Search Results for - Narrowed by: Business enterprises -- Computer networks -- Security measures. - Réseaux d'ordinateurs -- Sécurité -- Mesures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Business$002benterprises$002b--$002bComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Business$002benterprises$002b--$002bComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300$0026isd$003dtrue?2024-06-20T04:02:08Z8 steps to better security : a simple cyber resilience guide for businessent://SD_ILS/0/SD_ILS:23308352024-06-20T04:02:08Z2024-06-20T04:02:08Zby Crawley, Kim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119811237/?ar">https://learning.oreilly.com/library/view/~/9781119811237/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119811237">https://learning.oreilly.com/library/view/~/9781119811237</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar">https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar</a><br/>Format: Electronic Resources<br/>Cyber Warfare - Truth, Tactics, and Strategiesent://SD_ILS/0/SD_ILS:23236672024-06-20T04:02:08Z2024-06-20T04:02:08Zby Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format: Electronic Resources<br/>The cybersecurity playbook : how every leader and employee can contribute to a culture of securityent://SD_ILS/0/SD_ILS:23215682024-06-20T04:02:08Z2024-06-20T04:02:08Zby Cerra, Allison, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar">https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196/?ar">https://learning.oreilly.com/library/view/~/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196">https://learning.oreilly.com/library/view/~/9781119442196</a><br/>Format: Electronic Resources<br/>Hands-on network forensics : investigate network attacks and find evidence using common network forensic toolsent://SD_ILS/0/SD_ILS:23198362024-06-20T04:02:08Z2024-06-20T04:02:08Zby Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789344523/?ar">https://learning.oreilly.com/library/view/~/9781789344523/?ar</a><br/>Format: Electronic Resources<br/>Threat intelligence in practice : a practical guide to threat intelligence from successful organizationsent://SD_ILS/0/SD_ILS:23184352024-06-20T04:02:08Z2024-06-20T04:02:08Zby Liska, Allan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar">https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492049302/?ar">https://learning.oreilly.com/library/view/~/9781492049302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492049302">https://learning.oreilly.com/library/view/~/9781492049302</a><br/>Format: Electronic Resources<br/>Applied network security : master the art of detecting and averting advanced network security attacks and techniquesent://SD_ILS/0/SD_ILS:23132882024-06-20T04:02:08Z2024-06-20T04:02:08Zby Salmon, Arthur, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786466273/?ar">https://learning.oreilly.com/library/view/~/9781786466273/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar">https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786466273">https://learning.oreilly.com/library/view/~/9781786466273</a><br/>Format: Electronic Resources<br/>Identity and data security for web development : best practicesent://SD_ILS/0/SD_ILS:23108212024-06-20T04:02:08Z2024-06-20T04:02:08Zby LeBlanc, Jonathan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491937006">https://learning.oreilly.com/library/view/~/9781491937006</a>
<a href="https://learning.oreilly.com/library/view/~/9781491937006/?ar">https://learning.oreilly.com/library/view/~/9781491937006/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491937006/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937006/?ar</a><br/>Format: Electronic Resources<br/>Bezpieczenstwo tozsamosci i danych w projektach Webent://SD_ILS/0/SD_ILS:23245052024-06-20T04:02:08Z2024-06-20T04:02:08Zby LeBlanc, Jonathan.<br/><a href="https://learning.oreilly.com/library/view/~/9788375412093/?ar">https://learning.oreilly.com/library/view/~/9788375412093/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788375412093/?ar">https://go.oreilly.com/library-access/library/view/-/9788375412093/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788375412093">https://learning.oreilly.com/library/view/~/9788375412093</a><br/>Format: Electronic Resources<br/>Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacksent://SD_ILS/0/SD_ILS:23101212024-06-20T04:02:08Z2024-06-20T04:02:08Zby Datt, Samir, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar">https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905/?ar">https://learning.oreilly.com/library/view/~/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905">https://learning.oreilly.com/library/view/~/9781782174905</a><br/>Format: Electronic Resources<br/>Cracking security misconceptions : untangling common myths about modern information securityent://SD_ILS/0/SD_ILS:23167042024-06-20T04:02:08Z2024-06-20T04:02:08Zby Peterson, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042747">https://learning.oreilly.com/library/view/~/9781492042747</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042747/?ar">https://learning.oreilly.com/library/view/~/9781492042747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar</a><br/>Format: Electronic Resources<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:23034482024-06-20T04:02:08Z2024-06-20T04:02:08Zby Ulsch, N. MacDonnell, 1951-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar">https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118935958/?ar">https://learning.oreilly.com/library/view/~/9781118935958/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118935958">https://learning.oreilly.com/library/view/~/9781118935958</a><br/>Format: Electronic Resources<br/>Once more unto the breach : managing information security in an uncertain worldent://SD_ILS/0/SD_ILS:22980222024-06-20T04:02:08Z2024-06-20T04:02:08Zby Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format: Electronic Resources<br/>Understanding Public-Key Infrastructure : Concepts, Standards, and Deployment Considerationsent://SD_ILS/0/SD_ILS:23198042024-06-20T04:02:08Z2024-06-20T04:02:08Zby Adams, Carlisle, author.<br/><a href="https://learning.oreilly.com/library/view/~/157870166X">https://learning.oreilly.com/library/view/~/157870166X</a>
<a href="https://learning.oreilly.com/library/view/~/157870166X/?ar">https://learning.oreilly.com/library/view/~/157870166X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/157870166X/?ar">https://go.oreilly.com/library-access/library/view/-/157870166X/?ar</a><br/>Format: Electronic Resources<br/>