Search Results for - Narrowed by: Computer security. - 2000SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092000$0025092000$0026ps$003d300?2024-05-29T15:28:23ZPanoptikon gözün iktidarı =b Panoptikon : vart gjennomsiktige samfunnent://SD_ILS/0/SD_ILS:857412024-05-29T15:28:23Z2024-05-29T15:28:23Zby Apenes, Georg.<br/>Format: Books<br/>Data Privacy in the Information Age.ent://SD_ILS/0/SD_ILS:11901542024-05-29T15:28:23Z2024-05-29T15:28:23Zby Klosek, Jacqueline.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=282745">Click to View</a><br/>Format: Electronic Resources<br/>Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information.ent://SD_ILS/0/SD_ILS:13195732024-05-29T15:28:23Z2024-05-29T15:28:23Zby Council, National Research.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3377658">Click to View</a><br/>Format: Electronic Resources<br/>Data privacy in the information ageent://SD_ILS/0/SD_ILS:2651402024-05-29T15:28:23Z2024-05-29T15:28:23Zby Klosek, Jacqueline, 1972-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194</a><br/>Format: Electronic Resources<br/>Microsoft Windows 2000 security handbookent://SD_ILS/0/SD_ILS:22811702024-05-29T15:28:23Z2024-05-29T15:28:23Zby Schmidt, Jeff, MCSE.<br/><a href="https://learning.oreilly.com/library/view/~/0789719991">https://learning.oreilly.com/library/view/~/0789719991</a>
<a href="https://learning.oreilly.com/library/view/~/0789719991/?ar">https://learning.oreilly.com/library/view/~/0789719991/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0789719991/?ar">https://go.oreilly.com/library-access/library/view/-/0789719991/?ar</a><br/>Format: Electronic Resources<br/>Database nation : the death of privacy in the 21st centuryent://SD_ILS/0/SD_ILS:22806412024-05-29T15:28:23Z2024-05-29T15:28:23Zby Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596001053">https://learning.oreilly.com/library/view/~/0596001053</a>
<a href="https://learning.oreilly.com/library/view/~/0596001053/?ar">https://learning.oreilly.com/library/view/~/0596001053/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596001053/?ar">https://go.oreilly.com/library-access/library/view/-/0596001053/?ar</a><br/>Format: Electronic Resources<br/>Maximum Linux security : a hacker's guide to protecting your Linux server and workstationent://SD_ILS/0/SD_ILS:22811372024-05-29T15:28:23Z2024-05-29T15:28:23Z<a href="https://learning.oreilly.com/library/view/~/0672316706/?ar">https://learning.oreilly.com/library/view/~/0672316706/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672316706/?ar">https://go.oreilly.com/library-access/library/view/-/0672316706/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672316706">https://learning.oreilly.com/library/view/~/0672316706</a><br/>Format: Electronic Resources<br/>Java security handbookent://SD_ILS/0/SD_ILS:22813272024-05-29T15:28:23Z2024-05-29T15:28:23Zby Jaworski, Jamie.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672316021/?ar">https://go.oreilly.com/library-access/library/view/-/0672316021/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672316021">https://learning.oreilly.com/library/view/~/0672316021</a>
<a href="https://learning.oreilly.com/library/view/~/0672316021/?ar">https://learning.oreilly.com/library/view/~/0672316021/?ar</a><br/>Format: Electronic Resources<br/>