Search Results for - Narrowed by: Computer networks -- Security measures. - Cyberspace -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Cyberspace$002b--$002bSecurity$002bmeasures.$002509Cyberspace$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue? 2024-06-22T11:18:59Z Cyberspace and cybersecurity ent://SD_ILS/0/SD_ILS:2260769 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;Kostopoulos, George K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5110029">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity incident response : how to contain, eradicate, and recover from incidents ent://SD_ILS/0/SD_ILS:2317670 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;Thompson, Eric C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484238707/?ar">https://learning.oreilly.com/library/view/~/9781484238707/?ar</a><br/>Format:&#160;Electronic Resources<br/> The second economy : the race for trust, treasure and time in the cybersecurity war ent://SD_ILS/0/SD_ILS:2312552 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber operations : building, defending, and attacking modern computer networks ent://SD_ILS/0/SD_ILS:2308678 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;O'Leary, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484204573">https://learning.oreilly.com/library/view/~/9781484204573</a> <a href="https://learning.oreilly.com/library/view/~/9781484204573/?ar">https://learning.oreilly.com/library/view/~/9781484204573/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar">https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security. ent://SD_ILS/0/SD_ILS:1266506 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;Voeller, John G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1598809">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and Resiliency Policy Framework. ent://SD_ILS/0/SD_ILS:1277487 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;Vaseashta, A.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1818046">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:2207332 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1673591">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity : managing systems, conducting testing, and investigating intrusions ent://SD_ILS/0/SD_ILS:2301524 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;Mowbray, Thomas J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar">https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118697115/?ar">https://learning.oreilly.com/library/view/~/9781118697115/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118697115">https://learning.oreilly.com/library/view/~/9781118697115</a><br/>Format:&#160;Electronic Resources<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:2303155 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;Sood, Aditya K.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar">https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128006047/?ar">https://learning.oreilly.com/library/view/~/9780128006047/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing Trust in Cyberspace. ent://SD_ILS/0/SD_ILS:2302307 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;Thampi, Sabu M.<br/><a href="https://learning.oreilly.com/library/view/~/9781466568457/?ar">https://learning.oreilly.com/library/view/~/9781466568457/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466568457/?ar">https://go.oreilly.com/library-access/library/view/-/9781466568457/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466568457">https://learning.oreilly.com/library/view/~/9781466568457</a><br/>Format:&#160;Electronic Resources<br/> Cyber Conflict : Competing National Perspectives. ent://SD_ILS/0/SD_ILS:1254259 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1124641">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in cyber security : technology, operations, and experiences ent://SD_ILS/0/SD_ILS:1388405 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;Hsu, D. Frank (Derbiau Frank), 1948- editor.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4803841">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber conflict : competing national perspectives ent://SD_ILS/0/SD_ILS:2297590 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;Ventre, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781118562741">https://learning.oreilly.com/library/view/~/9781118562741</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118562741/?ar">https://go.oreilly.com/library-access/library/view/-/9781118562741/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118562741/?ar">https://learning.oreilly.com/library/view/~/9781118562741/?ar</a><br/>Format:&#160;Electronic Resources<br/> Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security. ent://SD_ILS/0/SD_ILS:1297677 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;Demchak, Chris C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3039013">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber warfare : techniques, tactics and tools for security practitioners ent://SD_ILS/0/SD_ILS:2292501 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;Andress, Jason.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496377/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496377/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496377/?ar">https://learning.oreilly.com/library/view/~/9781597496377/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber-security and global information assurance threat analysis and response solutions ent://SD_ILS/0/SD_ILS:2261272 2024-06-22T11:18:59Z 2024-06-22T11:18:59Z by&#160;Knapp, Kenneth J.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5</a><br/>Format:&#160;Electronic Resources<br/>