Search Results for - Narrowed by: IYTE Library - 2009 - Data protection.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLIBRARY$002509Library$0025091$00253AIYTE$002509IYTE$002bLibrary$0026qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?2024-09-25T15:06:05ZSurreptitious software : obfuscation, watermarking, and tamperproofing for software protectionent://SD_ILS/0/SD_ILS:22869822024-09-25T15:06:05Z2024-09-25T15:06:05Zby Collberg, Christian.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591258/?ar">https://learning.oreilly.com/library/view/~/9780321591258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar</a><br/>Format: Electronic Resources<br/>The Prompt Payment Act Answer Bookent://SD_ILS/0/SD_ILS:23152632024-09-25T15:06:05Z2024-09-25T15:06:05Zby Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263336">https://learning.oreilly.com/library/view/~/9781567263336</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263336/?ar">https://learning.oreilly.com/library/view/~/9781567263336/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar</a><br/>Format: Electronic Resources<br/>The Antideficiency Act Answer Bookent://SD_ILS/0/SD_ILS:23152732024-09-25T15:06:05Z2024-09-25T15:06:05Zby Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263343/?ar">https://learning.oreilly.com/library/view/~/9781567263343/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263343">https://learning.oreilly.com/library/view/~/9781567263343</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar</a><br/>Format: Electronic Resources<br/>Microsoftent://SD_ILS/0/SD_ILS:23210692024-09-25T15:06:05Z2024-09-25T15:06:05Zby Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format: Electronic Resources<br/>Insider Threat : Combatting the Enemy Within.ent://SD_ILS/0/SD_ILS:12121422024-09-25T15:06:05Z2024-09-25T15:06:05Zby Blackwell, Clive.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=480373">Click to View</a><br/>Format: Electronic Resources<br/>Managing Information Risk : A Director's Guide.ent://SD_ILS/0/SD_ILS:12121512024-09-25T15:06:05Z2024-09-25T15:06:05Zby Mitchell, Stewart.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=480407">Click to View</a><br/>Format: Electronic Resources<br/>Data Governance Imperative.ent://SD_ILS/0/SD_ILS:12121522024-09-25T15:06:05Z2024-09-25T15:06:05Zby Sarsfield, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=480410">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise Information Security and Privacy.ent://SD_ILS/0/SD_ILS:12077182024-09-25T15:06:05Z2024-09-25T15:06:05Zby Axelrod, C. Warren.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456886">Click to View</a><br/>Format: Electronic Resources<br/>Advances in Artificial Intelligence for Privacy Protection and Security.ent://SD_ILS/0/SD_ILS:12707052024-09-25T15:06:05Z2024-09-25T15:06:05Zby Solanas, Agusti.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679374">Click to View</a><br/>Format: Electronic Resources<br/>Information Security for Management.ent://SD_ILS/0/SD_ILS:12896542024-09-25T15:06:05Z2024-09-25T15:06:05Zby Iyengar, Venugopal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3011230">Click to View</a><br/>Format: Electronic Resources<br/>Cyber-security and global information assurance threat analysis and response solutionsent://SD_ILS/0/SD_ILS:22612722024-09-25T15:06:05Z2024-09-25T15:06:05Zby Knapp, Kenneth J.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5</a><br/>Format: Electronic Resources<br/>Definitive Guide to the C&A Transformation Process : The First Publication of a Comprehensive View of the C&A Transformation.ent://SD_ILS/0/SD_ILS:12161552024-09-25T15:06:05Z2024-09-25T15:06:05Zby Mehan, Julie.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=547041">Click to View</a><br/>Format: Electronic Resources<br/>The myths of security : what the computer security industry doesn't want you to knowent://SD_ILS/0/SD_ILS:21065612024-09-25T15:06:05Z2024-09-25T15:06:05Zby Viega, John.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821</a><br/>Format: Electronic Resources<br/>Data leaks for dummiesent://SD_ILS/0/SD_ILS:22887552024-09-25T15:06:05Z2024-09-25T15:06:05Zby Bunker, Guy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470388433">https://learning.oreilly.com/library/view/~/9780470388433</a>
<a href="https://learning.oreilly.com/library/view/~/9780470388433/?ar">https://learning.oreilly.com/library/view/~/9780470388433/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470388433/?ar">https://go.oreilly.com/library-access/library/view/-/9780470388433/?ar</a><br/>Format: Electronic Resources<br/>Oracle data guard 11g handbookent://SD_ILS/0/SD_ILS:22869362024-09-25T15:06:05Z2024-09-25T15:06:05Zby Carpenter, Larry.<br/><a href="https://learning.oreilly.com/library/view/~/9780071621113">https://learning.oreilly.com/library/view/~/9780071621113</a>
<a href="https://learning.oreilly.com/library/view/~/9780071621113/?ar">https://learning.oreilly.com/library/view/~/9780071621113/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071621113/?ar">https://go.oreilly.com/library-access/library/view/-/9780071621113/?ar</a><br/>Format: Electronic Resources<br/>Digital rights management for e-commerce systemsent://SD_ILS/0/SD_ILS:22613192024-09-25T15:06:05Z2024-09-25T15:06:05Zby Tsolis, Dimitrios.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6</a><br/>Format: Electronic Resources<br/>Social implications of data mining and information privacy interdisciplinary frameworks and solutionsent://SD_ILS/0/SD_ILS:22619172024-09-25T15:06:05Z2024-09-25T15:06:05Zby Eyob, Ephrem, 1954-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-196-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-196-4</a><br/>Format: Electronic Resources<br/>Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issuesent://SD_ILS/0/SD_ILS:22619692024-09-25T15:06:05Z2024-09-25T15:06:05Zby Nemati, Hamid R., 1958-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7</a><br/>Format: Electronic Resources<br/>Information storage and management : storing, managing, and protecting digital informationent://SD_ILS/0/SD_ILS:22866292024-09-25T15:06:05Z2024-09-25T15:06:05Zby Somasundaram, G.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470294215/?ar">https://go.oreilly.com/library-access/library/view/-/9780470294215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470294215/?ar">https://learning.oreilly.com/library/view/~/9780470294215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470294215">https://learning.oreilly.com/library/view/~/9780470294215</a><br/>Format: Electronic Resources<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:22866302024-09-25T15:06:05Z2024-09-25T15:06:05Zby Brotby, W. Krag, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar">https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862/?ar">https://learning.oreilly.com/library/view/~/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862">https://learning.oreilly.com/library/view/~/9781420052862</a><br/>Format: Electronic Resources<br/>Multimedia forensics and securityent://SD_ILS/0/SD_ILS:22617922024-09-25T15:06:05Z2024-09-25T15:06:05Zby Li, Chang-Tsun.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-869-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-869-7</a><br/>Format: Electronic Resources<br/>How to secure and audit Oracle 10g and 11gent://SD_ILS/0/SD_ILS:22863242024-09-25T15:06:05Z2024-09-25T15:06:05Zby Ben-Natan, Ron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar">https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139/?ar">https://learning.oreilly.com/library/view/~/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139">https://learning.oreilly.com/library/view/~/9781420084139</a><br/>Format: Electronic Resources<br/>How to survive a data breach : a pocket guideent://SD_ILS/0/SD_ILS:22900792024-09-25T15:06:05Z2024-09-25T15:06:05Zby Mitchell, Stewart.<br/><a href="https://learning.oreilly.com/library/view/~/9781905356966">https://learning.oreilly.com/library/view/~/9781905356966</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356966/?ar">https://learning.oreilly.com/library/view/~/9781905356966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar</a><br/>Format: Electronic Resources<br/>