Search Results for - Narrowed by: COMPUTERS -- Information Technology. - COMPUTERS -- Security -- General. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bInformation$002bTechnology.$002509COMPUTERS$002b--$002bInformation$002bTechnology.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$0026ps$003d300? 2024-05-27T05:02:09Z Microsoft Information Protection Administrator SC-400 Certification Guide : Advance Your Microsoft Security and Compliance Services Knowledge and Pass the SC-400 Exam with Confidence ent://SD_ILS/0/SD_ILS:2331137 2024-05-27T05:02:09Z 2024-05-27T05:02:09Z by&#160;Darr, Shabaz.<br/><a href="https://learning.oreilly.com/library/view/~/9781801811491/?ar">https://learning.oreilly.com/library/view/~/9781801811491/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801811491/?ar">https://go.oreilly.com/library-access/library/view/-/9781801811491/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801811491">https://learning.oreilly.com/library/view/~/9781801811491</a><br/>Format:&#160;Electronic Resources<br/> Data privacy for the smart grid ent://SD_ILS/0/SD_ILS:2306113 2024-05-27T05:02:09Z 2024-05-27T05:02:09Z by&#160;Herold, Rebecca.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466573376/?ar">https://go.oreilly.com/library-access/library/view/-/9781466573376/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466573376">https://learning.oreilly.com/library/view/~/9781466573376</a> <a href="https://learning.oreilly.com/library/view/~/9781466573376/?ar">https://learning.oreilly.com/library/view/~/9781466573376/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:2300180 2024-05-27T05:02:09Z 2024-05-27T05:02:09Z by&#160;Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:2299279 2024-05-27T05:02:09Z 2024-05-27T05:02:09Z by&#160;Scholz, James A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar">https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439841594/?ar">https://learning.oreilly.com/library/view/~/9781439841594/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to computer networks and cybersecurity ent://SD_ILS/0/SD_ILS:2305578 2024-05-27T05:02:09Z 2024-05-27T05:02:09Z by&#160;Wu, Chwan-Hwa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar">https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466572133/?ar">https://learning.oreilly.com/library/view/~/9781466572133/?ar</a><br/>Format:&#160;Electronic Resources<br/> The definitive guide to complying with the HIPAA/HITECH privacy and security rules ent://SD_ILS/0/SD_ILS:2296800 2024-05-27T05:02:09Z 2024-05-27T05:02:09Z by&#160;Trinckes, John J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466507685/?ar">https://go.oreilly.com/library-access/library/view/-/9781466507685/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466507685/?ar">https://learning.oreilly.com/library/view/~/9781466507685/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466507685">https://learning.oreilly.com/library/view/~/9781466507685</a><br/>Format:&#160;Electronic Resources<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:2293442 2024-05-27T05:02:09Z 2024-05-27T05:02:09Z by&#160;Speed, Tyler Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar">https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439809839/?ar">https://learning.oreilly.com/library/view/~/9781439809839/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security governance simplified : from the boardroom to the keyboard ent://SD_ILS/0/SD_ILS:2293427 2024-05-27T05:02:09Z 2024-05-27T05:02:09Z by&#160;Fitzgerald, Todd.<br/><a href="https://learning.oreilly.com/library/view/~/9781439811658">https://learning.oreilly.com/library/view/~/9781439811658</a> <a href="https://learning.oreilly.com/library/view/~/9781439811658/?ar">https://learning.oreilly.com/library/view/~/9781439811658/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439811658/?ar">https://go.oreilly.com/library-access/library/view/-/9781439811658/?ar</a><br/>Format:&#160;Electronic Resources<br/>