Search Results for - Narrowed by: Computer security. - Information technology -- Security measures. - Syst&egrave;mes informatiques -- Acc&egrave;s -- Contr&ocirc;le. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Information$002btechnology$002b--$002bSecurity$002bmeasures.$002509Information$002btechnology$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Syst$0025C3$0025A8mes$002binformatiques$002b--$002bAcc$0025C3$0025A8s$002b--$002bContr$0025C3$0025B4le.$002509Syst$0025C3$0025A8mes$002binformatiques$002b--$002bAcc$0025C3$0025A8s$002b--$002bContr$0025C3$0025B4le.$0026ps$003d300? 2024-09-26T06:52:57Z Protecting Data Privacy Beyond the Trusted System of Record ent://SD_ILS/0/SD_ILS:2323918 2024-09-26T06:52:57Z 2024-09-26T06:52:57Z by&#160;White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a> <a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM Security Key Lifecycle Manager ent://SD_ILS/0/SD_ILS:2323982 2024-09-26T06:52:57Z 2024-09-26T06:52:57Z by&#160;Chen, An, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458786/?ar">https://learning.oreilly.com/library/view/~/9780738458786/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458786">https://learning.oreilly.com/library/view/~/9780738458786</a><br/>Format:&#160;Electronic Resources<br/>