Search Results for - Narrowed by: Business enterprises -- Computer networks -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Business$002benterprises$002b--$002bComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Business$002benterprises$002b--$002bComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300? 2024-06-14T15:47:19Z Identity patterns and strategies for enterprise : design enterprise cloud identity model with Oauth 2.0 and active directory ent://SD_ILS/0/SD_ILS:2335379 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Federico, Giuseppe Di, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801810845/?ar">https://go.oreilly.com/library-access/library/view/-/9781801810845/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801810845">https://learning.oreilly.com/library/view/~/9781801810845</a> <a href="https://learning.oreilly.com/library/view/~/9781801810845/?ar">https://learning.oreilly.com/library/view/~/9781801810845/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber warfare : truth, tactics, and strategies : strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare ent://SD_ILS/0/SD_ILS:2334694 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Cunningham, Chase, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801076876">https://learning.oreilly.com/library/view/~/9781801076876</a> <a href="https://learning.oreilly.com/library/view/~/9781801076876/?ar">https://learning.oreilly.com/library/view/~/9781801076876/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801076876/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076876/?ar</a><br/>Format:&#160;Sound recording<br/> Building a cyber resilient business : a cyber handbook for executives and boards ent://SD_ILS/0/SD_ILS:2334967 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Chelly, Magda Lilia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803246482/?ar">https://go.oreilly.com/library-access/library/view/-/9781803246482/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803246482/?ar">https://learning.oreilly.com/library/view/~/9781803246482/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803246482">https://learning.oreilly.com/library/view/~/9781803246482</a><br/>Format:&#160;Electronic Resources<br/> Security awareness for dummies ent://SD_ILS/0/SD_ILS:2333093 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666174175/?ar">https://learning.oreilly.com/library/view/~/9781666174175/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781666174175/?ar">https://go.oreilly.com/library-access/library/view/-/9781666174175/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781666174175">https://learning.oreilly.com/library/view/~/9781666174175</a><br/>Format:&#160;Sound recording<br/> Security awareness for dummies ent://SD_ILS/0/SD_ILS:2332874 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Winkler, Ira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar">https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119720928">https://learning.oreilly.com/library/view/~/9781119720928</a> <a href="https://learning.oreilly.com/library/view/~/9781119720928/?ar">https://learning.oreilly.com/library/view/~/9781119720928/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English ent://SD_ILS/0/SD_ILS:2334424 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Cherry, Denny.<br/><a href="https://learning.oreilly.com/library/view/~/9781484286289">https://learning.oreilly.com/library/view/~/9781484286289</a> <a href="https://learning.oreilly.com/library/view/~/9781484286289/?ar">https://learning.oreilly.com/library/view/~/9781484286289/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484286289/?ar">https://go.oreilly.com/library-access/library/view/-/9781484286289/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ransomware protection playbook ent://SD_ILS/0/SD_ILS:2330090 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Grimes, Roger A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119849124">https://learning.oreilly.com/library/view/~/9781119849124</a> <a href="https://learning.oreilly.com/library/view/~/9781119849124/?ar">https://learning.oreilly.com/library/view/~/9781119849124/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar">https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar</a><br/>Format:&#160;Electronic Resources<br/> 8 steps to better security : a simple cyber resilience guide for business ent://SD_ILS/0/SD_ILS:2330835 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Crawley, Kim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119811237/?ar">https://learning.oreilly.com/library/view/~/9781119811237/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119811237">https://learning.oreilly.com/library/view/~/9781119811237</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar">https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar</a><br/>Format:&#160;Electronic Resources<br/> COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION EXAM GUIDE (EXAM CS0-002) ent://SD_ILS/0/SD_ILS:2326516 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Chapman, Brent.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar">https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781260464313">https://learning.oreilly.com/library/view/~/9781260464313</a> <a href="https://learning.oreilly.com/library/view/~/9781260464313/?ar">https://learning.oreilly.com/library/view/~/9781260464313/?ar</a><br/>Format:&#160;Electronic Resources<br/> Exam Ref MS-500 Microsoft 365 Security Administration ent://SD_ILS/0/SD_ILS:2325633 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Fisher, Ed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135881446/?ar">https://learning.oreilly.com/library/view/~/9780135881446/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135881446/?ar">https://go.oreilly.com/library-access/library/view/-/9780135881446/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135881446">https://learning.oreilly.com/library/view/~/9780135881446</a><br/>Format:&#160;Electronic Resources<br/> Cyber Warfare - Truth, Tactics, and Strategies ent://SD_ILS/0/SD_ILS:2323667 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a> <a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format:&#160;Electronic Resources<br/> Build Your Own Cybersecurity Testing Lab : Low-cost Solutions for Testing in Virtual and Cloud-based Environments ent://SD_ILS/0/SD_ILS:2323438 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260458329">https://learning.oreilly.com/library/view/~/9781260458329</a> <a href="https://learning.oreilly.com/library/view/~/9781260458329/?ar">https://learning.oreilly.com/library/view/~/9781260458329/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar">https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM Spectrum Scale Immutability Introduction, Configuration Guidance, and Use Cases ent://SD_ILS/0/SD_ILS:2323987 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Haustein, Nils, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458762/?ar">https://learning.oreilly.com/library/view/~/9780738458762/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458762">https://learning.oreilly.com/library/view/~/9780738458762</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458762/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458762/?ar</a><br/>Format:&#160;Electronic Resources<br/> GDPR For Dummies ent://SD_ILS/0/SD_ILS:2327235 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Dibble, Suzanne, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119546092/?ar">https://learning.oreilly.com/library/view/~/9781119546092/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119546092/?ar">https://go.oreilly.com/library-access/library/view/-/9781119546092/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119546092">https://learning.oreilly.com/library/view/~/9781119546092</a><br/>Format:&#160;Electronic Resources<br/> Hands-on network forensics : investigate network attacks and find evidence using common network forensic tools ent://SD_ILS/0/SD_ILS:2319836 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789344523/?ar">https://learning.oreilly.com/library/view/~/9781789344523/?ar</a><br/>Format:&#160;Electronic Resources<br/> The cybersecurity playbook : how every leader and employee can contribute to a culture of security ent://SD_ILS/0/SD_ILS:2321568 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Cerra, Allison, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar">https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119442196/?ar">https://learning.oreilly.com/library/view/~/9781119442196/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119442196">https://learning.oreilly.com/library/view/~/9781119442196</a><br/>Format:&#160;Electronic Resources<br/> Beginning security with Microsoft technologies : protecting Office 365, devices, and data ent://SD_ILS/0/SD_ILS:2322123 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Lakshmi, Vasantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484248539/?ar">https://learning.oreilly.com/library/view/~/9781484248539/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar">https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your data ent://SD_ILS/0/SD_ILS:2322204 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Chakrabarty, Boudhayan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458014/?ar">https://learning.oreilly.com/library/view/~/9780738458014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458014">https://learning.oreilly.com/library/view/~/9780738458014</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integration of IBM Aspera Sync with IBM Spectrum Scale : protecting and sharing files globally ent://SD_ILS/0/SD_ILS:2322105 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Haustein, Nils, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457499/?ar">https://learning.oreilly.com/library/view/~/9780738457499/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457499/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457499/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat intelligence in practice : a practical guide to threat intelligence from successful organizations ent://SD_ILS/0/SD_ILS:2318435 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Liska, Allan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar">https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492049302/?ar">https://learning.oreilly.com/library/view/~/9781492049302/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492049302">https://learning.oreilly.com/library/view/~/9781492049302</a><br/>Format:&#160;Electronic Resources<br/> IBM Spectrum Scale functionality to support GDPR requirements ent://SD_ILS/0/SD_ILS:2322101 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Patil, Sandeep, 1986- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738456768/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456768/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738456768/?ar">https://learning.oreilly.com/library/view/~/9780738456768/?ar</a><br/>Format:&#160;Electronic Resources<br/> Applied network security : master the art of detecting and averting advanced network security attacks and techniques ent://SD_ILS/0/SD_ILS:2155896 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Salmon, Arthur, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4853051">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building a practical information security program ent://SD_ILS/0/SD_ILS:2210925 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4711748">Click to View</a><br/>Format:&#160;Electronic Resources<br/> OpenVPN cookbook ent://SD_ILS/0/SD_ILS:2272030 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Keijser, Jan Just, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4809668">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The cyber risk handbook : creating and measuring effective cybersecurity capabilities ent://SD_ILS/0/SD_ILS:2312989 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Antonucci, Domenic, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119308805">https://learning.oreilly.com/library/view/~/9781119308805</a> <a href="https://learning.oreilly.com/library/view/~/9781119308805/?ar">https://learning.oreilly.com/library/view/~/9781119308805/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119308805/?ar">https://go.oreilly.com/library-access/library/view/-/9781119308805/?ar</a><br/>Format:&#160;Electronic Resources<br/> Applied network security : master the art of detecting and averting advanced network security attacks and techniques ent://SD_ILS/0/SD_ILS:2313288 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Salmon, Arthur, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786466273/?ar">https://learning.oreilly.com/library/view/~/9781786466273/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar">https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786466273">https://learning.oreilly.com/library/view/~/9781786466273</a><br/>Format:&#160;Electronic Resources<br/> Bezpieczenstwo tozsamosci i danych w projektach Web ent://SD_ILS/0/SD_ILS:2324505 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;LeBlanc, Jonathan.<br/><a href="https://learning.oreilly.com/library/view/~/9788375412093/?ar">https://learning.oreilly.com/library/view/~/9788375412093/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9788375412093/?ar">https://go.oreilly.com/library-access/library/view/-/9788375412093/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9788375412093">https://learning.oreilly.com/library/view/~/9788375412093</a><br/>Format:&#160;Electronic Resources<br/> Cyber security awareness for CEOs and management ent://SD_ILS/0/SD_ILS:2209372 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189279">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks ent://SD_ILS/0/SD_ILS:2235375 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Datt, Samir, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4520820">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Identity and data security for web development : best practices ent://SD_ILS/0/SD_ILS:2310821 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;LeBlanc, Jonathan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491937006">https://learning.oreilly.com/library/view/~/9781491937006</a> <a href="https://learning.oreilly.com/library/view/~/9781491937006/?ar">https://learning.oreilly.com/library/view/~/9781491937006/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491937006/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937006/?ar</a><br/>Format:&#160;Electronic Resources<br/> Selling information security to the board : a primer ent://SD_ILS/0/SD_ILS:2310614 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849288019/?ar">https://go.oreilly.com/library-access/library/view/-/9781849288019/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849288019/?ar">https://learning.oreilly.com/library/view/~/9781849288019/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks ent://SD_ILS/0/SD_ILS:2310121 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Datt, Samir, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar">https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782174905/?ar">https://learning.oreilly.com/library/view/~/9781782174905/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782174905">https://learning.oreilly.com/library/view/~/9781782174905</a><br/>Format:&#160;Electronic Resources<br/> Cracking security misconceptions : untangling common myths about modern information security ent://SD_ILS/0/SD_ILS:2316704 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Peterson, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042747">https://learning.oreilly.com/library/view/~/9781492042747</a> <a href="https://learning.oreilly.com/library/view/~/9781492042747/?ar">https://learning.oreilly.com/library/view/~/9781492042747/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network Attacks and Exploitation : A Framework. ent://SD_ILS/0/SD_ILS:1338187 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Monte, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4040351">Click to View</a><br/>Format:&#160;Electronic Resources<br/> E-commerce ent://SD_ILS/0/SD_ILS:2095847 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Mourya, S. K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5248356">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mobile IT-Infrastrukturen : Management, Sicherheit und Compliance ent://SD_ILS/0/SD_ILS:2308715 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Klett, Gerhard, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783826697159/?ar">https://go.oreilly.com/library-access/library/view/-/9783826697159/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783826697159/?ar">https://learning.oreilly.com/library/view/~/9783826697159/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering OpenVPN : master building and integrating secure private networks using OpenVPN ent://SD_ILS/0/SD_ILS:2271395 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Crist, Eric F., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191311">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network attacks and exploitation : a framework ent://SD_ILS/0/SD_ILS:2307717 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Monte, Matthew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118987124">https://learning.oreilly.com/library/view/~/9781118987124</a> <a href="https://learning.oreilly.com/library/view/~/9781118987124/?ar">https://learning.oreilly.com/library/view/~/9781118987124/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118987124/?ar">https://go.oreilly.com/library-access/library/view/-/9781118987124/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber Threat! : How to Manage the Growing Risk of Cyber Attacks. ent://SD_ILS/0/SD_ILS:1274126 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Ulsch, MacDonnell.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1742833">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security breaches : avoidance and treatment based on ISO27001 ent://SD_ILS/0/SD_ILS:2131814 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Krausz, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1778763">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:2303448 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Ulsch, N. MacDonnell, 1951-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar">https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118935958/?ar">https://learning.oreilly.com/library/view/~/9781118935958/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118935958">https://learning.oreilly.com/library/view/~/9781118935958</a><br/>Format:&#160;Electronic Resources<br/> Responsive security : be ready to be secure ent://SD_ILS/0/SD_ILS:2300643 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Kang, Meng-Chow.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584310/?ar">https://learning.oreilly.com/library/view/~/9781466584310/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar</a><br/>Format:&#160;Electronic Resources<br/> The case for ISO27001 : 2013 ent://SD_ILS/0/SD_ILS:2348526 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3015816">Click to View</a><br/>Format:&#160;Electronic Resources<br/> An introduction to information security and ISO27001:2013 : a pocket guide ent://SD_ILS/0/SD_ILS:2154908 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463578">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 / ISO27002 : a pocket guide ent://SD_ILS/0/SD_ILS:2154909 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463579">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The true cost of information security breaches and cyber crime ent://SD_ILS/0/SD_ILS:2154911 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Krausz, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1477418">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Pragmatic security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:2129847 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1153198">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Pragmatic security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:2297966 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Brotby, W. Krag.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881538/?ar">https://learning.oreilly.com/library/view/~/9781439881538/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nine steps to success : an ISO27001:2013 implementation overview ent://SD_ILS/0/SD_ILS:2300436 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285117/?ar">https://learning.oreilly.com/library/view/~/9781849285117/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285117">https://learning.oreilly.com/library/view/~/9781849285117</a><br/>Format:&#160;Electronic Resources<br/> The true cost of information security breaches and cyber crime ent://SD_ILS/0/SD_ILS:2300199 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849284967/?ar">https://go.oreilly.com/library-access/library/view/-/9781849284967/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849284967/?ar">https://learning.oreilly.com/library/view/~/9781849284967/?ar</a><br/>Format:&#160;Electronic Resources<br/> Endpoint security and compliance management design guide : using IBM Tivoli Endpoint Manager ent://SD_ILS/0/SD_ILS:2297512 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;B&uuml;cker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738436984">https://learning.oreilly.com/library/view/~/0738436984</a> <a href="https://learning.oreilly.com/library/view/~/0738436984/?ar">https://learning.oreilly.com/library/view/~/0738436984/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738436984/?ar">https://go.oreilly.com/library-access/library/view/-/0738436984/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT Governance : An International Guide to Data Security and ISO27001/ISO27002. ent://SD_ILS/0/SD_ILS:1238164 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Calder, Alan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=838114">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Once more unto the breach : managing information security in an uncertain world ent://SD_ILS/0/SD_ILS:2298022 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a> <a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format:&#160;Electronic Resources<br/> Identity Management : Concepts, Technologies, and Systems. ent://SD_ILS/0/SD_ILS:1222688 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Takahashi, Kenji.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=634511">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Auditing cloud computing a security and privacy guide ent://SD_ILS/0/SD_ILS:2269772 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Halpert, Ben, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=697627">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network intrusion prevention design guide ent://SD_ILS/0/SD_ILS:2294353 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;B&uuml;cker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738436216/?ar">https://learning.oreilly.com/library/view/~/0738436216/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738436216/?ar">https://go.oreilly.com/library-access/library/view/-/0738436216/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:2295995 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a> <a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format:&#160;Electronic Resources<br/> Auditing cloud computing : a security and privacy guide ent://SD_ILS/0/SD_ILS:2292255 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format:&#160;Electronic Resources<br/> Security the human factor ent://SD_ILS/0/SD_ILS:2205375 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Kearney, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=647939">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Selling information security to the board : a primer. ent://SD_ILS/0/SD_ILS:2290669 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Calder, Alan.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280549">https://learning.oreilly.com/library/view/~/9781849280549</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280549/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280549/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849280549/?ar">https://learning.oreilly.com/library/view/~/9781849280549/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of enterprise information architecture : a systems-based approach for unlocking business insight ent://SD_ILS/0/SD_ILS:2288559 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Godinez, Mario.<br/><a href="https://learning.oreilly.com/library/view/~/9780137054947">https://learning.oreilly.com/library/view/~/9780137054947</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137054947/?ar">https://go.oreilly.com/library-access/library/view/-/9780137054947/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780137054947/?ar">https://learning.oreilly.com/library/view/~/9780137054947/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security : the Human Factor. ent://SD_ILS/0/SD_ILS:2290675 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Kearney, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281843/?ar">https://learning.oreilly.com/library/view/~/9781849281843/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security strategy : from requirements to reality ent://SD_ILS/0/SD_ILS:2321638 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Stackpole, Bill. http://viaf.org/viaf/sourceID/LC%7cn2007046244<br/><a href="https://learning.oreilly.com/library/view/~/9781439827345">https://learning.oreilly.com/library/view/~/9781439827345</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar">https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439827345/?ar">https://learning.oreilly.com/library/view/~/9781439827345/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Information Security and Privacy. ent://SD_ILS/0/SD_ILS:1207718 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Axelrod, C. Warren.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456886">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SAP security configuration and deployment : the IT administrator's guide to best practices ent://SD_ILS/0/SD_ILS:2285985 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Wun-Young, Leslie.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492843">https://learning.oreilly.com/library/view/~/9781597492843</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492843/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492843/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492843/?ar">https://learning.oreilly.com/library/view/~/9781597492843/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:2286630 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Brotby, W. Krag, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar">https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420052862/?ar">https://learning.oreilly.com/library/view/~/9781420052862/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420052862">https://learning.oreilly.com/library/view/~/9781420052862</a><br/>Format:&#160;Electronic Resources<br/> Information Security Breaches : Avoidance and Treatment based on ISO27001. ent://SD_ILS/0/SD_ILS:2288616 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280273">https://learning.oreilly.com/library/view/~/9781849280273</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280273/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280273/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849280273/?ar">https://learning.oreilly.com/library/view/~/9781849280273/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:2048017 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in enterprise information technology security ent://SD_ILS/0/SD_ILS:2261103 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Khadraoui, Djamel.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5</a><br/>Format:&#160;Electronic Resources<br/> Nine steps to success : an ISO 27001 implementation overview ent://SD_ILS/0/SD_ILS:2289743 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Calder, Alan, 1957-<br/><a href="https://learning.oreilly.com/library/view/~/9781905356126/?ar">https://learning.oreilly.com/library/view/~/9781905356126/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advances in security and payment methods for mobile commerce ent://SD_ILS/0/SD_ILS:2261109 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Hu, Wen Chen, 1960-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-345-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-345-6</a><br/>Format:&#160;Electronic Resources<br/> The case for ISO 27001 ent://SD_ILS/0/SD_ILS:2290038 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781905356133/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781905356133/?ar">https://learning.oreilly.com/library/view/~/9781905356133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781905356133">https://learning.oreilly.com/library/view/~/9781905356133</a><br/>Format:&#160;Electronic Resources<br/> IT Governance : Guidelines for Directors. ent://SD_ILS/0/SD_ILS:2290678 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Calder, Alan.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281058/?ar">https://learning.oreilly.com/library/view/~/9781849281058/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281058/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281058/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing your business with CISCO ASA and PIX firewalls ent://SD_ILS/0/SD_ILS:2281815 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Abelar, Greg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587052148/?ar">https://go.oreilly.com/library-access/library/view/-/1587052148/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587052148">https://learning.oreilly.com/library/view/~/1587052148</a> <a href="https://learning.oreilly.com/library/view/~/1587052148/?ar">https://learning.oreilly.com/library/view/~/1587052148/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated Identity Management using IBM Tivoli Security Solutions. ent://SD_ILS/0/SD_ILS:1309748 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306357">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Control and Security of E-Commerce. ent://SD_ILS/0/SD_ILS:1209805 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Smith, Gordon E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=469918">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Lotus Security Handbook. ent://SD_ILS/0/SD_ILS:1310229 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306838">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Privacy What Developers and IT Professionals Should Know ent://SD_ILS/0/SD_ILS:2319742 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Cannon, J., author.<br/><a href="https://learning.oreilly.com/library/view/~/0321224094">https://learning.oreilly.com/library/view/~/0321224094</a> <a href="https://learning.oreilly.com/library/view/~/0321224094/?ar">https://learning.oreilly.com/library/view/~/0321224094/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321224094/?ar">https://go.oreilly.com/library-access/library/view/-/0321224094/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your e-commerce site the only way to stop a hacker is to think like one ent://SD_ILS/0/SD_ILS:65733 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Russell, Ryan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994275">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Understanding Public-Key Infrastructure : Concepts, Standards, and Deployment Considerations ent://SD_ILS/0/SD_ILS:2319804 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Adams, Carlisle, author.<br/><a href="https://learning.oreilly.com/library/view/~/157870166X">https://learning.oreilly.com/library/view/~/157870166X</a> <a href="https://learning.oreilly.com/library/view/~/157870166X/?ar">https://learning.oreilly.com/library/view/~/157870166X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/157870166X/?ar">https://go.oreilly.com/library-access/library/view/-/157870166X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise-wide security solutions presentation guide ent://SD_ILS/0/SD_ILS:2302482 2024-06-14T15:47:19Z 2024-06-14T15:47:19Z by&#160;Kigma, Cees.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738402087/?ar">https://go.oreilly.com/library-access/library/view/-/0738402087/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738402087/?ar">https://learning.oreilly.com/library/view/~/0738402087/?ar</a><br/>Format:&#160;Electronic Resources<br/>