Search Results for - Narrowed by: Business enterprises -- Computer networks -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Business$002benterprises$002b--$002bComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Business$002benterprises$002b--$002bComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-06-14T15:47:19ZIdentity patterns and strategies for enterprise : design enterprise cloud identity model with Oauth 2.0 and active directoryent://SD_ILS/0/SD_ILS:23353792024-06-14T15:47:19Z2024-06-14T15:47:19Zby Federico, Giuseppe Di, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801810845/?ar">https://go.oreilly.com/library-access/library/view/-/9781801810845/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801810845">https://learning.oreilly.com/library/view/~/9781801810845</a>
<a href="https://learning.oreilly.com/library/view/~/9781801810845/?ar">https://learning.oreilly.com/library/view/~/9781801810845/?ar</a><br/>Format: Electronic Resources<br/>Cyber warfare : truth, tactics, and strategies : strategic concepts and truths to help you and your organization survive on the battleground of cyber warfareent://SD_ILS/0/SD_ILS:23346942024-06-14T15:47:19Z2024-06-14T15:47:19Zby Cunningham, Chase, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801076876">https://learning.oreilly.com/library/view/~/9781801076876</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076876/?ar">https://learning.oreilly.com/library/view/~/9781801076876/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801076876/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076876/?ar</a><br/>Format: Sound recording<br/>Building a cyber resilient business : a cyber handbook for executives and boardsent://SD_ILS/0/SD_ILS:23349672024-06-14T15:47:19Z2024-06-14T15:47:19Zby Chelly, Magda Lilia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803246482/?ar">https://go.oreilly.com/library-access/library/view/-/9781803246482/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803246482/?ar">https://learning.oreilly.com/library/view/~/9781803246482/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803246482">https://learning.oreilly.com/library/view/~/9781803246482</a><br/>Format: Electronic Resources<br/>Security awareness for dummiesent://SD_ILS/0/SD_ILS:23330932024-06-14T15:47:19Z2024-06-14T15:47:19Zby Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666174175/?ar">https://learning.oreilly.com/library/view/~/9781666174175/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781666174175/?ar">https://go.oreilly.com/library-access/library/view/-/9781666174175/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781666174175">https://learning.oreilly.com/library/view/~/9781666174175</a><br/>Format: Sound recording<br/>Security awareness for dummiesent://SD_ILS/0/SD_ILS:23328742024-06-14T15:47:19Z2024-06-14T15:47:19Zby Winkler, Ira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar">https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119720928">https://learning.oreilly.com/library/view/~/9781119720928</a>
<a href="https://learning.oreilly.com/library/view/~/9781119720928/?ar">https://learning.oreilly.com/library/view/~/9781119720928/?ar</a><br/>Format: Electronic Resources<br/>Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain Englishent://SD_ILS/0/SD_ILS:23344242024-06-14T15:47:19Z2024-06-14T15:47:19Zby Cherry, Denny.<br/><a href="https://learning.oreilly.com/library/view/~/9781484286289">https://learning.oreilly.com/library/view/~/9781484286289</a>
<a href="https://learning.oreilly.com/library/view/~/9781484286289/?ar">https://learning.oreilly.com/library/view/~/9781484286289/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484286289/?ar">https://go.oreilly.com/library-access/library/view/-/9781484286289/?ar</a><br/>Format: Electronic Resources<br/>Ransomware protection playbookent://SD_ILS/0/SD_ILS:23300902024-06-14T15:47:19Z2024-06-14T15:47:19Zby Grimes, Roger A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119849124">https://learning.oreilly.com/library/view/~/9781119849124</a>
<a href="https://learning.oreilly.com/library/view/~/9781119849124/?ar">https://learning.oreilly.com/library/view/~/9781119849124/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar">https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar</a><br/>Format: Electronic Resources<br/>8 steps to better security : a simple cyber resilience guide for businessent://SD_ILS/0/SD_ILS:23308352024-06-14T15:47:19Z2024-06-14T15:47:19Zby Crawley, Kim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119811237/?ar">https://learning.oreilly.com/library/view/~/9781119811237/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119811237">https://learning.oreilly.com/library/view/~/9781119811237</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar">https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar</a><br/>Format: Electronic Resources<br/>COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION EXAM GUIDE (EXAM CS0-002)ent://SD_ILS/0/SD_ILS:23265162024-06-14T15:47:19Z2024-06-14T15:47:19Zby Chapman, Brent.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar">https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260464313">https://learning.oreilly.com/library/view/~/9781260464313</a>
<a href="https://learning.oreilly.com/library/view/~/9781260464313/?ar">https://learning.oreilly.com/library/view/~/9781260464313/?ar</a><br/>Format: Electronic Resources<br/>Exam Ref MS-500 Microsoft 365 Security Administrationent://SD_ILS/0/SD_ILS:23256332024-06-14T15:47:19Z2024-06-14T15:47:19Zby Fisher, Ed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135881446/?ar">https://learning.oreilly.com/library/view/~/9780135881446/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135881446/?ar">https://go.oreilly.com/library-access/library/view/-/9780135881446/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135881446">https://learning.oreilly.com/library/view/~/9780135881446</a><br/>Format: Electronic Resources<br/>Cyber Warfare - Truth, Tactics, and Strategiesent://SD_ILS/0/SD_ILS:23236672024-06-14T15:47:19Z2024-06-14T15:47:19Zby Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format: Electronic Resources<br/>Build Your Own Cybersecurity Testing Lab : Low-cost Solutions for Testing in Virtual and Cloud-based Environmentsent://SD_ILS/0/SD_ILS:23234382024-06-14T15:47:19Z2024-06-14T15:47:19Zby Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260458329">https://learning.oreilly.com/library/view/~/9781260458329</a>
<a href="https://learning.oreilly.com/library/view/~/9781260458329/?ar">https://learning.oreilly.com/library/view/~/9781260458329/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar">https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar</a><br/>Format: Electronic Resources<br/>IBM Spectrum Scale Immutability Introduction, Configuration Guidance, and Use Casesent://SD_ILS/0/SD_ILS:23239872024-06-14T15:47:19Z2024-06-14T15:47:19Zby Haustein, Nils, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458762/?ar">https://learning.oreilly.com/library/view/~/9780738458762/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458762">https://learning.oreilly.com/library/view/~/9780738458762</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458762/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458762/?ar</a><br/>Format: Electronic Resources<br/>GDPR For Dummiesent://SD_ILS/0/SD_ILS:23272352024-06-14T15:47:19Z2024-06-14T15:47:19Zby Dibble, Suzanne, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119546092/?ar">https://learning.oreilly.com/library/view/~/9781119546092/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119546092/?ar">https://go.oreilly.com/library-access/library/view/-/9781119546092/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119546092">https://learning.oreilly.com/library/view/~/9781119546092</a><br/>Format: Electronic Resources<br/>Hands-on network forensics : investigate network attacks and find evidence using common network forensic toolsent://SD_ILS/0/SD_ILS:23198362024-06-14T15:47:19Z2024-06-14T15:47:19Zby Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789344523/?ar">https://learning.oreilly.com/library/view/~/9781789344523/?ar</a><br/>Format: Electronic Resources<br/>The cybersecurity playbook : how every leader and employee can contribute to a culture of securityent://SD_ILS/0/SD_ILS:23215682024-06-14T15:47:19Z2024-06-14T15:47:19Zby Cerra, Allison, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar">https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196/?ar">https://learning.oreilly.com/library/view/~/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196">https://learning.oreilly.com/library/view/~/9781119442196</a><br/>Format: Electronic Resources<br/>Beginning security with Microsoft technologies : protecting Office 365, devices, and dataent://SD_ILS/0/SD_ILS:23221232024-06-14T15:47:19Z2024-06-14T15:47:19Zby Lakshmi, Vasantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484248539/?ar">https://learning.oreilly.com/library/view/~/9781484248539/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar">https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar</a><br/>Format: Electronic Resources<br/>Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your dataent://SD_ILS/0/SD_ILS:23222042024-06-14T15:47:19Z2024-06-14T15:47:19Zby Chakrabarty, Boudhayan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458014/?ar">https://learning.oreilly.com/library/view/~/9780738458014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458014">https://learning.oreilly.com/library/view/~/9780738458014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar</a><br/>Format: Electronic Resources<br/>Integration of IBM Aspera Sync with IBM Spectrum Scale : protecting and sharing files globallyent://SD_ILS/0/SD_ILS:23221052024-06-14T15:47:19Z2024-06-14T15:47:19Zby Haustein, Nils, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457499/?ar">https://learning.oreilly.com/library/view/~/9780738457499/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457499/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457499/?ar</a><br/>Format: Electronic Resources<br/>Threat intelligence in practice : a practical guide to threat intelligence from successful organizationsent://SD_ILS/0/SD_ILS:23184352024-06-14T15:47:19Z2024-06-14T15:47:19Zby Liska, Allan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar">https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492049302/?ar">https://learning.oreilly.com/library/view/~/9781492049302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492049302">https://learning.oreilly.com/library/view/~/9781492049302</a><br/>Format: Electronic Resources<br/>IBM Spectrum Scale functionality to support GDPR requirementsent://SD_ILS/0/SD_ILS:23221012024-06-14T15:47:19Z2024-06-14T15:47:19Zby Patil, Sandeep, 1986- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738456768/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456768/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738456768/?ar">https://learning.oreilly.com/library/view/~/9780738456768/?ar</a><br/>Format: Electronic Resources<br/>Applied network security : master the art of detecting and averting advanced network security attacks and techniquesent://SD_ILS/0/SD_ILS:21558962024-06-14T15:47:19Z2024-06-14T15:47:19Zby Salmon, Arthur, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4853051">Click to View</a><br/>Format: Electronic Resources<br/>Building a practical information security programent://SD_ILS/0/SD_ILS:22109252024-06-14T15:47:19Z2024-06-14T15:47:19Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4711748">Click to View</a><br/>Format: Electronic Resources<br/>OpenVPN cookbookent://SD_ILS/0/SD_ILS:22720302024-06-14T15:47:19Z2024-06-14T15:47:19Zby Keijser, Jan Just, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4809668">Click to View</a><br/>Format: Electronic Resources<br/>The cyber risk handbook : creating and measuring effective cybersecurity capabilitiesent://SD_ILS/0/SD_ILS:23129892024-06-14T15:47:19Z2024-06-14T15:47:19Zby Antonucci, Domenic, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119308805">https://learning.oreilly.com/library/view/~/9781119308805</a>
<a href="https://learning.oreilly.com/library/view/~/9781119308805/?ar">https://learning.oreilly.com/library/view/~/9781119308805/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119308805/?ar">https://go.oreilly.com/library-access/library/view/-/9781119308805/?ar</a><br/>Format: Electronic Resources<br/>Applied network security : master the art of detecting and averting advanced network security attacks and techniquesent://SD_ILS/0/SD_ILS:23132882024-06-14T15:47:19Z2024-06-14T15:47:19Zby Salmon, Arthur, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786466273/?ar">https://learning.oreilly.com/library/view/~/9781786466273/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar">https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786466273">https://learning.oreilly.com/library/view/~/9781786466273</a><br/>Format: Electronic Resources<br/>Bezpieczenstwo tozsamosci i danych w projektach Webent://SD_ILS/0/SD_ILS:23245052024-06-14T15:47:19Z2024-06-14T15:47:19Zby LeBlanc, Jonathan.<br/><a href="https://learning.oreilly.com/library/view/~/9788375412093/?ar">https://learning.oreilly.com/library/view/~/9788375412093/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788375412093/?ar">https://go.oreilly.com/library-access/library/view/-/9788375412093/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788375412093">https://learning.oreilly.com/library/view/~/9788375412093</a><br/>Format: Electronic Resources<br/>Cyber security awareness for CEOs and managementent://SD_ILS/0/SD_ILS:22093722024-06-14T15:47:19Z2024-06-14T15:47:19Zby Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189279">Click to View</a><br/>Format: Electronic Resources<br/>Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacksent://SD_ILS/0/SD_ILS:22353752024-06-14T15:47:19Z2024-06-14T15:47:19Zby Datt, Samir, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4520820">Click to View</a><br/>Format: Electronic Resources<br/>Identity and data security for web development : best practicesent://SD_ILS/0/SD_ILS:23108212024-06-14T15:47:19Z2024-06-14T15:47:19Zby LeBlanc, Jonathan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491937006">https://learning.oreilly.com/library/view/~/9781491937006</a>
<a href="https://learning.oreilly.com/library/view/~/9781491937006/?ar">https://learning.oreilly.com/library/view/~/9781491937006/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491937006/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937006/?ar</a><br/>Format: Electronic Resources<br/>Selling information security to the board : a primerent://SD_ILS/0/SD_ILS:23106142024-06-14T15:47:19Z2024-06-14T15:47:19Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849288019/?ar">https://go.oreilly.com/library-access/library/view/-/9781849288019/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849288019/?ar">https://learning.oreilly.com/library/view/~/9781849288019/?ar</a><br/>Format: Electronic Resources<br/>Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacksent://SD_ILS/0/SD_ILS:23101212024-06-14T15:47:19Z2024-06-14T15:47:19Zby Datt, Samir, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar">https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905/?ar">https://learning.oreilly.com/library/view/~/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905">https://learning.oreilly.com/library/view/~/9781782174905</a><br/>Format: Electronic Resources<br/>Cracking security misconceptions : untangling common myths about modern information securityent://SD_ILS/0/SD_ILS:23167042024-06-14T15:47:19Z2024-06-14T15:47:19Zby Peterson, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042747">https://learning.oreilly.com/library/view/~/9781492042747</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042747/?ar">https://learning.oreilly.com/library/view/~/9781492042747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar</a><br/>Format: Electronic Resources<br/>Network Attacks and Exploitation : A Framework.ent://SD_ILS/0/SD_ILS:13381872024-06-14T15:47:19Z2024-06-14T15:47:19Zby Monte, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4040351">Click to View</a><br/>Format: Electronic Resources<br/>E-commerceent://SD_ILS/0/SD_ILS:20958472024-06-14T15:47:19Z2024-06-14T15:47:19Zby Mourya, S. K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5248356">Click to View</a><br/>Format: Electronic Resources<br/>Mobile IT-Infrastrukturen : Management, Sicherheit und Complianceent://SD_ILS/0/SD_ILS:23087152024-06-14T15:47:19Z2024-06-14T15:47:19Zby Klett, Gerhard, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783826697159/?ar">https://go.oreilly.com/library-access/library/view/-/9783826697159/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783826697159/?ar">https://learning.oreilly.com/library/view/~/9783826697159/?ar</a><br/>Format: Electronic Resources<br/>Mastering OpenVPN : master building and integrating secure private networks using OpenVPNent://SD_ILS/0/SD_ILS:22713952024-06-14T15:47:19Z2024-06-14T15:47:19Zby Crist, Eric F., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191311">Click to View</a><br/>Format: Electronic Resources<br/>Network attacks and exploitation : a frameworkent://SD_ILS/0/SD_ILS:23077172024-06-14T15:47:19Z2024-06-14T15:47:19Zby Monte, Matthew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118987124">https://learning.oreilly.com/library/view/~/9781118987124</a>
<a href="https://learning.oreilly.com/library/view/~/9781118987124/?ar">https://learning.oreilly.com/library/view/~/9781118987124/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118987124/?ar">https://go.oreilly.com/library-access/library/view/-/9781118987124/?ar</a><br/>Format: Electronic Resources<br/>Cyber Threat! : How to Manage the Growing Risk of Cyber Attacks.ent://SD_ILS/0/SD_ILS:12741262024-06-14T15:47:19Z2024-06-14T15:47:19Zby Ulsch, MacDonnell.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1742833">Click to View</a><br/>Format: Electronic Resources<br/>Information security breaches : avoidance and treatment based on ISO27001ent://SD_ILS/0/SD_ILS:21318142024-06-14T15:47:19Z2024-06-14T15:47:19Zby Krausz, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1778763">Click to View</a><br/>Format: Electronic Resources<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:23034482024-06-14T15:47:19Z2024-06-14T15:47:19Zby Ulsch, N. MacDonnell, 1951-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar">https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118935958/?ar">https://learning.oreilly.com/library/view/~/9781118935958/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118935958">https://learning.oreilly.com/library/view/~/9781118935958</a><br/>Format: Electronic Resources<br/>Responsive security : be ready to be secureent://SD_ILS/0/SD_ILS:23006432024-06-14T15:47:19Z2024-06-14T15:47:19Zby Kang, Meng-Chow.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584310/?ar">https://learning.oreilly.com/library/view/~/9781466584310/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar</a><br/>Format: Electronic Resources<br/>The case for ISO27001 : 2013ent://SD_ILS/0/SD_ILS:23485262024-06-14T15:47:19Z2024-06-14T15:47:19Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3015816">Click to View</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:21549082024-06-14T15:47:19Z2024-06-14T15:47:19Zby Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463578">Click to View</a><br/>Format: Electronic Resources<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:21549092024-06-14T15:47:19Z2024-06-14T15:47:19Zby Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463579">Click to View</a><br/>Format: Electronic Resources<br/>The true cost of information security breaches and cyber crimeent://SD_ILS/0/SD_ILS:21549112024-06-14T15:47:19Z2024-06-14T15:47:19Zby Krausz, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1477418">Click to View</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:21298472024-06-14T15:47:19Z2024-06-14T15:47:19Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1153198">Click to View</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:22979662024-06-14T15:47:19Z2024-06-14T15:47:19Zby Brotby, W. Krag.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881538/?ar">https://learning.oreilly.com/library/view/~/9781439881538/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar</a><br/>Format: Electronic Resources<br/>Nine steps to success : an ISO27001:2013 implementation overviewent://SD_ILS/0/SD_ILS:23004362024-06-14T15:47:19Z2024-06-14T15:47:19Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117/?ar">https://learning.oreilly.com/library/view/~/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117">https://learning.oreilly.com/library/view/~/9781849285117</a><br/>Format: Electronic Resources<br/>The true cost of information security breaches and cyber crimeent://SD_ILS/0/SD_ILS:23001992024-06-14T15:47:19Z2024-06-14T15:47:19Zby Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849284967/?ar">https://go.oreilly.com/library-access/library/view/-/9781849284967/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849284967/?ar">https://learning.oreilly.com/library/view/~/9781849284967/?ar</a><br/>Format: Electronic Resources<br/>Endpoint security and compliance management design guide : using IBM Tivoli Endpoint Managerent://SD_ILS/0/SD_ILS:22975122024-06-14T15:47:19Z2024-06-14T15:47:19Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738436984">https://learning.oreilly.com/library/view/~/0738436984</a>
<a href="https://learning.oreilly.com/library/view/~/0738436984/?ar">https://learning.oreilly.com/library/view/~/0738436984/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738436984/?ar">https://go.oreilly.com/library-access/library/view/-/0738436984/?ar</a><br/>Format: Electronic Resources<br/>IT Governance : An International Guide to Data Security and ISO27001/ISO27002.ent://SD_ILS/0/SD_ILS:12381642024-06-14T15:47:19Z2024-06-14T15:47:19Zby Calder, Alan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=838114">Click to View</a><br/>Format: Electronic Resources<br/>Once more unto the breach : managing information security in an uncertain worldent://SD_ILS/0/SD_ILS:22980222024-06-14T15:47:19Z2024-06-14T15:47:19Zby Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format: Electronic Resources<br/>Identity Management : Concepts, Technologies, and Systems.ent://SD_ILS/0/SD_ILS:12226882024-06-14T15:47:19Z2024-06-14T15:47:19Zby Takahashi, Kenji.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=634511">Click to View</a><br/>Format: Electronic Resources<br/>Auditing cloud computing a security and privacy guideent://SD_ILS/0/SD_ILS:22697722024-06-14T15:47:19Z2024-06-14T15:47:19Zby Halpert, Ben, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=697627">Click to View</a><br/>Format: Electronic Resources<br/>Network intrusion prevention design guideent://SD_ILS/0/SD_ILS:22943532024-06-14T15:47:19Z2024-06-14T15:47:19Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738436216/?ar">https://learning.oreilly.com/library/view/~/0738436216/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738436216/?ar">https://go.oreilly.com/library-access/library/view/-/0738436216/?ar</a><br/>Format: Electronic Resources<br/>Security de-engineering : solving the problems in information risk managementent://SD_ILS/0/SD_ILS:22959952024-06-14T15:47:19Z2024-06-14T15:47:19Zby Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a>
<a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format: Electronic Resources<br/>Auditing cloud computing : a security and privacy guideent://SD_ILS/0/SD_ILS:22922552024-06-14T15:47:19Z2024-06-14T15:47:19Zby Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format: Electronic Resources<br/>Security the human factorent://SD_ILS/0/SD_ILS:22053752024-06-14T15:47:19Z2024-06-14T15:47:19Zby Kearney, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=647939">Click to View</a><br/>Format: Electronic Resources<br/>Selling information security to the board : a primer.ent://SD_ILS/0/SD_ILS:22906692024-06-14T15:47:19Z2024-06-14T15:47:19Zby Calder, Alan.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280549">https://learning.oreilly.com/library/view/~/9781849280549</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280549/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280549/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280549/?ar">https://learning.oreilly.com/library/view/~/9781849280549/?ar</a><br/>Format: Electronic Resources<br/>The art of enterprise information architecture : a systems-based approach for unlocking business insightent://SD_ILS/0/SD_ILS:22885592024-06-14T15:47:19Z2024-06-14T15:47:19Zby Godinez, Mario.<br/><a href="https://learning.oreilly.com/library/view/~/9780137054947">https://learning.oreilly.com/library/view/~/9780137054947</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137054947/?ar">https://go.oreilly.com/library-access/library/view/-/9780137054947/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137054947/?ar">https://learning.oreilly.com/library/view/~/9780137054947/?ar</a><br/>Format: Electronic Resources<br/>Security : the Human Factor.ent://SD_ILS/0/SD_ILS:22906752024-06-14T15:47:19Z2024-06-14T15:47:19Zby Kearney, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281843/?ar">https://learning.oreilly.com/library/view/~/9781849281843/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar</a><br/>Format: Electronic Resources<br/>Security strategy : from requirements to realityent://SD_ILS/0/SD_ILS:23216382024-06-14T15:47:19Z2024-06-14T15:47:19Zby Stackpole, Bill. http://viaf.org/viaf/sourceID/LC%7cn2007046244<br/><a href="https://learning.oreilly.com/library/view/~/9781439827345">https://learning.oreilly.com/library/view/~/9781439827345</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar">https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439827345/?ar">https://learning.oreilly.com/library/view/~/9781439827345/?ar</a><br/>Format: Electronic Resources<br/>Enterprise Information Security and Privacy.ent://SD_ILS/0/SD_ILS:12077182024-06-14T15:47:19Z2024-06-14T15:47:19Zby Axelrod, C. Warren.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456886">Click to View</a><br/>Format: Electronic Resources<br/>SAP security configuration and deployment : the IT administrator's guide to best practicesent://SD_ILS/0/SD_ILS:22859852024-06-14T15:47:19Z2024-06-14T15:47:19Zby Wun-Young, Leslie.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492843">https://learning.oreilly.com/library/view/~/9781597492843</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492843/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492843/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492843/?ar">https://learning.oreilly.com/library/view/~/9781597492843/?ar</a><br/>Format: Electronic Resources<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:22866302024-06-14T15:47:19Z2024-06-14T15:47:19Zby Brotby, W. Krag, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar">https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862/?ar">https://learning.oreilly.com/library/view/~/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862">https://learning.oreilly.com/library/view/~/9781420052862</a><br/>Format: Electronic Resources<br/>Information Security Breaches : Avoidance and Treatment based on ISO27001.ent://SD_ILS/0/SD_ILS:22886162024-06-14T15:47:19Z2024-06-14T15:47:19Zby Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280273">https://learning.oreilly.com/library/view/~/9781849280273</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280273/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280273/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280273/?ar">https://learning.oreilly.com/library/view/~/9781849280273/?ar</a><br/>Format: Electronic Resources<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:20480172024-06-14T15:47:19Z2024-06-14T15:47:19Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=339307">Click to View</a><br/>Format: Electronic Resources<br/>Advances in enterprise information technology securityent://SD_ILS/0/SD_ILS:22611032024-06-14T15:47:19Z2024-06-14T15:47:19Zby Khadraoui, Djamel.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5</a><br/>Format: Electronic Resources<br/>Nine steps to success : an ISO 27001 implementation overviewent://SD_ILS/0/SD_ILS:22897432024-06-14T15:47:19Z2024-06-14T15:47:19Zby Calder, Alan, 1957-<br/><a href="https://learning.oreilly.com/library/view/~/9781905356126/?ar">https://learning.oreilly.com/library/view/~/9781905356126/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar</a><br/>Format: Electronic Resources<br/>Advances in security and payment methods for mobile commerceent://SD_ILS/0/SD_ILS:22611092024-06-14T15:47:19Z2024-06-14T15:47:19Zby Hu, Wen Chen, 1960-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-345-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-345-6</a><br/>Format: Electronic Resources<br/>The case for ISO 27001ent://SD_ILS/0/SD_ILS:22900382024-06-14T15:47:19Z2024-06-14T15:47:19Zby Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781905356133/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356133/?ar">https://learning.oreilly.com/library/view/~/9781905356133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356133">https://learning.oreilly.com/library/view/~/9781905356133</a><br/>Format: Electronic Resources<br/>IT Governance : Guidelines for Directors.ent://SD_ILS/0/SD_ILS:22906782024-06-14T15:47:19Z2024-06-14T15:47:19Zby Calder, Alan.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281058/?ar">https://learning.oreilly.com/library/view/~/9781849281058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281058/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281058/?ar</a><br/>Format: Electronic Resources<br/>Securing your business with CISCO ASA and PIX firewallsent://SD_ILS/0/SD_ILS:22818152024-06-14T15:47:19Z2024-06-14T15:47:19Zby Abelar, Greg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587052148/?ar">https://go.oreilly.com/library-access/library/view/-/1587052148/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587052148">https://learning.oreilly.com/library/view/~/1587052148</a>
<a href="https://learning.oreilly.com/library/view/~/1587052148/?ar">https://learning.oreilly.com/library/view/~/1587052148/?ar</a><br/>Format: Electronic Resources<br/>Integrated Identity Management using IBM Tivoli Security Solutions.ent://SD_ILS/0/SD_ILS:13097482024-06-14T15:47:19Z2024-06-14T15:47:19Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306357">Click to View</a><br/>Format: Electronic Resources<br/>Control and Security of E-Commerce.ent://SD_ILS/0/SD_ILS:12098052024-06-14T15:47:19Z2024-06-14T15:47:19Zby Smith, Gordon E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=469918">Click to View</a><br/>Format: Electronic Resources<br/>Lotus Security Handbook.ent://SD_ILS/0/SD_ILS:13102292024-06-14T15:47:19Z2024-06-14T15:47:19Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306838">Click to View</a><br/>Format: Electronic Resources<br/>Privacy What Developers and IT Professionals Should Knowent://SD_ILS/0/SD_ILS:23197422024-06-14T15:47:19Z2024-06-14T15:47:19Zby Cannon, J., author.<br/><a href="https://learning.oreilly.com/library/view/~/0321224094">https://learning.oreilly.com/library/view/~/0321224094</a>
<a href="https://learning.oreilly.com/library/view/~/0321224094/?ar">https://learning.oreilly.com/library/view/~/0321224094/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321224094/?ar">https://go.oreilly.com/library-access/library/view/-/0321224094/?ar</a><br/>Format: Electronic Resources<br/>Hack proofing your e-commerce site the only way to stop a hacker is to think like oneent://SD_ILS/0/SD_ILS:657332024-06-14T15:47:19Z2024-06-14T15:47:19Zby Russell, Ryan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994275">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Understanding Public-Key Infrastructure : Concepts, Standards, and Deployment Considerationsent://SD_ILS/0/SD_ILS:23198042024-06-14T15:47:19Z2024-06-14T15:47:19Zby Adams, Carlisle, author.<br/><a href="https://learning.oreilly.com/library/view/~/157870166X">https://learning.oreilly.com/library/view/~/157870166X</a>
<a href="https://learning.oreilly.com/library/view/~/157870166X/?ar">https://learning.oreilly.com/library/view/~/157870166X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/157870166X/?ar">https://go.oreilly.com/library-access/library/view/-/157870166X/?ar</a><br/>Format: Electronic Resources<br/>Enterprise-wide security solutions presentation guideent://SD_ILS/0/SD_ILS:23024822024-06-14T15:47:19Z2024-06-14T15:47:19Zby Kigma, Cees.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738402087/?ar">https://go.oreilly.com/library-access/library/view/-/0738402087/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738402087/?ar">https://learning.oreilly.com/library/view/~/0738402087/?ar</a><br/>Format: Electronic Resources<br/>