Search Results for - Narrowed by: 2015 - Data protection.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092015$0025092015$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?2024-06-26T23:30:18ZMastering Python forensics : master the art of digital forensics and analysis with Pythonent://SD_ILS/0/SD_ILS:22194612024-06-26T23:30:18Z2024-06-26T23:30:18Zby Spreitzenbarth, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191124">Click to View</a><br/>Format: Electronic Resources<br/>Measuring and managing information risk : a FAIR approachent://SD_ILS/0/SD_ILS:22078292024-06-26T23:30:18Z2024-06-26T23:30:18Zby Freund, Jack, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1772300">Click to View</a><br/>Format: Electronic Resources<br/>Technology Disaster Response and Recovery Planning : A LITA Guide.ent://SD_ILS/0/SD_ILS:12853712024-06-26T23:30:18Z2024-06-26T23:30:18Zby Mallery, Mary.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2068199">Click to View</a><br/>Format: Electronic Resources<br/>Application of big data for national security : a practitioner's guide to emerging technologiesent://SD_ILS/0/SD_ILS:22084662024-06-26T23:30:18Z2024-06-26T23:30:18Zby Akhgar, Babak, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1962519">Click to View</a><br/>Format: Electronic Resources<br/>Digital identity managementent://SD_ILS/0/SD_ILS:22085742024-06-26T23:30:18Z2024-06-26T23:30:18Zby Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2007485">Click to View</a><br/>Format: Electronic Resources<br/>Cloud storage security : a practical guideent://SD_ILS/0/SD_ILS:22088522024-06-26T23:30:18Z2024-06-26T23:30:18Zby Wheeler, Aaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2084976">Click to View</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:23088472024-06-26T23:30:18Z2024-06-26T23:30:18Zby Ticher, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287135/?ar">https://learning.oreilly.com/library/view/~/9781849287135/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar</a><br/>Format: Electronic Resources<br/>Mastering Python forensics : master the art of digital forensics and analysis with Pythonent://SD_ILS/0/SD_ILS:23092272024-06-26T23:30:18Z2024-06-26T23:30:18Zby Spreitzenbarth, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783988044/?ar">https://learning.oreilly.com/library/view/~/9781783988044/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar">https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783988044">https://learning.oreilly.com/library/view/~/9781783988044</a><br/>Format: Electronic Resources<br/>Multi-domain master data management : advanced MDM and data governance in practiceent://SD_ILS/0/SD_ILS:23067012024-06-26T23:30:18Z2024-06-26T23:30:18Zby Allen, Mark, 1953- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008355/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008355/?ar">https://learning.oreilly.com/library/view/~/9780128008355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008355">https://learning.oreilly.com/library/view/~/9780128008355</a><br/>Format: Electronic Resources<br/>Introduction to information security : LiveLessons (Sneak Peek Video Training)ent://SD_ILS/0/SD_ILS:23063462024-06-26T23:30:18Z2024-06-26T23:30:18Zby Aurnou, Scott, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar">https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134135823/?ar">https://learning.oreilly.com/videos/~/9780134135823/?ar</a><br/>Format: Electronic Resources<br/>Implementing high availability and disaster recovery in IBM PureApplication Systems V2ent://SD_ILS/0/SD_ILS:23064692024-06-26T23:30:18Z2024-06-26T23:30:18Zby Gadepalli, Venkata, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738440337">https://learning.oreilly.com/library/view/~/0738440337</a>
<a href="https://learning.oreilly.com/library/view/~/0738440337/?ar">https://learning.oreilly.com/library/view/~/0738440337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738440337/?ar">https://go.oreilly.com/library-access/library/view/-/0738440337/?ar</a><br/>Format: Electronic Resources<br/>Security, privacy, and governance : protecting data, and using data to protect systemsent://SD_ILS/0/SD_ILS:23077562024-06-26T23:30:18Z2024-06-26T23:30:18Zby Lorica, Ben, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar">https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491931042/?ar">https://learning.oreilly.com/videos/~/9781491931042/?ar</a><br/>Format: Electronic Resources<br/>Information assurance handbook : effective computer security and risk management strategiesent://SD_ILS/0/SD_ILS:23048752024-06-26T23:30:18Z2024-06-26T23:30:18Zby Schou, Corey.<br/><a href="https://learning.oreilly.com/library/view/~/9780071821650">https://learning.oreilly.com/library/view/~/9780071821650</a>
<a href="https://learning.oreilly.com/library/view/~/9780071821650/?ar">https://learning.oreilly.com/library/view/~/9780071821650/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar">https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar</a><br/>Format: Electronic Resources<br/>Measuring and managing information risk : a FAIR approachent://SD_ILS/0/SD_ILS:23042452024-06-26T23:30:18Z2024-06-26T23:30:18Zby Freund, Jack, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar">https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124202313/?ar">https://learning.oreilly.com/library/view/~/9780124202313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124202313">https://learning.oreilly.com/library/view/~/9780124202313</a><br/>Format: Electronic Resources<br/>The cloud security ecosystem : technical, legal, business and management issuesent://SD_ILS/0/SD_ILS:23076492024-06-26T23:30:18Z2024-06-26T23:30:18Zby Ko, Ryan, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar">https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128017807/?ar">https://learning.oreilly.com/library/view/~/9780128017807/?ar</a><br/>Format: Electronic Resources<br/>Hadoop securityent://SD_ILS/0/SD_ILS:23077732024-06-26T23:30:18Z2024-06-26T23:30:18Zby Spivey, Ben, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar">https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491900970/?ar">https://learning.oreilly.com/library/view/~/9781491900970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491900970">https://learning.oreilly.com/library/view/~/9781491900970</a><br/>Format: Electronic Resources<br/>IT-Sicherheit im Unternehmenent://SD_ILS/0/SD_ILS:23083242024-06-26T23:30:18Z2024-06-26T23:30:18Zby Harich, Thomas W., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958451285/?ar">https://learning.oreilly.com/library/view/~/9783958451285/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958451285">https://learning.oreilly.com/library/view/~/9783958451285</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar">https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar</a><br/>Format: Electronic Resources<br/>Cloud storage security : a practical guideent://SD_ILS/0/SD_ILS:23079352024-06-26T23:30:18Z2024-06-26T23:30:18Zby Wheeler, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029312/?ar">https://learning.oreilly.com/library/view/~/9780128029312/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar</a><br/>Format: Electronic Resources<br/>Learning to love data science : explorations of emerging technologies and platforms for predictive analytics, machine learning, digital manufacturing, and supply chain optimizationent://SD_ILS/0/SD_ILS:23089132024-06-26T23:30:18Z2024-06-26T23:30:18Zby Barlow, Mike (Michael Alan), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491936573">https://learning.oreilly.com/library/view/~/9781491936573</a>
<a href="https://learning.oreilly.com/library/view/~/9781491936573/?ar">https://learning.oreilly.com/library/view/~/9781491936573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491936573/?ar">https://go.oreilly.com/library-access/library/view/-/9781491936573/?ar</a><br/>Format: Electronic Resources<br/>Mastering OAuth 2.0 : create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Frameworkent://SD_ILS/0/SD_ILS:23095472024-06-26T23:30:18Z2024-06-26T23:30:18Zby Bihis, Charles, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784395407/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395407/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784395407">https://learning.oreilly.com/library/view/~/9781784395407</a>
<a href="https://learning.oreilly.com/library/view/~/9781784395407/?ar">https://learning.oreilly.com/library/view/~/9781784395407/?ar</a><br/>Format: Electronic Resources<br/>Sharing big data safely : managing data securityent://SD_ILS/0/SD_ILS:23092452024-06-26T23:30:18Z2024-06-26T23:30:18Zby Dunning, Ted, 1956- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491953624/?ar">https://go.oreilly.com/library-access/library/view/-/9781491953624/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491953624/?ar">https://learning.oreilly.com/library/view/~/9781491953624/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491953624">https://learning.oreilly.com/library/view/~/9781491953624</a><br/>Format: Electronic Resources<br/>Application of big data for national security : a practitioner's guide to emerging technologiesent://SD_ILS/0/SD_ILS:23062322024-06-26T23:30:18Z2024-06-26T23:30:18Zby Akhgar, Babak, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128019672/?ar">https://learning.oreilly.com/library/view/~/9780128019672/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128019672/?ar">https://go.oreilly.com/library-access/library/view/-/9780128019672/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128019672">https://learning.oreilly.com/library/view/~/9780128019672</a><br/>Format: Electronic Resources<br/>Security in computingent://SD_ILS/0/SD_ILS:23058972024-06-26T23:30:18Z2024-06-26T23:30:18Zby Pfleeger, Charles P., 1948- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134085074/?ar">https://learning.oreilly.com/library/view/~/9780134085074/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar">https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar</a><br/>Format: Electronic Resources<br/>Risk centric threat modeling : process for attack simulation and threat analysisent://SD_ILS/0/SD_ILS:23087922024-06-26T23:30:18Z2024-06-26T23:30:18Zby Uceda Vélez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:21553202024-06-26T23:30:18Z2024-06-26T23:30:18Zby Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192125">Click to View</a><br/>Format: Electronic Resources<br/>Digital privacy in the marketplace : perspectives on the information exchangeent://SD_ILS/0/SD_ILS:20561852024-06-26T23:30:18Z2024-06-26T23:30:18Zby Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1920895">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft system center data protection manager 2012 R2 cookbook : over 100 recipes to build your own designs exploring the advanced functionality and features of system center DPM 2012 R2ent://SD_ILS/0/SD_ILS:22383532024-06-26T23:30:18Z2024-06-26T23:30:18Zby Hedblom, Robert, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2040609">Click to View</a><br/>Format: Electronic Resources<br/>