Search Results for - Narrowed by: Computer security. - Information technology -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Information$002btechnology$002b--$002bSecurity$002bmeasures.$002509Information$002btechnology$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-05-26T12:48:27ZFight fire with fire : proactive cybersecurity strategies for today's leadersent://SD_ILS/0/SD_ILS:23309142024-05-26T12:48:27Z2024-05-26T12:48:27Zby Tarun, Renee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119854265/?ar">https://learning.oreilly.com/library/view/~/9781119854265/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119854265">https://learning.oreilly.com/library/view/~/9781119854265</a><br/>Format: Electronic Resources<br/>Risk management for cyber security managers.ent://SD_ILS/0/SD_ILS:23355242024-05-26T12:48:27Z2024-05-26T12:48:27Zby Oni, Alexander, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837639878/?ar">https://learning.oreilly.com/videos/~/9781837639878/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837639878/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639878/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639878">https://learning.oreilly.com/videos/~/9781837639878</a><br/>Format: Video recording<br/>The complete cybersecurity bootcampent://SD_ILS/0/SD_ILS:23334072024-05-26T12:48:27Z2024-05-26T12:48:27Zby Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137949397">https://learning.oreilly.com/videos/~/9780137949397</a>
<a href="https://learning.oreilly.com/videos/~/9780137949397/?ar">https://learning.oreilly.com/videos/~/9780137949397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar">https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar</a><br/>Format: Video recording<br/>Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadarent://SD_ILS/0/SD_ILS:23320572024-05-26T12:48:27Z2024-05-26T12:48:27Zby IBM Storage Team, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260/?ar">https://learning.oreilly.com/library/view/~/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260">https://learning.oreilly.com/library/view/~/9780738460260</a><br/>Format: Electronic Resources<br/>Making sense of cybersecurityent://SD_ILS/0/SD_ILS:23350002024-05-26T12:48:27Z2024-05-26T12:48:27Zby Kranz, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617298004/?ar">https://learning.oreilly.com/library/view/~/9781617298004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617298004">https://learning.oreilly.com/library/view/~/9781617298004</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar">https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar</a><br/>Format: Electronic Resources<br/>Mastering Defensive Security : Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure.ent://SD_ILS/0/SD_ILS:23308412024-05-26T12:48:27Z2024-05-26T12:48:27Zby Bravo, Cesar.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar">https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800208162/?ar">https://learning.oreilly.com/library/view/~/9781800208162/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800208162">https://learning.oreilly.com/library/view/~/9781800208162</a><br/>Format: Electronic Resources<br/>Shifting left for application security : bridging the divide between DevOps and security with the right security toolsent://SD_ILS/0/SD_ILS:23325752024-05-26T12:48:27Z2024-05-26T12:48:27Zby Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format: Electronic Resources<br/>Protecting Data Privacy Beyond the Trusted System of Recordent://SD_ILS/0/SD_ILS:23239182024-05-26T12:48:27Z2024-05-26T12:48:27Zby White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format: Electronic Resources<br/>IBM Security Key Lifecycle Managerent://SD_ILS/0/SD_ILS:23239822024-05-26T12:48:27Z2024-05-26T12:48:27Zby Chen, An, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458786/?ar">https://learning.oreilly.com/library/view/~/9780738458786/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458786">https://learning.oreilly.com/library/view/~/9780738458786</a><br/>Format: Electronic Resources<br/>Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your dataent://SD_ILS/0/SD_ILS:23222042024-05-26T12:48:27Z2024-05-26T12:48:27Zby Chakrabarty, Boudhayan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458014/?ar">https://learning.oreilly.com/library/view/~/9780738458014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458014">https://learning.oreilly.com/library/view/~/9780738458014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar</a><br/>Format: Electronic Resources<br/>Privileged attack vectors : building effective cyber-defense strategies to protect organizationsent://SD_ILS/0/SD_ILS:23148702024-05-26T12:48:27Z2024-05-26T12:48:27Zby Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format: Electronic Resources<br/>Information security science : measuring the vulnerability to data compromisesent://SD_ILS/0/SD_ILS:22103282024-05-26T12:48:27Z2024-05-26T12:48:27Zby Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4567434">Click to View</a><br/>Format: Electronic Resources<br/>The Complete Guide to Cybersecurity Risks and Controlsent://SD_ILS/0/SD_ILS:23245242024-05-26T12:48:27Z2024-05-26T12:48:27Zby Kohnke, Anne, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar">https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579/?ar">https://learning.oreilly.com/library/view/~/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579">https://learning.oreilly.com/library/view/~/9781498740579</a><br/>Format: Electronic Resources<br/>Facing cyber threats head on : protecting yourself and your businessent://SD_ILS/0/SD_ILS:22662742024-05-26T12:48:27Z2024-05-26T12:48:27Zby Minick, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4773207">Click to View</a><br/>Format: Electronic Resources<br/>Information security : a practical guide : bridging the gap between IT and managementent://SD_ILS/0/SD_ILS:23088522024-05-26T12:48:27Z2024-05-26T12:48:27Zby Mooney, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849287418/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287418/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849287418/?ar">https://learning.oreilly.com/library/view/~/9781849287418/?ar</a><br/>Format: Electronic Resources<br/>Learning Puppet Security : secure your IT environments with the powerful secuity tools of Puppetent://SD_ILS/0/SD_ILS:23069482024-05-26T12:48:27Z2024-05-26T12:48:27Zby Slagle, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784397753/?ar">https://go.oreilly.com/library-access/library/view/-/9781784397753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784397753">https://learning.oreilly.com/library/view/~/9781784397753</a>
<a href="https://learning.oreilly.com/library/view/~/9781784397753/?ar">https://learning.oreilly.com/library/view/~/9781784397753/?ar</a><br/>Format: Electronic Resources<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:23031052024-05-26T12:48:27Z2024-05-26T12:48:27Zby Messier, Ric.<br/><a href="https://learning.oreilly.com/library/view/~/9780124170407/?ar">https://learning.oreilly.com/library/view/~/9780124170407/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar">https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:23032942024-05-26T12:48:27Z2024-05-26T12:48:27Zby Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:23015242024-05-26T12:48:27Z2024-05-26T12:48:27Zby Mowbray, Thomas J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar">https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115/?ar">https://learning.oreilly.com/library/view/~/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115">https://learning.oreilly.com/library/view/~/9781118697115</a><br/>Format: Electronic Resources<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:23032672024-05-26T12:48:27Z2024-05-26T12:48:27Zby Stapleton, Jeffrey James.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592155">https://learning.oreilly.com/library/view/~/9781466592155</a>
<a href="https://learning.oreilly.com/library/view/~/9781466592155/?ar">https://learning.oreilly.com/library/view/~/9781466592155/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar</a><br/>Format: Electronic Resources<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:23034122024-05-26T12:48:27Z2024-05-26T12:48:27Zby Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format: Electronic Resources<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:22703482024-05-26T12:48:27Z2024-05-26T12:48:27Zby Stapleton, Jeffrey James, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1538312">Click to View</a><br/>Format: Electronic Resources<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:22073392024-05-26T12:48:27Z2024-05-26T12:48:27Zby Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1675198">Click to View</a><br/>Format: Electronic Resources<br/>IT-Sicherheit Konzepte - Verfahren - Protokolle.ent://SD_ILS/0/SD_ILS:5281052024-05-26T12:48:27Z2024-05-26T12:48:27Zby Eckert, Claudia.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=757549">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=757549</a><br/>Format: Electronic Resources<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:22975342024-05-26T12:48:27Z2024-05-26T12:48:27Zby Yang, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047020">https://learning.oreilly.com/library/view/~/9780124047020</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124047020/?ar">https://learning.oreilly.com/library/view/~/9780124047020/?ar</a><br/>Format: Electronic Resources<br/>FISMA and the risk management framework : the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:22966152024-05-26T12:48:27Z2024-05-26T12:48:27Zby Gantz, Stephen D.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496414">https://learning.oreilly.com/library/view/~/9781597496414</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496414/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496414/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496414/?ar">https://learning.oreilly.com/library/view/~/9781597496414/?ar</a><br/>Format: Electronic Resources<br/>The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)ent://SD_ILS/0/SD_ILS:22941702024-05-26T12:48:27Z2024-05-26T12:48:27Zby Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format: Electronic Resources<br/>Security de-engineering : solving the problems in information risk managementent://SD_ILS/0/SD_ILS:22959952024-05-26T12:48:27Z2024-05-26T12:48:27Zby Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a>
<a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format: Electronic Resources<br/>Vulnerability managementent://SD_ILS/0/SD_ILS:22938422024-05-26T12:48:27Z2024-05-26T12:48:27Zby Foreman, Park.<br/><a href="https://learning.oreilly.com/library/view/~/9781439801512">https://learning.oreilly.com/library/view/~/9781439801512</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439801512/?ar">https://go.oreilly.com/library-access/library/view/-/9781439801512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439801512/?ar">https://learning.oreilly.com/library/view/~/9781439801512/?ar</a><br/>Format: Electronic Resources<br/>Definitive Guide to the C&A Transformation Process : The First Publication of a Comprehensive View of the C&A Transformation.ent://SD_ILS/0/SD_ILS:12161552024-05-26T12:48:27Z2024-05-26T12:48:27Zby Mehan, Julie.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=547041">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise Information Security and Privacy.ent://SD_ILS/0/SD_ILS:12077182024-05-26T12:48:27Z2024-05-26T12:48:27Zby Axelrod, C. Warren.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456886">Click to View</a><br/>Format: Electronic Resources<br/>Advances in Artificial Intelligence for Privacy Protection and Security.ent://SD_ILS/0/SD_ILS:12707052024-05-26T12:48:27Z2024-05-26T12:48:27Zby Solanas, Agusti.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679374">Click to View</a><br/>Format: Electronic Resources<br/>Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issuesent://SD_ILS/0/SD_ILS:22619692024-05-26T12:48:27Z2024-05-26T12:48:27Zby Nemati, Hamid R., 1958-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7</a><br/>Format: Electronic Resources<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:22866302024-05-26T12:48:27Z2024-05-26T12:48:27Zby Brotby, W. Krag, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar">https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862/?ar">https://learning.oreilly.com/library/view/~/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862">https://learning.oreilly.com/library/view/~/9781420052862</a><br/>Format: Electronic Resources<br/>The new school of information securityent://SD_ILS/0/SD_ILS:22850322024-05-26T12:48:27Z2024-05-26T12:48:27Zby Shostack, Adam.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321562753/?ar">https://go.oreilly.com/library-access/library/view/-/9780321562753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321562753/?ar">https://learning.oreilly.com/library/view/~/9780321562753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321562753">https://learning.oreilly.com/library/view/~/9780321562753</a><br/>Format: Electronic Resources<br/>Ten rules of information security for the smaller business : a plain English guideent://SD_ILS/0/SD_ILS:22896292024-05-26T12:48:27Z2024-05-26T12:48:27Zby Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781905356553/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356553/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356553/?ar">https://learning.oreilly.com/library/view/~/9781905356553/?ar</a><br/>Format: Electronic Resources<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:20480172024-05-26T12:48:27Z2024-05-26T12:48:27Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=339307">Click to View</a><br/>Format: Electronic Resources<br/>Advances in enterprise information technology securityent://SD_ILS/0/SD_ILS:22611032024-05-26T12:48:27Z2024-05-26T12:48:27Zby Khadraoui, Djamel.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5</a><br/>Format: Electronic Resources<br/>Dictionary of information securityent://SD_ILS/0/SD_ILS:22823182024-05-26T12:48:27Z2024-05-26T12:48:27Zby Slade, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491150">https://learning.oreilly.com/library/view/~/9781597491150</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491150/?ar">https://learning.oreilly.com/library/view/~/9781597491150/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491150/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491150/?ar</a><br/>Format: Electronic Resources<br/>Security and Control in Information Systems : A Guide for Business and Accounting.ent://SD_ILS/0/SD_ILS:11845722024-05-26T12:48:27Z2024-05-26T12:48:27Zby Hawker, Andrew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=240531">Click to View</a><br/>Format: Electronic Resources<br/>Security assessment case studies for implementing the NSA IAMent://SD_ILS/0/SD_ILS:659382024-05-26T12:48:27Z2024-05-26T12:48:27Zby Rogers, Russ.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>