Search Results for - Narrowed by: Computer security. - 2000 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092000$0025092000$0026ps$003d300? 2024-05-29T15:28:23Z Panoptikon g&ouml;z&uuml;n iktidarı =b Panoptikon : vart gjennomsiktige samfunn ent://SD_ILS/0/SD_ILS:85741 2024-05-29T15:28:23Z 2024-05-29T15:28:23Z by&#160;Apenes, Georg.<br/>Format:&#160;Books<br/> Data Privacy in the Information Age. ent://SD_ILS/0/SD_ILS:1190154 2024-05-29T15:28:23Z 2024-05-29T15:28:23Z by&#160;Klosek, Jacqueline.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=282745">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information. ent://SD_ILS/0/SD_ILS:1319573 2024-05-29T15:28:23Z 2024-05-29T15:28:23Z by&#160;Council, National Research.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3377658">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data privacy in the information age ent://SD_ILS/0/SD_ILS:265140 2024-05-29T15:28:23Z 2024-05-29T15:28:23Z by&#160;Klosek, Jacqueline, 1972-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Windows 2000 security handbook ent://SD_ILS/0/SD_ILS:2281170 2024-05-29T15:28:23Z 2024-05-29T15:28:23Z by&#160;Schmidt, Jeff, MCSE.<br/><a href="https://learning.oreilly.com/library/view/~/0789719991">https://learning.oreilly.com/library/view/~/0789719991</a> <a href="https://learning.oreilly.com/library/view/~/0789719991/?ar">https://learning.oreilly.com/library/view/~/0789719991/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0789719991/?ar">https://go.oreilly.com/library-access/library/view/-/0789719991/?ar</a><br/>Format:&#160;Electronic Resources<br/> Database nation : the death of privacy in the 21st century ent://SD_ILS/0/SD_ILS:2280641 2024-05-29T15:28:23Z 2024-05-29T15:28:23Z by&#160;Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596001053">https://learning.oreilly.com/library/view/~/0596001053</a> <a href="https://learning.oreilly.com/library/view/~/0596001053/?ar">https://learning.oreilly.com/library/view/~/0596001053/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596001053/?ar">https://go.oreilly.com/library-access/library/view/-/0596001053/?ar</a><br/>Format:&#160;Electronic Resources<br/> Maximum Linux security : a hacker's guide to protecting your Linux server and workstation ent://SD_ILS/0/SD_ILS:2281137 2024-05-29T15:28:23Z 2024-05-29T15:28:23Z <a href="https://learning.oreilly.com/library/view/~/0672316706/?ar">https://learning.oreilly.com/library/view/~/0672316706/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0672316706/?ar">https://go.oreilly.com/library-access/library/view/-/0672316706/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672316706">https://learning.oreilly.com/library/view/~/0672316706</a><br/>Format:&#160;Electronic Resources<br/> Java security handbook ent://SD_ILS/0/SD_ILS:2281327 2024-05-29T15:28:23Z 2024-05-29T15:28:23Z by&#160;Jaworski, Jamie.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672316021/?ar">https://go.oreilly.com/library-access/library/view/-/0672316021/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672316021">https://learning.oreilly.com/library/view/~/0672316021</a> <a href="https://learning.oreilly.com/library/view/~/0672316021/?ar">https://learning.oreilly.com/library/view/~/0672316021/?ar</a><br/>Format:&#160;Electronic Resources<br/>