Search Results for - Narrowed by: Computer networks -- Security measures. - Cyberspace -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Cyberspace$002b--$002bSecurity$002bmeasures.$002509Cyberspace$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue?2024-06-22T11:18:59ZCyberspace and cybersecurityent://SD_ILS/0/SD_ILS:22607692024-06-22T11:18:59Z2024-06-22T11:18:59Zby Kostopoulos, George K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5110029">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity incident response : how to contain, eradicate, and recover from incidentsent://SD_ILS/0/SD_ILS:23176702024-06-22T11:18:59Z2024-06-22T11:18:59Zby Thompson, Eric C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238707/?ar">https://learning.oreilly.com/library/view/~/9781484238707/?ar</a><br/>Format: Electronic Resources<br/>The second economy : the race for trust, treasure and time in the cybersecurity warent://SD_ILS/0/SD_ILS:23125522024-06-22T11:18:59Z2024-06-22T11:18:59Zby Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format: Electronic Resources<br/>Cyber operations : building, defending, and attacking modern computer networksent://SD_ILS/0/SD_ILS:23086782024-06-22T11:18:59Z2024-06-22T11:18:59Zby O'Leary, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484204573">https://learning.oreilly.com/library/view/~/9781484204573</a>
<a href="https://learning.oreilly.com/library/view/~/9781484204573/?ar">https://learning.oreilly.com/library/view/~/9781484204573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar">https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar</a><br/>Format: Electronic Resources<br/>Cyber Security.ent://SD_ILS/0/SD_ILS:12665062024-06-22T11:18:59Z2024-06-22T11:18:59Zby Voeller, John G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1598809">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Security and Resiliency Policy Framework.ent://SD_ILS/0/SD_ILS:12774872024-06-22T11:18:59Z2024-06-22T11:18:59Zby Vaseashta, A.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1818046">Click to View</a><br/>Format: Electronic Resources<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:22073322024-06-22T11:18:59Z2024-06-22T11:18:59Zby Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1673591">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:23015242024-06-22T11:18:59Z2024-06-22T11:18:59Zby Mowbray, Thomas J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar">https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115/?ar">https://learning.oreilly.com/library/view/~/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115">https://learning.oreilly.com/library/view/~/9781118697115</a><br/>Format: Electronic Resources<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:23031552024-06-22T11:18:59Z2024-06-22T11:18:59Zby Sood, Aditya K.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar">https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128006047/?ar">https://learning.oreilly.com/library/view/~/9780128006047/?ar</a><br/>Format: Electronic Resources<br/>Managing Trust in Cyberspace.ent://SD_ILS/0/SD_ILS:23023072024-06-22T11:18:59Z2024-06-22T11:18:59Zby Thampi, Sabu M.<br/><a href="https://learning.oreilly.com/library/view/~/9781466568457/?ar">https://learning.oreilly.com/library/view/~/9781466568457/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466568457/?ar">https://go.oreilly.com/library-access/library/view/-/9781466568457/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466568457">https://learning.oreilly.com/library/view/~/9781466568457</a><br/>Format: Electronic Resources<br/>Cyber Conflict : Competing National Perspectives.ent://SD_ILS/0/SD_ILS:12542592024-06-22T11:18:59Z2024-06-22T11:18:59Zby Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1124641">Click to View</a><br/>Format: Electronic Resources<br/>Advances in cyber security : technology, operations, and experiencesent://SD_ILS/0/SD_ILS:13884052024-06-22T11:18:59Z2024-06-22T11:18:59Zby Hsu, D. Frank (Derbiau Frank), 1948- editor.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4803841">Click to View</a><br/>Format: Electronic Resources<br/>Cyber conflict : competing national perspectivesent://SD_ILS/0/SD_ILS:22975902024-06-22T11:18:59Z2024-06-22T11:18:59Zby Ventre, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781118562741">https://learning.oreilly.com/library/view/~/9781118562741</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118562741/?ar">https://go.oreilly.com/library-access/library/view/-/9781118562741/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118562741/?ar">https://learning.oreilly.com/library/view/~/9781118562741/?ar</a><br/>Format: Electronic Resources<br/>Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security.ent://SD_ILS/0/SD_ILS:12976772024-06-22T11:18:59Z2024-06-22T11:18:59Zby Demchak, Chris C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3039013">Click to View</a><br/>Format: Electronic Resources<br/>Cyber warfare : techniques, tactics and tools for security practitionersent://SD_ILS/0/SD_ILS:22925012024-06-22T11:18:59Z2024-06-22T11:18:59Zby Andress, Jason.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496377/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496377/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496377/?ar">https://learning.oreilly.com/library/view/~/9781597496377/?ar</a><br/>Format: Electronic Resources<br/>Cyber-security and global information assurance threat analysis and response solutionsent://SD_ILS/0/SD_ILS:22612722024-06-22T11:18:59Z2024-06-22T11:18:59Zby Knapp, Kenneth J.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5</a><br/>Format: Electronic Resources<br/>