Search Results for - Narrowed by: Computer networks -- Security measures. - Computer networks -- Security measures -- United States.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002b--$002bUnited$002bStates.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002b--$002bUnited$002bStates.$0026ps$003d300?2024-05-30T14:26:33ZBreached! : why data security law fails and how to improve itent://SD_ILS/0/SD_ILS:23329562024-05-30T14:26:33Z2024-05-30T14:26:33Zby Solove, Daniel J., 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781705056271/?ar">https://go.oreilly.com/library-access/library/view/-/9781705056271/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781705056271/?ar">https://learning.oreilly.com/library/view/~/9781705056271/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781705056271">https://learning.oreilly.com/library/view/~/9781705056271</a><br/>Format: Sound recording<br/>Aan quan fang yu ru men shou ce = Defensive security handbookent://SD_ILS/0/SD_ILS:23336482024-05-30T14:26:33Z2024-05-30T14:26:33Zby Brotherston, Lee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9787115577955/?ar">https://learning.oreilly.com/library/view/~/9787115577955/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9787115577955/?ar">https://go.oreilly.com/library-access/library/view/-/9787115577955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9787115577955">https://learning.oreilly.com/library/view/~/9787115577955</a><br/>Format: Electronic Resources<br/>Defensive security handbook : best practices for securing infrastructureent://SD_ILS/0/SD_ILS:23129832024-05-30T14:26:33Z2024-05-30T14:26:33Zby Brotherston, Lee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491960370/?ar">https://learning.oreilly.com/library/view/~/9781491960370/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491960370/?ar">https://go.oreilly.com/library-access/library/view/-/9781491960370/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491960370">https://learning.oreilly.com/library/view/~/9781491960370</a><br/>Format: Electronic Resources<br/>FISMA and the risk management framework : the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:22966152024-05-30T14:26:33Z2024-05-30T14:26:33Zby Gantz, Stephen D.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496414">https://learning.oreilly.com/library/view/~/9781597496414</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496414/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496414/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496414/?ar">https://learning.oreilly.com/library/view/~/9781597496414/?ar</a><br/>Format: Electronic Resources<br/>Schneier on securityent://SD_ILS/0/SD_ILS:22865522024-05-30T14:26:33Z2024-05-30T14:26:33Zby Schneier, Bruce, 1963-<br/><a href="https://learning.oreilly.com/library/view/~/9780470395356/?ar">https://learning.oreilly.com/library/view/~/9780470395356/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470395356/?ar">https://go.oreilly.com/library-access/library/view/-/9780470395356/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470395356">https://learning.oreilly.com/library/view/~/9780470395356</a><br/>Format: Electronic Resources<br/>Cybersecurity Today and Tomorrow : Pay Now or Pay Later.ent://SD_ILS/0/SD_ILS:13172712024-05-30T14:26:33Z2024-05-30T14:26:33Zby National Research Council (U.S.), Computer Science and Telecommunications Board Staff.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3375180">Click to View</a><br/>Format: Electronic Resources<br/>