Search Results for - Narrowed by: Computer security. - Cyberspace -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Cyberspace$002b--$002bSecurity$002bmeasures.$002509Cyberspace$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-05-30T13:43:40ZCyber security engineering : a practical approach for systems and software assuranceent://SD_ILS/0/SD_ILS:23119962024-05-30T13:43:40Z2024-05-30T13:43:40Zby Mead, Nancy R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar">https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134189857/?ar">https://learning.oreilly.com/library/view/~/9780134189857/?ar</a><br/>Format: Electronic Resources<br/>The second economy : the race for trust, treasure and time in the cybersecurity warent://SD_ILS/0/SD_ILS:23125522024-05-30T13:43:40Z2024-05-30T13:43:40Zby Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format: Electronic Resources<br/>Cyber operations : building, defending, and attacking modern computer networksent://SD_ILS/0/SD_ILS:23086782024-05-30T13:43:40Z2024-05-30T13:43:40Zby O'Leary, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484204573">https://learning.oreilly.com/library/view/~/9781484204573</a>
<a href="https://learning.oreilly.com/library/view/~/9781484204573/?ar">https://learning.oreilly.com/library/view/~/9781484204573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar">https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar</a><br/>Format: Electronic Resources<br/>The Defender’s Dilemma : Charting a Course Toward Cybersecurity.ent://SD_ILS/0/SD_ILS:12855092024-05-30T13:43:40Z2024-05-30T13:43:40Zby Libicki, Martin C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2075897">Click to View</a><br/>Format: Electronic Resources<br/>Cyber blockadesent://SD_ILS/0/SD_ILS:5279062024-05-30T13:43:40Z2024-05-30T13:43:40Zby Russell, Alison Lawlor, author.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030</a><br/>Format: Electronic Resources<br/>Cyber Blockades.ent://SD_ILS/0/SD_ILS:12769992024-05-30T13:43:40Z2024-05-30T13:43:40Zby Russell, Alison Lawlor.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1810129">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:23015242024-05-30T13:43:40Z2024-05-30T13:43:40Zby Mowbray, Thomas J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar">https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115/?ar">https://learning.oreilly.com/library/view/~/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115">https://learning.oreilly.com/library/view/~/9781118697115</a><br/>Format: Electronic Resources<br/>Malware, rootkits & botnets : a beginner's guideent://SD_ILS/0/SD_ILS:22973802024-05-30T13:43:40Z2024-05-30T13:43:40Zby Elisan, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780071792066">https://learning.oreilly.com/library/view/~/9780071792066</a>
<a href="https://learning.oreilly.com/library/view/~/9780071792066/?ar">https://learning.oreilly.com/library/view/~/9780071792066/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar">https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar</a><br/>Format: Electronic Resources<br/>Cyber security for educational leaders a guide to understanding and implementing technology policiesent://SD_ILS/0/SD_ILS:21297052024-05-30T13:43:40Z2024-05-30T13:43:40Zby Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1143733">Click to View</a><br/>Format: Electronic Resources<br/>Safeguarding Critical E-Documents : Implementing a Program for Securing Confidential Information Assets.ent://SD_ILS/0/SD_ILS:12366012024-05-30T13:43:40Z2024-05-30T13:43:40Zby Smallwood, Robert F.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=821999">Click to View</a><br/>Format: Electronic Resources<br/>