Search Results for - Narrowed by: COMPUTERS -- Information Technology. - COMPUTERS -- Security -- General.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bInformation$002bTechnology.$002509COMPUTERS$002b--$002bInformation$002bTechnology.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$0026ps$003d300?2024-05-27T05:02:09ZMicrosoft Information Protection Administrator SC-400 Certification Guide : Advance Your Microsoft Security and Compliance Services Knowledge and Pass the SC-400 Exam with Confidenceent://SD_ILS/0/SD_ILS:23311372024-05-27T05:02:09Z2024-05-27T05:02:09Zby Darr, Shabaz.<br/><a href="https://learning.oreilly.com/library/view/~/9781801811491/?ar">https://learning.oreilly.com/library/view/~/9781801811491/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801811491/?ar">https://go.oreilly.com/library-access/library/view/-/9781801811491/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801811491">https://learning.oreilly.com/library/view/~/9781801811491</a><br/>Format: Electronic Resources<br/>Data privacy for the smart grident://SD_ILS/0/SD_ILS:23061132024-05-27T05:02:09Z2024-05-27T05:02:09Zby Herold, Rebecca.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466573376/?ar">https://go.oreilly.com/library-access/library/view/-/9781466573376/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466573376">https://learning.oreilly.com/library/view/~/9781466573376</a>
<a href="https://learning.oreilly.com/library/view/~/9781466573376/?ar">https://learning.oreilly.com/library/view/~/9781466573376/?ar</a><br/>Format: Electronic Resources<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:23001802024-05-27T05:02:09Z2024-05-27T05:02:09Zby Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format: Electronic Resources<br/>Enterprise architecture and information assurance : developing a secure foundationent://SD_ILS/0/SD_ILS:22992792024-05-27T05:02:09Z2024-05-27T05:02:09Zby Scholz, James A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar">https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439841594/?ar">https://learning.oreilly.com/library/view/~/9781439841594/?ar</a><br/>Format: Electronic Resources<br/>Introduction to computer networks and cybersecurityent://SD_ILS/0/SD_ILS:23055782024-05-27T05:02:09Z2024-05-27T05:02:09Zby Wu, Chwan-Hwa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar">https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466572133/?ar">https://learning.oreilly.com/library/view/~/9781466572133/?ar</a><br/>Format: Electronic Resources<br/>The definitive guide to complying with the HIPAA/HITECH privacy and security rulesent://SD_ILS/0/SD_ILS:22968002024-05-27T05:02:09Z2024-05-27T05:02:09Zby Trinckes, John J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466507685/?ar">https://go.oreilly.com/library-access/library/view/-/9781466507685/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466507685/?ar">https://learning.oreilly.com/library/view/~/9781466507685/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466507685">https://learning.oreilly.com/library/view/~/9781466507685</a><br/>Format: Electronic Resources<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:22934422024-05-27T05:02:09Z2024-05-27T05:02:09Zby Speed, Tyler Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar">https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439809839/?ar">https://learning.oreilly.com/library/view/~/9781439809839/?ar</a><br/>Format: Electronic Resources<br/>Information security governance simplified : from the boardroom to the keyboardent://SD_ILS/0/SD_ILS:22934272024-05-27T05:02:09Z2024-05-27T05:02:09Zby Fitzgerald, Todd.<br/><a href="https://learning.oreilly.com/library/view/~/9781439811658">https://learning.oreilly.com/library/view/~/9781439811658</a>
<a href="https://learning.oreilly.com/library/view/~/9781439811658/?ar">https://learning.oreilly.com/library/view/~/9781439811658/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439811658/?ar">https://go.oreilly.com/library-access/library/view/-/9781439811658/?ar</a><br/>Format: Electronic Resources<br/>