Search Results for - Narrowed by: O'reilly E-Books - COMPUTERS -- Data Processing. - Sécurité informatique.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AOREILLY$002509O$002527reilly$002bE-Books$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bData$002bProcessing.$002509COMPUTERS$002b--$002bData$002bProcessing.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300?2024-06-19T23:31:54ZEnterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threatsent://SD_ILS/0/SD_ILS:23160162024-06-19T23:31:54Z2024-06-19T23:31:54Zby Donaldson, Scott E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232583/?ar">https://learning.oreilly.com/library/view/~/9781484232583/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484232583">https://learning.oreilly.com/library/view/~/9781484232583</a><br/>Format: Electronic Resources<br/>Securing the internet of thingsent://SD_ILS/0/SD_ILS:23123482024-06-19T23:31:54Z2024-06-19T23:31:54Zby Li, Shancang, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045053">https://learning.oreilly.com/library/view/~/9780128045053</a>
<a href="https://learning.oreilly.com/library/view/~/9780128045053/?ar">https://learning.oreilly.com/library/view/~/9780128045053/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar</a><br/>Format: Electronic Resources<br/>Incident management for operationsent://SD_ILS/0/SD_ILS:23135452024-06-19T23:31:54Z2024-06-19T23:31:54Zby Schnepp, Rob, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491917619/?ar">https://learning.oreilly.com/library/view/~/9781491917619/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar">https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491917619">https://learning.oreilly.com/library/view/~/9781491917619</a><br/>Format: Electronic Resources<br/>Die Kunst der Anonymität im Internet : so schützen Sie Ihre Identität und Ihre Datenent://SD_ILS/0/SD_ILS:23150112024-06-19T23:31:54Z2024-06-19T23:31:54Zby Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format: Electronic Resources<br/>Cyber security : a practitioner's guideent://SD_ILS/0/SD_ILS:23137632024-06-19T23:31:54Z2024-06-19T23:31:54Zby Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format: Electronic Resources<br/>A study of black hole attack solutions : on AODV routing protocol in MANETent://SD_ILS/0/SD_ILS:23090382024-06-19T23:31:54Z2024-06-19T23:31:54Zby Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format: Electronic Resources<br/>CSA guide to cloud computing : implementing cloud privacy and securityent://SD_ILS/0/SD_ILS:23047762024-06-19T23:31:54Z2024-06-19T23:31:54Zby Samani, Raj, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar">https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124201255/?ar">https://learning.oreilly.com/library/view/~/9780124201255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124201255">https://learning.oreilly.com/library/view/~/9780124201255</a><br/>Format: Electronic Resources<br/>The basics of IT audit : Purposes, processes, and practical information.ent://SD_ILS/0/SD_ILS:23015012024-06-19T23:31:54Z2024-06-19T23:31:54Zby Gantz, Stephen D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596/?ar">https://learning.oreilly.com/library/view/~/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596">https://learning.oreilly.com/library/view/~/9780124171596</a><br/>Format: Electronic Resources<br/>Oracle 11g Anti-hacker's Cookbook.ent://SD_ILS/0/SD_ILS:22965542024-06-19T23:31:54Z2024-06-19T23:31:54Zby Neagu, Adrian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849685269/?ar">https://go.oreilly.com/library-access/library/view/-/9781849685269/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849685269/?ar">https://learning.oreilly.com/library/view/~/9781849685269/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849685269">https://learning.oreilly.com/library/view/~/9781849685269</a><br/>Format: Electronic Resources<br/>