Search Results for - Narrowed by: IYTE Library - 2017 - Data protection.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLIBRARY$002509Library$0025091$00253AIYTE$002509IYTE$002bLibrary$0026qf$003dPUBDATE$002509Publication$002bDate$0025092017$0025092017$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?2024-06-24T01:53:24ZData hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:22107202024-06-24T01:53:24Z2024-06-24T01:53:24Zby Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4676113">Click to View</a><br/>Format: Electronic Resources<br/>Big data e privacy by design : anonimizzazione pseudonimizzazione sicurezzaent://SD_ILS/0/SD_ILS:21212652024-06-24T01:53:24Z2024-06-24T01:53:24Zby D'Acquisto, Giuseppe, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4818389">Click to View</a><br/>Format: Electronic Resources<br/>ISO 37001 : an introduction to anti-bribery management systems : doing the right thingsent://SD_ILS/0/SD_ILS:21122852024-06-24T01:53:24Z2024-06-24T01:53:24Zby Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5211339">Click to View</a><br/>Format: Electronic Resources<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:22112802024-06-24T01:53:24Z2024-06-24T01:53:24Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4743573">Click to View</a><br/>Format: Electronic Resources<br/>OAuth 2 in actionent://SD_ILS/0/SD_ILS:23131852024-06-24T01:53:24Z2024-06-24T01:53:24Zby Richer, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617293276/?ar">https://go.oreilly.com/library-access/library/view/-/9781617293276/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617293276">https://learning.oreilly.com/library/view/~/9781617293276</a>
<a href="https://learning.oreilly.com/library/view/~/9781617293276/?ar">https://learning.oreilly.com/library/view/~/9781617293276/?ar</a><br/>Format: Electronic Resources<br/>Die Kunst der Anonymität im Internet : so schützen Sie Ihre Identität und Ihre Datenent://SD_ILS/0/SD_ILS:23150112024-06-24T01:53:24Z2024-06-24T01:53:24Zby Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format: Electronic Resources<br/>ISO 37001 : an Introduction to Anti-Bribery Management Systems.ent://SD_ILS/0/SD_ILS:23150202024-06-24T01:53:24Z2024-06-24T01:53:24Zby Field, Alan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559">https://learning.oreilly.com/library/view/~/9781849289559</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559/?ar">https://learning.oreilly.com/library/view/~/9781849289559/?ar</a><br/>Format: Electronic Resources<br/>Distributed Networksent://SD_ILS/0/SD_ILS:23199072024-06-24T01:53:24Z2024-06-24T01:53:24Zby Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format: Electronic Resources<br/>Mastering Active Directory : automate tasks by leveraging PowerShell for Active Directory Domain Services 2016ent://SD_ILS/0/SD_ILS:23138092024-06-24T01:53:24Z2024-06-24T01:53:24Zby Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787289352">https://learning.oreilly.com/library/view/~/9781787289352</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar">https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787289352/?ar">https://learning.oreilly.com/library/view/~/9781787289352/?ar</a><br/>Format: Electronic Resources<br/>Data hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:23116292024-06-24T01:53:24Z2024-06-24T01:53:24Zby Hassan, Nihad Ahmad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128044964/?ar">https://learning.oreilly.com/library/view/~/9780128044964/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128044964/?ar">https://go.oreilly.com/library-access/library/view/-/9780128044964/?ar</a><br/>Format: Electronic Resources<br/>Versteckte Botschaften : die faszinierende Geschichte der Steganografieent://SD_ILS/0/SD_ILS:23146762024-06-24T01:53:24Z2024-06-24T01:53:24Zby Schmeh, Klaus, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492064855">https://learning.oreilly.com/library/view/~/9781492064855</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar">https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492064855/?ar">https://learning.oreilly.com/library/view/~/9781492064855/?ar</a><br/>Format: Electronic Resources<br/>Guide: Reporting on an Entity's Cyberse.ent://SD_ILS/0/SD_ILS:23167562024-06-24T01:53:24Z2024-06-24T01:53:24Zby AICPA Staff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781943546725/?ar">https://learning.oreilly.com/library/view/~/9781943546725/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar">https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781943546725">https://learning.oreilly.com/library/view/~/9781943546725</a><br/>Format: Electronic Resources<br/>Cloud computing security : foundations and challengesent://SD_ILS/0/SD_ILS:23115242024-06-24T01:53:24Z2024-06-24T01:53:24Zby Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format: Electronic Resources<br/>