Search Results for - Narrowed by: Computer networks -- Security measures. - Vacca, John R. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dAUTHOR$002509Author$002509Vacca$00252C$002bJohn$002bR.$002509Vacca$00252C$002bJohn$002bR.$0026ps$003d300? 2024-06-07T21:43:11Z Network and system security ent://SD_ILS/0/SD_ILS:2301170 2024-06-07T21:43:11Z 2024-06-07T21:43:11Z by&#160;Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124166899/?ar">https://learning.oreilly.com/library/view/~/9780124166899/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook, second edition ent://SD_ILS/0/SD_ILS:2300197 2024-06-07T21:43:11Z 2024-06-07T21:43:11Z by&#160;Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar">https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123943972/?ar">https://learning.oreilly.com/library/view/~/9780123943972/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and IT Infrastructure Protection. ent://SD_ILS/0/SD_ILS:1261962 2024-06-07T21:43:11Z 2024-06-07T21:43:11Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1377640">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security. ent://SD_ILS/0/SD_ILS:1261682 2024-06-07T21:43:11Z 2024-06-07T21:43:11Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1364061">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security. ent://SD_ILS/0/SD_ILS:1261560 2024-06-07T21:43:11Z 2024-06-07T21:43:11Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1357643">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer and Information Security Handbook. ent://SD_ILS/0/SD_ILS:1258612 2024-06-07T21:43:11Z 2024-06-07T21:43:11Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1195617">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network and system security ent://SD_ILS/0/SD_ILS:2288837 2024-06-07T21:43:11Z 2024-06-07T21:43:11Z by&#160;Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495356">https://learning.oreilly.com/library/view/~/9781597495356</a> <a href="https://learning.oreilly.com/library/view/~/9781597495356/?ar">https://learning.oreilly.com/library/view/~/9781597495356/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2286804 2024-06-07T21:43:11Z 2024-06-07T21:43:11Z by&#160;Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a> <a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2048378 2024-06-07T21:43:11Z 2024-06-07T21:43:11Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=453166">Click to View</a><br/>Format:&#160;Electronic Resources<br/>