Search Results for - Narrowed by: Bases de donn&eacute;es -- S&eacute;curit&eacute; -- Mesures. - Data protection. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Bases$002bde$002bdonn$0025C3$0025A9es$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509Bases$002bde$002bdonn$0025C3$0025A9es$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue? 2024-06-20T00:49:39Z Introduction to Hadoop security : a hands-on approach to securing big data clusters ent://SD_ILS/0/SD_ILS:2310270 2024-06-20T00:49:39Z 2024-06-20T00:49:39Z by&#160;Bean, Jeff, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar">https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771375054/?ar">https://learning.oreilly.com/videos/~/9781771375054/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to information security : LiveLessons (Sneak Peek Video Training) ent://SD_ILS/0/SD_ILS:2306346 2024-06-20T00:49:39Z 2024-06-20T00:49:39Z by&#160;Aurnou, Scott, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar">https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780134135823/?ar">https://learning.oreilly.com/videos/~/9780134135823/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hadoop security ent://SD_ILS/0/SD_ILS:2307773 2024-06-20T00:49:39Z 2024-06-20T00:49:39Z by&#160;Spivey, Ben, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar">https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491900970/?ar">https://learning.oreilly.com/library/view/~/9781491900970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491900970">https://learning.oreilly.com/library/view/~/9781491900970</a><br/>Format:&#160;Electronic Resources<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:2299279 2024-06-20T00:49:39Z 2024-06-20T00:49:39Z by&#160;Scholz, James A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar">https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439841594/?ar">https://learning.oreilly.com/library/view/~/9781439841594/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Hadoop security ent://SD_ILS/0/SD_ILS:2305422 2024-06-20T00:49:39Z 2024-06-20T00:49:39Z by&#160;Lakhe, Bhushan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265450">https://learning.oreilly.com/library/view/~/9781430265450</a> <a href="https://learning.oreilly.com/library/view/~/9781430265450/?ar">https://learning.oreilly.com/library/view/~/9781430265450/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar</a><br/>Format:&#160;Electronic Resources<br/> Expert Oracle and Java security : programming secure Oracle database applications with Java ent://SD_ILS/0/SD_ILS:2293224 2024-06-20T00:49:39Z 2024-06-20T00:49:39Z by&#160;Coffin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781430238317">https://learning.oreilly.com/library/view/~/9781430238317</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar">https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430238317/?ar">https://learning.oreilly.com/library/view/~/9781430238317/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:2295995 2024-06-20T00:49:39Z 2024-06-20T00:49:39Z by&#160;Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a> <a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to survive a data breach : a pocket guide ent://SD_ILS/0/SD_ILS:2290079 2024-06-20T00:49:39Z 2024-06-20T00:49:39Z by&#160;Mitchell, Stewart.<br/><a href="https://learning.oreilly.com/library/view/~/9781905356966">https://learning.oreilly.com/library/view/~/9781905356966</a> <a href="https://learning.oreilly.com/library/view/~/9781905356966/?ar">https://learning.oreilly.com/library/view/~/9781905356966/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data leaks for dummies ent://SD_ILS/0/SD_ILS:2288755 2024-06-20T00:49:39Z 2024-06-20T00:49:39Z by&#160;Bunker, Guy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470388433">https://learning.oreilly.com/library/view/~/9780470388433</a> <a href="https://learning.oreilly.com/library/view/~/9780470388433/?ar">https://learning.oreilly.com/library/view/~/9780470388433/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470388433/?ar">https://go.oreilly.com/library-access/library/view/-/9780470388433/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to secure and audit Oracle 10g and 11g ent://SD_ILS/0/SD_ILS:2286324 2024-06-20T00:49:39Z 2024-06-20T00:49:39Z by&#160;Ben-Natan, Ron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar">https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420084139/?ar">https://learning.oreilly.com/library/view/~/9781420084139/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420084139">https://learning.oreilly.com/library/view/~/9781420084139</a><br/>Format:&#160;Electronic Resources<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:2285226 2024-06-20T00:49:39Z 2024-06-20T00:49:39Z by&#160;Clark, Champ, III.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492249">https://learning.oreilly.com/library/view/~/9781597492249</a> <a href="https://learning.oreilly.com/library/view/~/9781597492249/?ar">https://learning.oreilly.com/library/view/~/9781597492249/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar</a><br/>Format:&#160;Electronic Resources<br/>