Search Results for - Narrowed by: Computer networks -- Security measures. - Electronic information resources -- Access control. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Electronic$002binformation$002bresources$002b--$002bAccess$002bcontrol.$002509Electronic$002binformation$002bresources$002b--$002bAccess$002bcontrol.$0026ps$003d300? 2024-06-08T15:32:16Z Security operations in practice ent://SD_ILS/0/SD_ILS:2333929 2024-06-08T15:32:16Z 2024-06-08T15:32:16Z by&#160;Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175089/?ar">https://learning.oreilly.com/library/view/~/9781780175089/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780175089">https://learning.oreilly.com/library/view/~/9781780175089</a><br/>Format:&#160;Electronic Resources<br/> Foundations of information security : a straightforward introduction ent://SD_ILS/0/SD_ILS:2322313 2024-06-08T15:32:16Z 2024-06-08T15:32:16Z by&#160;Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098122546/?ar">https://learning.oreilly.com/library/view/~/9781098122546/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098122546">https://learning.oreilly.com/library/view/~/9781098122546</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar</a><br/>Format:&#160;Electronic Resources<br/> Bezpieczenstwo tozsamosci i danych w projektach Web ent://SD_ILS/0/SD_ILS:2324505 2024-06-08T15:32:16Z 2024-06-08T15:32:16Z by&#160;LeBlanc, Jonathan.<br/><a href="https://learning.oreilly.com/library/view/~/9788375412093/?ar">https://learning.oreilly.com/library/view/~/9788375412093/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9788375412093/?ar">https://go.oreilly.com/library-access/library/view/-/9788375412093/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9788375412093">https://learning.oreilly.com/library/view/~/9788375412093</a><br/>Format:&#160;Electronic Resources<br/> Identity and data security for web development : best practices ent://SD_ILS/0/SD_ILS:2310821 2024-06-08T15:32:16Z 2024-06-08T15:32:16Z by&#160;LeBlanc, Jonathan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491937006">https://learning.oreilly.com/library/view/~/9781491937006</a> <a href="https://learning.oreilly.com/library/view/~/9781491937006/?ar">https://learning.oreilly.com/library/view/~/9781491937006/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491937006/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937006/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security Intelligence : A Practitioner's Guide to Solving Enterprise Security Challenges. ent://SD_ILS/0/SD_ILS:1280051 2024-06-08T15:32:16Z 2024-06-08T15:32:16Z by&#160;Li, Qing.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1895130">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Managing information security breaches : studies from real life ent://SD_ILS/0/SD_ILS:2308836 2024-06-08T15:32:16Z 2024-06-08T15:32:16Z by&#160;Krausz, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285964/?ar">https://learning.oreilly.com/library/view/~/9781849285964/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Tester's Open Source Toolkit. ent://SD_ILS/0/SD_ILS:1186046 2024-06-08T15:32:16Z 2024-06-08T15:32:16Z by&#160;Faircloth, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254834">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Platforms: TCPA Technology in Context ent://SD_ILS/0/SD_ILS:2326640 2024-06-08T15:32:16Z 2024-06-08T15:32:16Z by&#160;Pearson, Siani, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0130092207/?ar">https://go.oreilly.com/library-access/library/view/-/0130092207/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0130092207">https://learning.oreilly.com/library/view/~/0130092207</a> <a href="https://learning.oreilly.com/library/view/~/0130092207/?ar">https://learning.oreilly.com/library/view/~/0130092207/?ar</a><br/>Format:&#160;Electronic Resources<br/>