Search Results for - Narrowed by: O'reilly E-Books - S&eacute;curit&eacute; informatique. - United States. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AOREILLY$002509O$002527reilly$002bE-Books$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509United$002bStates.$002509United$002bStates.$0026ps$003d300? 2024-06-25T12:51:59Z Healthcare fraud : auditing and detection guide ent://SD_ILS/0/SD_ILS:2294132 2024-06-25T12:51:59Z 2024-06-25T12:51:59Z by&#160;Busch, Rebecca S.<br/><a href="https://learning.oreilly.com/library/view/~/9781118240250/?ar">https://learning.oreilly.com/library/view/~/9781118240250/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118240250/?ar">https://go.oreilly.com/library-access/library/view/-/9781118240250/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118240250">https://learning.oreilly.com/library/view/~/9781118240250</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit ent://SD_ILS/0/SD_ILS:2295823 2024-06-25T12:51:59Z 2024-06-25T12:51:59Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format:&#160;Electronic Resources<br/> Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection ent://SD_ILS/0/SD_ILS:2286982 2024-06-25T12:51:59Z 2024-06-25T12:51:59Z by&#160;Collberg, Christian.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591258/?ar">https://learning.oreilly.com/library/view/~/9780321591258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar</a><br/>Format:&#160;Electronic Resources<br/> Geekonomics : the real cost of insecure software ent://SD_ILS/0/SD_ILS:2284350 2024-06-25T12:51:59Z 2024-06-25T12:51:59Z by&#160;Rice, David, 1971-<br/><a href="https://learning.oreilly.com/library/view/~/9780321477897/?ar">https://learning.oreilly.com/library/view/~/9780321477897/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321477897/?ar">https://go.oreilly.com/library-access/library/view/-/9780321477897/?ar</a><br/>Format:&#160;Electronic Resources<br/> The business case for network security : advocacy, governance, and ROI ent://SD_ILS/0/SD_ILS:2281646 2024-06-25T12:51:59Z 2024-06-25T12:51:59Z by&#160;Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587201216/?ar">https://go.oreilly.com/library-access/library/view/-/1587201216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587201216/?ar">https://learning.oreilly.com/library/view/~/1587201216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587201216">https://learning.oreilly.com/library/view/~/1587201216</a><br/>Format:&#160;Electronic Resources<br/>