Search Results for - Narrowed by: Computer security. - United States. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509United$002bStates.$002509United$002bStates.$0026ps$003d300? 2024-05-31T05:15:43Z Cybersecurity and local government ent://SD_ILS/0/SD_ILS:2331746 2024-05-31T05:15:43Z 2024-05-31T05:15:43Z by&#160;Norris, Donald F., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119788287/?ar">https://learning.oreilly.com/library/view/~/9781119788287/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119788287">https://learning.oreilly.com/library/view/~/9781119788287</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119788287/?ar">https://go.oreilly.com/library-access/library/view/-/9781119788287/?ar</a><br/>Format:&#160;Electronic Resources<br/> Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering (CCE) ent://SD_ILS/0/SD_ILS:2326323 2024-05-31T05:15:43Z 2024-05-31T05:15:43Z by&#160;Bochman, Andrew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781000292978/?ar">https://go.oreilly.com/library-access/library/view/-/9781000292978/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781000292978/?ar">https://learning.oreilly.com/library/view/~/9781000292978/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781000292978">https://learning.oreilly.com/library/view/~/9781000292978</a><br/>Format:&#160;Electronic Resources<br/> The future of cyber security and security innovation. ent://SD_ILS/0/SD_ILS:2308889 2024-05-31T05:15:43Z 2024-05-31T05:15:43Z by&#160;Suits and spooks conference (2015 : New York, N.Y.)<br/><a href="https://learning.oreilly.com/videos/~/9781491937198/?ar">https://learning.oreilly.com/videos/~/9781491937198/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar</a><br/>Format:&#160;Electronic Resources<br/> FISMA and the risk management framework : the new practice of federal cyber security ent://SD_ILS/0/SD_ILS:2296615 2024-05-31T05:15:43Z 2024-05-31T05:15:43Z by&#160;Gantz, Stephen D.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496414">https://learning.oreilly.com/library/view/~/9781597496414</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496414/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496414/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496414/?ar">https://learning.oreilly.com/library/view/~/9781597496414/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit ent://SD_ILS/0/SD_ILS:2295823 2024-05-31T05:15:43Z 2024-05-31T05:15:43Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format:&#160;Electronic Resources<br/> Healthcare fraud : auditing and detection guide ent://SD_ILS/0/SD_ILS:2294132 2024-05-31T05:15:43Z 2024-05-31T05:15:43Z by&#160;Busch, Rebecca S.<br/><a href="https://learning.oreilly.com/library/view/~/9781118240250/?ar">https://learning.oreilly.com/library/view/~/9781118240250/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118240250/?ar">https://go.oreilly.com/library-access/library/view/-/9781118240250/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118240250">https://learning.oreilly.com/library/view/~/9781118240250</a><br/>Format:&#160;Electronic Resources<br/> Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection ent://SD_ILS/0/SD_ILS:2286982 2024-05-31T05:15:43Z 2024-05-31T05:15:43Z by&#160;Collberg, Christian.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591258/?ar">https://learning.oreilly.com/library/view/~/9780321591258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar</a><br/>Format:&#160;Electronic Resources<br/> Geekonomics : the real cost of insecure software ent://SD_ILS/0/SD_ILS:2284350 2024-05-31T05:15:43Z 2024-05-31T05:15:43Z by&#160;Rice, David, 1971-<br/><a href="https://learning.oreilly.com/library/view/~/9780321477897/?ar">https://learning.oreilly.com/library/view/~/9780321477897/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321477897/?ar">https://go.oreilly.com/library-access/library/view/-/9780321477897/?ar</a><br/>Format:&#160;Electronic Resources<br/> Schneier on security ent://SD_ILS/0/SD_ILS:2286552 2024-05-31T05:15:43Z 2024-05-31T05:15:43Z by&#160;Schneier, Bruce, 1963-<br/><a href="https://learning.oreilly.com/library/view/~/9780470395356/?ar">https://learning.oreilly.com/library/view/~/9780470395356/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470395356/?ar">https://go.oreilly.com/library-access/library/view/-/9780470395356/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470395356">https://learning.oreilly.com/library/view/~/9780470395356</a><br/>Format:&#160;Electronic Resources<br/> The business case for network security : advocacy, governance, and ROI ent://SD_ILS/0/SD_ILS:2281646 2024-05-31T05:15:43Z 2024-05-31T05:15:43Z by&#160;Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587201216/?ar">https://go.oreilly.com/library-access/library/view/-/1587201216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587201216/?ar">https://learning.oreilly.com/library/view/~/1587201216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587201216">https://learning.oreilly.com/library/view/~/1587201216</a><br/>Format:&#160;Electronic Resources<br/> Database nation : the death of privacy in the 21st century ent://SD_ILS/0/SD_ILS:2280641 2024-05-31T05:15:43Z 2024-05-31T05:15:43Z by&#160;Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596001053">https://learning.oreilly.com/library/view/~/0596001053</a> <a href="https://learning.oreilly.com/library/view/~/0596001053/?ar">https://learning.oreilly.com/library/view/~/0596001053/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596001053/?ar">https://go.oreilly.com/library-access/library/view/-/0596001053/?ar</a><br/>Format:&#160;Electronic Resources<br/>