Search Results for - Narrowed by: Computer security. - Technologie de l'information -- Gestion. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Technologie$002bde$002bl$002527information$002b--$002bGestion.$002509Technologie$002bde$002bl$002527information$002b--$002bGestion.$0026ps$003d300$0026isd$003dtrue? 2024-09-24T21:29:11Z Cybersecurity leadership demystified : a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO ent://SD_ILS/0/SD_ILS:2331468 2024-09-24T21:29:11Z 2024-09-24T21:29:11Z by&#160;Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801819282/?ar">https://go.oreilly.com/library-access/library/view/-/9781801819282/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801819282/?ar">https://learning.oreilly.com/library/view/~/9781801819282/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801819282">https://learning.oreilly.com/library/view/~/9781801819282</a><br/>Format:&#160;Electronic Resources<br/> Shifting left for application security : bridging the divide between DevOps and security with the right security tools ent://SD_ILS/0/SD_ILS:2332575 2024-09-24T21:29:11Z 2024-09-24T21:29:11Z by&#160;Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a> <a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format:&#160;Electronic Resources<br/> Strategy, leadership, and AI in the cyber ecosystem : the role of digital societies in information governance and decision making ent://SD_ILS/0/SD_ILS:2326455 2024-09-24T21:29:11Z 2024-09-24T21:29:11Z by&#160;Jahankhani, Hamid.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128214596/?ar">https://go.oreilly.com/library-access/library/view/-/9780128214596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128214596/?ar">https://learning.oreilly.com/library/view/~/9780128214596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128214596">https://learning.oreilly.com/library/view/~/9780128214596</a><br/>Format:&#160;Electronic Resources<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:2322126 2024-09-24T21:29:11Z 2024-09-24T21:29:11Z by&#160;Kegerreis, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260453232/?ar">https://learning.oreilly.com/library/view/~/9781260453232/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar">https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data analytics for IT networks : developing innovative use cases ent://SD_ILS/0/SD_ILS:2317559 2024-09-24T21:29:11Z 2024-09-24T21:29:11Z by&#160;Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux troubleshooting course with real life examples ent://SD_ILS/0/SD_ILS:2323238 2024-09-24T21:29:11Z 2024-09-24T21:29:11Z by&#160;Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your data ent://SD_ILS/0/SD_ILS:2322204 2024-09-24T21:29:11Z 2024-09-24T21:29:11Z by&#160;Chakrabarty, Boudhayan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458014/?ar">https://learning.oreilly.com/library/view/~/9780738458014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458014">https://learning.oreilly.com/library/view/~/9780738458014</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar</a><br/>Format:&#160;Electronic Resources<br/> Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments ent://SD_ILS/0/SD_ILS:2322055 2024-09-24T21:29:11Z 2024-09-24T21:29:11Z by&#160;Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat and vulnerability assessment for enterprises ent://SD_ILS/0/SD_ILS:2319277 2024-09-24T21:29:11Z 2024-09-24T21:29:11Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781838559205/?ar">https://learning.oreilly.com/videos/~/9781838559205/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar">https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar</a><br/>Format:&#160;Electronic Resources<br/> Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud ent://SD_ILS/0/SD_ILS:2321488 2024-09-24T21:29:11Z 2024-09-24T21:29:11Z by&#160;Berkouwer, Sander, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806984">https://learning.oreilly.com/library/view/~/9781789806984</a> <a href="https://learning.oreilly.com/library/view/~/9781789806984/?ar">https://learning.oreilly.com/library/view/~/9781789806984/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar</a><br/>Format:&#160;Electronic Resources<br/> Beginning security with Microsoft technologies : protecting Office 365, devices, and data ent://SD_ILS/0/SD_ILS:2322123 2024-09-24T21:29:11Z 2024-09-24T21:29:11Z by&#160;Lakshmi, Vasantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484248539/?ar">https://learning.oreilly.com/library/view/~/9781484248539/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar">https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information Risk Management : a Practitioner's Guide ent://SD_ILS/0/SD_ILS:2305241 2024-09-24T21:29:11Z 2024-09-24T21:29:11Z by&#160;Sutton, David (Information security practitioner), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780172651">https://learning.oreilly.com/library/view/~/9781780172651</a> <a href="https://learning.oreilly.com/library/view/~/9781780172651/?ar">https://learning.oreilly.com/library/view/~/9781780172651/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780172651/?ar">https://go.oreilly.com/library-access/library/view/-/9781780172651/?ar</a><br/>Format:&#160;Electronic Resources<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:2303105 2024-09-24T21:29:11Z 2024-09-24T21:29:11Z by&#160;Messier, Ric.<br/><a href="https://learning.oreilly.com/library/view/~/9780124170407/?ar">https://learning.oreilly.com/library/view/~/9780124170407/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar">https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT Governance : Guidelines for Directors. ent://SD_ILS/0/SD_ILS:2290678 2024-09-24T21:29:11Z 2024-09-24T21:29:11Z by&#160;Calder, Alan.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281058/?ar">https://learning.oreilly.com/library/view/~/9781849281058/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281058/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281058/?ar</a><br/>Format:&#160;Electronic Resources<br/>