Search Results for - Narrowed by: Computer networks -- Security measures. - Vacca, John R.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dAUTHOR$002509Author$002509Vacca$00252C$002bJohn$002bR.$002509Vacca$00252C$002bJohn$002bR.$0026ps$003d300?2024-06-07T21:43:11ZNetwork and system securityent://SD_ILS/0/SD_ILS:23011702024-06-07T21:43:11Z2024-06-07T21:43:11Zby Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124166899/?ar">https://learning.oreilly.com/library/view/~/9780124166899/?ar</a><br/>Format: Electronic Resources<br/>Computer and information security handbook, second editionent://SD_ILS/0/SD_ILS:23001972024-06-07T21:43:11Z2024-06-07T21:43:11Zby Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar">https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123943972/?ar">https://learning.oreilly.com/library/view/~/9780123943972/?ar</a><br/>Format: Electronic Resources<br/>Cyber Security and IT Infrastructure Protection.ent://SD_ILS/0/SD_ILS:12619622024-06-07T21:43:11Z2024-06-07T21:43:11Zby Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1377640">Click to View</a><br/>Format: Electronic Resources<br/>Network and System Security.ent://SD_ILS/0/SD_ILS:12616822024-06-07T21:43:11Z2024-06-07T21:43:11Zby Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1364061">Click to View</a><br/>Format: Electronic Resources<br/>Managing Information Security.ent://SD_ILS/0/SD_ILS:12615602024-06-07T21:43:11Z2024-06-07T21:43:11Zby Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1357643">Click to View</a><br/>Format: Electronic Resources<br/>Computer and Information Security Handbook.ent://SD_ILS/0/SD_ILS:12586122024-06-07T21:43:11Z2024-06-07T21:43:11Zby Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1195617">Click to View</a><br/>Format: Electronic Resources<br/>Network and system securityent://SD_ILS/0/SD_ILS:22888372024-06-07T21:43:11Z2024-06-07T21:43:11Zby Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495356">https://learning.oreilly.com/library/view/~/9781597495356</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495356/?ar">https://learning.oreilly.com/library/view/~/9781597495356/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:22868042024-06-07T21:43:11Z2024-06-07T21:43:11Zby Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a>
<a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:20483782024-06-07T21:43:11Z2024-06-07T21:43:11Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=453166">Click to View</a><br/>Format: Electronic Resources<br/>