Search Results for - Narrowed by: Computer networks -- Security measures. - Internet SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Internet$002509Internet$0026ps$003d300? 2024-05-27T00:46:35Z Enterprise cloud security and governance : efficiently set data protection and privacy principles ent://SD_ILS/0/SD_ILS:2315410 2024-05-27T00:46:35Z 2024-05-27T00:46:35Z by&#160;Vora, Zeal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788299558/?ar">https://learning.oreilly.com/library/view/~/9781788299558/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788299558/?ar">https://go.oreilly.com/library-access/library/view/-/9781788299558/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical anonymity : hiding in plain sight online ent://SD_ILS/0/SD_ILS:2299515 2024-05-27T00:46:35Z 2024-05-27T00:46:35Z by&#160;Loshin, Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar">https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124104044/?ar">https://learning.oreilly.com/library/view/~/9780124104044/?ar</a><br/>Format:&#160;Electronic Resources<br/> Disappearing cryptography : information hiding, steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:2287580 2024-05-27T00:46:35Z 2024-05-27T00:46:35Z by&#160;Wayner, Peter, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780123744791/?ar">https://learning.oreilly.com/library/view/~/9780123744791/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar">https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security hacks ent://SD_ILS/0/SD_ILS:2282983 2024-05-27T00:46:35Z 2024-05-27T00:46:35Z by&#160;Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596527632/?ar">https://go.oreilly.com/library-access/library/view/-/0596527632/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596527632">https://learning.oreilly.com/library/view/~/0596527632</a> <a href="https://learning.oreilly.com/library/view/~/0596527632/?ar">https://learning.oreilly.com/library/view/~/0596527632/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to break Web software : functional and security testing of Web applications and Web services ent://SD_ILS/0/SD_ILS:2286432 2024-05-27T00:46:35Z 2024-05-27T00:46:35Z by&#160;Andrews, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321657497/?ar">https://go.oreilly.com/library-access/library/view/-/9780321657497/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321657497/?ar">https://learning.oreilly.com/library/view/~/9780321657497/?ar</a><br/>Format:&#160;Electronic Resources<br/> Disappearing cryptography : information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:2280752 2024-05-27T00:46:35Z 2024-05-27T00:46:35Z by&#160;Wayner, Peter, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9781558607699/?ar">https://learning.oreilly.com/library/view/~/9781558607699/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781558607699/?ar">https://go.oreilly.com/library-access/library/view/-/9781558607699/?ar</a><br/>Format:&#160;Electronic Resources<br/>