Search Results for - Narrowed by: Data protection. - 2021SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092021$0025092021$0026ps$003d300?2024-05-23T02:17:57ZMastering Active Directory - Third Editionent://SD_ILS/0/SD_ILS:23311052024-05-23T02:17:57Z2024-05-23T02:17:57Zby Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format: Electronic Resources<br/>Google xi tong jia gou jie mi : gou jian an quan ke kao de xi tong = Building secure and reliable systemsent://SD_ILS/0/SD_ILS:23329282024-05-23T02:17:57Z2024-05-23T02:17:57Zby Adkins, Heather, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar">https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9787115569257/?ar">https://learning.oreilly.com/library/view/~/9787115569257/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9787115569257">https://learning.oreilly.com/library/view/~/9787115569257</a><br/>Format: Electronic Resources<br/>Big breaches : cybersecurity lessons for everyoneent://SD_ILS/0/SD_ILS:23281262024-05-23T02:17:57Z2024-05-23T02:17:57Zby Daswani, Neil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484266557">https://learning.oreilly.com/library/view/~/9781484266557</a>
<a href="https://learning.oreilly.com/library/view/~/9781484266557/?ar">https://learning.oreilly.com/library/view/~/9781484266557/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar">https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar</a><br/>Format: Electronic Resources<br/>Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisionsent://SD_ILS/0/SD_ILS:23284852024-05-23T02:17:57Z2024-05-23T02:17:57Zby Moore, Richard O., III, 1971- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469082707">https://learning.oreilly.com/library/view/~/9781469082707</a>
<a href="https://learning.oreilly.com/library/view/~/9781469082707/?ar">https://learning.oreilly.com/library/view/~/9781469082707/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469082707/?ar">https://go.oreilly.com/library-access/library/view/-/9781469082707/?ar</a><br/>Format: Electronic Resources<br/>Self-sovereign identity : decentralized digital identity and verifiable credentialsent://SD_ILS/0/SD_ILS:23302702024-05-23T02:17:57Z2024-05-23T02:17:57Zby Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format: Electronic Resources<br/>Pro Google cloud automation : with Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkinsent://SD_ILS/0/SD_ILS:23275092024-05-23T02:17:57Z2024-05-23T02:17:57Zby Sabharwal, Navin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265734/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265734/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265734/?ar">https://learning.oreilly.com/library/view/~/9781484265734/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265734">https://learning.oreilly.com/library/view/~/9781484265734</a><br/>Format: Electronic Resources<br/>Secure operations and protectionsent://SD_ILS/0/SD_ILS:23320922024-05-23T02:17:57Z2024-05-23T02:17:57Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format: Video recording<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:23270532024-05-23T02:17:57Z2024-05-23T02:17:57Zby Moschovitis, Christos J. P., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119658740">https://learning.oreilly.com/library/view/~/9781119658740</a>
<a href="https://learning.oreilly.com/library/view/~/9781119658740/?ar">https://learning.oreilly.com/library/view/~/9781119658740/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar">https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar</a><br/>Format: Electronic Resources<br/>