Engineers.ent://SD_ILS/0/SD_ILS:23316502024-09-25T22:41:20Z2024-09-25T22:41:20Zby Bhajaria, Nishant.<br/><a href="https://learning.oreilly.com/library/view/~/9781617298998/?ar">https://learning.oreilly.com/library/view/~/9781617298998/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617298998/?ar">https://go.oreilly.com/library-access/library/view/-/9781617298998/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617298998">https://learning.oreilly.com/library/view/~/9781617298998</a><br/>Format: Electronic Resources<br/>Hacking artificial intelligence : a leader's guide from deepfakes to breaking deep learningent://SD_ILS/0/SD_ILS:23329122024-09-25T22:41:20Z2024-09-25T22:41:20Zby Gibian, Davey, 1988- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663719379/?ar">https://go.oreilly.com/library-access/library/view/-/9781663719379/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781663719379">https://learning.oreilly.com/library/view/~/9781663719379</a>
<a href="https://learning.oreilly.com/library/view/~/9781663719379/?ar">https://learning.oreilly.com/library/view/~/9781663719379/?ar</a><br/>Format: Sound recording<br/>Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copyent://SD_ILS/0/SD_ILS:23339502024-09-25T22:41:20Z2024-09-25T22:41:20Zby Shingornikar, Shashank, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460710/?ar">https://learning.oreilly.com/library/view/~/9780738460710/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460710">https://learning.oreilly.com/library/view/~/9780738460710</a><br/>Format: Electronic Resources<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:23270532024-09-25T22:41:20Z2024-09-25T22:41:20Zby Moschovitis, Christos J. P., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119658740">https://learning.oreilly.com/library/view/~/9781119658740</a>
<a href="https://learning.oreilly.com/library/view/~/9781119658740/?ar">https://learning.oreilly.com/library/view/~/9781119658740/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar">https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar</a><br/>Format: Electronic Resources<br/>Big breaches : cybersecurity lessons for everyoneent://SD_ILS/0/SD_ILS:23281262024-09-25T22:41:20Z2024-09-25T22:41:20Zby Daswani, Neil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484266557">https://learning.oreilly.com/library/view/~/9781484266557</a>
<a href="https://learning.oreilly.com/library/view/~/9781484266557/?ar">https://learning.oreilly.com/library/view/~/9781484266557/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar">https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar</a><br/>Format: Electronic Resources<br/>Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisionsent://SD_ILS/0/SD_ILS:23284852024-09-25T22:41:20Z2024-09-25T22:41:20Zby Moore, Richard O., III, 1971- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469082707">https://learning.oreilly.com/library/view/~/9781469082707</a>
<a href="https://learning.oreilly.com/library/view/~/9781469082707/?ar">https://learning.oreilly.com/library/view/~/9781469082707/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469082707/?ar">https://go.oreilly.com/library-access/library/view/-/9781469082707/?ar</a><br/>Format: Electronic Resources<br/>Self-sovereign identity : decentralized digital identity and verifiable credentialsent://SD_ILS/0/SD_ILS:23302702024-09-25T22:41:20Z2024-09-25T22:41:20Zby Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format: Electronic Resources<br/>Mastering Active Directory - Third Editionent://SD_ILS/0/SD_ILS:23311052024-09-25T22:41:20Z2024-09-25T22:41:20Zby Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format: Electronic Resources<br/>Secure operations and protectionsent://SD_ILS/0/SD_ILS:23320922024-09-25T22:41:20Z2024-09-25T22:41:20Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format: Video recording<br/>Pro Google cloud automation : with Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkinsent://SD_ILS/0/SD_ILS:23275092024-09-25T22:41:20Z2024-09-25T22:41:20Zby Sabharwal, Navin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265734/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265734/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265734/?ar">https://learning.oreilly.com/library/view/~/9781484265734/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265734">https://learning.oreilly.com/library/view/~/9781484265734</a><br/>Format: Electronic Resources<br/>Advanced ASP.NET Core 3 Security : understanding hacks, attacks, and vulnerabilities to secure your websiteent://SD_ILS/0/SD_ILS:23264242024-09-25T22:41:20Z2024-09-25T22:41:20Zby Norberg, Scott, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260142/?ar">https://learning.oreilly.com/library/view/~/9781484260142/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484260142">https://learning.oreilly.com/library/view/~/9781484260142</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484260142/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260142/?ar</a><br/>Format: Electronic Resources<br/>Protecting Data Privacy Beyond the Trusted System of Recordent://SD_ILS/0/SD_ILS:23239182024-09-25T22:41:20Z2024-09-25T22:41:20Zby White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format: Electronic Resources<br/>Encryption for organizations and individuals : basics of contemporary and quantum cryptographyent://SD_ILS/0/SD_ILS:23254632024-09-25T22:41:20Z2024-09-25T22:41:20Zby Ciesla, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260562">https://learning.oreilly.com/library/view/~/9781484260562</a>
<a href="https://learning.oreilly.com/library/view/~/9781484260562/?ar">https://learning.oreilly.com/library/view/~/9781484260562/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar</a><br/>Format: Electronic Resources<br/>Building secure firmware : armoring the foundation of the platforment://SD_ILS/0/SD_ILS:23260202024-09-25T22:41:20Z2024-09-25T22:41:20Zby Yao, Jiewen.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261064">https://learning.oreilly.com/library/view/~/9781484261064</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261064/?ar">https://learning.oreilly.com/library/view/~/9781484261064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar</a><br/>Format: Electronic Resources<br/>Data privacy and GDPR handbookent://SD_ILS/0/SD_ILS:23225582024-09-25T22:41:20Z2024-09-25T22:41:20Zby Sharma, Sanjay (Financial executive), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119594246">https://learning.oreilly.com/library/view/~/9781119594246</a>
<a href="https://learning.oreilly.com/library/view/~/9781119594246/?ar">https://learning.oreilly.com/library/view/~/9781119594246/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar">https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity for industrial scada systemsent://SD_ILS/0/SD_ILS:23514002024-09-25T22:41:20Z2024-09-25T22:41:20Zby Shaw, William T., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6468131">Click to View</a><br/>Format: Electronic Resources<br/>Cloud Computing Security, 2nd Editionent://SD_ILS/0/SD_ILS:23311012024-09-25T22:41:20Z2024-09-25T22:41:20Zby Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloudent://SD_ILS/0/SD_ILS:23263952024-09-25T22:41:20Z2024-09-25T22:41:20Zby Calles, Miguel A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002/?ar">https://learning.oreilly.com/library/view/~/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002">https://learning.oreilly.com/library/view/~/9781484261002</a><br/>Format: Electronic Resources<br/>Exposed : how revealing your data and eliminating privacy increases trust and liberates humanityent://SD_ILS/0/SD_ILS:23264132024-09-25T22:41:20Z2024-09-25T22:41:20Zby Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a>
<a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format: Electronic Resources<br/>Privileged attack vectors : building effective cyber-defense strategies to protect organizationsent://SD_ILS/0/SD_ILS:23246642024-09-25T22:41:20Z2024-09-25T22:41:20Zby Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146/?ar">https://learning.oreilly.com/library/view/~/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146">https://learning.oreilly.com/library/view/~/9781484259146</a><br/>Format: Electronic Resources<br/>Advanced API Security : OAuth 2. 0 and Beyondent://SD_ILS/0/SD_ILS:23227342024-09-25T22:41:20Z2024-09-25T22:41:20Zby Siriwardena, Prabath.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220504">https://learning.oreilly.com/library/view/~/9781484220504</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220504/?ar">https://learning.oreilly.com/library/view/~/9781484220504/?ar</a><br/>Format: Electronic Resources<br/>The Complete 2020 Ethereum and Solidity Developer Bootcampent://SD_ILS/0/SD_ILS:23234782024-09-25T22:41:20Z2024-09-25T22:41:20Zby Wiesner, Thomas, author.<br/><a href="https://learning.oreilly.com/videos/~/9781800201019/?ar">https://learning.oreilly.com/videos/~/9781800201019/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar">https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781800201019">https://learning.oreilly.com/videos/~/9781800201019</a><br/>Format: Electronic Resources<br/>Data privacy and GDPR handbookent://SD_ILS/0/SD_ILS:22739352024-09-25T22:41:20Z2024-09-25T22:41:20Zby Sharma, Sanjay, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986738">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Enterprise Mobility and Security trainingent://SD_ILS/0/SD_ILS:23195562024-09-25T22:41:20Z2024-09-25T22:41:20Zby Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format: Electronic Resources<br/>Managing SQL Server encryption certificates : getting started with SQL Server encryptionent://SD_ILS/0/SD_ILS:23213592024-09-25T22:41:20Z2024-09-25T22:41:20Zby Blinn, Eric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484251515/?ar">https://learning.oreilly.com/videos/~/9781484251515/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484251515/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251515/?ar</a><br/>Format: Electronic Resources<br/>How digital trust drives culture change : privacy is a right, not a privilege : but organizations and leadership often struggle with it comes to adapting their culture toward digital trust and stewardshipent://SD_ILS/0/SD_ILS:23208552024-09-25T22:41:20Z2024-09-25T22:41:20Zby Abraham, Chon, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT60430/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT60430/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT60430/?ar">https://learning.oreilly.com/library/view/~/53863MIT60430/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT60430">https://learning.oreilly.com/library/view/~/53863MIT60430</a><br/>Format: Electronic Resources<br/>Karma-based API on Apple platforms : building privacy into iOS and macOS appsent://SD_ILS/0/SD_ILS:23220612024-09-25T22:41:20Z2024-09-25T22:41:20Zby Carrasco Molina, Manuel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242919/?ar">https://learning.oreilly.com/library/view/~/9781484242919/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242919/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242919/?ar</a><br/>Format: Electronic Resources<br/>How to choose the right digital leader for your company : Striking the right competence-credibility balance for digital leaders depends largely on how the role of the CDO is defined in a particular companyent://SD_ILS/0/SD_ILS:23212772024-09-25T22:41:20Z2024-09-25T22:41:20Zby Wade, Michael R., author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT60442/?ar">https://learning.oreilly.com/library/view/~/53863MIT60442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT60442">https://learning.oreilly.com/library/view/~/53863MIT60442</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT60442/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT60442/?ar</a><br/>Format: Electronic Resources<br/>GDPR For Dummiesent://SD_ILS/0/SD_ILS:23272352024-09-25T22:41:20Z2024-09-25T22:41:20Zby Dibble, Suzanne, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119546092/?ar">https://learning.oreilly.com/library/view/~/9781119546092/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119546092/?ar">https://go.oreilly.com/library-access/library/view/-/9781119546092/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119546092">https://learning.oreilly.com/library/view/~/9781119546092</a><br/>Format: Electronic Resources<br/>ISO22301 : a Pocket Guideent://SD_ILS/0/SD_ILS:23252782024-09-25T22:41:20Z2024-09-25T22:41:20Zby Drewitt, Tony, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781016/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781016/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781016/?ar">https://learning.oreilly.com/library/view/~/9781787781016/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781016">https://learning.oreilly.com/library/view/~/9781787781016</a><br/>Format: Electronic Resources<br/>Take Control of Your Online Privacy, 4th Editionent://SD_ILS/0/SD_ILS:23210702024-09-25T22:41:20Z2024-09-25T22:41:20Zby Kissell, Joe.<br/><a href="https://learning.oreilly.com/library/view/~/9781947282377">https://learning.oreilly.com/library/view/~/9781947282377</a>
<a href="https://learning.oreilly.com/library/view/~/9781947282377/?ar">https://learning.oreilly.com/library/view/~/9781947282377/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781947282377/?ar">https://go.oreilly.com/library-access/library/view/-/9781947282377/?ar</a><br/>Format: Electronic Resources<br/>Modern defense in depth : an integrated approach to better web application securityent://SD_ILS/0/SD_ILS:23198732024-09-25T22:41:20Z2024-09-25T22:41:20Zby Gates, Stephen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492050360/?ar">https://learning.oreilly.com/library/view/~/9781492050360/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492050360">https://learning.oreilly.com/library/view/~/9781492050360</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar">https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar</a><br/>Format: Electronic Resources<br/>Mastering Active Directory - Second Editionent://SD_ILS/0/SD_ILS:23239792024-09-25T22:41:20Z2024-09-25T22:41:20Zby Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789800203/?ar">https://learning.oreilly.com/library/view/~/9781789800203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar">https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789800203">https://learning.oreilly.com/library/view/~/9781789800203</a><br/>Format: Electronic Resources<br/>Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environmentsent://SD_ILS/0/SD_ILS:23220552024-09-25T22:41:20Z2024-09-25T22:41:20Zby Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers : cybersecurity advice from the best hackers in the worldent://SD_ILS/0/SD_ILS:23214522024-09-25T22:41:20Z2024-09-25T22:41:20Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format: Electronic Resources<br/>How to build privacy and security into deep learning modelsent://SD_ILS/0/SD_ILS:23227912024-09-25T22:41:20Z2024-09-25T22:41:20Zby Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format: Electronic Resources<br/>Digital identities in tension : between autonomy and controlent://SD_ILS/0/SD_ILS:22735092024-09-25T22:41:20Z2024-09-25T22:41:20Zby Khatchatourov, Armen, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5785310">Click to View</a><br/>Format: Electronic Resources<br/>Privileged attack vectors : building effective cyber-defense strategies to protect organizationsent://SD_ILS/0/SD_ILS:23148702024-09-25T22:41:20Z2024-09-25T22:41:20Zby Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format: Electronic Resources<br/>What is cybersecurity?ent://SD_ILS/0/SD_ILS:23187222024-09-25T22:41:20Z2024-09-25T22:41:20Zby Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format: Electronic Resources<br/>IBM QRadar Version 7.3 : planning and installation guideent://SD_ILS/0/SD_ILS:23154742024-09-25T22:41:20Z2024-09-25T22:41:20Zby Carabaguiaz, Elias, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442877/?ar">https://learning.oreilly.com/library/view/~/9780738442877/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar</a><br/>Format: Electronic Resources<br/>Lessons Learned : How to protect critical information infrastructureent://SD_ILS/0/SD_ILS:23154982024-09-25T22:41:20Z2024-09-25T22:41:20Zby Viira, Toomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849289597/?ar">https://learning.oreilly.com/library/view/~/9781849289597/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849289597/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289597/?ar</a><br/>Format: Electronic Resources<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:23150322024-09-25T22:41:20Z2024-09-25T22:41:20Zby Wallace, Michael, 1960- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814438770/?ar">https://learning.oreilly.com/library/view/~/9780814438770/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar">https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar</a><br/>Format: Electronic Resources<br/>Investigating the Cyber Breach : the digital forensics guide for the network engineerent://SD_ILS/0/SD_ILS:23153452024-09-25T22:41:20Z2024-09-25T22:41:20Zby Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar">https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134755885/?ar">https://learning.oreilly.com/library/view/~/9780134755885/?ar</a><br/>Format: Electronic Resources<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:23161522024-09-25T22:41:20Z2024-09-25T22:41:20Zby Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format: Electronic Resources<br/>Solving Cyber Risk : Protecting Your Company and Society.ent://SD_ILS/0/SD_ILS:23182822024-09-25T22:41:20Z2024-09-25T22:41:20Zby Coburn, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781119490937">https://learning.oreilly.com/library/view/~/9781119490937</a>
<a href="https://learning.oreilly.com/library/view/~/9781119490937/?ar">https://learning.oreilly.com/library/view/~/9781119490937/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar">https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar</a><br/>Format: Electronic Resources<br/>Securing web applications : building a strategy for defense against malicious botsent://SD_ILS/0/SD_ILS:23192612024-09-25T22:41:20Z2024-09-25T22:41:20Zby Gates, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar">https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492040279">https://learning.oreilly.com/library/view/~/9781492040279</a>
<a href="https://learning.oreilly.com/library/view/~/9781492040279/?ar">https://learning.oreilly.com/library/view/~/9781492040279/?ar</a><br/>Format: Electronic Resources<br/>Take Control of 1Password, 4th Editionent://SD_ILS/0/SD_ILS:23194742024-09-25T22:41:20Z2024-09-25T22:41:20Zby Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format: Electronic Resources<br/>The Board's Role in Managing Cybersecurity Risksent://SD_ILS/0/SD_ILS:23207492024-09-25T22:41:20Z2024-09-25T22:41:20Zby Rothrock, Ray, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221/?ar">https://learning.oreilly.com/library/view/~/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221">https://learning.oreilly.com/library/view/~/53863MIT59221</a><br/>Format: Electronic Resources<br/>Adversary Detection For Cognitive Radio Networksent://SD_ILS/0/SD_ILS:20874002024-09-25T22:41:20Z2024-09-25T22:41:20Zby He, Xiaofan. author.<br/><a href="https://doi.org/10.1007/978-3-319-75868-8">https://doi.org/10.1007/978-3-319-75868-8</a><br/>Format: Electronic Resources<br/>Innovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11–12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848902024-09-25T22:41:20Z2024-09-25T22:41:20Zby M. F. Kebe, Cheikh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format: Electronic Resources<br/>Artificial Intelligence Tools for Cyber Attributionent://SD_ILS/0/SD_ILS:20847932024-09-25T22:41:20Z2024-09-25T22:41:20Zby Nunes, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-319-73788-1">https://doi.org/10.1007/978-3-319-73788-1</a><br/>Format: Electronic Resources<br/>Honeypot Frameworks and Their Applications: A New Frameworkent://SD_ILS/0/SD_ILS:20841442024-09-25T22:41:20Z2024-09-25T22:41:20Zby NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Electronic Resources<br/>Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20845202024-09-25T22:41:20Z2024-09-25T22:41:20Zby You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845302024-09-25T22:41:20Z2024-09-25T22:41:20Zby Zhou, Yifeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74439-1">https://doi.org/10.1007/978-3-319-74439-1</a><br/>Format: Electronic Resources<br/>Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842682024-09-25T22:41:20Z2024-09-25T22:41:20Zby Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/><a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format: Electronic Resources<br/>Information Technology - New Generations 15th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:20862202024-09-25T22:41:20Z2024-09-25T22:41:20Zby Latifi, Shahram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-77028-4">https://doi.org/10.1007/978-3-319-77028-4</a><br/>Format: Electronic Resources<br/>Dynamic itemset hiding under multiple support thresholdsent://SD_ILS/0/SD_ILS:20754082024-09-25T22:41:20Z2024-09-25T22:41:20Zby Öztürk, Ahmet Cumhur, author.<br/><a href="http://hdl.handle.net/11147/6998">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Cyber-Physical Systems Securityent://SD_ILS/0/SD_ILS:20843522024-09-25T22:41:20Z2024-09-25T22:41:20Zby Koç, Çetin Kaya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98935-8">https://doi.org/10.1007/978-3-319-98935-8</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20847972024-09-25T22:41:20Z2024-09-25T22:41:20Zby Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Smart Micro-Grid Systems Security and Privacyent://SD_ILS/0/SD_ILS:20842352024-09-25T22:41:20Z2024-09-25T22:41:20Zby Kayem, Anne V. D. M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91427-5">https://doi.org/10.1007/978-3-319-91427-5</a><br/>Format: Electronic Resources<br/>Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849922024-09-25T22:41:20Z2024-09-25T22:41:20Zby Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201<br/><a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format: Electronic Resources<br/>Communications and Networking 11th EAI International Conference, ChinaCom 2016, Chongqing, China, September 24-26, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20848502024-09-25T22:41:20Z2024-09-25T22:41:20Zby Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66625-9">https://doi.org/10.1007/978-3-319-66625-9</a><br/>Format: Electronic Resources<br/>Communications and Networking 11th EAI international Conference, ChinaCom 2016 Chongqing, China, September 24-26, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20848512024-09-25T22:41:20Z2024-09-25T22:41:20Zby Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66628-0">https://doi.org/10.1007/978-3-319-66628-0</a><br/>Format: Electronic Resources<br/>Fundamentals and Applications of Hardcopy Communication Conveying Side Information by Printed Mediaent://SD_ILS/0/SD_ILS:20848522024-09-25T22:41:20Z2024-09-25T22:41:20Zby Mayer, Joceli. author.<br/><a href="https://doi.org/10.1007/978-3-319-74083-6">https://doi.org/10.1007/978-3-319-74083-6</a><br/>Format: Electronic Resources<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:20840512024-09-25T22:41:20Z2024-09-25T22:41:20Zby Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855102024-09-25T22:41:20Z2024-09-25T22:41:20Zby Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format: Electronic Resources<br/>Network and Parallel Computing 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29 – December 1, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855532024-09-25T22:41:20Z2024-09-25T22:41:20Zby Zhang, Feng. editor. (orcid)0000-0003-1983-7321<br/><a href="https://doi.org/10.1007/978-3-030-05677-3">https://doi.org/10.1007/978-3-030-05677-3</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Developing Countries First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedingsent://SD_ILS/0/SD_ILS:20847182024-09-25T22:41:20Z2024-09-25T22:41:20Zby Belqasmi, Fatna. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67837-5">https://doi.org/10.1007/978-3-319-67837-5</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20847202024-09-25T22:41:20Z2024-09-25T22:41:20Zby Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Edge Computing: A Primerent://SD_ILS/0/SD_ILS:20840722024-09-25T22:41:20Z2024-09-25T22:41:20Zby Cao, Jie. author.<br/><a href="https://doi.org/10.1007/978-3-030-02083-5">https://doi.org/10.1007/978-3-030-02083-5</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844012024-09-25T22:41:20Z2024-09-25T22:41:20Zby Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845112024-09-25T22:41:20Z2024-09-25T22:41:20Zby Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Electronic Resources<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20848132024-09-25T22:41:20Z2024-09-25T22:41:20Zby Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853902024-09-25T22:41:20Z2024-09-25T22:41:20Zby Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983<br/><a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format: Electronic Resources<br/>Smart Blockchain First International Conference, SmartBlock 2018, Tokyo, Japan, December 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853912024-09-25T22:41:20Z2024-09-25T22:41:20Zby Qiu, Meikang. editor. (orcid)0000-0002-1004-0140<br/><a href="https://doi.org/10.1007/978-3-030-05764-0">https://doi.org/10.1007/978-3-030-05764-0</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853922024-09-25T22:41:20Z2024-09-25T22:41:20Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05345-1">https://doi.org/10.1007/978-3-030-05345-1</a><br/>Format: Electronic Resources<br/>Smart Multimedia First International Conference, ICSM 2018, Toulon, France, August 24–26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20853932024-09-25T22:41:20Z2024-09-25T22:41:20Zby Basu, Anup. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04375-9">https://doi.org/10.1007/978-3-030-04375-9</a><br/>Format: Electronic Resources<br/>Dynamic Games for Network Securityent://SD_ILS/0/SD_ILS:20870572024-09-25T22:41:20Z2024-09-25T22:41:20Zby He, Xiaofan. author.<br/><a href="https://doi.org/10.1007/978-3-319-75871-8">https://doi.org/10.1007/978-3-319-75871-8</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXXII Special Issue on Cybersecurity and Biometricsent://SD_ILS/0/SD_ILS:20850252024-09-25T22:41:20Z2024-09-25T22:41:20Zby Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56672-5">https://doi.org/10.1007/978-3-662-56672-5</a><br/>Format: Electronic Resources<br/>Mathematics and Computing 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844422024-09-25T22:41:20Z2024-09-25T22:41:20Zby Ghosh, Debdas. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0023-3">https://doi.org/10.1007/978-981-13-0023-3</a><br/>Format: Electronic Resources<br/>Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848582024-09-25T22:41:20Z2024-09-25T22:41:20Zby Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Electronic Resources<br/>Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854042024-09-25T22:41:20Z2024-09-25T22:41:20Zby Ganapathy, Vinod. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format: Electronic Resources<br/>Versatile Cybersecurityent://SD_ILS/0/SD_ILS:20842922024-09-25T22:41:20Z2024-09-25T22:41:20Zby Conti, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Electronic Resources<br/>Engineering Applications of Neural Networks 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842982024-09-25T22:41:20Z2024-09-25T22:41:20Zby Pimenidis, Elias. editor. (orcid)0000-0003-3593-8640<br/><a href="https://doi.org/10.1007/978-3-319-98204-5">https://doi.org/10.1007/978-3-319-98204-5</a><br/>Format: Electronic Resources<br/>Advanced Monitoring in P2P Botnets A Dual Perspectiveent://SD_ILS/0/SD_ILS:20844732024-09-25T22:41:20Z2024-09-25T22:41:20Zby Karuppayah, Shankar. author.<br/><a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Electronic Resources<br/>Future Internet Technologies and Trends First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20847722024-09-25T22:41:20Z2024-09-25T22:41:20Zby Patel, Zuber. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73712-6">https://doi.org/10.1007/978-3-319-73712-6</a><br/>Format: Electronic Resources<br/>Introduction to Security Reductionent://SD_ILS/0/SD_ILS:20841282024-09-25T22:41:20Z2024-09-25T22:41:20Zby Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20844812024-09-25T22:41:20Z2024-09-25T22:41:20Zby Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Electronic Resources<br/>Smart Trends in Information Technology and Computer Communications Second International Conference, SmartCom 2017, Pune, India, August 18-19, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842162024-09-25T22:41:20Z2024-09-25T22:41:20Zby Deshpande, A.V. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1423-0">https://doi.org/10.1007/978-981-13-1423-0</a><br/>Format: Electronic Resources<br/>5G for Future Wireless Networks First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20844982024-09-25T22:41:20Z2024-09-25T22:41:20Zby Long, Keping. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72823-0">https://doi.org/10.1007/978-3-319-72823-0</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846572024-09-25T22:41:20Z2024-09-25T22:41:20Zby Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Electronic Resources<br/>Cyber Threat Intelligenceent://SD_ILS/0/SD_ILS:20845032024-09-25T22:41:20Z2024-09-25T22:41:20Zby Dehghantanha, Ali. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format: Electronic Resources<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:20848032024-09-25T22:41:20Z2024-09-25T22:41:20Zby Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Lessons learned : critical information infrastructure protection : how to protect critical information infrastructureent://SD_ILS/0/SD_ILS:21123032024-09-25T22:41:20Z2024-09-25T22:41:20Zby Viira, Toomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5244626">Click to View</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Fog Computing and Its Applicationsent://SD_ILS/0/SD_ILS:20840632024-09-25T22:41:20Z2024-09-25T22:41:20Zby Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-02113-9">https://doi.org/10.1007/978-3-030-02113-9</a><br/>Format: Electronic Resources<br/>Security Protocols XXVI 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20855322024-09-25T22:41:20Z2024-09-25T22:41:20Zby Matyáš, Vashek. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03251-7">https://doi.org/10.1007/978-3-030-03251-7</a><br/>Format: Electronic Resources<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848802024-09-25T22:41:20Z2024-09-25T22:41:20Zby Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Industrial Networks and Intelligent Systems 3rd International Conference, INISCOM 2017, Ho Chi Minh City, Vietnam, September 4, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848882024-09-25T22:41:20Z2024-09-25T22:41:20Zby Chen, Yuanfang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74176-5">https://doi.org/10.1007/978-3-319-74176-5</a><br/>Format: Electronic Resources<br/>Network Intrusion Detection using Deep Learning A Feature Learning Approachent://SD_ILS/0/SD_ILS:20843402024-09-25T22:41:20Z2024-09-25T22:41:20Zby Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>Security and Privacy in Smart Grident://SD_ILS/0/SD_ILS:20841582024-09-25T22:41:20Z2024-09-25T22:41:20Zby Abdallah, Asmaa. author.<br/><a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853022024-09-25T22:41:20Z2024-09-25T22:41:20Zby Saracino, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860542024-09-25T22:41:20Z2024-09-25T22:41:20Zby Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Security with Intelligent Computing and Big-data Servicesent://SD_ILS/0/SD_ILS:20868502024-09-25T22:41:20Z2024-09-25T22:41:20Zby Peng, Sheng-Lung. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76451-1">https://doi.org/10.1007/978-3-319-76451-1</a><br/>Format: Electronic Resources<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:21329282024-09-25T22:41:20Z2024-09-25T22:41:20Zby Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4987646">Click to View</a><br/>Format: Electronic Resources<br/>99 privacy breaches to beware of : practical data protection tips from real-life experiencesent://SD_ILS/0/SD_ILS:22683062024-09-25T22:41:20Z2024-09-25T22:41:20Zby Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5879671">Click to View</a><br/>Format: Electronic Resources<br/>Cloud computing security : foundations and challengesent://SD_ILS/0/SD_ILS:23115242024-09-25T22:41:20Z2024-09-25T22:41:20Zby Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format: Electronic Resources<br/>ISO 37001 : an Introduction to Anti-Bribery Management Systems.ent://SD_ILS/0/SD_ILS:23150202024-09-25T22:41:20Z2024-09-25T22:41:20Zby Field, Alan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559">https://learning.oreilly.com/library/view/~/9781849289559</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559/?ar">https://learning.oreilly.com/library/view/~/9781849289559/?ar</a><br/>Format: Electronic Resources<br/>Distributed Networksent://SD_ILS/0/SD_ILS:23199072024-09-25T22:41:20Z2024-09-25T22:41:20Zby Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format: Electronic Resources<br/>Mastering Active Directory : automate tasks by leveraging PowerShell for Active Directory Domain Services 2016ent://SD_ILS/0/SD_ILS:23138092024-09-25T22:41:20Z2024-09-25T22:41:20Zby Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787289352">https://learning.oreilly.com/library/view/~/9781787289352</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar">https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787289352/?ar">https://learning.oreilly.com/library/view/~/9781787289352/?ar</a><br/>Format: Electronic Resources<br/>Guide: Reporting on an Entity's Cyberse.ent://SD_ILS/0/SD_ILS:23167562024-09-25T22:41:20Z2024-09-25T22:41:20Zby AICPA Staff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781943546725/?ar">https://learning.oreilly.com/library/view/~/9781943546725/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar">https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781943546725">https://learning.oreilly.com/library/view/~/9781943546725</a><br/>Format: Electronic Resources<br/>OAuth 2 in actionent://SD_ILS/0/SD_ILS:23131852024-09-25T22:41:20Z2024-09-25T22:41:20Zby Richer, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617293276/?ar">https://go.oreilly.com/library-access/library/view/-/9781617293276/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617293276">https://learning.oreilly.com/library/view/~/9781617293276</a>
<a href="https://learning.oreilly.com/library/view/~/9781617293276/?ar">https://learning.oreilly.com/library/view/~/9781617293276/?ar</a><br/>Format: Electronic Resources<br/>Data hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:23116292024-09-25T22:41:20Z2024-09-25T22:41:20Zby Hassan, Nihad Ahmad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128044964/?ar">https://learning.oreilly.com/library/view/~/9780128044964/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128044964/?ar">https://go.oreilly.com/library-access/library/view/-/9780128044964/?ar</a><br/>Format: Electronic Resources<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:22112802024-09-25T22:41:20Z2024-09-25T22:41:20Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4743573">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:22107202024-09-25T22:41:20Z2024-09-25T22:41:20Zby Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4676113">Click to View</a><br/>Format: Electronic Resources<br/>ISO 37001 : an introduction to anti-bribery management systems : doing the right thingsent://SD_ILS/0/SD_ILS:21122852024-09-25T22:41:20Z2024-09-25T22:41:20Zby Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5211339">Click to View</a><br/>Format: Electronic Resources<br/>Analyzing and securing social networksent://SD_ILS/0/SD_ILS:23133852024-09-25T22:41:20Z2024-09-25T22:41:20Zby Thuraisingham, Bhavani M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar">https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482243284/?ar">https://learning.oreilly.com/library/view/~/9781482243284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482243284">https://learning.oreilly.com/library/view/~/9781482243284</a><br/>Format: Electronic Resources<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:23134842024-09-25T22:41:20Z2024-09-25T22:41:20Zby Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format: Electronic Resources<br/>Information theft prevention : theory and practiceent://SD_ILS/0/SD_ILS:23155502024-09-25T22:41:20Z2024-09-25T22:41:20Zby Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format: Electronic Resources<br/>You--for sale : protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:23084652024-09-25T22:41:20Z2024-09-25T22:41:20Zby Sumner, Stuart, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034231/?ar">https://learning.oreilly.com/library/view/~/9780128034231/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar</a><br/>Format: Electronic Resources<br/>Introduction to Hadoop security : a hands-on approach to securing big data clustersent://SD_ILS/0/SD_ILS:23102702024-09-25T22:41:20Z2024-09-25T22:41:20Zby Bean, Jeff, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar">https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771375054/?ar">https://learning.oreilly.com/videos/~/9781771375054/?ar</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:23102902024-09-25T22:41:20Z2024-09-25T22:41:20Zby Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format: Electronic Resources<br/>Information security policies, procedures, and standards : a practitioner's referenceent://SD_ILS/0/SD_ILS:23107492024-09-25T22:41:20Z2024-09-25T22:41:20Zby Landoll, Douglas J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482245912/?ar">https://learning.oreilly.com/library/view/~/9781482245912/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar">https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar</a><br/>Format: Electronic Resources<br/>PCI DSS 3.1 : the standard that killed SSLent://SD_ILS/0/SD_ILS:23084682024-09-25T22:41:20Z2024-09-25T22:41:20Zby Williams, Branden R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128046494">https://learning.oreilly.com/library/view/~/9780128046494</a>
<a href="https://learning.oreilly.com/library/view/~/9780128046494/?ar">https://learning.oreilly.com/library/view/~/9780128046494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar">https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar</a><br/>Format: Electronic Resources<br/>Data governance : frameworks and strategiesent://SD_ILS/0/SD_ILS:23098712024-09-25T22:41:20Z2024-09-25T22:41:20Zby Adler, John, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar">https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491942352/?ar">https://learning.oreilly.com/videos/~/9781491942352/?ar</a><br/>Format: Electronic Resources<br/>The CISO Handbookent://SD_ILS/0/SD_ILS:23236772024-09-25T22:41:20Z2024-09-25T22:41:20Zby Gentile, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031379">https://learning.oreilly.com/library/view/~/9781420031379</a>
<a href="https://learning.oreilly.com/library/view/~/9781420031379/?ar">https://learning.oreilly.com/library/view/~/9781420031379/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar</a><br/>Format: Electronic Resources<br/>Information Security Management Handbook, Volume 6, 6th Editionent://SD_ILS/0/SD_ILS:23233972024-09-25T22:41:20Z2024-09-25T22:41:20Zby Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a>
<a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format: Electronic Resources<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:22089652024-09-25T22:41:20Z2024-09-25T22:41:20Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:22094442024-09-25T22:41:20Z2024-09-25T22:41:20Zby Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4334673">Click to View</a><br/>Format: Electronic Resources<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:21109522024-09-25T22:41:20Z2024-09-25T22:41:20Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4009415">Click to View</a><br/>Format: Electronic Resources<br/>Innovations for Community Services 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846442024-09-25T22:41:20Z2024-09-25T22:41:20Zby Fahrnberger, Günter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49466-1">https://doi.org/10.1007/978-3-319-49466-1</a><br/>Format: Electronic Resources<br/>Secure Data Deletionent://SD_ILS/0/SD_ILS:20847492024-09-25T22:41:20Z2024-09-25T22:41:20Zby Reardon, Joel. author.<br/><a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848392024-09-25T22:41:20Z2024-09-25T22:41:20Zby Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format: Electronic Resources<br/>Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850862024-09-25T22:41:20Z2024-09-25T22:41:20Zby Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format: Electronic Resources<br/>Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856982024-09-25T22:41:20Z2024-09-25T22:41:20Zby Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860702024-09-25T22:41:20Z2024-09-25T22:41:20Zby Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842542024-09-25T22:41:20Z2024-09-25T22:41:20Zby Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format: Electronic Resources<br/>Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850362024-09-25T22:41:20Z2024-09-25T22:41:20Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-09-25T22:41:20Z2024-09-25T22:41:20Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858882024-09-25T22:41:20Z2024-09-25T22:41:20Zby Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861432024-09-25T22:41:20Z2024-09-25T22:41:20Zby Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format: Electronic Resources<br/>Data breach aftermath and recovery for individuals and institutions : proceedings of a workshopent://SD_ILS/0/SD_ILS:20276202024-09-25T22:41:20Z2024-09-25T22:41:20Zby Johnson, Anne, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Data-Breach-Aftermath.pdf">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://dx.doi.org/10.17226/23559">http://dx.doi.org/10.17226/23559</a><br/>Format: Electronic Resources<br/>PCI DSS 3.1 : the standard that killed SSLent://SD_ILS/0/SD_ILS:20983352024-09-25T22:41:20Z2024-09-25T22:41:20Zby Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4053870">Click to View</a><br/>Format: Electronic Resources<br/>Big data and ethics : the medical datasphereent://SD_ILS/0/SD_ILS:22100682024-09-25T22:41:20Z2024-09-25T22:41:20Zby Béranger, Jérôme, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4529549">Click to View</a><br/>Format: Electronic Resources<br/>Data breach aftermath and recovery for individuals and institutions : proceedings of a workshopent://SD_ILS/0/SD_ILS:22283312024-09-25T22:41:20Z2024-09-25T22:41:20Zby Johnson, Anne, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4690560">Click to View</a><br/>Format: Electronic Resources<br/>88 privacy breaches to beware of : practical data protection tips from real-life experiencesent://SD_ILS/0/SD_ILS:22651852024-09-25T22:41:20Z2024-09-25T22:41:20Zby Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4558135">Click to View</a><br/>Format: Electronic Resources<br/>Facing cyber threats head on : protecting yourself and your businessent://SD_ILS/0/SD_ILS:22662742024-09-25T22:41:20Z2024-09-25T22:41:20Zby Minick, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4773207">Click to View</a><br/>Format: Electronic Resources<br/>Sharing big data safely : managing data securityent://SD_ILS/0/SD_ILS:23092452024-09-25T22:41:20Z2024-09-25T22:41:20Zby Dunning, Ted, 1956- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491953624/?ar">https://go.oreilly.com/library-access/library/view/-/9781491953624/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491953624/?ar">https://learning.oreilly.com/library/view/~/9781491953624/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491953624">https://learning.oreilly.com/library/view/~/9781491953624</a><br/>Format: Electronic Resources<br/>Mastering Python forensics : master the art of digital forensics and analysis with Pythonent://SD_ILS/0/SD_ILS:23092272024-09-25T22:41:20Z2024-09-25T22:41:20Zby Spreitzenbarth, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783988044/?ar">https://learning.oreilly.com/library/view/~/9781783988044/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar">https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783988044">https://learning.oreilly.com/library/view/~/9781783988044</a><br/>Format: Electronic Resources<br/>Measuring and managing information risk : a FAIR approachent://SD_ILS/0/SD_ILS:23042452024-09-25T22:41:20Z2024-09-25T22:41:20Zby Freund, Jack, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar">https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124202313/?ar">https://learning.oreilly.com/library/view/~/9780124202313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124202313">https://learning.oreilly.com/library/view/~/9780124202313</a><br/>Format: Electronic Resources<br/>Security in computingent://SD_ILS/0/SD_ILS:23058972024-09-25T22:41:20Z2024-09-25T22:41:20Zby Pfleeger, Charles P., 1948- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134085074/?ar">https://learning.oreilly.com/library/view/~/9780134085074/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar">https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar</a><br/>Format: Electronic Resources<br/>Multi-domain master data management : advanced MDM and data governance in practiceent://SD_ILS/0/SD_ILS:23067012024-09-25T22:41:20Z2024-09-25T22:41:20Zby Allen, Mark, 1953- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008355/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008355/?ar">https://learning.oreilly.com/library/view/~/9780128008355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008355">https://learning.oreilly.com/library/view/~/9780128008355</a><br/>Format: Electronic Resources<br/>Introduction to information security : LiveLessons (Sneak Peek Video Training)ent://SD_ILS/0/SD_ILS:23063462024-09-25T22:41:20Z2024-09-25T22:41:20Zby Aurnou, Scott, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar">https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134135823/?ar">https://learning.oreilly.com/videos/~/9780134135823/?ar</a><br/>Format: Electronic Resources<br/>Cloud storage security : a practical guideent://SD_ILS/0/SD_ILS:23079352024-09-25T22:41:20Z2024-09-25T22:41:20Zby Wheeler, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029312/?ar">https://learning.oreilly.com/library/view/~/9780128029312/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar</a><br/>Format: Electronic Resources<br/>Application of big data for national security : a practitioner's guide to emerging technologiesent://SD_ILS/0/SD_ILS:23062322024-09-25T22:41:20Z2024-09-25T22:41:20Zby Akhgar, Babak, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128019672/?ar">https://learning.oreilly.com/library/view/~/9780128019672/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128019672/?ar">https://go.oreilly.com/library-access/library/view/-/9780128019672/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128019672">https://learning.oreilly.com/library/view/~/9780128019672</a><br/>Format: Electronic Resources<br/>Hadoop securityent://SD_ILS/0/SD_ILS:23077732024-09-25T22:41:20Z2024-09-25T22:41:20Zby Spivey, Ben, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar">https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491900970/?ar">https://learning.oreilly.com/library/view/~/9781491900970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491900970">https://learning.oreilly.com/library/view/~/9781491900970</a><br/>Format: Electronic Resources<br/>Learning to love data science : explorations of emerging technologies and platforms for predictive analytics, machine learning, digital manufacturing, and supply chain optimizationent://SD_ILS/0/SD_ILS:23089132024-09-25T22:41:20Z2024-09-25T22:41:20Zby Barlow, Mike (Michael Alan), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491936573">https://learning.oreilly.com/library/view/~/9781491936573</a>
<a href="https://learning.oreilly.com/library/view/~/9781491936573/?ar">https://learning.oreilly.com/library/view/~/9781491936573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491936573/?ar">https://go.oreilly.com/library-access/library/view/-/9781491936573/?ar</a><br/>Format: Electronic Resources<br/>Risk centric threat modeling : process for attack simulation and threat analysisent://SD_ILS/0/SD_ILS:23087922024-09-25T22:41:20Z2024-09-25T22:41:20Zby Uceda Vélez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format: Electronic Resources<br/>Mastering OAuth 2.0 : create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Frameworkent://SD_ILS/0/SD_ILS:23095472024-09-25T22:41:20Z2024-09-25T22:41:20Zby Bihis, Charles, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784395407/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395407/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784395407">https://learning.oreilly.com/library/view/~/9781784395407</a>
<a href="https://learning.oreilly.com/library/view/~/9781784395407/?ar">https://learning.oreilly.com/library/view/~/9781784395407/?ar</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:23088472024-09-25T22:41:20Z2024-09-25T22:41:20Zby Ticher, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287135/?ar">https://learning.oreilly.com/library/view/~/9781849287135/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar</a><br/>Format: Electronic Resources<br/>The cloud security ecosystem : technical, legal, business and management issuesent://SD_ILS/0/SD_ILS:23076492024-09-25T22:41:20Z2024-09-25T22:41:20Zby Ko, Ryan, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar">https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128017807/?ar">https://learning.oreilly.com/library/view/~/9780128017807/?ar</a><br/>Format: Electronic Resources<br/>Security, privacy, and governance : protecting data, and using data to protect systemsent://SD_ILS/0/SD_ILS:23077562024-09-25T22:41:20Z2024-09-25T22:41:20Zby Lorica, Ben, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar">https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491931042/?ar">https://learning.oreilly.com/videos/~/9781491931042/?ar</a><br/>Format: Electronic Resources<br/>Technology Disaster Response and Recovery Planning : A LITA Guide.ent://SD_ILS/0/SD_ILS:12853712024-09-25T22:41:20Z2024-09-25T22:41:20Zby Mallery, Mary.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2068199">Click to View</a><br/>Format: Electronic Resources<br/>Digital privacy in the marketplace : perspectives on the information exchangeent://SD_ILS/0/SD_ILS:20561852024-09-25T22:41:20Z2024-09-25T22:41:20Zby Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1920895">Click to View</a><br/>Format: Electronic Resources<br/>Cloud storage security : a practical guideent://SD_ILS/0/SD_ILS:22088522024-09-25T22:41:20Z2024-09-25T22:41:20Zby Wheeler, Aaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2084976">Click to View</a><br/>Format: Electronic Resources<br/>Measuring and managing information risk : a FAIR approachent://SD_ILS/0/SD_ILS:22078292024-09-25T22:41:20Z2024-09-25T22:41:20Zby Freund, Jack, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1772300">Click to View</a><br/>Format: Electronic Resources<br/>Application of big data for national security : a practitioner's guide to emerging technologiesent://SD_ILS/0/SD_ILS:22084662024-09-25T22:41:20Z2024-09-25T22:41:20Zby Akhgar, Babak, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1962519">Click to View</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:21553202024-09-25T22:41:20Z2024-09-25T22:41:20Zby Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192125">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Python forensics : master the art of digital forensics and analysis with Pythonent://SD_ILS/0/SD_ILS:22194612024-09-25T22:41:20Z2024-09-25T22:41:20Zby Spreitzenbarth, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191124">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft system center data protection manager 2012 R2 cookbook : over 100 recipes to build your own designs exploring the advanced functionality and features of system center DPM 2012 R2ent://SD_ILS/0/SD_ILS:22383532024-09-25T22:41:20Z2024-09-25T22:41:20Zby Hedblom, Robert, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2040609">Click to View</a><br/>Format: Electronic Resources<br/>Information assurance handbook : effective computer security and risk management strategiesent://SD_ILS/0/SD_ILS:23048752024-09-25T22:41:20Z2024-09-25T22:41:20Zby Schou, Corey.<br/><a href="https://learning.oreilly.com/library/view/~/9780071821650">https://learning.oreilly.com/library/view/~/9780071821650</a>
<a href="https://learning.oreilly.com/library/view/~/9780071821650/?ar">https://learning.oreilly.com/library/view/~/9780071821650/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar">https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar</a><br/>Format: Electronic Resources<br/>Implementing high availability and disaster recovery in IBM PureApplication Systems V2ent://SD_ILS/0/SD_ILS:23064692024-09-25T22:41:20Z2024-09-25T22:41:20Zby Gadepalli, Venkata, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738440337">https://learning.oreilly.com/library/view/~/0738440337</a>
<a href="https://learning.oreilly.com/library/view/~/0738440337/?ar">https://learning.oreilly.com/library/view/~/0738440337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738440337/?ar">https://go.oreilly.com/library-access/library/view/-/0738440337/?ar</a><br/>Format: Electronic Resources<br/>The Science and Technology of Counterterrorisment://SD_ILS/0/SD_ILS:23199612024-09-25T22:41:20Z2024-09-25T22:41:20Zby Young, Carl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562">https://learning.oreilly.com/library/view/~/9780124200562</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562/?ar">https://learning.oreilly.com/library/view/~/9780124200562/?ar</a><br/>Format: Electronic Resources<br/>Anonymous Communication Networksent://SD_ILS/0/SD_ILS:23272682024-09-25T22:41:20Z2024-09-25T22:41:20Zby Peng, Kun, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881606">https://learning.oreilly.com/library/view/~/9781439881606</a>
<a href="https://learning.oreilly.com/library/view/~/9781439881606/?ar">https://learning.oreilly.com/library/view/~/9781439881606/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439881606/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881606/?ar</a><br/>Format: Electronic Resources<br/>Healthcare information privacy and security : regulatory compliance and data security in the age of electronic health recordsent://SD_ILS/0/SD_ILS:23036462024-09-25T22:41:20Z2024-09-25T22:41:20Zby Robichau, Bernard Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430266778">https://learning.oreilly.com/library/view/~/9781430266778</a>
<a href="https://learning.oreilly.com/library/view/~/9781430266778/?ar">https://learning.oreilly.com/library/view/~/9781430266778/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430266778/?ar">https://go.oreilly.com/library-access/library/view/-/9781430266778/?ar</a><br/>Format: Electronic Resources<br/>10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacyent://SD_ILS/0/SD_ILS:23048612024-09-25T22:41:20Z2024-09-25T22:41:20Zby Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format: Electronic Resources<br/>IBM ProtecTIER implementation and best practices guideent://SD_ILS/0/SD_ILS:23045262024-09-25T22:41:20Z2024-09-25T22:41:20Zby Orlando, Karen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738440027/?ar">https://go.oreilly.com/library-access/library/view/-/0738440027/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738440027/?ar">https://learning.oreilly.com/library/view/~/0738440027/?ar</a><br/>Format: Electronic Resources<br/>Practical Hadoop securityent://SD_ILS/0/SD_ILS:23054222024-09-25T22:41:20Z2024-09-25T22:41:20Zby Lakhe, Bhushan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265450">https://learning.oreilly.com/library/view/~/9781430265450</a>
<a href="https://learning.oreilly.com/library/view/~/9781430265450/?ar">https://learning.oreilly.com/library/view/~/9781430265450/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar</a><br/>Format: Electronic Resources<br/>Integrated Security Systems Design, 2nd Editionent://SD_ILS/0/SD_ILS:23209742024-09-25T22:41:20Z2024-09-25T22:41:20Zby Norman, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000229/?ar">https://learning.oreilly.com/library/view/~/9780128000229/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000229">https://learning.oreilly.com/library/view/~/9780128000229</a><br/>Format: Electronic Resources<br/>Data stewardship : an actionable guide to effective data management and data governanceent://SD_ILS/0/SD_ILS:22065792024-09-25T22:41:20Z2024-09-25T22:41:20Zby Plotkin, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418375">Click to View</a><br/>Format: Electronic Resources<br/>G3P - Good Privacy Protection Practice in Clinical Research : Principles of Pseudonymization and Anonymization.ent://SD_ILS/0/SD_ILS:12718912024-09-25T22:41:20Z2024-09-25T22:41:20Zby Schriever, Karl-Heinz.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1685362">Click to View</a><br/>Format: Electronic Resources<br/>Security leader insights for information protection : lessons and strategies from leading security professionalsent://SD_ILS/0/SD_ILS:22074672024-09-25T22:41:20Z2024-09-25T22:41:20Zby Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699254">Click to View</a><br/>Format: Electronic Resources<br/>Information governance and assurance : reducing risk, promoting policyent://SD_ILS/0/SD_ILS:22357842024-09-25T22:41:20Z2024-09-25T22:41:20Zby Maclennan, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4923765">Click to View</a><br/>Format: Electronic Resources<br/>Information security management handbook . Volume 7ent://SD_ILS/0/SD_ILS:23002992024-09-25T22:41:20Z2024-09-25T22:41:20Zby O'Hanley, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar">https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466567498">https://learning.oreilly.com/library/view/~/9781466567498</a>
<a href="https://learning.oreilly.com/library/view/~/9781466567498/?ar">https://learning.oreilly.com/library/view/~/9781466567498/?ar</a><br/>Format: Electronic Resources<br/>Responsive security : be ready to be secureent://SD_ILS/0/SD_ILS:23006432024-09-25T22:41:20Z2024-09-25T22:41:20Zby Kang, Meng-Chow.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584310/?ar">https://learning.oreilly.com/library/view/~/9781466584310/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar</a><br/>Format: Electronic Resources<br/>Total information risk management : maximizing the value of data and information assetsent://SD_ILS/0/SD_ILS:22998982024-09-25T22:41:20Z2024-09-25T22:41:20Zby Borek, Alexander.<br/><a href="https://learning.oreilly.com/library/view/~/9780124055476/?ar">https://learning.oreilly.com/library/view/~/9780124055476/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar">https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar</a><br/>Format: Electronic Resources<br/>Data stewardship : an actionable guide to effective data management and data governanceent://SD_ILS/0/SD_ILS:23014992024-09-25T22:41:20Z2024-09-25T22:41:20Zby Plotkin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780124103894/?ar">https://learning.oreilly.com/library/view/~/9780124103894/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124103894">https://learning.oreilly.com/library/view/~/9780124103894</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar">https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar</a><br/>Format: Electronic Resources<br/>The privacy engineer's manifesto : getting from policy to code to QA to valueent://SD_ILS/0/SD_ILS:23022962024-09-25T22:41:20Z2024-09-25T22:41:20Zby Dennedy, Michelle Finneran.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263555">https://learning.oreilly.com/library/view/~/9781430263555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430263555/?ar">https://learning.oreilly.com/library/view/~/9781430263555/?ar</a><br/>Format: Electronic Resources<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:23034122024-09-25T22:41:20Z2024-09-25T22:41:20Zby Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format: Electronic Resources<br/>Enterprise architecture and information assurance : developing a secure foundationent://SD_ILS/0/SD_ILS:22992792024-09-25T22:41:20Z2024-09-25T22:41:20Zby Scholz, James A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar">https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439841594/?ar">https://learning.oreilly.com/library/view/~/9781439841594/?ar</a><br/>Format: Electronic Resources<br/>Deployment guide for Infosphere Guardiument://SD_ILS/0/SD_ILS:23040112024-09-25T22:41:20Z2024-09-25T22:41:20Zby Chen, Whei-Jen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738439355/?ar">https://go.oreilly.com/library-access/library/view/-/0738439355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738439355/?ar">https://learning.oreilly.com/library/view/~/0738439355/?ar</a><br/>Format: Electronic Resources<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:23001802024-09-25T22:41:20Z2024-09-25T22:41:20Zby Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format: Electronic Resources<br/>Anti-hacker tool kit.ent://SD_ILS/0/SD_ILS:23036302024-09-25T22:41:20Z2024-09-25T22:41:20Zby Shema, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar">https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071800143/?ar">https://learning.oreilly.com/library/view/~/9780071800143/?ar</a><br/>Format: Electronic Resources<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:23134822024-09-25T22:41:20Z2024-09-25T22:41:20Zby Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format: Electronic Resources<br/>Best Practices for the Formal Software Testing Process : a Menu of Testing Tasksent://SD_ILS/0/SD_ILS:23206912024-09-25T22:41:20Z2024-09-25T22:41:20Zby Drabick, Rodger, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309/?ar">https://learning.oreilly.com/library/view/~/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309">https://learning.oreilly.com/library/view/~/9780133489309</a><br/>Format: Electronic Resources<br/>ISO27001/ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:23107422024-09-25T22:41:20Z2024-09-25T22:41:20Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285247/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285247/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285247/?ar">https://learning.oreilly.com/library/view/~/9781849285247/?ar</a><br/>Format: Electronic Resources<br/>Strategic Information Management, 3rd Editionent://SD_ILS/0/SD_ILS:23199142024-09-25T22:41:20Z2024-09-25T22:41:20Zby Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format: Electronic Resources<br/>Information protection playbookent://SD_ILS/0/SD_ILS:22065832024-09-25T22:41:20Z2024-09-25T22:41:20Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418381">Click to View</a><br/>Format: Electronic Resources<br/>The complete book of data anonymization : from planning to implementationent://SD_ILS/0/SD_ILS:4098302024-09-25T22:41:20Z2024-09-25T22:41:20Zby Raghunathan, Balaji, author.<br/>Format: Books<br/>Getting Started with FortiGate.ent://SD_ILS/0/SD_ILS:12650072024-09-25T22:41:20Z2024-09-25T22:41:20Zby Fabbri, Rosato.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572901">Click to View</a><br/>Format: Electronic Resources<br/>Total Information Risk Management : Maximizing the Value of Data and Information Assets.ent://SD_ILS/0/SD_ILS:12620542024-09-25T22:41:20Z2024-09-25T22:41:20Zby Borek, Alexander.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1386476">Click to View</a><br/>Format: Electronic Resources<br/>IBM InfoSphere : A Platform for Big Data Governance and Process Data Governance.ent://SD_ILS/0/SD_ILS:12906442024-09-25T22:41:20Z2024-09-25T22:41:20Zby Soares, Sunil.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3015277">Click to View</a><br/>Format: Electronic Resources<br/>Oracle Data Guard 11gR2 Administration Beginner's Guide.ent://SD_ILS/0/SD_ILS:12582622024-09-25T22:41:20Z2024-09-25T22:41:20Zby Baransel, Emre.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1192652">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to Cyber-Warfare : A Multidisciplinary Approach.ent://SD_ILS/0/SD_ILS:12534912024-09-25T22:41:20Z2024-09-25T22:41:20Zby Shakarian, Paulo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115159">Click to View</a><br/>Format: Electronic Resources<br/>Information Security Management Principles.ent://SD_ILS/0/SD_ILS:12590732024-09-25T22:41:20Z2024-09-25T22:41:20Zby Alexander, David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1213992">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocolsent://SD_ILS/0/SD_ILS:22060432024-09-25T22:41:20Z2024-09-25T22:41:20Zby Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073014">Click to View</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:21549082024-09-25T22:41:20Z2024-09-25T22:41:20Zby Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463578">Click to View</a><br/>Format: Electronic Resources<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:21549092024-09-25T22:41:20Z2024-09-25T22:41:20Zby Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463579">Click to View</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:21298472024-09-25T22:41:20Z2024-09-25T22:41:20Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1153198">Click to View</a><br/>Format: Electronic Resources<br/>The dark side of personalization online privacy concerns influence customer behaviorent://SD_ILS/0/SD_ILS:22379762024-09-25T22:41:20Z2024-09-25T22:41:20Zby Ziesak, Jörg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1324048">Click to View</a><br/>Format: Electronic Resources<br/>Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this dayent://SD_ILS/0/SD_ILS:22980532024-09-25T22:41:20Z2024-09-25T22:41:20Zby Yerrid, K. C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960/?ar">https://learning.oreilly.com/library/view/~/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960">https://learning.oreilly.com/library/view/~/9781849519960</a><br/>Format: Electronic Resources<br/>Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:22966162024-09-25T22:41:20Z2024-09-25T22:41:20Zby Raggo, Michael T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format: Electronic Resources<br/>Introduction to cyber-warfare : a multidisciplinary approachent://SD_ILS/0/SD_ILS:23001962024-09-25T22:41:20Z2024-09-25T22:41:20Zby Shakarian, Paulo.<br/><a href="https://learning.oreilly.com/library/view/~/9780124078147">https://learning.oreilly.com/library/view/~/9780124078147</a>
<a href="https://learning.oreilly.com/library/view/~/9780124078147/?ar">https://learning.oreilly.com/library/view/~/9780124078147/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar">https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar</a><br/>Format: Electronic Resources<br/>The PayPal official insider guide to internet security : spot scams and protect your online businessent://SD_ILS/0/SD_ILS:22972592024-09-25T22:41:20Z2024-09-25T22:41:20Zby Savage, Michelle.<br/><a href="https://learning.oreilly.com/library/view/~/9780133154573">https://learning.oreilly.com/library/view/~/9780133154573</a>
<a href="https://learning.oreilly.com/library/view/~/9780133154573/?ar">https://learning.oreilly.com/library/view/~/9780133154573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar">https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar</a><br/>Format: Electronic Resources<br/>Oracle Data Guard 11gR2 Administration Beginner's Guide : Learn How to Build and Maintain Data Guard Configurations with Real-Life, Practical Examplesent://SD_ILS/0/SD_ILS:22994492024-09-25T22:41:20Z2024-09-25T22:41:20Zby Baransel, Emre.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849687904/?ar">https://go.oreilly.com/library-access/library/view/-/9781849687904/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849687904/?ar">https://learning.oreilly.com/library/view/~/9781849687904/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849687904">https://learning.oreilly.com/library/view/~/9781849687904</a><br/>Format: Electronic Resources<br/>Information security management principlesent://SD_ILS/0/SD_ILS:22994512024-09-25T22:41:20Z2024-09-25T22:41:20Zby Alexander, David (Information security practitioner)<br/><a href="https://learning.oreilly.com/library/view/~/9781780171753/?ar">https://learning.oreilly.com/library/view/~/9781780171753/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar">https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780171753">https://learning.oreilly.com/library/view/~/9781780171753</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:22979662024-09-25T22:41:20Z2024-09-25T22:41:20Zby Brotby, W. Krag.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881538/?ar">https://learning.oreilly.com/library/view/~/9781439881538/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar</a><br/>Format: Electronic Resources<br/>Surviving the Top Ten Challenges of Software Testing : a People-Oriented Approachent://SD_ILS/0/SD_ILS:23058322024-09-25T22:41:20Z2024-09-25T22:41:20Zby Rice, William E. Perry. Randall W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163">https://learning.oreilly.com/library/view/~/9780133489163</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163/?ar">https://learning.oreilly.com/library/view/~/9780133489163/?ar</a><br/>Format: Electronic Resources<br/>Nine steps to success : an ISO27001:2013 implementation overviewent://SD_ILS/0/SD_ILS:23004362024-09-25T22:41:20Z2024-09-25T22:41:20Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117/?ar">https://learning.oreilly.com/library/view/~/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117">https://learning.oreilly.com/library/view/~/9781849285117</a><br/>Format: Electronic Resources<br/>Cyber security standards, practices and industrial applications systems and methodologiesent://SD_ILS/0/SD_ILS:4763482024-09-25T22:41:20Z2024-09-25T22:41:20Zby Zubairi, Junaid Ahmed, 1961-<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/</a><br/>Format: Electronic Resources<br/>Governance, Risk, and Compliance Handbook for Oracle Applications.ent://SD_ILS/0/SD_ILS:12478132024-09-25T22:41:20Z2024-09-25T22:41:20Zby King, Nigel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1019540">Click to View</a><br/>Format: Electronic Resources<br/>Data Governance : How to Design, Deploy and Sustain an Effective Data Governance Program.ent://SD_ILS/0/SD_ILS:12484912024-09-25T22:41:20Z2024-09-25T22:41:20Zby Ladley, John.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1032951">Click to View</a><br/>Format: Electronic Resources<br/>Death of the Internet.ent://SD_ILS/0/SD_ILS:12392272024-09-25T22:41:20Z2024-09-25T22:41:20Zby Jakobsson, Markus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=848529">Click to View</a><br/>Format: Electronic Resources<br/>IT Governance : An International Guide to Data Security and ISO27001/ISO27002.ent://SD_ILS/0/SD_ILS:12381642024-09-25T22:41:20Z2024-09-25T22:41:20Zby Calder, Alan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=838114">Click to View</a><br/>Format: Electronic Resources<br/>Network Backup with Bacula How-to.ent://SD_ILS/0/SD_ILS:12521662024-09-25T22:41:20Z2024-09-25T22:41:20Zby Pankov, Eugene.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085229">Click to View</a><br/>Format: Electronic Resources<br/>Information Warfare.ent://SD_ILS/0/SD_ILS:12526522024-09-25T22:41:20Z2024-09-25T22:41:20Zby Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106528">Click to View</a><br/>Format: Electronic Resources<br/>Internet and surveillance the challenges of Web 2.0 and social mediaent://SD_ILS/0/SD_ILS:21276242024-09-25T22:41:20Z2024-09-25T22:41:20Zby Fuchs, Christian, 1976-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=981641">Click to View</a><br/>Format: Electronic Resources<br/>The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)ent://SD_ILS/0/SD_ILS:22941702024-09-25T22:41:20Z2024-09-25T22:41:20Zby Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format: Electronic Resources<br/>Getting started with OAuth 2.0ent://SD_ILS/0/SD_ILS:22951502024-09-25T22:41:20Z2024-09-25T22:41:20Zby Boyd, Ryan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449317843/?ar">https://go.oreilly.com/library-access/library/view/-/9781449317843/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449317843">https://learning.oreilly.com/library/view/~/9781449317843</a>
<a href="https://learning.oreilly.com/library/view/~/9781449317843/?ar">https://learning.oreilly.com/library/view/~/9781449317843/?ar</a><br/>Format: Electronic Resources<br/>Once more unto the breach : managing information security in an uncertain worldent://SD_ILS/0/SD_ILS:22980222024-09-25T22:41:20Z2024-09-25T22:41:20Zby Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format: Electronic Resources<br/>Data governance : how to design, deploy and sustain an effective data governance programent://SD_ILS/0/SD_ILS:22954852024-09-25T22:41:20Z2024-09-25T22:41:20Zby Ladley, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124158290/?ar">https://go.oreilly.com/library-access/library/view/-/9780124158290/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124158290/?ar">https://learning.oreilly.com/library/view/~/9780124158290/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124158290">https://learning.oreilly.com/library/view/~/9780124158290</a><br/>Format: Electronic Resources<br/>Internet and surveillance : the challenges of Web 2.0 and social mediaent://SD_ILS/0/SD_ILS:22949962024-09-25T22:41:20Z2024-09-25T22:41:20Zby Fuchs, Christian, 1976-<br/><a href="https://learning.oreilly.com/library/view/~/9780415891608/?ar">https://learning.oreilly.com/library/view/~/9780415891608/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780415891608/?ar">https://go.oreilly.com/library-access/library/view/-/9780415891608/?ar</a><br/>Format: Electronic Resources<br/>Information storage and management : storing, managing, and protecting digital information in classic, virtualized, and cloud environmentsent://SD_ILS/0/SD_ILS:22963502024-09-25T22:41:20Z2024-09-25T22:41:20Zby EMC Corporation.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118236963/?ar">https://go.oreilly.com/library-access/library/view/-/9781118236963/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118236963/?ar">https://learning.oreilly.com/library/view/~/9781118236963/?ar</a><br/>Format: Electronic Resources<br/>Information security management handbook. Volume 5ent://SD_ILS/0/SD_ILS:23031242024-09-25T22:41:20Z2024-09-25T22:41:20Zby Tipton, Harold F.<br/><a href="https://learning.oreilly.com/library/view/~/9781439853467/?ar">https://learning.oreilly.com/library/view/~/9781439853467/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439853467/?ar">https://go.oreilly.com/library-access/library/view/-/9781439853467/?ar</a><br/>Format: Electronic Resources<br/>Analyzing computer security : a threat/vulnerability/countermeasure approachent://SD_ILS/0/SD_ILS:22918062024-09-25T22:41:20Z2024-09-25T22:41:20Zby Pfleeger, Charles P., 1948-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar">https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132789493/?ar">https://learning.oreilly.com/library/view/~/9780132789493/?ar</a><br/>Format: Electronic Resources<br/>IBM System Storage TS7650, TS7650G, and TS7610ent://SD_ILS/0/SD_ILS:23267932024-09-25T22:41:20Z2024-09-25T22:41:20Zby Osuna, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738435848">https://learning.oreilly.com/library/view/~/0738435848</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738435848/?ar">https://go.oreilly.com/library-access/library/view/-/0738435848/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738435848/?ar">https://learning.oreilly.com/library/view/~/0738435848/?ar</a><br/>Format: Electronic Resources<br/>Information Security, Coding Theory and Related Combinatorics : Information Coding and Combinatorics.ent://SD_ILS/0/SD_ILS:12263672024-09-25T22:41:20Z2024-09-25T22:41:20Zby Crnkovic, D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=682727">Click to View</a><br/>Format: Electronic Resources<br/>CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:1403112024-09-25T22:41:20Z2024-09-25T22:41:20Zby Canavan, Tom.<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy1202/2011922796-b.html">http://www.loc.gov/catdir/enhancements/fy1202/2011922796-b.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy1202/2011922796-d.html">http://www.loc.gov/catdir/enhancements/fy1202/2011922796-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy1202/2011922796-t.html">http://www.loc.gov/catdir/enhancements/fy1202/2011922796-t.html</a><br/>Format: Books<br/>Auditing cloud computing a security and privacy guideent://SD_ILS/0/SD_ILS:22697722024-09-25T22:41:20Z2024-09-25T22:41:20Zby Halpert, Ben, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=697627">Click to View</a><br/>Format: Electronic Resources<br/>WordPress 3 Ultimate Security.ent://SD_ILS/0/SD_ILS:12456472024-09-25T22:41:20Z2024-09-25T22:41:20Zby Connelly, Olly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=948509">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Data Protection Manager 2010.ent://SD_ILS/0/SD_ILS:12459022024-09-25T22:41:20Z2024-09-25T22:41:20Zby Buchanan, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=950601">Click to View</a><br/>Format: Electronic Resources<br/>CMS Security Handbook : The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone.ent://SD_ILS/0/SD_ILS:12289172024-09-25T22:41:20Z2024-09-25T22:41:20Zby Canavan, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706893">Click to View</a><br/>Format: Electronic Resources<br/>Use of Risk Analysis in Computer-Aided Persuasion.ent://SD_ILS/0/SD_ILS:12377402024-09-25T22:41:20Z2024-09-25T22:41:20Zby Duman, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=836226">Click to View</a><br/>Format: Electronic Resources<br/>The chief information security officer : insights, tools and survival skillsent://SD_ILS/0/SD_ILS:22913842024-09-25T22:41:20Z2024-09-25T22:41:20Zby Kouns, Barry.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281966">https://learning.oreilly.com/library/view/~/9781849281966</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281966/?ar">https://learning.oreilly.com/library/view/~/9781849281966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar</a><br/>Format: Electronic Resources<br/>The security risk assessment handbook : a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:22916532024-09-25T22:41:20Z2024-09-25T22:41:20Zby Landoll, Douglas J.<br/><a href="https://learning.oreilly.com/library/view/~/9781439821497">https://learning.oreilly.com/library/view/~/9781439821497</a>
<a href="https://learning.oreilly.com/library/view/~/9781439821497/?ar">https://learning.oreilly.com/library/view/~/9781439821497/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar">https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar</a><br/>Format: Electronic Resources<br/>Practical risk management for the CIOent://SD_ILS/0/SD_ILS:22913672024-09-25T22:41:20Z2024-09-25T22:41:20Zby Scherling, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856543/?ar">https://learning.oreilly.com/library/view/~/9781439856543/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856543">https://learning.oreilly.com/library/view/~/9781439856543</a><br/>Format: Electronic Resources<br/>CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:22916612024-09-25T22:41:20Z2024-09-25T22:41:20Zby Canavan, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar">https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216/?ar">https://learning.oreilly.com/library/view/~/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216">https://learning.oreilly.com/library/view/~/9780470916216</a><br/>Format: Electronic Resources<br/>Preventing good people from doing bad things : implementing least privilegeent://SD_ILS/0/SD_ILS:22932782024-09-25T22:41:20Z2024-09-25T22:41:20Zby Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format: Electronic Resources<br/>Expert Oracle and Java security : programming secure Oracle database applications with Javaent://SD_ILS/0/SD_ILS:22932242024-09-25T22:41:20Z2024-09-25T22:41:20Zby Coffin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781430238317">https://learning.oreilly.com/library/view/~/9781430238317</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar">https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430238317/?ar">https://learning.oreilly.com/library/view/~/9781430238317/?ar</a><br/>Format: Electronic Resources<br/>Security de-engineering : solving the problems in information risk managementent://SD_ILS/0/SD_ILS:22959952024-09-25T22:41:20Z2024-09-25T22:41:20Zby Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a>
<a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format: Electronic Resources<br/>Mobile device security for dummiesent://SD_ILS/0/SD_ILS:22935152024-09-25T22:41:20Z2024-09-25T22:41:20Zby Campagna, Rich R.<br/><a href="https://learning.oreilly.com/library/view/~/9781118093801/?ar">https://learning.oreilly.com/library/view/~/9781118093801/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar">https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar</a><br/>Format: Electronic Resources<br/>Privacy and Big Data.ent://SD_ILS/0/SD_ILS:22935542024-09-25T22:41:20Z2024-09-25T22:41:20Zby Craig, Terence.<br/><a href="https://learning.oreilly.com/library/view/~/9781449314842">https://learning.oreilly.com/library/view/~/9781449314842</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781449314842/?ar">https://go.oreilly.com/library-access/library/view/-/9781449314842/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449314842/?ar">https://learning.oreilly.com/library/view/~/9781449314842/?ar</a><br/>Format: Electronic Resources<br/>IBM system storage solutions for smarter systemsent://SD_ILS/0/SD_ILS:22925552024-09-25T22:41:20Z2024-09-25T22:41:20Zby Dufrasne, Bertrand.<br/><a href="https://learning.oreilly.com/library/view/~/073843583X/?ar">https://learning.oreilly.com/library/view/~/073843583X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/073843583X/?ar">https://go.oreilly.com/library-access/library/view/-/073843583X/?ar</a><br/>Format: Electronic Resources<br/>Auditing cloud computing : a security and privacy guideent://SD_ILS/0/SD_ILS:22922552024-09-25T22:41:20Z2024-09-25T22:41:20Zby Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format: Electronic Resources<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:22908842024-09-25T22:41:20Z2024-09-25T22:41:20Zby Wallace, Michael, 1960-<br/><a href="https://learning.oreilly.com/library/view/~/9780814416136/?ar">https://learning.oreilly.com/library/view/~/9780814416136/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar">https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar</a><br/>Format: Electronic Resources<br/>Security strategy : from requirements to realityent://SD_ILS/0/SD_ILS:23216382024-09-25T22:41:20Z2024-09-25T22:41:20Zby Stackpole, Bill. http://viaf.org/viaf/sourceID/LC%7cn2007046244<br/><a href="https://learning.oreilly.com/library/view/~/9781439827345">https://learning.oreilly.com/library/view/~/9781439827345</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar">https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439827345/?ar">https://learning.oreilly.com/library/view/~/9781439827345/?ar</a><br/>Format: Electronic Resources<br/>Information security for managementent://SD_ILS/0/SD_ILS:3092552024-09-25T22:41:20Z2024-09-25T22:41:20Zby Iyengar, Venugopal.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178</a><br/>Format: Electronic Resources<br/>Information security management : concepts and practiceent://SD_ILS/0/SD_ILS:21314412024-09-25T22:41:20Z2024-09-25T22:41:20Zby Raggad, Bel G., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1449482">Click to View</a><br/>Format: Electronic Resources<br/>Information security for managementent://SD_ILS/0/SD_ILS:21013382024-09-25T22:41:20Z2024-09-25T22:41:20Zby Iyengar, Venugopal.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3011230">Click to View</a><br/>Format: Electronic Resources<br/>PCI compliance : understand and implement effective PCI data security standard compliance.ent://SD_ILS/0/SD_ILS:22886412024-09-25T22:41:20Z2024-09-25T22:41:20Zby Chuvakin, Anton.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494991/?ar">https://learning.oreilly.com/library/view/~/9781597494991/?ar</a><br/>Format: Electronic Resources<br/>Network security auditingent://SD_ILS/0/SD_ILS:22894632024-09-25T22:41:20Z2024-09-25T22:41:20Zby Jackson, Chris, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9781587059407">https://learning.oreilly.com/library/view/~/9781587059407</a>
<a href="https://learning.oreilly.com/library/view/~/9781587059407/?ar">https://learning.oreilly.com/library/view/~/9781587059407/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587059407/?ar">https://go.oreilly.com/library-access/library/view/-/9781587059407/?ar</a><br/>Format: Electronic Resources<br/>Managing Information Security Breaches : Studies from Real Life.ent://SD_ILS/0/SD_ILS:22906742024-09-25T22:41:20Z2024-09-25T22:41:20Zby Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format: Electronic Resources<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:22612152024-09-25T22:41:20Z2024-09-25T22:41:20Zby Seigneur, Jean-Marc.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format: Electronic Resources<br/>Surreptitious software : obfuscation, watermarking, and tamperproofing for software protectionent://SD_ILS/0/SD_ILS:22869822024-09-25T22:41:20Z2024-09-25T22:41:20Zby Collberg, Christian.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591258/?ar">https://learning.oreilly.com/library/view/~/9780321591258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar</a><br/>Format: Electronic Resources<br/>The Prompt Payment Act Answer Bookent://SD_ILS/0/SD_ILS:23152632024-09-25T22:41:20Z2024-09-25T22:41:20Zby Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263336">https://learning.oreilly.com/library/view/~/9781567263336</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263336/?ar">https://learning.oreilly.com/library/view/~/9781567263336/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar</a><br/>Format: Electronic Resources<br/>The Antideficiency Act Answer Bookent://SD_ILS/0/SD_ILS:23152732024-09-25T22:41:20Z2024-09-25T22:41:20Zby Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263343/?ar">https://learning.oreilly.com/library/view/~/9781567263343/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263343">https://learning.oreilly.com/library/view/~/9781567263343</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar</a><br/>Format: Electronic Resources<br/>Microsoftent://SD_ILS/0/SD_ILS:23210692024-09-25T22:41:20Z2024-09-25T22:41:20Zby Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format: Electronic Resources<br/>Insider Threat : Combatting the Enemy Within.ent://SD_ILS/0/SD_ILS:12121422024-09-25T22:41:20Z2024-09-25T22:41:20Zby Blackwell, Clive.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=480373">Click to View</a><br/>Format: Electronic Resources<br/>Managing Information Risk : A Director's Guide.ent://SD_ILS/0/SD_ILS:12121512024-09-25T22:41:20Z2024-09-25T22:41:20Zby Mitchell, Stewart.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=480407">Click to View</a><br/>Format: Electronic Resources<br/>Data Governance Imperative.ent://SD_ILS/0/SD_ILS:12121522024-09-25T22:41:20Z2024-09-25T22:41:20Zby Sarsfield, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=480410">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise Information Security and Privacy.ent://SD_ILS/0/SD_ILS:12077182024-09-25T22:41:20Z2024-09-25T22:41:20Zby Axelrod, C. Warren.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456886">Click to View</a><br/>Format: Electronic Resources<br/>Advances in Artificial Intelligence for Privacy Protection and Security.ent://SD_ILS/0/SD_ILS:12707052024-09-25T22:41:20Z2024-09-25T22:41:20Zby Solanas, Agusti.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679374">Click to View</a><br/>Format: Electronic Resources<br/>Information Security for Management.ent://SD_ILS/0/SD_ILS:12896542024-09-25T22:41:20Z2024-09-25T22:41:20Zby Iyengar, Venugopal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3011230">Click to View</a><br/>Format: Electronic Resources<br/>Cyber-security and global information assurance threat analysis and response solutionsent://SD_ILS/0/SD_ILS:22612722024-09-25T22:41:20Z2024-09-25T22:41:20Zby Knapp, Kenneth J.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5</a><br/>Format: Electronic Resources<br/>Definitive Guide to the C&A Transformation Process : The First Publication of a Comprehensive View of the C&A Transformation.ent://SD_ILS/0/SD_ILS:12161552024-09-25T22:41:20Z2024-09-25T22:41:20Zby Mehan, Julie.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=547041">Click to View</a><br/>Format: Electronic Resources<br/>The myths of security : what the computer security industry doesn't want you to knowent://SD_ILS/0/SD_ILS:21065612024-09-25T22:41:20Z2024-09-25T22:41:20Zby Viega, John.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821</a><br/>Format: Electronic Resources<br/>Data leaks for dummiesent://SD_ILS/0/SD_ILS:22887552024-09-25T22:41:20Z2024-09-25T22:41:20Zby Bunker, Guy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470388433">https://learning.oreilly.com/library/view/~/9780470388433</a>
<a href="https://learning.oreilly.com/library/view/~/9780470388433/?ar">https://learning.oreilly.com/library/view/~/9780470388433/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470388433/?ar">https://go.oreilly.com/library-access/library/view/-/9780470388433/?ar</a><br/>Format: Electronic Resources<br/>Oracle data guard 11g handbookent://SD_ILS/0/SD_ILS:22869362024-09-25T22:41:20Z2024-09-25T22:41:20Zby Carpenter, Larry.<br/><a href="https://learning.oreilly.com/library/view/~/9780071621113">https://learning.oreilly.com/library/view/~/9780071621113</a>
<a href="https://learning.oreilly.com/library/view/~/9780071621113/?ar">https://learning.oreilly.com/library/view/~/9780071621113/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071621113/?ar">https://go.oreilly.com/library-access/library/view/-/9780071621113/?ar</a><br/>Format: Electronic Resources<br/>Digital rights management for e-commerce systemsent://SD_ILS/0/SD_ILS:22613192024-09-25T22:41:20Z2024-09-25T22:41:20Zby Tsolis, Dimitrios.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6</a><br/>Format: Electronic Resources<br/>Social implications of data mining and information privacy interdisciplinary frameworks and solutionsent://SD_ILS/0/SD_ILS:22619172024-09-25T22:41:20Z2024-09-25T22:41:20Zby Eyob, Ephrem, 1954-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-196-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-196-4</a><br/>Format: Electronic Resources<br/>Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issuesent://SD_ILS/0/SD_ILS:22619692024-09-25T22:41:20Z2024-09-25T22:41:20Zby Nemati, Hamid R., 1958-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7</a><br/>Format: Electronic Resources<br/>Information storage and management : storing, managing, and protecting digital informationent://SD_ILS/0/SD_ILS:22866292024-09-25T22:41:20Z2024-09-25T22:41:20Zby Somasundaram, G.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470294215/?ar">https://go.oreilly.com/library-access/library/view/-/9780470294215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470294215/?ar">https://learning.oreilly.com/library/view/~/9780470294215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470294215">https://learning.oreilly.com/library/view/~/9780470294215</a><br/>Format: Electronic Resources<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:22866302024-09-25T22:41:20Z2024-09-25T22:41:20Zby Brotby, W. Krag, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar">https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862/?ar">https://learning.oreilly.com/library/view/~/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862">https://learning.oreilly.com/library/view/~/9781420052862</a><br/>Format: Electronic Resources<br/>Multimedia forensics and securityent://SD_ILS/0/SD_ILS:22617922024-09-25T22:41:20Z2024-09-25T22:41:20Zby Li, Chang-Tsun.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-869-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-869-7</a><br/>Format: Electronic Resources<br/>How to secure and audit Oracle 10g and 11gent://SD_ILS/0/SD_ILS:22863242024-09-25T22:41:20Z2024-09-25T22:41:20Zby Ben-Natan, Ron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar">https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139/?ar">https://learning.oreilly.com/library/view/~/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139">https://learning.oreilly.com/library/view/~/9781420084139</a><br/>Format: Electronic Resources<br/>How to survive a data breach : a pocket guideent://SD_ILS/0/SD_ILS:22900792024-09-25T22:41:20Z2024-09-25T22:41:20Zby Mitchell, Stewart.<br/><a href="https://learning.oreilly.com/library/view/~/9781905356966">https://learning.oreilly.com/library/view/~/9781905356966</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356966/?ar">https://learning.oreilly.com/library/view/~/9781905356966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar</a><br/>Format: Electronic Resources<br/>Information security policy, processes, and practicesent://SD_ILS/0/SD_ILS:2930002024-09-25T22:41:20Z2024-09-25T22:41:20Zby Straub, Detmar W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513</a><br/>Format: Electronic Resources<br/>Privacy-Preserving Data Mining Models and Algorithmsent://SD_ILS/0/SD_ILS:5016612024-09-25T22:41:20Z2024-09-25T22:41:20Zby Aggarwal, Charu C. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-70992-5">http://dx.doi.org/10.1007/978-0-387-70992-5</a><br/>Format: Electronic Resources<br/>Security for Telecommunications Networksent://SD_ILS/0/SD_ILS:5016992024-09-25T22:41:20Z2024-09-25T22:41:20Zby Traynor, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>Dependability Metrics Advanced Lecturesent://SD_ILS/0/SD_ILS:5026932024-09-25T22:41:20Z2024-09-25T22:41:20Zby Eusgeld, Irene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68947-8">http://dx.doi.org/10.1007/978-3-540-68947-8</a><br/>Format: Electronic Resources<br/>Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026942024-09-25T22:41:20Z2024-09-25T22:41:20Zby Lipp, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68979-9">http://dx.doi.org/10.1007/978-3-540-68979-9</a><br/>Format: Electronic Resources<br/>