Search Results for - Narrowed by: Data protection.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?2024-06-18T05:17:16ZData governanceent://SD_ILS/0/SD_ILS:23352012024-06-18T05:17:16Z2024-06-18T05:17:16Zby Reichental, Jonathan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119906773/?ar">https://go.oreilly.com/library-access/library/view/-/9781119906773/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119906773">https://learning.oreilly.com/library/view/~/9781119906773</a>
<a href="https://learning.oreilly.com/library/view/~/9781119906773/?ar">https://learning.oreilly.com/library/view/~/9781119906773/?ar</a><br/>Format: Electronic Resources<br/>Learning digital identity : design, deploy, and manage identity architecturesent://SD_ILS/0/SD_ILS:23347392024-06-18T05:17:16Z2024-06-18T05:17:16Zby Windley, Phillip J., 1958- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098117689/?ar">https://learning.oreilly.com/library/view/~/9781098117689/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098117689">https://learning.oreilly.com/library/view/~/9781098117689</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar">https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar</a><br/>Format: Electronic Resources<br/>System and privacy data protection.ent://SD_ILS/0/SD_ILS:23317772024-06-18T05:17:16Z2024-06-18T05:17:16Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a>
<a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format: Video recording<br/>Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000ent://SD_ILS/0/SD_ILS:23320672024-06-18T05:17:16Z2024-06-18T05:17:16Zby International Business Machines Corporation, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406/?ar">https://learning.oreilly.com/library/view/~/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406">https://learning.oreilly.com/library/view/~/9780738460406</a><br/>Format: Electronic Resources<br/>Hacking artificial intelligence : a leader's guide from deepfakes to breaking deep learningent://SD_ILS/0/SD_ILS:23329122024-06-18T05:17:16Z2024-06-18T05:17:16Zby Gibian, Davey, 1988- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663719379/?ar">https://go.oreilly.com/library-access/library/view/-/9781663719379/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781663719379">https://learning.oreilly.com/library/view/~/9781663719379</a>
<a href="https://learning.oreilly.com/library/view/~/9781663719379/?ar">https://learning.oreilly.com/library/view/~/9781663719379/?ar</a><br/>Format: Sound recording<br/>Data Privacy : a Runbook for Engineers.ent://SD_ILS/0/SD_ILS:23316502024-06-18T05:17:16Z2024-06-18T05:17:16Zby Bhajaria, Nishant.<br/><a href="https://learning.oreilly.com/library/view/~/9781617298998/?ar">https://learning.oreilly.com/library/view/~/9781617298998/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617298998/?ar">https://go.oreilly.com/library-access/library/view/-/9781617298998/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617298998">https://learning.oreilly.com/library/view/~/9781617298998</a><br/>Format: Electronic Resources<br/>Mastering cyber intelligence : gain comprehensive knowledge and skills to conduct threat intelligence for effective system defenseent://SD_ILS/0/SD_ILS:23326682024-06-18T05:17:16Z2024-06-18T05:17:16Zby Dahj, Jean Nestor M.<br/><a href="https://learning.oreilly.com/library/view/~/9781800209404">https://learning.oreilly.com/library/view/~/9781800209404</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar">https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800209404/?ar">https://learning.oreilly.com/library/view/~/9781800209404/?ar</a><br/>Format: Electronic Resources<br/>Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copyent://SD_ILS/0/SD_ILS:23339502024-06-18T05:17:16Z2024-06-18T05:17:16Zby Shingornikar, Shashank, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460710/?ar">https://learning.oreilly.com/library/view/~/9780738460710/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460710">https://learning.oreilly.com/library/view/~/9780738460710</a><br/>Format: Electronic Resources<br/>Executive's guide to cyber risk : securing the future todayent://SD_ILS/0/SD_ILS:23332112024-06-18T05:17:16Z2024-06-18T05:17:16Zby Moyo, Siegfried, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119863113">https://learning.oreilly.com/library/view/~/9781119863113</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar">https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119863113/?ar">https://learning.oreilly.com/library/view/~/9781119863113/?ar</a><br/>Format: Electronic Resources<br/>ASP.NET Core Securityent://SD_ILS/0/SD_ILS:23339622024-06-18T05:17:16Z2024-06-18T05:17:16Zby Wenz, Christian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781633439986/?ar">https://learning.oreilly.com/library/view/~/9781633439986/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781633439986">https://learning.oreilly.com/library/view/~/9781633439986</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781633439986/?ar">https://go.oreilly.com/library-access/library/view/-/9781633439986/?ar</a><br/>Format: Electronic Resources<br/>Transitioning to quantum-safe cryptography on IBM Zent://SD_ILS/0/SD_ILS:23339332024-06-18T05:17:16Z2024-06-18T05:17:16Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460680">https://learning.oreilly.com/library/view/~/9780738460680</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460680/?ar">https://learning.oreilly.com/library/view/~/9780738460680/?ar</a><br/>Format: Electronic Resources<br/>Digital Earth : cyber threats, privacy and ethics in an age of paranoiaent://SD_ILS/0/SD_ILS:23328962024-06-18T05:17:16Z2024-06-18T05:17:16Zby Katz, Sarah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783614">https://learning.oreilly.com/library/view/~/9781787783614</a>
<a href="https://learning.oreilly.com/library/view/~/9781787783614/?ar">https://learning.oreilly.com/library/view/~/9781787783614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar</a><br/>Format: Electronic Resources<br/>Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflictent://SD_ILS/0/SD_ILS:23346962024-06-18T05:17:16Z2024-06-18T05:17:16Zby Borges, Dan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818/?ar">https://learning.oreilly.com/library/view/~/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818">https://learning.oreilly.com/library/view/~/9781801812818</a><br/>Format: Sound recording<br/>Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisionsent://SD_ILS/0/SD_ILS:23284852024-06-18T05:17:16Z2024-06-18T05:17:16Zby Moore, Richard O., III, 1971- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469082707">https://learning.oreilly.com/library/view/~/9781469082707</a>
<a href="https://learning.oreilly.com/library/view/~/9781469082707/?ar">https://learning.oreilly.com/library/view/~/9781469082707/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469082707/?ar">https://go.oreilly.com/library-access/library/view/-/9781469082707/?ar</a><br/>Format: Electronic Resources<br/>Pro Google cloud automation : with Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkinsent://SD_ILS/0/SD_ILS:23275092024-06-18T05:17:16Z2024-06-18T05:17:16Zby Sabharwal, Navin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265734/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265734/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265734/?ar">https://learning.oreilly.com/library/view/~/9781484265734/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265734">https://learning.oreilly.com/library/view/~/9781484265734</a><br/>Format: Electronic Resources<br/>Big breaches : cybersecurity lessons for everyoneent://SD_ILS/0/SD_ILS:23281262024-06-18T05:17:16Z2024-06-18T05:17:16Zby Daswani, Neil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484266557">https://learning.oreilly.com/library/view/~/9781484266557</a>
<a href="https://learning.oreilly.com/library/view/~/9781484266557/?ar">https://learning.oreilly.com/library/view/~/9781484266557/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar">https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar</a><br/>Format: Electronic Resources<br/>Self-sovereign identity : decentralized digital identity and verifiable credentialsent://SD_ILS/0/SD_ILS:23302702024-06-18T05:17:16Z2024-06-18T05:17:16Zby Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format: Electronic Resources<br/>Mastering Active Directory - Third Editionent://SD_ILS/0/SD_ILS:23311052024-06-18T05:17:16Z2024-06-18T05:17:16Zby Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format: Electronic Resources<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:23270532024-06-18T05:17:16Z2024-06-18T05:17:16Zby Moschovitis, Christos J. P., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119658740">https://learning.oreilly.com/library/view/~/9781119658740</a>
<a href="https://learning.oreilly.com/library/view/~/9781119658740/?ar">https://learning.oreilly.com/library/view/~/9781119658740/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar">https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar</a><br/>Format: Electronic Resources<br/>Secure operations and protectionsent://SD_ILS/0/SD_ILS:23320922024-06-18T05:17:16Z2024-06-18T05:17:16Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format: Video recording<br/>Google xi tong jia gou jie mi : gou jian an quan ke kao de xi tong = Building secure and reliable systemsent://SD_ILS/0/SD_ILS:23329282024-06-18T05:17:16Z2024-06-18T05:17:16Zby Adkins, Heather, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar">https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9787115569257/?ar">https://learning.oreilly.com/library/view/~/9787115569257/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9787115569257">https://learning.oreilly.com/library/view/~/9787115569257</a><br/>Format: Electronic Resources<br/>Protecting Data Privacy Beyond the Trusted System of Recordent://SD_ILS/0/SD_ILS:23239182024-06-18T05:17:16Z2024-06-18T05:17:16Zby White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format: Electronic Resources<br/>Privileged attack vectors : building effective cyber-defense strategies to protect organizationsent://SD_ILS/0/SD_ILS:23246642024-06-18T05:17:16Z2024-06-18T05:17:16Zby Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146/?ar">https://learning.oreilly.com/library/view/~/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146">https://learning.oreilly.com/library/view/~/9781484259146</a><br/>Format: Electronic Resources<br/>Data privacy and GDPR handbookent://SD_ILS/0/SD_ILS:23225582024-06-18T05:17:16Z2024-06-18T05:17:16Zby Sharma, Sanjay (Financial executive), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119594246">https://learning.oreilly.com/library/view/~/9781119594246</a>
<a href="https://learning.oreilly.com/library/view/~/9781119594246/?ar">https://learning.oreilly.com/library/view/~/9781119594246/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar">https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar</a><br/>Format: Electronic Resources<br/>Data privacy and GDPR handbookent://SD_ILS/0/SD_ILS:22739352024-06-18T05:17:16Z2024-06-18T05:17:16Zby Sharma, Sanjay, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986738">Click to View</a><br/>Format: Electronic Resources<br/>The Complete 2020 Ethereum and Solidity Developer Bootcampent://SD_ILS/0/SD_ILS:23234782024-06-18T05:17:16Z2024-06-18T05:17:16Zby Wiesner, Thomas, author.<br/><a href="https://learning.oreilly.com/videos/~/9781800201019/?ar">https://learning.oreilly.com/videos/~/9781800201019/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar">https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781800201019">https://learning.oreilly.com/videos/~/9781800201019</a><br/>Format: Electronic Resources<br/>Advanced API Security : OAuth 2. 0 and Beyondent://SD_ILS/0/SD_ILS:23227342024-06-18T05:17:16Z2024-06-18T05:17:16Zby Siriwardena, Prabath.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220504">https://learning.oreilly.com/library/view/~/9781484220504</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220504/?ar">https://learning.oreilly.com/library/view/~/9781484220504/?ar</a><br/>Format: Electronic Resources<br/>Building secure firmware : armoring the foundation of the platforment://SD_ILS/0/SD_ILS:23260202024-06-18T05:17:16Z2024-06-18T05:17:16Zby Yao, Jiewen.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261064">https://learning.oreilly.com/library/view/~/9781484261064</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261064/?ar">https://learning.oreilly.com/library/view/~/9781484261064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar</a><br/>Format: Electronic Resources<br/>Encryption for organizations and individuals : basics of contemporary and quantum cryptographyent://SD_ILS/0/SD_ILS:23254632024-06-18T05:17:16Z2024-06-18T05:17:16Zby Ciesla, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260562">https://learning.oreilly.com/library/view/~/9781484260562</a>
<a href="https://learning.oreilly.com/library/view/~/9781484260562/?ar">https://learning.oreilly.com/library/view/~/9781484260562/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity for industrial scada systemsent://SD_ILS/0/SD_ILS:23514002024-06-18T05:17:16Z2024-06-18T05:17:16Zby Shaw, William T., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6468131">Click to View</a><br/>Format: Electronic Resources<br/>Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloudent://SD_ILS/0/SD_ILS:23263952024-06-18T05:17:16Z2024-06-18T05:17:16Zby Calles, Miguel A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002/?ar">https://learning.oreilly.com/library/view/~/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002">https://learning.oreilly.com/library/view/~/9781484261002</a><br/>Format: Electronic Resources<br/>Exposed : how revealing your data and eliminating privacy increases trust and liberates humanityent://SD_ILS/0/SD_ILS:23264132024-06-18T05:17:16Z2024-06-18T05:17:16Zby Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a>
<a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format: Electronic Resources<br/>Cloud Computing Security, 2nd Editionent://SD_ILS/0/SD_ILS:23311012024-06-18T05:17:16Z2024-06-18T05:17:16Zby Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>Advanced ASP.NET Core 3 Security : understanding hacks, attacks, and vulnerabilities to secure your websiteent://SD_ILS/0/SD_ILS:23264242024-06-18T05:17:16Z2024-06-18T05:17:16Zby Norberg, Scott, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260142/?ar">https://learning.oreilly.com/library/view/~/9781484260142/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484260142">https://learning.oreilly.com/library/view/~/9781484260142</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484260142/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260142/?ar</a><br/>Format: Electronic Resources<br/>Take Control of Your Online Privacy, 4th Editionent://SD_ILS/0/SD_ILS:23210702024-06-18T05:17:16Z2024-06-18T05:17:16Zby Kissell, Joe.<br/><a href="https://learning.oreilly.com/library/view/~/9781947282377">https://learning.oreilly.com/library/view/~/9781947282377</a>
<a href="https://learning.oreilly.com/library/view/~/9781947282377/?ar">https://learning.oreilly.com/library/view/~/9781947282377/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781947282377/?ar">https://go.oreilly.com/library-access/library/view/-/9781947282377/?ar</a><br/>Format: Electronic Resources<br/>How to choose the right digital leader for your company : Striking the right competence-credibility balance for digital leaders depends largely on how the role of the CDO is defined in a particular companyent://SD_ILS/0/SD_ILS:23212772024-06-18T05:17:16Z2024-06-18T05:17:16Zby Wade, Michael R., author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT60442/?ar">https://learning.oreilly.com/library/view/~/53863MIT60442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT60442">https://learning.oreilly.com/library/view/~/53863MIT60442</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT60442/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT60442/?ar</a><br/>Format: Electronic Resources<br/>Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environmentsent://SD_ILS/0/SD_ILS:23220552024-06-18T05:17:16Z2024-06-18T05:17:16Zby Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format: Electronic Resources<br/>Karma-based API on Apple platforms : building privacy into iOS and macOS appsent://SD_ILS/0/SD_ILS:23220612024-06-18T05:17:16Z2024-06-18T05:17:16Zby Carrasco Molina, Manuel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242919/?ar">https://learning.oreilly.com/library/view/~/9781484242919/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242919/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242919/?ar</a><br/>Format: Electronic Resources<br/>How digital trust drives culture change : privacy is a right, not a privilege : but organizations and leadership often struggle with it comes to adapting their culture toward digital trust and stewardshipent://SD_ILS/0/SD_ILS:23208552024-06-18T05:17:16Z2024-06-18T05:17:16Zby Abraham, Chon, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT60430/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT60430/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT60430/?ar">https://learning.oreilly.com/library/view/~/53863MIT60430/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT60430">https://learning.oreilly.com/library/view/~/53863MIT60430</a><br/>Format: Electronic Resources<br/>How to build privacy and security into deep learning modelsent://SD_ILS/0/SD_ILS:23227912024-06-18T05:17:16Z2024-06-18T05:17:16Zby Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format: Electronic Resources<br/>Microsoft Enterprise Mobility and Security trainingent://SD_ILS/0/SD_ILS:23195562024-06-18T05:17:16Z2024-06-18T05:17:16Zby Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format: Electronic Resources<br/>Modern defense in depth : an integrated approach to better web application securityent://SD_ILS/0/SD_ILS:23198732024-06-18T05:17:16Z2024-06-18T05:17:16Zby Gates, Stephen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492050360/?ar">https://learning.oreilly.com/library/view/~/9781492050360/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492050360">https://learning.oreilly.com/library/view/~/9781492050360</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar">https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers : cybersecurity advice from the best hackers in the worldent://SD_ILS/0/SD_ILS:23214522024-06-18T05:17:16Z2024-06-18T05:17:16Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format: Electronic Resources<br/>Managing SQL Server encryption certificates : getting started with SQL Server encryptionent://SD_ILS/0/SD_ILS:23213592024-06-18T05:17:16Z2024-06-18T05:17:16Zby Blinn, Eric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484251515/?ar">https://learning.oreilly.com/videos/~/9781484251515/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484251515/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251515/?ar</a><br/>Format: Electronic Resources<br/>Digital identities in tension : between autonomy and controlent://SD_ILS/0/SD_ILS:22735092024-06-18T05:17:16Z2024-06-18T05:17:16Zby Khatchatourov, Armen, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5785310">Click to View</a><br/>Format: Electronic Resources<br/>Il nuovo codice in materia di protezione dei dati personali : la normativa italiana dopo il d.lgs. n. 101/2018ent://SD_ILS/0/SD_ILS:22684942024-06-18T05:17:16Z2024-06-18T05:17:16Zby Scagliarini, Simone, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5971279">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Active Directory - Second Editionent://SD_ILS/0/SD_ILS:23239792024-06-18T05:17:16Z2024-06-18T05:17:16Zby Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789800203/?ar">https://learning.oreilly.com/library/view/~/9781789800203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar">https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789800203">https://learning.oreilly.com/library/view/~/9781789800203</a><br/>Format: Electronic Resources<br/>ISO22301 : a Pocket Guideent://SD_ILS/0/SD_ILS:23252782024-06-18T05:17:16Z2024-06-18T05:17:16Zby Drewitt, Tony, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781016/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781016/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781016/?ar">https://learning.oreilly.com/library/view/~/9781787781016/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781016">https://learning.oreilly.com/library/view/~/9781787781016</a><br/>Format: Electronic Resources<br/>GDPR For Dummiesent://SD_ILS/0/SD_ILS:23272352024-06-18T05:17:16Z2024-06-18T05:17:16Zby Dibble, Suzanne, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119546092/?ar">https://learning.oreilly.com/library/view/~/9781119546092/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119546092/?ar">https://go.oreilly.com/library-access/library/view/-/9781119546092/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119546092">https://learning.oreilly.com/library/view/~/9781119546092</a><br/>Format: Electronic Resources<br/>Take Control of 1Password, 4th Editionent://SD_ILS/0/SD_ILS:23194742024-06-18T05:17:16Z2024-06-18T05:17:16Zby Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format: Electronic Resources<br/>IBM QRadar Version 7.3 : planning and installation guideent://SD_ILS/0/SD_ILS:23154742024-06-18T05:17:16Z2024-06-18T05:17:16Zby Carabaguiaz, Elias, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442877/?ar">https://learning.oreilly.com/library/view/~/9780738442877/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar</a><br/>Format: Electronic Resources<br/>IT-Sicherheitsmanagement - Praxiswissen für IT Security Manager, 2. Auflageent://SD_ILS/0/SD_ILS:23201052024-06-18T05:17:16Z2024-06-18T05:17:16Zby Harich, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9783958452756/?ar">https://learning.oreilly.com/library/view/~/9783958452756/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452756">https://learning.oreilly.com/library/view/~/9783958452756</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar</a><br/>Format: Electronic Resources<br/>What is cybersecurity?ent://SD_ILS/0/SD_ILS:23187222024-06-18T05:17:16Z2024-06-18T05:17:16Zby Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format: Electronic Resources<br/>The Board's Role in Managing Cybersecurity Risksent://SD_ILS/0/SD_ILS:23207492024-06-18T05:17:16Z2024-06-18T05:17:16Zby Rothrock, Ray, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221/?ar">https://learning.oreilly.com/library/view/~/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221">https://learning.oreilly.com/library/view/~/53863MIT59221</a><br/>Format: Electronic Resources<br/>Solving Cyber Risk : Protecting Your Company and Society.ent://SD_ILS/0/SD_ILS:23182822024-06-18T05:17:16Z2024-06-18T05:17:16Zby Coburn, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781119490937">https://learning.oreilly.com/library/view/~/9781119490937</a>
<a href="https://learning.oreilly.com/library/view/~/9781119490937/?ar">https://learning.oreilly.com/library/view/~/9781119490937/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar">https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar</a><br/>Format: Electronic Resources<br/>Securing web applications : building a strategy for defense against malicious botsent://SD_ILS/0/SD_ILS:23192612024-06-18T05:17:16Z2024-06-18T05:17:16Zby Gates, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar">https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492040279">https://learning.oreilly.com/library/view/~/9781492040279</a>
<a href="https://learning.oreilly.com/library/view/~/9781492040279/?ar">https://learning.oreilly.com/library/view/~/9781492040279/?ar</a><br/>Format: Electronic Resources<br/>Lessons Learned : How to protect critical information infrastructureent://SD_ILS/0/SD_ILS:23154982024-06-18T05:17:16Z2024-06-18T05:17:16Zby Viira, Toomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849289597/?ar">https://learning.oreilly.com/library/view/~/9781849289597/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849289597/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289597/?ar</a><br/>Format: Electronic Resources<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:23150322024-06-18T05:17:16Z2024-06-18T05:17:16Zby Wallace, Michael, 1960- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814438770/?ar">https://learning.oreilly.com/library/view/~/9780814438770/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar">https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar</a><br/>Format: Electronic Resources<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:23161522024-06-18T05:17:16Z2024-06-18T05:17:16Zby Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format: Electronic Resources<br/>Dynamic itemset hiding under multiple support thresholdsent://SD_ILS/0/SD_ILS:20754082024-06-18T05:17:16Z2024-06-18T05:17:16Zby Öztürk, Ahmet Cumhur, author.<br/><a href="http://hdl.handle.net/11147/6998">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849922024-06-18T05:17:16Z2024-06-18T05:17:16Zby Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201<br/><a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format: Electronic Resources<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:20840512024-06-18T05:17:16Z2024-06-18T05:17:16Zby Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Mathematics and Computing 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844422024-06-18T05:17:16Z2024-06-18T05:17:16Zby Ghosh, Debdas. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0023-3">https://doi.org/10.1007/978-981-13-0023-3</a><br/>Format: Electronic Resources<br/>Introduction to Security Reductionent://SD_ILS/0/SD_ILS:20841282024-06-18T05:17:16Z2024-06-18T05:17:16Zby Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Electronic Resources<br/>Smart Micro-Grid Systems Security and Privacyent://SD_ILS/0/SD_ILS:20842352024-06-18T05:17:16Z2024-06-18T05:17:16Zby Kayem, Anne V. D. M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91427-5">https://doi.org/10.1007/978-3-319-91427-5</a><br/>Format: Electronic Resources<br/>Security and Privacy in Smart Grident://SD_ILS/0/SD_ILS:20841582024-06-18T05:17:16Z2024-06-18T05:17:16Zby Abdallah, Asmaa. author.<br/><a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format: Electronic Resources<br/>Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842682024-06-18T05:17:16Z2024-06-18T05:17:16Zby Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/><a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format: Electronic Resources<br/>Cyber Threat Intelligenceent://SD_ILS/0/SD_ILS:20845032024-06-18T05:17:16Z2024-06-18T05:17:16Zby Dehghantanha, Ali. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format: Electronic Resources<br/>Future Internet Technologies and Trends First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20847722024-06-18T05:17:16Z2024-06-18T05:17:16Zby Patel, Zuber. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73712-6">https://doi.org/10.1007/978-3-319-73712-6</a><br/>Format: Electronic Resources<br/>Communications and Networking 11th EAI International Conference, ChinaCom 2016, Chongqing, China, September 24-26, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20848502024-06-18T05:17:16Z2024-06-18T05:17:16Zby Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66625-9">https://doi.org/10.1007/978-3-319-66625-9</a><br/>Format: Electronic Resources<br/>Communications and Networking 11th EAI international Conference, ChinaCom 2016 Chongqing, China, September 24-26, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20848512024-06-18T05:17:16Z2024-06-18T05:17:16Zby Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66628-0">https://doi.org/10.1007/978-3-319-66628-0</a><br/>Format: Electronic Resources<br/>Fundamentals and Applications of Hardcopy Communication Conveying Side Information by Printed Mediaent://SD_ILS/0/SD_ILS:20848522024-06-18T05:17:16Z2024-06-18T05:17:16Zby Mayer, Joceli. author.<br/><a href="https://doi.org/10.1007/978-3-319-74083-6">https://doi.org/10.1007/978-3-319-74083-6</a><br/>Format: Electronic Resources<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:20848032024-06-18T05:17:16Z2024-06-18T05:17:16Zby Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Industrial Networks and Intelligent Systems 3rd International Conference, INISCOM 2017, Ho Chi Minh City, Vietnam, September 4, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848882024-06-18T05:17:16Z2024-06-18T05:17:16Zby Chen, Yuanfang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74176-5">https://doi.org/10.1007/978-3-319-74176-5</a><br/>Format: Electronic Resources<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848802024-06-18T05:17:16Z2024-06-18T05:17:16Zby Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Innovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11–12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848902024-06-18T05:17:16Z2024-06-18T05:17:16Zby M. F. Kebe, Cheikh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853922024-06-18T05:17:16Z2024-06-18T05:17:16Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05345-1">https://doi.org/10.1007/978-3-030-05345-1</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Developing Countries First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedingsent://SD_ILS/0/SD_ILS:20847182024-06-18T05:17:16Z2024-06-18T05:17:16Zby Belqasmi, Fatna. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67837-5">https://doi.org/10.1007/978-3-319-67837-5</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20847202024-06-18T05:17:16Z2024-06-18T05:17:16Zby Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20848132024-06-18T05:17:16Z2024-06-18T05:17:16Zby Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844012024-06-18T05:17:16Z2024-06-18T05:17:16Zby Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Security Protocols XXVI 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20855322024-06-18T05:17:16Z2024-06-18T05:17:16Zby Matyáš, Vashek. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03251-7">https://doi.org/10.1007/978-3-030-03251-7</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860542024-06-18T05:17:16Z2024-06-18T05:17:16Zby Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Dynamic Games for Network Securityent://SD_ILS/0/SD_ILS:20870572024-06-18T05:17:16Z2024-06-18T05:17:16Zby He, Xiaofan. author.<br/><a href="https://doi.org/10.1007/978-3-319-75871-8">https://doi.org/10.1007/978-3-319-75871-8</a><br/>Format: Electronic Resources<br/>Edge Computing: A Primerent://SD_ILS/0/SD_ILS:20840722024-06-18T05:17:16Z2024-06-18T05:17:16Zby Cao, Jie. author.<br/><a href="https://doi.org/10.1007/978-3-030-02083-5">https://doi.org/10.1007/978-3-030-02083-5</a><br/>Format: Electronic Resources<br/>5G for Future Wireless Networks First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20844982024-06-18T05:17:16Z2024-06-18T05:17:16Zby Long, Keping. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72823-0">https://doi.org/10.1007/978-3-319-72823-0</a><br/>Format: Electronic Resources<br/>Versatile Cybersecurityent://SD_ILS/0/SD_ILS:20842922024-06-18T05:17:16Z2024-06-18T05:17:16Zby Conti, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Electronic Resources<br/>Engineering Applications of Neural Networks 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842982024-06-18T05:17:16Z2024-06-18T05:17:16Zby Pimenidis, Elias. editor. (orcid)0000-0003-3593-8640<br/><a href="https://doi.org/10.1007/978-3-319-98204-5">https://doi.org/10.1007/978-3-319-98204-5</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846572024-06-18T05:17:16Z2024-06-18T05:17:16Zby Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Electronic Resources<br/>Artificial Intelligence Tools for Cyber Attributionent://SD_ILS/0/SD_ILS:20847932024-06-18T05:17:16Z2024-06-18T05:17:16Zby Nunes, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-319-73788-1">https://doi.org/10.1007/978-3-319-73788-1</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXXII Special Issue on Cybersecurity and Biometricsent://SD_ILS/0/SD_ILS:20850252024-06-18T05:17:16Z2024-06-18T05:17:16Zby Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56672-5">https://doi.org/10.1007/978-3-662-56672-5</a><br/>Format: Electronic Resources<br/>Honeypot Frameworks and Their Applications: A New Frameworkent://SD_ILS/0/SD_ILS:20841442024-06-18T05:17:16Z2024-06-18T05:17:16Zby NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845302024-06-18T05:17:16Z2024-06-18T05:17:16Zby Zhou, Yifeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74439-1">https://doi.org/10.1007/978-3-319-74439-1</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Fog Computing and Its Applicationsent://SD_ILS/0/SD_ILS:20840632024-06-18T05:17:16Z2024-06-18T05:17:16Zby Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-02113-9">https://doi.org/10.1007/978-3-030-02113-9</a><br/>Format: Electronic Resources<br/>Cyber-Physical Systems Securityent://SD_ILS/0/SD_ILS:20843522024-06-18T05:17:16Z2024-06-18T05:17:16Zby Koç, Çetin Kaya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98935-8">https://doi.org/10.1007/978-3-319-98935-8</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845112024-06-18T05:17:16Z2024-06-18T05:17:16Zby Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Electronic Resources<br/>Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20845202024-06-18T05:17:16Z2024-06-18T05:17:16Zby You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format: Electronic Resources<br/>Network Intrusion Detection using Deep Learning A Feature Learning Approachent://SD_ILS/0/SD_ILS:20843402024-06-18T05:17:16Z2024-06-18T05:17:16Zby Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>Advanced Monitoring in P2P Botnets A Dual Perspectiveent://SD_ILS/0/SD_ILS:20844732024-06-18T05:17:16Z2024-06-18T05:17:16Zby Karuppayah, Shankar. author.<br/><a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Electronic Resources<br/>Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848582024-06-18T05:17:16Z2024-06-18T05:17:16Zby Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853902024-06-18T05:17:16Z2024-06-18T05:17:16Zby Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983<br/><a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format: Electronic Resources<br/>Smart Blockchain First International Conference, SmartBlock 2018, Tokyo, Japan, December 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853912024-06-18T05:17:16Z2024-06-18T05:17:16Zby Qiu, Meikang. editor. (orcid)0000-0002-1004-0140<br/><a href="https://doi.org/10.1007/978-3-030-05764-0">https://doi.org/10.1007/978-3-030-05764-0</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853022024-06-18T05:17:16Z2024-06-18T05:17:16Zby Saracino, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format: Electronic Resources<br/>Adversary Detection For Cognitive Radio Networksent://SD_ILS/0/SD_ILS:20874002024-06-18T05:17:16Z2024-06-18T05:17:16Zby He, Xiaofan. author.<br/><a href="https://doi.org/10.1007/978-3-319-75868-8">https://doi.org/10.1007/978-3-319-75868-8</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20844812024-06-18T05:17:16Z2024-06-18T05:17:16Zby Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Electronic Resources<br/>Smart Trends in Information Technology and Computer Communications Second International Conference, SmartCom 2017, Pune, India, August 18-19, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842162024-06-18T05:17:16Z2024-06-18T05:17:16Zby Deshpande, A.V. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1423-0">https://doi.org/10.1007/978-981-13-1423-0</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20847972024-06-18T05:17:16Z2024-06-18T05:17:16Zby Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Network and Parallel Computing 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29 – December 1, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855532024-06-18T05:17:16Z2024-06-18T05:17:16Zby Zhang, Feng. editor. (orcid)0000-0003-1983-7321<br/><a href="https://doi.org/10.1007/978-3-030-05677-3">https://doi.org/10.1007/978-3-030-05677-3</a><br/>Format: Electronic Resources<br/>Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855102024-06-18T05:17:16Z2024-06-18T05:17:16Zby Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format: Electronic Resources<br/>Information Technology - New Generations 15th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:20862202024-06-18T05:17:16Z2024-06-18T05:17:16Zby Latifi, Shahram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-77028-4">https://doi.org/10.1007/978-3-319-77028-4</a><br/>Format: Electronic Resources<br/>Smart Multimedia First International Conference, ICSM 2018, Toulon, France, August 24–26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20853932024-06-18T05:17:16Z2024-06-18T05:17:16Zby Basu, Anup. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04375-9">https://doi.org/10.1007/978-3-030-04375-9</a><br/>Format: Electronic Resources<br/>Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854042024-06-18T05:17:16Z2024-06-18T05:17:16Zby Ganapathy, Vinod. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format: Electronic Resources<br/>Security with Intelligent Computing and Big-data Servicesent://SD_ILS/0/SD_ILS:20868502024-06-18T05:17:16Z2024-06-18T05:17:16Zby Peng, Sheng-Lung. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76451-1">https://doi.org/10.1007/978-3-319-76451-1</a><br/>Format: Electronic Resources<br/>99 privacy breaches to beware of : practical data protection tips from real-life experiencesent://SD_ILS/0/SD_ILS:22683062024-06-18T05:17:16Z2024-06-18T05:17:16Zby Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5879671">Click to View</a><br/>Format: Electronic Resources<br/>Lessons learned : critical information infrastructure protection : how to protect critical information infrastructureent://SD_ILS/0/SD_ILS:21123032024-06-18T05:17:16Z2024-06-18T05:17:16Zby Viira, Toomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5244626">Click to View</a><br/>Format: Electronic Resources<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:21329282024-06-18T05:17:16Z2024-06-18T05:17:16Zby Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4987646">Click to View</a><br/>Format: Electronic Resources<br/>Privileged attack vectors : building effective cyber-defense strategies to protect organizationsent://SD_ILS/0/SD_ILS:23148702024-06-18T05:17:16Z2024-06-18T05:17:16Zby Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format: Electronic Resources<br/>Investigating the Cyber Breach : the digital forensics guide for the network engineerent://SD_ILS/0/SD_ILS:23153452024-06-18T05:17:16Z2024-06-18T05:17:16Zby Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar">https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134755885/?ar">https://learning.oreilly.com/library/view/~/9780134755885/?ar</a><br/>Format: Electronic Resources<br/>OAuth 2 in actionent://SD_ILS/0/SD_ILS:23131852024-06-18T05:17:16Z2024-06-18T05:17:16Zby Richer, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617293276/?ar">https://go.oreilly.com/library-access/library/view/-/9781617293276/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617293276">https://learning.oreilly.com/library/view/~/9781617293276</a>
<a href="https://learning.oreilly.com/library/view/~/9781617293276/?ar">https://learning.oreilly.com/library/view/~/9781617293276/?ar</a><br/>Format: Electronic Resources<br/>Mastering Active Directory : automate tasks by leveraging PowerShell for Active Directory Domain Services 2016ent://SD_ILS/0/SD_ILS:23138092024-06-18T05:17:16Z2024-06-18T05:17:16Zby Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787289352">https://learning.oreilly.com/library/view/~/9781787289352</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar">https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787289352/?ar">https://learning.oreilly.com/library/view/~/9781787289352/?ar</a><br/>Format: Electronic Resources<br/>Data hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:23116292024-06-18T05:17:16Z2024-06-18T05:17:16Zby Hassan, Nihad Ahmad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128044964/?ar">https://learning.oreilly.com/library/view/~/9780128044964/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128044964/?ar">https://go.oreilly.com/library-access/library/view/-/9780128044964/?ar</a><br/>Format: Electronic Resources<br/>Cloud computing security : foundations and challengesent://SD_ILS/0/SD_ILS:23115242024-06-18T05:17:16Z2024-06-18T05:17:16Zby Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format: Electronic Resources<br/>Distributed Networksent://SD_ILS/0/SD_ILS:23199072024-06-18T05:17:16Z2024-06-18T05:17:16Zby Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format: Electronic Resources<br/>Guide: Reporting on an Entity's Cyberse.ent://SD_ILS/0/SD_ILS:23167562024-06-18T05:17:16Z2024-06-18T05:17:16Zby AICPA Staff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781943546725/?ar">https://learning.oreilly.com/library/view/~/9781943546725/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar">https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781943546725">https://learning.oreilly.com/library/view/~/9781943546725</a><br/>Format: Electronic Resources<br/>ISO 37001 : an Introduction to Anti-Bribery Management Systems.ent://SD_ILS/0/SD_ILS:23150202024-06-18T05:17:16Z2024-06-18T05:17:16Zby Field, Alan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559">https://learning.oreilly.com/library/view/~/9781849289559</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559/?ar">https://learning.oreilly.com/library/view/~/9781849289559/?ar</a><br/>Format: Electronic Resources<br/>Versteckte Botschaften : die faszinierende Geschichte der Steganografieent://SD_ILS/0/SD_ILS:23146762024-06-18T05:17:16Z2024-06-18T05:17:16Zby Schmeh, Klaus, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492064855">https://learning.oreilly.com/library/view/~/9781492064855</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar">https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492064855/?ar">https://learning.oreilly.com/library/view/~/9781492064855/?ar</a><br/>Format: Electronic Resources<br/>Die Kunst der Anonymität im Internet : so schützen Sie Ihre Identität und Ihre Datenent://SD_ILS/0/SD_ILS:23150112024-06-18T05:17:16Z2024-06-18T05:17:16Zby Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format: Electronic Resources<br/>Big data e privacy by design : anonimizzazione pseudonimizzazione sicurezzaent://SD_ILS/0/SD_ILS:21212652024-06-18T05:17:16Z2024-06-18T05:17:16Zby D'Acquisto, Giuseppe, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4818389">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:22107202024-06-18T05:17:16Z2024-06-18T05:17:16Zby Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4676113">Click to View</a><br/>Format: Electronic Resources<br/>ISO 37001 : an introduction to anti-bribery management systems : doing the right thingsent://SD_ILS/0/SD_ILS:21122852024-06-18T05:17:16Z2024-06-18T05:17:16Zby Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5211339">Click to View</a><br/>Format: Electronic Resources<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:22112802024-06-18T05:17:16Z2024-06-18T05:17:16Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4743573">Click to View</a><br/>Format: Electronic Resources<br/>Information security policies, procedures, and standards : a practitioner's referenceent://SD_ILS/0/SD_ILS:23107492024-06-18T05:17:16Z2024-06-18T05:17:16Zby Landoll, Douglas J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482245912/?ar">https://learning.oreilly.com/library/view/~/9781482245912/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar">https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar</a><br/>Format: Electronic Resources<br/>The CISO Handbookent://SD_ILS/0/SD_ILS:23236772024-06-18T05:17:16Z2024-06-18T05:17:16Zby Gentile, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031379">https://learning.oreilly.com/library/view/~/9781420031379</a>
<a href="https://learning.oreilly.com/library/view/~/9781420031379/?ar">https://learning.oreilly.com/library/view/~/9781420031379/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar</a><br/>Format: Electronic Resources<br/>Data governance : frameworks and strategiesent://SD_ILS/0/SD_ILS:23098712024-06-18T05:17:16Z2024-06-18T05:17:16Zby Adler, John, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar">https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491942352/?ar">https://learning.oreilly.com/videos/~/9781491942352/?ar</a><br/>Format: Electronic Resources<br/>Information Security Management Handbook, Volume 6, 6th Editionent://SD_ILS/0/SD_ILS:23233972024-06-18T05:17:16Z2024-06-18T05:17:16Zby Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a>
<a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format: Electronic Resources<br/>You--for sale : protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:23084652024-06-18T05:17:16Z2024-06-18T05:17:16Zby Sumner, Stuart, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034231/?ar">https://learning.oreilly.com/library/view/~/9780128034231/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar</a><br/>Format: Electronic Resources<br/>Introduction to Hadoop security : a hands-on approach to securing big data clustersent://SD_ILS/0/SD_ILS:23102702024-06-18T05:17:16Z2024-06-18T05:17:16Zby Bean, Jeff, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar">https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771375054/?ar">https://learning.oreilly.com/videos/~/9781771375054/?ar</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:23102902024-06-18T05:17:16Z2024-06-18T05:17:16Zby Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format: Electronic Resources<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:23134842024-06-18T05:17:16Z2024-06-18T05:17:16Zby Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format: Electronic Resources<br/>IBM ProtecTIER implementation and best practices guideent://SD_ILS/0/SD_ILS:23108392024-06-18T05:17:16Z2024-06-18T05:17:16Zby Orlando, Karen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738441696/?ar">https://learning.oreilly.com/library/view/~/9780738441696/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738441696/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441696/?ar</a><br/>Format: Electronic Resources<br/>PCI DSS 3.1 : the standard that killed SSLent://SD_ILS/0/SD_ILS:23084682024-06-18T05:17:16Z2024-06-18T05:17:16Zby Williams, Branden R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128046494">https://learning.oreilly.com/library/view/~/9780128046494</a>
<a href="https://learning.oreilly.com/library/view/~/9780128046494/?ar">https://learning.oreilly.com/library/view/~/9780128046494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar">https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar</a><br/>Format: Electronic Resources<br/>Analyzing and securing social networksent://SD_ILS/0/SD_ILS:23133852024-06-18T05:17:16Z2024-06-18T05:17:16Zby Thuraisingham, Bhavani M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar">https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482243284/?ar">https://learning.oreilly.com/library/view/~/9781482243284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482243284">https://learning.oreilly.com/library/view/~/9781482243284</a><br/>Format: Electronic Resources<br/>Information theft prevention : theory and practiceent://SD_ILS/0/SD_ILS:23155502024-06-18T05:17:16Z2024-06-18T05:17:16Zby Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-06-18T05:17:16Z2024-06-18T05:17:16Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Secure Data Deletionent://SD_ILS/0/SD_ILS:20847492024-06-18T05:17:16Z2024-06-18T05:17:16Zby Reardon, Joel. author.<br/><a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848392024-06-18T05:17:16Z2024-06-18T05:17:16Zby Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format: Electronic Resources<br/>Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850862024-06-18T05:17:16Z2024-06-18T05:17:16Zby Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format: Electronic Resources<br/>Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856982024-06-18T05:17:16Z2024-06-18T05:17:16Zby Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format: Electronic Resources<br/>Innovations for Community Services 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846442024-06-18T05:17:16Z2024-06-18T05:17:16Zby Fahrnberger, Günter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49466-1">https://doi.org/10.1007/978-3-319-49466-1</a><br/>Format: Electronic Resources<br/>Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850362024-06-18T05:17:16Z2024-06-18T05:17:16Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858882024-06-18T05:17:16Z2024-06-18T05:17:16Zby Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format: Electronic Resources<br/>Data breach aftermath and recovery for individuals and institutions : proceedings of a workshopent://SD_ILS/0/SD_ILS:20276202024-06-18T05:17:16Z2024-06-18T05:17:16Zby Johnson, Anne, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Data-Breach-Aftermath.pdf">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://dx.doi.org/10.17226/23559">http://dx.doi.org/10.17226/23559</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842542024-06-18T05:17:16Z2024-06-18T05:17:16Zby Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861432024-06-18T05:17:16Z2024-06-18T05:17:16Zby Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860702024-06-18T05:17:16Z2024-06-18T05:17:16Zby Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format: Electronic Resources<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:22089652024-06-18T05:17:16Z2024-06-18T05:17:16Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:22094442024-06-18T05:17:16Z2024-06-18T05:17:16Zby Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4334673">Click to View</a><br/>Format: Electronic Resources<br/>Big data and ethics : the medical datasphereent://SD_ILS/0/SD_ILS:22100682024-06-18T05:17:16Z2024-06-18T05:17:16Zby Béranger, Jérôme, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4529549">Click to View</a><br/>Format: Electronic Resources<br/>88 privacy breaches to beware of : practical data protection tips from real-life experiencesent://SD_ILS/0/SD_ILS:22651852024-06-18T05:17:16Z2024-06-18T05:17:16Zby Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4558135">Click to View</a><br/>Format: Electronic Resources<br/>Facing cyber threats head on : protecting yourself and your businessent://SD_ILS/0/SD_ILS:22662742024-06-18T05:17:16Z2024-06-18T05:17:16Zby Minick, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4773207">Click to View</a><br/>Format: Electronic Resources<br/>PCI DSS 3.1 : the standard that killed SSLent://SD_ILS/0/SD_ILS:20983352024-06-18T05:17:16Z2024-06-18T05:17:16Zby Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4053870">Click to View</a><br/>Format: Electronic Resources<br/>Data breach aftermath and recovery for individuals and institutions : proceedings of a workshopent://SD_ILS/0/SD_ILS:22283312024-06-18T05:17:16Z2024-06-18T05:17:16Zby Johnson, Anne, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4690560">Click to View</a><br/>Format: Electronic Resources<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:21109522024-06-18T05:17:16Z2024-06-18T05:17:16Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4009415">Click to View</a><br/>Format: Electronic Resources<br/>Application of big data for national security : a practitioner's guide to emerging technologiesent://SD_ILS/0/SD_ILS:23062322024-06-18T05:17:16Z2024-06-18T05:17:16Zby Akhgar, Babak, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128019672/?ar">https://learning.oreilly.com/library/view/~/9780128019672/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128019672/?ar">https://go.oreilly.com/library-access/library/view/-/9780128019672/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128019672">https://learning.oreilly.com/library/view/~/9780128019672</a><br/>Format: Electronic Resources<br/>Sharing big data safely : managing data securityent://SD_ILS/0/SD_ILS:23092452024-06-18T05:17:16Z2024-06-18T05:17:16Zby Dunning, Ted, 1956- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491953624/?ar">https://go.oreilly.com/library-access/library/view/-/9781491953624/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491953624/?ar">https://learning.oreilly.com/library/view/~/9781491953624/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491953624">https://learning.oreilly.com/library/view/~/9781491953624</a><br/>Format: Electronic Resources<br/>IT-Sicherheit im Unternehmenent://SD_ILS/0/SD_ILS:23083242024-06-18T05:17:16Z2024-06-18T05:17:16Zby Harich, Thomas W., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958451285/?ar">https://learning.oreilly.com/library/view/~/9783958451285/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958451285">https://learning.oreilly.com/library/view/~/9783958451285</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar">https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar</a><br/>Format: Electronic Resources<br/>Information assurance handbook : effective computer security and risk management strategiesent://SD_ILS/0/SD_ILS:23048752024-06-18T05:17:16Z2024-06-18T05:17:16Zby Schou, Corey.<br/><a href="https://learning.oreilly.com/library/view/~/9780071821650">https://learning.oreilly.com/library/view/~/9780071821650</a>
<a href="https://learning.oreilly.com/library/view/~/9780071821650/?ar">https://learning.oreilly.com/library/view/~/9780071821650/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar">https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar</a><br/>Format: Electronic Resources<br/>Security in computingent://SD_ILS/0/SD_ILS:23058972024-06-18T05:17:16Z2024-06-18T05:17:16Zby Pfleeger, Charles P., 1948- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134085074/?ar">https://learning.oreilly.com/library/view/~/9780134085074/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar">https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar</a><br/>Format: Electronic Resources<br/>Implementing high availability and disaster recovery in IBM PureApplication Systems V2ent://SD_ILS/0/SD_ILS:23064692024-06-18T05:17:16Z2024-06-18T05:17:16Zby Gadepalli, Venkata, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738440337">https://learning.oreilly.com/library/view/~/0738440337</a>
<a href="https://learning.oreilly.com/library/view/~/0738440337/?ar">https://learning.oreilly.com/library/view/~/0738440337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738440337/?ar">https://go.oreilly.com/library-access/library/view/-/0738440337/?ar</a><br/>Format: Electronic Resources<br/>Multi-domain master data management : advanced MDM and data governance in practiceent://SD_ILS/0/SD_ILS:23067012024-06-18T05:17:16Z2024-06-18T05:17:16Zby Allen, Mark, 1953- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008355/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008355/?ar">https://learning.oreilly.com/library/view/~/9780128008355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008355">https://learning.oreilly.com/library/view/~/9780128008355</a><br/>Format: Electronic Resources<br/>Security, privacy, and governance : protecting data, and using data to protect systemsent://SD_ILS/0/SD_ILS:23077562024-06-18T05:17:16Z2024-06-18T05:17:16Zby Lorica, Ben, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar">https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491931042/?ar">https://learning.oreilly.com/videos/~/9781491931042/?ar</a><br/>Format: Electronic Resources<br/>Hadoop securityent://SD_ILS/0/SD_ILS:23077732024-06-18T05:17:16Z2024-06-18T05:17:16Zby Spivey, Ben, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar">https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491900970/?ar">https://learning.oreilly.com/library/view/~/9781491900970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491900970">https://learning.oreilly.com/library/view/~/9781491900970</a><br/>Format: Electronic Resources<br/>Risk centric threat modeling : process for attack simulation and threat analysisent://SD_ILS/0/SD_ILS:23087922024-06-18T05:17:16Z2024-06-18T05:17:16Zby Uceda Vélez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format: Electronic Resources<br/>Cloud storage security : a practical guideent://SD_ILS/0/SD_ILS:23079352024-06-18T05:17:16Z2024-06-18T05:17:16Zby Wheeler, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029312/?ar">https://learning.oreilly.com/library/view/~/9780128029312/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar</a><br/>Format: Electronic Resources<br/>Mastering Python forensics : master the art of digital forensics and analysis with Pythonent://SD_ILS/0/SD_ILS:23092272024-06-18T05:17:16Z2024-06-18T05:17:16Zby Spreitzenbarth, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783988044/?ar">https://learning.oreilly.com/library/view/~/9781783988044/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar">https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783988044">https://learning.oreilly.com/library/view/~/9781783988044</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:23088472024-06-18T05:17:16Z2024-06-18T05:17:16Zby Ticher, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287135/?ar">https://learning.oreilly.com/library/view/~/9781849287135/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar</a><br/>Format: Electronic Resources<br/>Learning to love data science : explorations of emerging technologies and platforms for predictive analytics, machine learning, digital manufacturing, and supply chain optimizationent://SD_ILS/0/SD_ILS:23089132024-06-18T05:17:16Z2024-06-18T05:17:16Zby Barlow, Mike (Michael Alan), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491936573">https://learning.oreilly.com/library/view/~/9781491936573</a>
<a href="https://learning.oreilly.com/library/view/~/9781491936573/?ar">https://learning.oreilly.com/library/view/~/9781491936573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491936573/?ar">https://go.oreilly.com/library-access/library/view/-/9781491936573/?ar</a><br/>Format: Electronic Resources<br/>Mastering OAuth 2.0 : create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Frameworkent://SD_ILS/0/SD_ILS:23095472024-06-18T05:17:16Z2024-06-18T05:17:16Zby Bihis, Charles, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784395407/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395407/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784395407">https://learning.oreilly.com/library/view/~/9781784395407</a>
<a href="https://learning.oreilly.com/library/view/~/9781784395407/?ar">https://learning.oreilly.com/library/view/~/9781784395407/?ar</a><br/>Format: Electronic Resources<br/>Measuring and managing information risk : a FAIR approachent://SD_ILS/0/SD_ILS:23042452024-06-18T05:17:16Z2024-06-18T05:17:16Zby Freund, Jack, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar">https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124202313/?ar">https://learning.oreilly.com/library/view/~/9780124202313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124202313">https://learning.oreilly.com/library/view/~/9780124202313</a><br/>Format: Electronic Resources<br/>Introduction to information security : LiveLessons (Sneak Peek Video Training)ent://SD_ILS/0/SD_ILS:23063462024-06-18T05:17:16Z2024-06-18T05:17:16Zby Aurnou, Scott, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar">https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134135823/?ar">https://learning.oreilly.com/videos/~/9780134135823/?ar</a><br/>Format: Electronic Resources<br/>The cloud security ecosystem : technical, legal, business and management issuesent://SD_ILS/0/SD_ILS:23076492024-06-18T05:17:16Z2024-06-18T05:17:16Zby Ko, Ryan, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar">https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128017807/?ar">https://learning.oreilly.com/library/view/~/9780128017807/?ar</a><br/>Format: Electronic Resources<br/>Digital privacy in the marketplace : perspectives on the information exchangeent://SD_ILS/0/SD_ILS:20561852024-06-18T05:17:16Z2024-06-18T05:17:16Zby Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1920895">Click to View</a><br/>Format: Electronic Resources<br/>Technology Disaster Response and Recovery Planning : A LITA Guide.ent://SD_ILS/0/SD_ILS:12853712024-06-18T05:17:16Z2024-06-18T05:17:16Zby Mallery, Mary.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2068199">Click to View</a><br/>Format: Electronic Resources<br/>Digital identity managementent://SD_ILS/0/SD_ILS:22085742024-06-18T05:17:16Z2024-06-18T05:17:16Zby Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2007485">Click to View</a><br/>Format: Electronic Resources<br/>Application of big data for national security : a practitioner's guide to emerging technologiesent://SD_ILS/0/SD_ILS:22084662024-06-18T05:17:16Z2024-06-18T05:17:16Zby Akhgar, Babak, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1962519">Click to View</a><br/>Format: Electronic Resources<br/>Cloud storage security : a practical guideent://SD_ILS/0/SD_ILS:22088522024-06-18T05:17:16Z2024-06-18T05:17:16Zby Wheeler, Aaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2084976">Click to View</a><br/>Format: Electronic Resources<br/>Measuring and managing information risk : a FAIR approachent://SD_ILS/0/SD_ILS:22078292024-06-18T05:17:16Z2024-06-18T05:17:16Zby Freund, Jack, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1772300">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft system center data protection manager 2012 R2 cookbook : over 100 recipes to build your own designs exploring the advanced functionality and features of system center DPM 2012 R2ent://SD_ILS/0/SD_ILS:22383532024-06-18T05:17:16Z2024-06-18T05:17:16Zby Hedblom, Robert, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2040609">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Python forensics : master the art of digital forensics and analysis with Pythonent://SD_ILS/0/SD_ILS:22194612024-06-18T05:17:16Z2024-06-18T05:17:16Zby Spreitzenbarth, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191124">Click to View</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:21553202024-06-18T05:17:16Z2024-06-18T05:17:16Zby Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192125">Click to View</a><br/>Format: Electronic Resources<br/>Integrated Security Systems Design, 2nd Editionent://SD_ILS/0/SD_ILS:23209742024-06-18T05:17:16Z2024-06-18T05:17:16Zby Norman, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000229/?ar">https://learning.oreilly.com/library/view/~/9780128000229/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000229">https://learning.oreilly.com/library/view/~/9780128000229</a><br/>Format: Electronic Resources<br/>Healthcare information privacy and security : regulatory compliance and data security in the age of electronic health recordsent://SD_ILS/0/SD_ILS:23036462024-06-18T05:17:16Z2024-06-18T05:17:16Zby Robichau, Bernard Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430266778">https://learning.oreilly.com/library/view/~/9781430266778</a>
<a href="https://learning.oreilly.com/library/view/~/9781430266778/?ar">https://learning.oreilly.com/library/view/~/9781430266778/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430266778/?ar">https://go.oreilly.com/library-access/library/view/-/9781430266778/?ar</a><br/>Format: Electronic Resources<br/>Anti-hacker tool kit.ent://SD_ILS/0/SD_ILS:23036302024-06-18T05:17:16Z2024-06-18T05:17:16Zby Shema, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar">https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071800143/?ar">https://learning.oreilly.com/library/view/~/9780071800143/?ar</a><br/>Format: Electronic Resources<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:23034122024-06-18T05:17:16Z2024-06-18T05:17:16Zby Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format: Electronic Resources<br/>Dropbox : Sicher speichern und effektiv arbeiten in der Cloudent://SD_ILS/0/SD_ILS:23086012024-06-18T05:17:16Z2024-06-18T05:17:16Zby Schilling, Christian O., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783826687235/?ar">https://learning.oreilly.com/library/view/~/9783826687235/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783826687235/?ar">https://go.oreilly.com/library-access/library/view/-/9783826687235/?ar</a><br/>Format: Electronic Resources<br/>IBM ProtecTIER implementation and best practices guideent://SD_ILS/0/SD_ILS:23045262024-06-18T05:17:16Z2024-06-18T05:17:16Zby Orlando, Karen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738440027/?ar">https://go.oreilly.com/library-access/library/view/-/0738440027/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738440027/?ar">https://learning.oreilly.com/library/view/~/0738440027/?ar</a><br/>Format: Electronic Resources<br/>Practical Hadoop securityent://SD_ILS/0/SD_ILS:23054222024-06-18T05:17:16Z2024-06-18T05:17:16Zby Lakhe, Bhushan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265450">https://learning.oreilly.com/library/view/~/9781430265450</a>
<a href="https://learning.oreilly.com/library/view/~/9781430265450/?ar">https://learning.oreilly.com/library/view/~/9781430265450/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar</a><br/>Format: Electronic Resources<br/>The Science and Technology of Counterterrorisment://SD_ILS/0/SD_ILS:23199612024-06-18T05:17:16Z2024-06-18T05:17:16Zby Young, Carl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562">https://learning.oreilly.com/library/view/~/9780124200562</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562/?ar">https://learning.oreilly.com/library/view/~/9780124200562/?ar</a><br/>Format: Electronic Resources<br/>10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacyent://SD_ILS/0/SD_ILS:23048612024-06-18T05:17:16Z2024-06-18T05:17:16Zby Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format: Electronic Resources<br/>Deployment guide for Infosphere Guardiument://SD_ILS/0/SD_ILS:23040112024-06-18T05:17:16Z2024-06-18T05:17:16Zby Chen, Whei-Jen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738439355/?ar">https://go.oreilly.com/library-access/library/view/-/0738439355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738439355/?ar">https://learning.oreilly.com/library/view/~/0738439355/?ar</a><br/>Format: Electronic Resources<br/>Data stewardship : an actionable guide to effective data management and data governanceent://SD_ILS/0/SD_ILS:23014992024-06-18T05:17:16Z2024-06-18T05:17:16Zby Plotkin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780124103894/?ar">https://learning.oreilly.com/library/view/~/9780124103894/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124103894">https://learning.oreilly.com/library/view/~/9780124103894</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar">https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar</a><br/>Format: Electronic Resources<br/>The privacy engineer's manifesto : getting from policy to code to QA to valueent://SD_ILS/0/SD_ILS:23022962024-06-18T05:17:16Z2024-06-18T05:17:16Zby Dennedy, Michelle Finneran.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263555">https://learning.oreilly.com/library/view/~/9781430263555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430263555/?ar">https://learning.oreilly.com/library/view/~/9781430263555/?ar</a><br/>Format: Electronic Resources<br/>Information security management handbook . Volume 7ent://SD_ILS/0/SD_ILS:23002992024-06-18T05:17:16Z2024-06-18T05:17:16Zby O'Hanley, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar">https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466567498">https://learning.oreilly.com/library/view/~/9781466567498</a>
<a href="https://learning.oreilly.com/library/view/~/9781466567498/?ar">https://learning.oreilly.com/library/view/~/9781466567498/?ar</a><br/>Format: Electronic Resources<br/>Total information risk management : maximizing the value of data and information assetsent://SD_ILS/0/SD_ILS:22998982024-06-18T05:17:16Z2024-06-18T05:17:16Zby Borek, Alexander.<br/><a href="https://learning.oreilly.com/library/view/~/9780124055476/?ar">https://learning.oreilly.com/library/view/~/9780124055476/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar">https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar</a><br/>Format: Electronic Resources<br/>Responsive security : be ready to be secureent://SD_ILS/0/SD_ILS:23006432024-06-18T05:17:16Z2024-06-18T05:17:16Zby Kang, Meng-Chow.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584310/?ar">https://learning.oreilly.com/library/view/~/9781466584310/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar</a><br/>Format: Electronic Resources<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:23001802024-06-18T05:17:16Z2024-06-18T05:17:16Zby Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format: Electronic Resources<br/>G3P - Good Privacy Protection Practice in Clinical Research : Principles of Pseudonymization and Anonymization.ent://SD_ILS/0/SD_ILS:12718912024-06-18T05:17:16Z2024-06-18T05:17:16Zby Schriever, Karl-Heinz.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1685362">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise architecture and information assurance : developing a secure foundationent://SD_ILS/0/SD_ILS:22992792024-06-18T05:17:16Z2024-06-18T05:17:16Zby Scholz, James A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar">https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439841594/?ar">https://learning.oreilly.com/library/view/~/9781439841594/?ar</a><br/>Format: Electronic Resources<br/>Information governance and assurance : reducing risk, promoting policyent://SD_ILS/0/SD_ILS:22357842024-06-18T05:17:16Z2024-06-18T05:17:16Zby Maclennan, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4923765">Click to View</a><br/>Format: Electronic Resources<br/>Security leader insights for information protection : lessons and strategies from leading security professionalsent://SD_ILS/0/SD_ILS:22074672024-06-18T05:17:16Z2024-06-18T05:17:16Zby Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699254">Click to View</a><br/>Format: Electronic Resources<br/>Data stewardship : an actionable guide to effective data management and data governanceent://SD_ILS/0/SD_ILS:22065792024-06-18T05:17:16Z2024-06-18T05:17:16Zby Plotkin, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418375">Click to View</a><br/>Format: Electronic Resources<br/>Anonymous Communication Networksent://SD_ILS/0/SD_ILS:23272682024-06-18T05:17:16Z2024-06-18T05:17:16Zby Peng, Kun, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881606">https://learning.oreilly.com/library/view/~/9781439881606</a>
<a href="https://learning.oreilly.com/library/view/~/9781439881606/?ar">https://learning.oreilly.com/library/view/~/9781439881606/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439881606/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881606/?ar</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:21298472024-06-18T05:17:16Z2024-06-18T05:17:16Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1153198">Click to View</a><br/>Format: Electronic Resources<br/>ISO27001/ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:23107422024-06-18T05:17:16Z2024-06-18T05:17:16Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285247/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285247/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285247/?ar">https://learning.oreilly.com/library/view/~/9781849285247/?ar</a><br/>Format: Electronic Resources<br/>Best Practices for the Formal Software Testing Process : a Menu of Testing Tasksent://SD_ILS/0/SD_ILS:23206912024-06-18T05:17:16Z2024-06-18T05:17:16Zby Drabick, Rodger, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309/?ar">https://learning.oreilly.com/library/view/~/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309">https://learning.oreilly.com/library/view/~/9780133489309</a><br/>Format: Electronic Resources<br/>Surviving the Top Ten Challenges of Software Testing : a People-Oriented Approachent://SD_ILS/0/SD_ILS:23058322024-06-18T05:17:16Z2024-06-18T05:17:16Zby Rice, William E. Perry. Randall W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163">https://learning.oreilly.com/library/view/~/9780133489163</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163/?ar">https://learning.oreilly.com/library/view/~/9780133489163/?ar</a><br/>Format: Electronic Resources<br/>Strategic Information Management, 3rd Editionent://SD_ILS/0/SD_ILS:23199142024-06-18T05:17:16Z2024-06-18T05:17:16Zby Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format: Electronic Resources<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:23134822024-06-18T05:17:16Z2024-06-18T05:17:16Zby Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:22979662024-06-18T05:17:16Z2024-06-18T05:17:16Zby Brotby, W. Krag.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881538/?ar">https://learning.oreilly.com/library/view/~/9781439881538/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar</a><br/>Format: Electronic Resources<br/>Introduction to cyber-warfare : a multidisciplinary approachent://SD_ILS/0/SD_ILS:23001962024-06-18T05:17:16Z2024-06-18T05:17:16Zby Shakarian, Paulo.<br/><a href="https://learning.oreilly.com/library/view/~/9780124078147">https://learning.oreilly.com/library/view/~/9780124078147</a>
<a href="https://learning.oreilly.com/library/view/~/9780124078147/?ar">https://learning.oreilly.com/library/view/~/9780124078147/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar">https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar</a><br/>Format: Electronic Resources<br/>Information security management principlesent://SD_ILS/0/SD_ILS:22994512024-06-18T05:17:16Z2024-06-18T05:17:16Zby Alexander, David (Information security practitioner)<br/><a href="https://learning.oreilly.com/library/view/~/9781780171753/?ar">https://learning.oreilly.com/library/view/~/9781780171753/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar">https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780171753">https://learning.oreilly.com/library/view/~/9781780171753</a><br/>Format: Electronic Resources<br/>Getting Started with FortiGate.ent://SD_ILS/0/SD_ILS:12650072024-06-18T05:17:16Z2024-06-18T05:17:16Zby Fabbri, Rosato.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572901">Click to View</a><br/>Format: Electronic Resources<br/>Information Security Management Principles.ent://SD_ILS/0/SD_ILS:12590732024-06-18T05:17:16Z2024-06-18T05:17:16Zby Alexander, David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1213992">Click to View</a><br/>Format: Electronic Resources<br/>The complete book of data anonymization : from planning to implementationent://SD_ILS/0/SD_ILS:4098302024-06-18T05:17:16Z2024-06-18T05:17:16Zby Raghunathan, Balaji, author.<br/>Format: Books<br/>Afet durumunda kamuda veri güvenliÄŸient://SD_ILS/0/SD_ILS:4304932024-06-18T05:17:16Z2024-06-18T05:17:16Zby Ä°stanbul Ä°l Özel Ä°daresi<br/>Format: Books<br/>Introduction to Cyber-Warfare : A Multidisciplinary Approach.ent://SD_ILS/0/SD_ILS:12534912024-06-18T05:17:16Z2024-06-18T05:17:16Zby Shakarian, Paulo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115159">Click to View</a><br/>Format: Electronic Resources<br/>IBM InfoSphere : A Platform for Big Data Governance and Process Data Governance.ent://SD_ILS/0/SD_ILS:12906442024-06-18T05:17:16Z2024-06-18T05:17:16Zby Soares, Sunil.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3015277">Click to View</a><br/>Format: Electronic Resources<br/>Oracle Data Guard 11gR2 Administration Beginner's Guide.ent://SD_ILS/0/SD_ILS:12582622024-06-18T05:17:16Z2024-06-18T05:17:16Zby Baransel, Emre.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1192652">Click to View</a><br/>Format: Electronic Resources<br/>Total Information Risk Management : Maximizing the Value of Data and Information Assets.ent://SD_ILS/0/SD_ILS:12620542024-06-18T05:17:16Z2024-06-18T05:17:16Zby Borek, Alexander.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1386476">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocolsent://SD_ILS/0/SD_ILS:22060432024-06-18T05:17:16Z2024-06-18T05:17:16Zby Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073014">Click to View</a><br/>Format: Electronic Resources<br/>Nine steps to success : an ISO27001:2013 implementation overviewent://SD_ILS/0/SD_ILS:23004362024-06-18T05:17:16Z2024-06-18T05:17:16Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117/?ar">https://learning.oreilly.com/library/view/~/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117">https://learning.oreilly.com/library/view/~/9781849285117</a><br/>Format: Electronic Resources<br/>Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this dayent://SD_ILS/0/SD_ILS:22980532024-06-18T05:17:16Z2024-06-18T05:17:16Zby Yerrid, K. C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960/?ar">https://learning.oreilly.com/library/view/~/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960">https://learning.oreilly.com/library/view/~/9781849519960</a><br/>Format: Electronic Resources<br/>Oracle Data Guard 11gR2 Administration Beginner's Guide : Learn How to Build and Maintain Data Guard Configurations with Real-Life, Practical Examplesent://SD_ILS/0/SD_ILS:22994492024-06-18T05:17:16Z2024-06-18T05:17:16Zby Baransel, Emre.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849687904/?ar">https://go.oreilly.com/library-access/library/view/-/9781849687904/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849687904/?ar">https://learning.oreilly.com/library/view/~/9781849687904/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849687904">https://learning.oreilly.com/library/view/~/9781849687904</a><br/>Format: Electronic Resources<br/>Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:22966162024-06-18T05:17:16Z2024-06-18T05:17:16Zby Raggo, Michael T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format: Electronic Resources<br/>The PayPal official insider guide to internet security : spot scams and protect your online businessent://SD_ILS/0/SD_ILS:22972592024-06-18T05:17:16Z2024-06-18T05:17:16Zby Savage, Michelle.<br/><a href="https://learning.oreilly.com/library/view/~/9780133154573">https://learning.oreilly.com/library/view/~/9780133154573</a>
<a href="https://learning.oreilly.com/library/view/~/9780133154573/?ar">https://learning.oreilly.com/library/view/~/9780133154573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar">https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:21549082024-06-18T05:17:16Z2024-06-18T05:17:16Zby Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463578">Click to View</a><br/>Format: Electronic Resources<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:21549092024-06-18T05:17:16Z2024-06-18T05:17:16Zby Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463579">Click to View</a><br/>Format: Electronic Resources<br/>The dark side of personalization online privacy concerns influence customer behaviorent://SD_ILS/0/SD_ILS:22379762024-06-18T05:17:16Z2024-06-18T05:17:16Zby Ziesak, Jörg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1324048">Click to View</a><br/>Format: Electronic Resources<br/>Information protection playbookent://SD_ILS/0/SD_ILS:22065832024-06-18T05:17:16Z2024-06-18T05:17:16Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418381">Click to View</a><br/>Format: Electronic Resources<br/>Information security management handbook. Volume 5ent://SD_ILS/0/SD_ILS:23031242024-06-18T05:17:16Z2024-06-18T05:17:16Zby Tipton, Harold F.<br/><a href="https://learning.oreilly.com/library/view/~/9781439853467/?ar">https://learning.oreilly.com/library/view/~/9781439853467/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439853467/?ar">https://go.oreilly.com/library-access/library/view/-/9781439853467/?ar</a><br/>Format: Electronic Resources<br/>Death of the Internet.ent://SD_ILS/0/SD_ILS:12392272024-06-18T05:17:16Z2024-06-18T05:17:16Zby Jakobsson, Markus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=848529">Click to View</a><br/>Format: Electronic Resources<br/>IT Governance : An International Guide to Data Security and ISO27001/ISO27002.ent://SD_ILS/0/SD_ILS:12381642024-06-18T05:17:16Z2024-06-18T05:17:16Zby Calder, Alan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=838114">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security standards, practices and industrial applications systems and methodologiesent://SD_ILS/0/SD_ILS:4763482024-06-18T05:17:16Z2024-06-18T05:17:16Zby Zubairi, Junaid Ahmed, 1961-<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/</a><br/>Format: Electronic Resources<br/>Governance, Risk, and Compliance Handbook for Oracle Applications.ent://SD_ILS/0/SD_ILS:12478132024-06-18T05:17:16Z2024-06-18T05:17:16Zby King, Nigel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1019540">Click to View</a><br/>Format: Electronic Resources<br/>Data Governance : How to Design, Deploy and Sustain an Effective Data Governance Program.ent://SD_ILS/0/SD_ILS:12484912024-06-18T05:17:16Z2024-06-18T05:17:16Zby Ladley, John.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1032951">Click to View</a><br/>Format: Electronic Resources<br/>Information Warfare.ent://SD_ILS/0/SD_ILS:12526522024-06-18T05:17:16Z2024-06-18T05:17:16Zby Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106528">Click to View</a><br/>Format: Electronic Resources<br/>Network Backup with Bacula How-to.ent://SD_ILS/0/SD_ILS:12521662024-06-18T05:17:16Z2024-06-18T05:17:16Zby Pankov, Eugene.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085229">Click to View</a><br/>Format: Electronic Resources<br/>Internet and surveillance : the challenges of Web 2.0 and social mediaent://SD_ILS/0/SD_ILS:22949962024-06-18T05:17:16Z2024-06-18T05:17:16Zby Fuchs, Christian, 1976-<br/><a href="https://learning.oreilly.com/library/view/~/9780415891608/?ar">https://learning.oreilly.com/library/view/~/9780415891608/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780415891608/?ar">https://go.oreilly.com/library-access/library/view/-/9780415891608/?ar</a><br/>Format: Electronic Resources<br/>The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)ent://SD_ILS/0/SD_ILS:22941702024-06-18T05:17:16Z2024-06-18T05:17:16Zby Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format: Electronic Resources<br/>Analyzing computer security : a threat/vulnerability/countermeasure approachent://SD_ILS/0/SD_ILS:22918062024-06-18T05:17:16Z2024-06-18T05:17:16Zby Pfleeger, Charles P., 1948-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar">https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132789493/?ar">https://learning.oreilly.com/library/view/~/9780132789493/?ar</a><br/>Format: Electronic Resources<br/>Data governance : how to design, deploy and sustain an effective data governance programent://SD_ILS/0/SD_ILS:22954852024-06-18T05:17:16Z2024-06-18T05:17:16Zby Ladley, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124158290/?ar">https://go.oreilly.com/library-access/library/view/-/9780124158290/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124158290/?ar">https://learning.oreilly.com/library/view/~/9780124158290/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124158290">https://learning.oreilly.com/library/view/~/9780124158290</a><br/>Format: Electronic Resources<br/>Information storage and management : storing, managing, and protecting digital information in classic, virtualized, and cloud environmentsent://SD_ILS/0/SD_ILS:22963502024-06-18T05:17:16Z2024-06-18T05:17:16Zby EMC Corporation.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118236963/?ar">https://go.oreilly.com/library-access/library/view/-/9781118236963/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118236963/?ar">https://learning.oreilly.com/library/view/~/9781118236963/?ar</a><br/>Format: Electronic Resources<br/>Once more unto the breach : managing information security in an uncertain worldent://SD_ILS/0/SD_ILS:22980222024-06-18T05:17:16Z2024-06-18T05:17:16Zby Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format: Electronic Resources<br/>Getting started with OAuth 2.0ent://SD_ILS/0/SD_ILS:22951502024-06-18T05:17:16Z2024-06-18T05:17:16Zby Boyd, Ryan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449317843/?ar">https://go.oreilly.com/library-access/library/view/-/9781449317843/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449317843">https://learning.oreilly.com/library/view/~/9781449317843</a>
<a href="https://learning.oreilly.com/library/view/~/9781449317843/?ar">https://learning.oreilly.com/library/view/~/9781449317843/?ar</a><br/>Format: Electronic Resources<br/>Internet and surveillance the challenges of Web 2.0 and social mediaent://SD_ILS/0/SD_ILS:21276242024-06-18T05:17:16Z2024-06-18T05:17:16Zby Fuchs, Christian, 1976-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=981641">Click to View</a><br/>Format: Electronic Resources<br/>Der hypothetische Vergleich des [section][section] 269 StGB unter Berucksichtigung der tatsachlichen und normativen Vergleichbarkeit von Schrifturkunde und moderner (Computer-) Datenurkundent://SD_ILS/0/SD_ILS:23505462024-06-18T05:17:16Z2024-06-18T05:17:16Zby Hoinghaus, Nils, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5782103">Click to View</a><br/>Format: Electronic Resources<br/>CMS Security Handbook : The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone.ent://SD_ILS/0/SD_ILS:12289172024-06-18T05:17:16Z2024-06-18T05:17:16Zby Canavan, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706893">Click to View</a><br/>Format: Electronic Resources<br/>Information Security, Coding Theory and Related Combinatorics : Information Coding and Combinatorics.ent://SD_ILS/0/SD_ILS:12263672024-06-18T05:17:16Z2024-06-18T05:17:16Zby Crnkovic, D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=682727">Click to View</a><br/>Format: Electronic Resources<br/>CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:1403112024-06-18T05:17:16Z2024-06-18T05:17:16Zby Canavan, Tom.<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy1202/2011922796-b.html">http://www.loc.gov/catdir/enhancements/fy1202/2011922796-b.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy1202/2011922796-d.html">http://www.loc.gov/catdir/enhancements/fy1202/2011922796-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy1202/2011922796-t.html">http://www.loc.gov/catdir/enhancements/fy1202/2011922796-t.html</a><br/>Format: Books<br/>Microsoft Data Protection Manager 2010.ent://SD_ILS/0/SD_ILS:12459022024-06-18T05:17:16Z2024-06-18T05:17:16Zby Buchanan, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=950601">Click to View</a><br/>Format: Electronic Resources<br/>Use of Risk Analysis in Computer-Aided Persuasion.ent://SD_ILS/0/SD_ILS:12377402024-06-18T05:17:16Z2024-06-18T05:17:16Zby Duman, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=836226">Click to View</a><br/>Format: Electronic Resources<br/>WordPress 3 Ultimate Security.ent://SD_ILS/0/SD_ILS:12456472024-06-18T05:17:16Z2024-06-18T05:17:16Zby Connelly, Olly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=948509">Click to View</a><br/>Format: Electronic Resources<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:22908842024-06-18T05:17:16Z2024-06-18T05:17:16Zby Wallace, Michael, 1960-<br/><a href="https://learning.oreilly.com/library/view/~/9780814416136/?ar">https://learning.oreilly.com/library/view/~/9780814416136/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar">https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar</a><br/>Format: Electronic Resources<br/>The chief information security officer : insights, tools and survival skillsent://SD_ILS/0/SD_ILS:22913842024-06-18T05:17:16Z2024-06-18T05:17:16Zby Kouns, Barry.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281966">https://learning.oreilly.com/library/view/~/9781849281966</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281966/?ar">https://learning.oreilly.com/library/view/~/9781849281966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar</a><br/>Format: Electronic Resources<br/>Practical risk management for the CIOent://SD_ILS/0/SD_ILS:22913672024-06-18T05:17:16Z2024-06-18T05:17:16Zby Scherling, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856543/?ar">https://learning.oreilly.com/library/view/~/9781439856543/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856543">https://learning.oreilly.com/library/view/~/9781439856543</a><br/>Format: Electronic Resources<br/>The security risk assessment handbook : a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:22916532024-06-18T05:17:16Z2024-06-18T05:17:16Zby Landoll, Douglas J.<br/><a href="https://learning.oreilly.com/library/view/~/9781439821497">https://learning.oreilly.com/library/view/~/9781439821497</a>
<a href="https://learning.oreilly.com/library/view/~/9781439821497/?ar">https://learning.oreilly.com/library/view/~/9781439821497/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar">https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar</a><br/>Format: Electronic Resources<br/>CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:22916612024-06-18T05:17:16Z2024-06-18T05:17:16Zby Canavan, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar">https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216/?ar">https://learning.oreilly.com/library/view/~/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216">https://learning.oreilly.com/library/view/~/9780470916216</a><br/>Format: Electronic Resources<br/>Preventing good people from doing bad things : implementing least privilegeent://SD_ILS/0/SD_ILS:22932782024-06-18T05:17:16Z2024-06-18T05:17:16Zby Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format: Electronic Resources<br/>Mobile device security for dummiesent://SD_ILS/0/SD_ILS:22935152024-06-18T05:17:16Z2024-06-18T05:17:16Zby Campagna, Rich R.<br/><a href="https://learning.oreilly.com/library/view/~/9781118093801/?ar">https://learning.oreilly.com/library/view/~/9781118093801/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar">https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar</a><br/>Format: Electronic Resources<br/>Auditing cloud computing : a security and privacy guideent://SD_ILS/0/SD_ILS:22922552024-06-18T05:17:16Z2024-06-18T05:17:16Zby Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format: Electronic Resources<br/>IBM system storage solutions for smarter systemsent://SD_ILS/0/SD_ILS:22925552024-06-18T05:17:16Z2024-06-18T05:17:16Zby Dufrasne, Bertrand.<br/><a href="https://learning.oreilly.com/library/view/~/073843583X/?ar">https://learning.oreilly.com/library/view/~/073843583X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/073843583X/?ar">https://go.oreilly.com/library-access/library/view/-/073843583X/?ar</a><br/>Format: Electronic Resources<br/>Privacy and Big Data.ent://SD_ILS/0/SD_ILS:22935542024-06-18T05:17:16Z2024-06-18T05:17:16Zby Craig, Terence.<br/><a href="https://learning.oreilly.com/library/view/~/9781449314842">https://learning.oreilly.com/library/view/~/9781449314842</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781449314842/?ar">https://go.oreilly.com/library-access/library/view/-/9781449314842/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449314842/?ar">https://learning.oreilly.com/library/view/~/9781449314842/?ar</a><br/>Format: Electronic Resources<br/>Auditing cloud computing a security and privacy guideent://SD_ILS/0/SD_ILS:22697722024-06-18T05:17:16Z2024-06-18T05:17:16Zby Halpert, Ben, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=697627">Click to View</a><br/>Format: Electronic Resources<br/>Security de-engineering : solving the problems in information risk managementent://SD_ILS/0/SD_ILS:22959952024-06-18T05:17:16Z2024-06-18T05:17:16Zby Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a>
<a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format: Electronic Resources<br/>Expert Oracle and Java security : programming secure Oracle database applications with Javaent://SD_ILS/0/SD_ILS:22932242024-06-18T05:17:16Z2024-06-18T05:17:16Zby Coffin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781430238317">https://learning.oreilly.com/library/view/~/9781430238317</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar">https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430238317/?ar">https://learning.oreilly.com/library/view/~/9781430238317/?ar</a><br/>Format: Electronic Resources<br/>IBM System Storage TS7650, TS7650G, and TS7610ent://SD_ILS/0/SD_ILS:23267932024-06-18T05:17:16Z2024-06-18T05:17:16Zby Osuna, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738435848">https://learning.oreilly.com/library/view/~/0738435848</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738435848/?ar">https://go.oreilly.com/library-access/library/view/-/0738435848/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738435848/?ar">https://learning.oreilly.com/library/view/~/0738435848/?ar</a><br/>Format: Electronic Resources<br/>Security strategy : from requirements to realityent://SD_ILS/0/SD_ILS:23216382024-06-18T05:17:16Z2024-06-18T05:17:16Zby Stackpole, Bill. http://viaf.org/viaf/sourceID/LC%7cn2007046244<br/><a href="https://learning.oreilly.com/library/view/~/9781439827345">https://learning.oreilly.com/library/view/~/9781439827345</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar">https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439827345/?ar">https://learning.oreilly.com/library/view/~/9781439827345/?ar</a><br/>Format: Electronic Resources<br/>Information security for managementent://SD_ILS/0/SD_ILS:3092552024-06-18T05:17:16Z2024-06-18T05:17:16Zby Iyengar, Venugopal.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178</a><br/>Format: Electronic Resources<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:22612152024-06-18T05:17:16Z2024-06-18T05:17:16Zby Seigneur, Jean-Marc.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format: Electronic Resources<br/>PCI compliance : understand and implement effective PCI data security standard compliance.ent://SD_ILS/0/SD_ILS:22886412024-06-18T05:17:16Z2024-06-18T05:17:16Zby Chuvakin, Anton.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494991/?ar">https://learning.oreilly.com/library/view/~/9781597494991/?ar</a><br/>Format: Electronic Resources<br/>Network security auditingent://SD_ILS/0/SD_ILS:22894632024-06-18T05:17:16Z2024-06-18T05:17:16Zby Jackson, Chris, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9781587059407">https://learning.oreilly.com/library/view/~/9781587059407</a>
<a href="https://learning.oreilly.com/library/view/~/9781587059407/?ar">https://learning.oreilly.com/library/view/~/9781587059407/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587059407/?ar">https://go.oreilly.com/library-access/library/view/-/9781587059407/?ar</a><br/>Format: Electronic Resources<br/>Managing Information Security Breaches : Studies from Real Life.ent://SD_ILS/0/SD_ILS:22906742024-06-18T05:17:16Z2024-06-18T05:17:16Zby Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format: Electronic Resources<br/>Surreptitious software : obfuscation, watermarking, and tamperproofing for software protectionent://SD_ILS/0/SD_ILS:22869822024-06-18T05:17:16Z2024-06-18T05:17:16Zby Collberg, Christian.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591258/?ar">https://learning.oreilly.com/library/view/~/9780321591258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar</a><br/>Format: Electronic Resources<br/>Information security for managementent://SD_ILS/0/SD_ILS:21013382024-06-18T05:17:16Z2024-06-18T05:17:16Zby Iyengar, Venugopal.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3011230">Click to View</a><br/>Format: Electronic Resources<br/>Information security management : concepts and practiceent://SD_ILS/0/SD_ILS:21314412024-06-18T05:17:16Z2024-06-18T05:17:16Zby Raggad, Bel G., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1449482">Click to View</a><br/>Format: Electronic Resources<br/>Microsoftent://SD_ILS/0/SD_ILS:23210692024-06-18T05:17:16Z2024-06-18T05:17:16Zby Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format: Electronic Resources<br/>The Prompt Payment Act Answer Bookent://SD_ILS/0/SD_ILS:23152632024-06-18T05:17:16Z2024-06-18T05:17:16Zby Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263336">https://learning.oreilly.com/library/view/~/9781567263336</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263336/?ar">https://learning.oreilly.com/library/view/~/9781567263336/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar</a><br/>Format: Electronic Resources<br/>The Antideficiency Act Answer Bookent://SD_ILS/0/SD_ILS:23152732024-06-18T05:17:16Z2024-06-18T05:17:16Zby Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263343/?ar">https://learning.oreilly.com/library/view/~/9781567263343/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263343">https://learning.oreilly.com/library/view/~/9781567263343</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar</a><br/>Format: Electronic Resources<br/>Enterprise Information Security and Privacy.ent://SD_ILS/0/SD_ILS:12077182024-06-18T05:17:16Z2024-06-18T05:17:16Zby Axelrod, C. Warren.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456886">Click to View</a><br/>Format: Electronic Resources<br/>Insider Threat : Combatting the Enemy Within.ent://SD_ILS/0/SD_ILS:12121422024-06-18T05:17:16Z2024-06-18T05:17:16Zby Blackwell, Clive.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=480373">Click to View</a><br/>Format: Electronic Resources<br/>Managing Information Risk : A Director's Guide.ent://SD_ILS/0/SD_ILS:12121512024-06-18T05:17:16Z2024-06-18T05:17:16Zby Mitchell, Stewart.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=480407">Click to View</a><br/>Format: Electronic Resources<br/>Definitive Guide to the C&A Transformation Process : The First Publication of a Comprehensive View of the C&A Transformation.ent://SD_ILS/0/SD_ILS:12161552024-06-18T05:17:16Z2024-06-18T05:17:16Zby Mehan, Julie.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=547041">Click to View</a><br/>Format: Electronic Resources<br/>Data Governance Imperative.ent://SD_ILS/0/SD_ILS:12121522024-06-18T05:17:16Z2024-06-18T05:17:16Zby Sarsfield, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=480410">Click to View</a><br/>Format: Electronic Resources<br/>Information Security for Management.ent://SD_ILS/0/SD_ILS:12896542024-06-18T05:17:16Z2024-06-18T05:17:16Zby Iyengar, Venugopal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3011230">Click to View</a><br/>Format: Electronic Resources<br/>Advances in Artificial Intelligence for Privacy Protection and Security.ent://SD_ILS/0/SD_ILS:12707052024-06-18T05:17:16Z2024-06-18T05:17:16Zby Solanas, Agusti.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679374">Click to View</a><br/>Format: Electronic Resources<br/>Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issuesent://SD_ILS/0/SD_ILS:22619692024-06-18T05:17:16Z2024-06-18T05:17:16Zby Nemati, Hamid R., 1958-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7</a><br/>Format: Electronic Resources<br/>Multimedia forensics and securityent://SD_ILS/0/SD_ILS:22617922024-06-18T05:17:16Z2024-06-18T05:17:16Zby Li, Chang-Tsun.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-869-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-869-7</a><br/>Format: Electronic Resources<br/>Social implications of data mining and information privacy interdisciplinary frameworks and solutionsent://SD_ILS/0/SD_ILS:22619172024-06-18T05:17:16Z2024-06-18T05:17:16Zby Eyob, Ephrem, 1954-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-196-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-196-4</a><br/>Format: Electronic Resources<br/>Cyber-security and global information assurance threat analysis and response solutionsent://SD_ILS/0/SD_ILS:22612722024-06-18T05:17:16Z2024-06-18T05:17:16Zby Knapp, Kenneth J.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5</a><br/>Format: Electronic Resources<br/>How to secure and audit Oracle 10g and 11gent://SD_ILS/0/SD_ILS:22863242024-06-18T05:17:16Z2024-06-18T05:17:16Zby Ben-Natan, Ron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar">https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139/?ar">https://learning.oreilly.com/library/view/~/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139">https://learning.oreilly.com/library/view/~/9781420084139</a><br/>Format: Electronic Resources<br/>