Search Results for - Narrowed by: Information technology -- Security measures. - Protection de l'information (Informatique)
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Information$002btechnology$002b--$002bSecurity$002bmeasures.$002509Information$002btechnology$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Protection$002bde$002bl$002527information$002b$002528Informatique$002529$002509Protection$002bde$002bl$002527information$002b$002528Informatique$002529$0026ps$003d300?
2024-09-26T12:37:40Z
Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000
ent://SD_ILS/0/SD_ILS:2332067
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by International Business Machines Corporation, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406/?ar">https://learning.oreilly.com/library/view/~/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406">https://learning.oreilly.com/library/view/~/9780738460406</a><br/>Format: Electronic Resources<br/>
Secure operations and protections
ent://SD_ILS/0/SD_ILS:2332092
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format: Video recording<br/>
Protecting Data Privacy Beyond the Trusted System of Record
ent://SD_ILS/0/SD_ILS:2323918
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format: Electronic Resources<br/>
Privileged attack vectors : building effective cyber-defense strategies to protect organizations
ent://SD_ILS/0/SD_ILS:2324664
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146/?ar">https://learning.oreilly.com/library/view/~/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146">https://learning.oreilly.com/library/view/~/9781484259146</a><br/>Format: Electronic Resources<br/>
The Board's Role in Managing Cybersecurity Risks
ent://SD_ILS/0/SD_ILS:2320749
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Rothrock, Ray, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221/?ar">https://learning.oreilly.com/library/view/~/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221">https://learning.oreilly.com/library/view/~/53863MIT59221</a><br/>Format: Electronic Resources<br/>
IBM QRadar Version 7.3 : planning and installation guide
ent://SD_ILS/0/SD_ILS:2315474
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Carabaguiaz, Elias, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442877/?ar">https://learning.oreilly.com/library/view/~/9780738442877/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar</a><br/>Format: Electronic Resources<br/>
Take Control of 1Password, 4th Edition
ent://SD_ILS/0/SD_ILS:2319474
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format: Electronic Resources<br/>
Privileged attack vectors : building effective cyber-defense strategies to protect organizations
ent://SD_ILS/0/SD_ILS:2314870
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format: Electronic Resources<br/>
IT-Sicherheitsmanagement - Praxiswissen für IT Security Manager, 2. Auflage
ent://SD_ILS/0/SD_ILS:2320105
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Harich, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9783958452756/?ar">https://learning.oreilly.com/library/view/~/9783958452756/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452756">https://learning.oreilly.com/library/view/~/9783958452756</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar</a><br/>Format: Electronic Resources<br/>
Investigating the Cyber Breach : the digital forensics guide for the network engineer
ent://SD_ILS/0/SD_ILS:2315345
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar">https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134755885/?ar">https://learning.oreilly.com/library/view/~/9780134755885/?ar</a><br/>Format: Electronic Resources<br/>
Distributed Networks
ent://SD_ILS/0/SD_ILS:2319907
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format: Electronic Resources<br/>
ISO 37001 : an Introduction to Anti-Bribery Management Systems.
ent://SD_ILS/0/SD_ILS:2315020
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Field, Alan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559">https://learning.oreilly.com/library/view/~/9781849289559</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559/?ar">https://learning.oreilly.com/library/view/~/9781849289559/?ar</a><br/>Format: Electronic Resources<br/>
Guide: Reporting on an Entity's Cyberse.
ent://SD_ILS/0/SD_ILS:2316756
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by AICPA Staff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781943546725/?ar">https://learning.oreilly.com/library/view/~/9781943546725/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar">https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781943546725">https://learning.oreilly.com/library/view/~/9781943546725</a><br/>Format: Electronic Resources<br/>
The cloud security ecosystem : technical, legal, business and management issues
ent://SD_ILS/0/SD_ILS:2307649
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Ko, Ryan, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar">https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128017807/?ar">https://learning.oreilly.com/library/view/~/9780128017807/?ar</a><br/>Format: Electronic Resources<br/>
IT-Sicherheit im Unternehmen
ent://SD_ILS/0/SD_ILS:2308324
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Harich, Thomas W., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958451285/?ar">https://learning.oreilly.com/library/view/~/9783958451285/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958451285">https://learning.oreilly.com/library/view/~/9783958451285</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar">https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar</a><br/>Format: Electronic Resources<br/>
Total information risk management : maximizing the value of data and information assets
ent://SD_ILS/0/SD_ILS:2299898
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Borek, Alexander.<br/><a href="https://learning.oreilly.com/library/view/~/9780124055476/?ar">https://learning.oreilly.com/library/view/~/9780124055476/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar">https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar</a><br/>Format: Electronic Resources<br/>
Integrated Security Systems Design, 2nd Edition
ent://SD_ILS/0/SD_ILS:2320974
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Norman, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000229/?ar">https://learning.oreilly.com/library/view/~/9780128000229/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000229">https://learning.oreilly.com/library/view/~/9780128000229</a><br/>Format: Electronic Resources<br/>
Responsive security : be ready to be secure
ent://SD_ILS/0/SD_ILS:2300643
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Kang, Meng-Chow.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584310/?ar">https://learning.oreilly.com/library/view/~/9781466584310/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar</a><br/>Format: Electronic Resources<br/>
Data stewardship : an actionable guide to effective data management and data governance
ent://SD_ILS/0/SD_ILS:2301499
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Plotkin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780124103894/?ar">https://learning.oreilly.com/library/view/~/9780124103894/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124103894">https://learning.oreilly.com/library/view/~/9780124103894</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar">https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar</a><br/>Format: Electronic Resources<br/>
Information security : principles and practices
ent://SD_ILS/0/SD_ILS:2303412
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format: Electronic Resources<br/>
The Science and Technology of Counterterrorism
ent://SD_ILS/0/SD_ILS:2319961
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Young, Carl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562">https://learning.oreilly.com/library/view/~/9780124200562</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562/?ar">https://learning.oreilly.com/library/view/~/9780124200562/?ar</a><br/>Format: Electronic Resources<br/>
Surviving the Top Ten Challenges of Software Testing : a People-Oriented Approach
ent://SD_ILS/0/SD_ILS:2305832
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Rice, William E. Perry. Randall W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163">https://learning.oreilly.com/library/view/~/9780133489163</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163/?ar">https://learning.oreilly.com/library/view/~/9780133489163/?ar</a><br/>Format: Electronic Resources<br/>
Strategic Information Management, 3rd Edition
ent://SD_ILS/0/SD_ILS:2319914
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format: Electronic Resources<br/>
Best Practices for the Formal Software Testing Process : a Menu of Testing Tasks
ent://SD_ILS/0/SD_ILS:2320691
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Drabick, Rodger, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309/?ar">https://learning.oreilly.com/library/view/~/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309">https://learning.oreilly.com/library/view/~/9780133489309</a><br/>Format: Electronic Resources<br/>
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
ent://SD_ILS/0/SD_ILS:2294170
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format: Electronic Resources<br/>
Once more unto the breach : managing information security in an uncertain world
ent://SD_ILS/0/SD_ILS:2298022
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format: Electronic Resources<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:2295995
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a>
<a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format: Electronic Resources<br/>
Practical risk management for the CIO
ent://SD_ILS/0/SD_ILS:2291367
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Scherling, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856543/?ar">https://learning.oreilly.com/library/view/~/9781439856543/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856543">https://learning.oreilly.com/library/view/~/9781439856543</a><br/>Format: Electronic Resources<br/>
Auditing cloud computing : a security and privacy guide
ent://SD_ILS/0/SD_ILS:2292255
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format: Electronic Resources<br/>
Information security management metrics : a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:2286630
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Brotby, W. Krag, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar">https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862/?ar">https://learning.oreilly.com/library/view/~/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862">https://learning.oreilly.com/library/view/~/9781420052862</a><br/>Format: Electronic Resources<br/>
Microsoft
ent://SD_ILS/0/SD_ILS:2321069
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format: Electronic Resources<br/>
The Prompt Payment Act Answer Book
ent://SD_ILS/0/SD_ILS:2315263
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263336">https://learning.oreilly.com/library/view/~/9781567263336</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263336/?ar">https://learning.oreilly.com/library/view/~/9781567263336/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar</a><br/>Format: Electronic Resources<br/>
The Antideficiency Act Answer Book
ent://SD_ILS/0/SD_ILS:2315273
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263343/?ar">https://learning.oreilly.com/library/view/~/9781567263343/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263343">https://learning.oreilly.com/library/view/~/9781567263343</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar</a><br/>Format: Electronic Resources<br/>
Information security management principles : an ISEB certificate
ent://SD_ILS/0/SD_ILS:2290300
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Taylor, Andy.<br/><a href="https://learning.oreilly.com/library/view/~/9781902505909/?ar">https://learning.oreilly.com/library/view/~/9781902505909/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781902505909/?ar">https://go.oreilly.com/library-access/library/view/-/9781902505909/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781902505909">https://learning.oreilly.com/library/view/~/9781902505909</a><br/>Format: Electronic Resources<br/>
ISO27001 / ISO27002 : a pocket guide / Alan Calder.
ent://SD_ILS/0/SD_ILS:2299817
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281669/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281669/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285230/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285230/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281669/?ar">https://learning.oreilly.com/library/view/~/9781849281669/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285230/?ar">https://learning.oreilly.com/library/view/~/9781849285230/?ar</a><br/>Format: Electronic Resources<br/>
Solving the Enigma : History of Cryptanalytic Bombe
ent://SD_ILS/0/SD_ILS:2310798
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Wilcox, Jennifer.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100015SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100015SI/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/01120100015SI">https://learning.oreilly.com/library/view/~/01120100015SI</a>
<a href="https://learning.oreilly.com/library/view/~/01120100015SI/?ar">https://learning.oreilly.com/library/view/~/01120100015SI/?ar</a><br/>Format: Electronic Resources<br/>
HIGH-TECH CRIMES REVEALED : CYBERWAR STORIES FROM THE DIGITAL FRONT
ent://SD_ILS/0/SD_ILS:2320688
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Branigan, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321218736/?ar">https://go.oreilly.com/library-access/library/view/-/0321218736/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321218736/?ar">https://learning.oreilly.com/library/view/~/0321218736/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321218736">https://learning.oreilly.com/library/view/~/0321218736</a><br/>Format: Electronic Resources<br/>
Mapping security : the corporate security sourcebook for today's global economy
ent://SD_ILS/0/SD_ILS:2315191
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Patterson, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321304527/?ar">https://go.oreilly.com/library-access/library/view/-/0321304527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321304527/?ar">https://learning.oreilly.com/library/view/~/0321304527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321304527">https://learning.oreilly.com/library/view/~/0321304527</a><br/>Format: Electronic Resources<br/>
Security + Study Guide and DVD Training System
ent://SD_ILS/0/SD_ILS:2320599
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Syngress, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836722">https://learning.oreilly.com/library/view/~/9781931836722</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836722/?ar">https://learning.oreilly.com/library/view/~/9781931836722/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar</a><br/>Format: Electronic Resources<br/>
Inside the Security Mind : Making the Tough Decisions.
ent://SD_ILS/0/SD_ILS:2322565
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Day, Kevin, 1975- author.<br/><a href="https://learning.oreilly.com/library/view/~/0131118293/?ar">https://learning.oreilly.com/library/view/~/0131118293/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131118293">https://learning.oreilly.com/library/view/~/0131118293</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131118293/?ar">https://go.oreilly.com/library-access/library/view/-/0131118293/?ar</a><br/>Format: Electronic Resources<br/>
Firewalls and Internet Security : Repelling the Wily Hacker, Second Edition
ent://SD_ILS/0/SD_ILS:2324785
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Cheswick, William, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/020163466X/?ar">https://go.oreilly.com/library-access/library/view/-/020163466X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/020163466X/?ar">https://learning.oreilly.com/library/view/~/020163466X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/020163466X">https://learning.oreilly.com/library/view/~/020163466X</a><br/>Format: Electronic Resources<br/>
Managing Information Security Risks : the OCTAVESM Approach
ent://SD_ILS/0/SD_ILS:2321582
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Alberts, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/0321118863/?ar">https://learning.oreilly.com/library/view/~/0321118863/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321118863/?ar">https://go.oreilly.com/library-access/library/view/-/0321118863/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321118863">https://learning.oreilly.com/library/view/~/0321118863</a><br/>Format: Electronic Resources<br/>
Understanding PKI : Concepts, Standards, and Deployment Considerations, Second Edition
ent://SD_ILS/0/SD_ILS:2321625
2024-09-26T12:37:40Z
2024-09-26T12:37:40Z
by Adams, Carlisle, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672323915/?ar">https://go.oreilly.com/library-access/library/view/-/0672323915/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672323915/?ar">https://learning.oreilly.com/library/view/~/0672323915/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672323915">https://learning.oreilly.com/library/view/~/0672323915</a><br/>Format: Electronic Resources<br/>