Search Results for - Narrowed by: Computer networks -- Security measures. - Cyberterrorism -- Prevention. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Cyberterrorism$002b--$002bPrevention.$002509Cyberterrorism$002b--$002bPrevention.$0026ps$003d300? 2024-05-30T20:38:32Z Practical cyber intelligence : how action-based intelligence can be an effective response to incidents ent://SD_ILS/0/SD_ILS:2316348 2024-05-30T20:38:32Z 2024-05-30T20:38:32Z by&#160;Bautista, Wilson, Jr., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788625562">https://learning.oreilly.com/library/view/~/9781788625562</a> <a href="https://learning.oreilly.com/library/view/~/9781788625562/?ar">https://learning.oreilly.com/library/view/~/9781788625562/?ar</a><br/>Format:&#160;Electronic Resources<br/> North Korea's cyber operations : strategy and responses ent://SD_ILS/0/SD_ILS:2264327 2024-05-30T20:38:32Z 2024-05-30T20:38:32Z by&#160;Jun, Jenny, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4332477">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013. ent://SD_ILS/0/SD_ILS:1274585 2024-05-30T20:38:32Z 2024-05-30T20:38:32Z by&#160;Furnell, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1752831">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and IT Infrastructure Protection. ent://SD_ILS/0/SD_ILS:1261962 2024-05-30T20:38:32Z 2024-05-30T20:38:32Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1377640">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber conflict : competing national perspectives ent://SD_ILS/0/SD_ILS:2297590 2024-05-30T20:38:32Z 2024-05-30T20:38:32Z by&#160;Ventre, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781118562741">https://learning.oreilly.com/library/view/~/9781118562741</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118562741/?ar">https://go.oreilly.com/library-access/library/view/-/9781118562741/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118562741/?ar">https://learning.oreilly.com/library/view/~/9781118562741/?ar</a><br/>Format:&#160;Electronic Resources<br/> Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security. ent://SD_ILS/0/SD_ILS:1297677 2024-05-30T20:38:32Z 2024-05-30T20:38:32Z by&#160;Demchak, Chris C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3039013">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Toward a Safer and More Secure Cyberspace. ent://SD_ILS/0/SD_ILS:1320138 2024-05-30T20:38:32Z 2024-05-30T20:38:32Z by&#160;Committee on Improving Cybersecurity Research in the United States, National Research Council.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3378311">Click to View</a><br/>Format:&#160;Electronic Resources<br/>