Search Results for - Narrowed by: COMPUTERS -- Machine Theory. - Computer security.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bMachine$002bTheory.$002509COMPUTERS$002b--$002bMachine$002bTheory.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2024-05-30T11:49:56Z
Securing the internet of things
ent://SD_ILS/0/SD_ILS:2312348
2024-05-30T11:49:56Z
2024-05-30T11:49:56Z
by Li, Shancang, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045053">https://learning.oreilly.com/library/view/~/9780128045053</a>
<a href="https://learning.oreilly.com/library/view/~/9780128045053/?ar">https://learning.oreilly.com/library/view/~/9780128045053/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar</a><br/>Format: Electronic Resources<br/>
Incident management for operations
ent://SD_ILS/0/SD_ILS:2313545
2024-05-30T11:49:56Z
2024-05-30T11:49:56Z
by Schnepp, Rob, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491917619/?ar">https://learning.oreilly.com/library/view/~/9781491917619/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar">https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491917619">https://learning.oreilly.com/library/view/~/9781491917619</a><br/>Format: Electronic Resources<br/>
Die Kunst der Anonymität im Internet : so schützen Sie Ihre Identität und Ihre Daten
ent://SD_ILS/0/SD_ILS:2315011
2024-05-30T11:49:56Z
2024-05-30T11:49:56Z
by Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format: Electronic Resources<br/>
A study of black hole attack solutions : on AODV routing protocol in MANET
ent://SD_ILS/0/SD_ILS:2309038
2024-05-30T11:49:56Z
2024-05-30T11:49:56Z
by Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format: Electronic Resources<br/>
CSA guide to cloud computing : implementing cloud privacy and security
ent://SD_ILS/0/SD_ILS:2304776
2024-05-30T11:49:56Z
2024-05-30T11:49:56Z
by Samani, Raj, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar">https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124201255/?ar">https://learning.oreilly.com/library/view/~/9780124201255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124201255">https://learning.oreilly.com/library/view/~/9780124201255</a><br/>Format: Electronic Resources<br/>
The basics of IT audit : Purposes, processes, and practical information.
ent://SD_ILS/0/SD_ILS:2301501
2024-05-30T11:49:56Z
2024-05-30T11:49:56Z
by Gantz, Stephen D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596/?ar">https://learning.oreilly.com/library/view/~/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596">https://learning.oreilly.com/library/view/~/9780124171596</a><br/>Format: Electronic Resources<br/>
Microsoft Forefront threat management gateway (TMG) : administrator's companion
ent://SD_ILS/0/SD_ILS:2287747
2024-05-30T11:49:56Z
2024-05-30T11:49:56Z
by Harrison, Jim.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735640535/?ar">https://go.oreilly.com/library-access/library/view/-/9780735640535/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735640535/?ar">https://learning.oreilly.com/library/view/~/9780735640535/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735640535">https://learning.oreilly.com/library/view/~/9780735640535</a><br/>Format: Electronic Resources<br/>
Unauthorised access : physical penetration testing for IT security teams
ent://SD_ILS/0/SD_ILS:2288452
2024-05-30T11:49:56Z
2024-05-30T11:49:56Z
by Allsopp, Wil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar">https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470747612/?ar">https://learning.oreilly.com/library/view/~/9780470747612/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470747612">https://learning.oreilly.com/library/view/~/9780470747612</a><br/>Format: Electronic Resources<br/>