Search Results for - Narrowed by: Computer security. - Cyberspace -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Cyberspace$002b--$002bSecurity$002bmeasures.$002509Cyberspace$002b--$002bSecurity$002bmeasures.$0026ps$003d300? 2024-05-30T13:43:40Z Cyber security engineering : a practical approach for systems and software assurance ent://SD_ILS/0/SD_ILS:2311996 2024-05-30T13:43:40Z 2024-05-30T13:43:40Z by&#160;Mead, Nancy R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar">https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134189857/?ar">https://learning.oreilly.com/library/view/~/9780134189857/?ar</a><br/>Format:&#160;Electronic Resources<br/> The second economy : the race for trust, treasure and time in the cybersecurity war ent://SD_ILS/0/SD_ILS:2312552 2024-05-30T13:43:40Z 2024-05-30T13:43:40Z by&#160;Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber operations : building, defending, and attacking modern computer networks ent://SD_ILS/0/SD_ILS:2308678 2024-05-30T13:43:40Z 2024-05-30T13:43:40Z by&#160;O'Leary, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484204573">https://learning.oreilly.com/library/view/~/9781484204573</a> <a href="https://learning.oreilly.com/library/view/~/9781484204573/?ar">https://learning.oreilly.com/library/view/~/9781484204573/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar">https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Defender&rsquo;s Dilemma : Charting a Course Toward Cybersecurity. ent://SD_ILS/0/SD_ILS:1285509 2024-05-30T13:43:40Z 2024-05-30T13:43:40Z by&#160;Libicki, Martin C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2075897">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber blockades ent://SD_ILS/0/SD_ILS:527906 2024-05-30T13:43:40Z 2024-05-30T13:43:40Z by&#160;Russell, Alison Lawlor, author.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030</a><br/>Format:&#160;Electronic Resources<br/> Cyber Blockades. ent://SD_ILS/0/SD_ILS:1276999 2024-05-30T13:43:40Z 2024-05-30T13:43:40Z by&#160;Russell, Alison Lawlor.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1810129">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity : managing systems, conducting testing, and investigating intrusions ent://SD_ILS/0/SD_ILS:2301524 2024-05-30T13:43:40Z 2024-05-30T13:43:40Z by&#160;Mowbray, Thomas J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar">https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118697115/?ar">https://learning.oreilly.com/library/view/~/9781118697115/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118697115">https://learning.oreilly.com/library/view/~/9781118697115</a><br/>Format:&#160;Electronic Resources<br/> Malware, rootkits &amp; botnets : a beginner's guide ent://SD_ILS/0/SD_ILS:2297380 2024-05-30T13:43:40Z 2024-05-30T13:43:40Z by&#160;Elisan, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780071792066">https://learning.oreilly.com/library/view/~/9780071792066</a> <a href="https://learning.oreilly.com/library/view/~/9780071792066/?ar">https://learning.oreilly.com/library/view/~/9780071792066/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar">https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security for educational leaders a guide to understanding and implementing technology policies ent://SD_ILS/0/SD_ILS:2129705 2024-05-30T13:43:40Z 2024-05-30T13:43:40Z by&#160;Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1143733">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Safeguarding Critical E-Documents : Implementing a Program for Securing Confidential Information Assets. ent://SD_ILS/0/SD_ILS:1236601 2024-05-30T13:43:40Z 2024-05-30T13:43:40Z by&#160;Smallwood, Robert F.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=821999">Click to View</a><br/>Format:&#160;Electronic Resources<br/>