Search Results for - Narrowed by: Data protection.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?2024-05-30T22:54:43ZLearning digital identity : design, deploy, and manage identity architecturesent://SD_ILS/0/SD_ILS:23347392024-05-30T22:54:43Z2024-05-30T22:54:43Zby Windley, Phillip J., 1958- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098117689/?ar">https://learning.oreilly.com/library/view/~/9781098117689/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098117689">https://learning.oreilly.com/library/view/~/9781098117689</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar">https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar</a><br/>Format: Electronic Resources<br/>Data governanceent://SD_ILS/0/SD_ILS:23352012024-05-30T22:54:43Z2024-05-30T22:54:43Zby Reichental, Jonathan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119906773/?ar">https://go.oreilly.com/library-access/library/view/-/9781119906773/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119906773">https://learning.oreilly.com/library/view/~/9781119906773</a>
<a href="https://learning.oreilly.com/library/view/~/9781119906773/?ar">https://learning.oreilly.com/library/view/~/9781119906773/?ar</a><br/>Format: Electronic Resources<br/>Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflictent://SD_ILS/0/SD_ILS:23346962024-05-30T22:54:43Z2024-05-30T22:54:43Zby Borges, Dan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818/?ar">https://learning.oreilly.com/library/view/~/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818">https://learning.oreilly.com/library/view/~/9781801812818</a><br/>Format: Sound recording<br/>Transitioning to quantum-safe cryptography on IBM Zent://SD_ILS/0/SD_ILS:23339332024-05-30T22:54:43Z2024-05-30T22:54:43Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460680">https://learning.oreilly.com/library/view/~/9780738460680</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460680/?ar">https://learning.oreilly.com/library/view/~/9780738460680/?ar</a><br/>Format: Electronic Resources<br/>Data Privacy : a Runbook for Engineers.ent://SD_ILS/0/SD_ILS:23316502024-05-30T22:54:43Z2024-05-30T22:54:43Zby Bhajaria, Nishant.<br/><a href="https://learning.oreilly.com/library/view/~/9781617298998/?ar">https://learning.oreilly.com/library/view/~/9781617298998/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617298998/?ar">https://go.oreilly.com/library-access/library/view/-/9781617298998/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617298998">https://learning.oreilly.com/library/view/~/9781617298998</a><br/>Format: Electronic Resources<br/>System and privacy data protection.ent://SD_ILS/0/SD_ILS:23317772024-05-30T22:54:43Z2024-05-30T22:54:43Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a>
<a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format: Video recording<br/>Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copyent://SD_ILS/0/SD_ILS:23339502024-05-30T22:54:43Z2024-05-30T22:54:43Zby Shingornikar, Shashank, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460710/?ar">https://learning.oreilly.com/library/view/~/9780738460710/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460710">https://learning.oreilly.com/library/view/~/9780738460710</a><br/>Format: Electronic Resources<br/>ASP.NET Core Securityent://SD_ILS/0/SD_ILS:23339622024-05-30T22:54:43Z2024-05-30T22:54:43Zby Wenz, Christian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781633439986/?ar">https://learning.oreilly.com/library/view/~/9781633439986/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781633439986">https://learning.oreilly.com/library/view/~/9781633439986</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781633439986/?ar">https://go.oreilly.com/library-access/library/view/-/9781633439986/?ar</a><br/>Format: Electronic Resources<br/>Mastering cyber intelligence : gain comprehensive knowledge and skills to conduct threat intelligence for effective system defenseent://SD_ILS/0/SD_ILS:23326682024-05-30T22:54:43Z2024-05-30T22:54:43Zby Dahj, Jean Nestor M.<br/><a href="https://learning.oreilly.com/library/view/~/9781800209404">https://learning.oreilly.com/library/view/~/9781800209404</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar">https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800209404/?ar">https://learning.oreilly.com/library/view/~/9781800209404/?ar</a><br/>Format: Electronic Resources<br/>Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000ent://SD_ILS/0/SD_ILS:23320672024-05-30T22:54:43Z2024-05-30T22:54:43Zby International Business Machines Corporation, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406/?ar">https://learning.oreilly.com/library/view/~/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406">https://learning.oreilly.com/library/view/~/9780738460406</a><br/>Format: Electronic Resources<br/>Digital Earth : cyber threats, privacy and ethics in an age of paranoiaent://SD_ILS/0/SD_ILS:23328962024-05-30T22:54:43Z2024-05-30T22:54:43Zby Katz, Sarah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783614">https://learning.oreilly.com/library/view/~/9781787783614</a>
<a href="https://learning.oreilly.com/library/view/~/9781787783614/?ar">https://learning.oreilly.com/library/view/~/9781787783614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar</a><br/>Format: Electronic Resources<br/>Hacking artificial intelligence : a leader's guide from deepfakes to breaking deep learningent://SD_ILS/0/SD_ILS:23329122024-05-30T22:54:43Z2024-05-30T22:54:43Zby Gibian, Davey, 1988- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663719379/?ar">https://go.oreilly.com/library-access/library/view/-/9781663719379/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781663719379">https://learning.oreilly.com/library/view/~/9781663719379</a>
<a href="https://learning.oreilly.com/library/view/~/9781663719379/?ar">https://learning.oreilly.com/library/view/~/9781663719379/?ar</a><br/>Format: Sound recording<br/>Executive's guide to cyber risk : securing the future todayent://SD_ILS/0/SD_ILS:23332112024-05-30T22:54:43Z2024-05-30T22:54:43Zby Moyo, Siegfried, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119863113">https://learning.oreilly.com/library/view/~/9781119863113</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar">https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119863113/?ar">https://learning.oreilly.com/library/view/~/9781119863113/?ar</a><br/>Format: Electronic Resources<br/>Google xi tong jia gou jie mi : gou jian an quan ke kao de xi tong = Building secure and reliable systemsent://SD_ILS/0/SD_ILS:23329282024-05-30T22:54:43Z2024-05-30T22:54:43Zby Adkins, Heather, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar">https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9787115569257/?ar">https://learning.oreilly.com/library/view/~/9787115569257/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9787115569257">https://learning.oreilly.com/library/view/~/9787115569257</a><br/>Format: Electronic Resources<br/>Pro Google cloud automation : with Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkinsent://SD_ILS/0/SD_ILS:23275092024-05-30T22:54:43Z2024-05-30T22:54:43Zby Sabharwal, Navin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265734/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265734/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265734/?ar">https://learning.oreilly.com/library/view/~/9781484265734/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265734">https://learning.oreilly.com/library/view/~/9781484265734</a><br/>Format: Electronic Resources<br/>Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisionsent://SD_ILS/0/SD_ILS:23284852024-05-30T22:54:43Z2024-05-30T22:54:43Zby Moore, Richard O., III, 1971- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469082707">https://learning.oreilly.com/library/view/~/9781469082707</a>
<a href="https://learning.oreilly.com/library/view/~/9781469082707/?ar">https://learning.oreilly.com/library/view/~/9781469082707/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469082707/?ar">https://go.oreilly.com/library-access/library/view/-/9781469082707/?ar</a><br/>Format: Electronic Resources<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:23270532024-05-30T22:54:43Z2024-05-30T22:54:43Zby Moschovitis, Christos J. P., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119658740">https://learning.oreilly.com/library/view/~/9781119658740</a>
<a href="https://learning.oreilly.com/library/view/~/9781119658740/?ar">https://learning.oreilly.com/library/view/~/9781119658740/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar">https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar</a><br/>Format: Electronic Resources<br/>Self-sovereign identity : decentralized digital identity and verifiable credentialsent://SD_ILS/0/SD_ILS:23302702024-05-30T22:54:43Z2024-05-30T22:54:43Zby Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format: Electronic Resources<br/>Big breaches : cybersecurity lessons for everyoneent://SD_ILS/0/SD_ILS:23281262024-05-30T22:54:43Z2024-05-30T22:54:43Zby Daswani, Neil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484266557">https://learning.oreilly.com/library/view/~/9781484266557</a>
<a href="https://learning.oreilly.com/library/view/~/9781484266557/?ar">https://learning.oreilly.com/library/view/~/9781484266557/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar">https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar</a><br/>Format: Electronic Resources<br/>Secure operations and protectionsent://SD_ILS/0/SD_ILS:23320922024-05-30T22:54:43Z2024-05-30T22:54:43Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format: Video recording<br/>Mastering Active Directory - Third Editionent://SD_ILS/0/SD_ILS:23311052024-05-30T22:54:43Z2024-05-30T22:54:43Zby Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format: Electronic Resources<br/>The Complete 2020 Ethereum and Solidity Developer Bootcampent://SD_ILS/0/SD_ILS:23234782024-05-30T22:54:43Z2024-05-30T22:54:43Zby Wiesner, Thomas, author.<br/><a href="https://learning.oreilly.com/videos/~/9781800201019/?ar">https://learning.oreilly.com/videos/~/9781800201019/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar">https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781800201019">https://learning.oreilly.com/videos/~/9781800201019</a><br/>Format: Electronic Resources<br/>Advanced ASP.NET Core 3 Security : understanding hacks, attacks, and vulnerabilities to secure your websiteent://SD_ILS/0/SD_ILS:23264242024-05-30T22:54:43Z2024-05-30T22:54:43Zby Norberg, Scott, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260142/?ar">https://learning.oreilly.com/library/view/~/9781484260142/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484260142">https://learning.oreilly.com/library/view/~/9781484260142</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484260142/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260142/?ar</a><br/>Format: Electronic Resources<br/>Building secure firmware : armoring the foundation of the platforment://SD_ILS/0/SD_ILS:23260202024-05-30T22:54:43Z2024-05-30T22:54:43Zby Yao, Jiewen.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261064">https://learning.oreilly.com/library/view/~/9781484261064</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261064/?ar">https://learning.oreilly.com/library/view/~/9781484261064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar</a><br/>Format: Electronic Resources<br/>Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloudent://SD_ILS/0/SD_ILS:23263952024-05-30T22:54:43Z2024-05-30T22:54:43Zby Calles, Miguel A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002/?ar">https://learning.oreilly.com/library/view/~/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002">https://learning.oreilly.com/library/view/~/9781484261002</a><br/>Format: Electronic Resources<br/>Exposed : how revealing your data and eliminating privacy increases trust and liberates humanityent://SD_ILS/0/SD_ILS:23264132024-05-30T22:54:43Z2024-05-30T22:54:43Zby Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a>
<a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format: Electronic Resources<br/>Privileged attack vectors : building effective cyber-defense strategies to protect organizationsent://SD_ILS/0/SD_ILS:23246642024-05-30T22:54:43Z2024-05-30T22:54:43Zby Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146/?ar">https://learning.oreilly.com/library/view/~/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146">https://learning.oreilly.com/library/view/~/9781484259146</a><br/>Format: Electronic Resources<br/>Protecting Data Privacy Beyond the Trusted System of Recordent://SD_ILS/0/SD_ILS:23239182024-05-30T22:54:43Z2024-05-30T22:54:43Zby White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format: Electronic Resources<br/>Advanced API Security : OAuth 2. 0 and Beyondent://SD_ILS/0/SD_ILS:23227342024-05-30T22:54:43Z2024-05-30T22:54:43Zby Siriwardena, Prabath.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220504">https://learning.oreilly.com/library/view/~/9781484220504</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220504/?ar">https://learning.oreilly.com/library/view/~/9781484220504/?ar</a><br/>Format: Electronic Resources<br/>Encryption for organizations and individuals : basics of contemporary and quantum cryptographyent://SD_ILS/0/SD_ILS:23254632024-05-30T22:54:43Z2024-05-30T22:54:43Zby Ciesla, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260562">https://learning.oreilly.com/library/view/~/9781484260562</a>
<a href="https://learning.oreilly.com/library/view/~/9781484260562/?ar">https://learning.oreilly.com/library/view/~/9781484260562/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar</a><br/>Format: Electronic Resources<br/>Data privacy and GDPR handbookent://SD_ILS/0/SD_ILS:23225582024-05-30T22:54:43Z2024-05-30T22:54:43Zby Sharma, Sanjay (Financial executive), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119594246">https://learning.oreilly.com/library/view/~/9781119594246</a>
<a href="https://learning.oreilly.com/library/view/~/9781119594246/?ar">https://learning.oreilly.com/library/view/~/9781119594246/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar">https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar</a><br/>Format: Electronic Resources<br/>Cloud Computing Security, 2nd Editionent://SD_ILS/0/SD_ILS:23311012024-05-30T22:54:43Z2024-05-30T22:54:43Zby Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity for industrial scada systemsent://SD_ILS/0/SD_ILS:23514002024-05-30T22:54:43Z2024-05-30T22:54:43Zby Shaw, William T., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6468131">Click to View</a><br/>Format: Electronic Resources<br/>Data privacy and GDPR handbookent://SD_ILS/0/SD_ILS:22739352024-05-30T22:54:43Z2024-05-30T22:54:43Zby Sharma, Sanjay, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986738">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Enterprise Mobility and Security trainingent://SD_ILS/0/SD_ILS:23195562024-05-30T22:54:43Z2024-05-30T22:54:43Zby Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format: Electronic Resources<br/>GDPR For Dummiesent://SD_ILS/0/SD_ILS:23272352024-05-30T22:54:43Z2024-05-30T22:54:43Zby Dibble, Suzanne, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119546092/?ar">https://learning.oreilly.com/library/view/~/9781119546092/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119546092/?ar">https://go.oreilly.com/library-access/library/view/-/9781119546092/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119546092">https://learning.oreilly.com/library/view/~/9781119546092</a><br/>Format: Electronic Resources<br/>How digital trust drives culture change : privacy is a right, not a privilege : but organizations and leadership often struggle with it comes to adapting their culture toward digital trust and stewardshipent://SD_ILS/0/SD_ILS:23208552024-05-30T22:54:43Z2024-05-30T22:54:43Zby Abraham, Chon, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT60430/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT60430/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT60430/?ar">https://learning.oreilly.com/library/view/~/53863MIT60430/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT60430">https://learning.oreilly.com/library/view/~/53863MIT60430</a><br/>Format: Electronic Resources<br/>ISO22301 : a Pocket Guideent://SD_ILS/0/SD_ILS:23252782024-05-30T22:54:43Z2024-05-30T22:54:43Zby Drewitt, Tony, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781016/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781016/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781016/?ar">https://learning.oreilly.com/library/view/~/9781787781016/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781016">https://learning.oreilly.com/library/view/~/9781787781016</a><br/>Format: Electronic Resources<br/>Mastering Active Directory - Second Editionent://SD_ILS/0/SD_ILS:23239792024-05-30T22:54:43Z2024-05-30T22:54:43Zby Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789800203/?ar">https://learning.oreilly.com/library/view/~/9781789800203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar">https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789800203">https://learning.oreilly.com/library/view/~/9781789800203</a><br/>Format: Electronic Resources<br/>Take Control of Your Online Privacy, 4th Editionent://SD_ILS/0/SD_ILS:23210702024-05-30T22:54:43Z2024-05-30T22:54:43Zby Kissell, Joe.<br/><a href="https://learning.oreilly.com/library/view/~/9781947282377">https://learning.oreilly.com/library/view/~/9781947282377</a>
<a href="https://learning.oreilly.com/library/view/~/9781947282377/?ar">https://learning.oreilly.com/library/view/~/9781947282377/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781947282377/?ar">https://go.oreilly.com/library-access/library/view/-/9781947282377/?ar</a><br/>Format: Electronic Resources<br/>Managing SQL Server encryption certificates : getting started with SQL Server encryptionent://SD_ILS/0/SD_ILS:23213592024-05-30T22:54:43Z2024-05-30T22:54:43Zby Blinn, Eric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484251515/?ar">https://learning.oreilly.com/videos/~/9781484251515/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484251515/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251515/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers : cybersecurity advice from the best hackers in the worldent://SD_ILS/0/SD_ILS:23214522024-05-30T22:54:43Z2024-05-30T22:54:43Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format: Electronic Resources<br/>How to build privacy and security into deep learning modelsent://SD_ILS/0/SD_ILS:23227912024-05-30T22:54:43Z2024-05-30T22:54:43Zby Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format: Electronic Resources<br/>Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environmentsent://SD_ILS/0/SD_ILS:23220552024-05-30T22:54:43Z2024-05-30T22:54:43Zby Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format: Electronic Resources<br/>Karma-based API on Apple platforms : building privacy into iOS and macOS appsent://SD_ILS/0/SD_ILS:23220612024-05-30T22:54:43Z2024-05-30T22:54:43Zby Carrasco Molina, Manuel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242919/?ar">https://learning.oreilly.com/library/view/~/9781484242919/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242919/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242919/?ar</a><br/>Format: Electronic Resources<br/>Digital identities in tension : between autonomy and controlent://SD_ILS/0/SD_ILS:22735092024-05-30T22:54:43Z2024-05-30T22:54:43Zby Khatchatourov, Armen, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5785310">Click to View</a><br/>Format: Electronic Resources<br/>Il nuovo codice in materia di protezione dei dati personali : la normativa italiana dopo il d.lgs. n. 101/2018ent://SD_ILS/0/SD_ILS:22684942024-05-30T22:54:43Z2024-05-30T22:54:43Zby Scagliarini, Simone, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5971279">Click to View</a><br/>Format: Electronic Resources<br/>Modern defense in depth : an integrated approach to better web application securityent://SD_ILS/0/SD_ILS:23198732024-05-30T22:54:43Z2024-05-30T22:54:43Zby Gates, Stephen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492050360/?ar">https://learning.oreilly.com/library/view/~/9781492050360/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492050360">https://learning.oreilly.com/library/view/~/9781492050360</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar">https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar</a><br/>Format: Electronic Resources<br/>How to choose the right digital leader for your company : Striking the right competence-credibility balance for digital leaders depends largely on how the role of the CDO is defined in a particular companyent://SD_ILS/0/SD_ILS:23212772024-05-30T22:54:43Z2024-05-30T22:54:43Zby Wade, Michael R., author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT60442/?ar">https://learning.oreilly.com/library/view/~/53863MIT60442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT60442">https://learning.oreilly.com/library/view/~/53863MIT60442</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT60442/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT60442/?ar</a><br/>Format: Electronic Resources<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:23150322024-05-30T22:54:43Z2024-05-30T22:54:43Zby Wallace, Michael, 1960- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814438770/?ar">https://learning.oreilly.com/library/view/~/9780814438770/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar">https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar</a><br/>Format: Electronic Resources<br/>Lessons Learned : How to protect critical information infrastructureent://SD_ILS/0/SD_ILS:23154982024-05-30T22:54:43Z2024-05-30T22:54:43Zby Viira, Toomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849289597/?ar">https://learning.oreilly.com/library/view/~/9781849289597/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849289597/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289597/?ar</a><br/>Format: Electronic Resources<br/>What is cybersecurity?ent://SD_ILS/0/SD_ILS:23187222024-05-30T22:54:43Z2024-05-30T22:54:43Zby Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format: Electronic Resources<br/>The Board's Role in Managing Cybersecurity Risksent://SD_ILS/0/SD_ILS:23207492024-05-30T22:54:43Z2024-05-30T22:54:43Zby Rothrock, Ray, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221/?ar">https://learning.oreilly.com/library/view/~/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221">https://learning.oreilly.com/library/view/~/53863MIT59221</a><br/>Format: Electronic Resources<br/>IT-Sicherheitsmanagement - Praxiswissen für IT Security Manager, 2. Auflageent://SD_ILS/0/SD_ILS:23201052024-05-30T22:54:43Z2024-05-30T22:54:43Zby Harich, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9783958452756/?ar">https://learning.oreilly.com/library/view/~/9783958452756/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452756">https://learning.oreilly.com/library/view/~/9783958452756</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar</a><br/>Format: Electronic Resources<br/>Investigating the Cyber Breach : the digital forensics guide for the network engineerent://SD_ILS/0/SD_ILS:23153452024-05-30T22:54:43Z2024-05-30T22:54:43Zby Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar">https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134755885/?ar">https://learning.oreilly.com/library/view/~/9780134755885/?ar</a><br/>Format: Electronic Resources<br/>IBM QRadar Version 7.3 : planning and installation guideent://SD_ILS/0/SD_ILS:23154742024-05-30T22:54:43Z2024-05-30T22:54:43Zby Carabaguiaz, Elias, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442877/?ar">https://learning.oreilly.com/library/view/~/9780738442877/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853022024-05-30T22:54:43Z2024-05-30T22:54:43Zby Saracino, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845302024-05-30T22:54:43Z2024-05-30T22:54:43Zby Zhou, Yifeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74439-1">https://doi.org/10.1007/978-3-319-74439-1</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846572024-05-30T22:54:43Z2024-05-30T22:54:43Zby Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20844812024-05-30T22:54:43Z2024-05-30T22:54:43Zby Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Electronic Resources<br/>Cyber Threat Intelligenceent://SD_ILS/0/SD_ILS:20845032024-05-30T22:54:43Z2024-05-30T22:54:43Zby Dehghantanha, Ali. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format: Electronic Resources<br/>Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20845202024-05-30T22:54:43Z2024-05-30T22:54:43Zby You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format: Electronic Resources<br/>Honeypot Frameworks and Their Applications: A New Frameworkent://SD_ILS/0/SD_ILS:20841442024-05-30T22:54:43Z2024-05-30T22:54:43Zby NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Electronic Resources<br/>Security and Privacy in Smart Grident://SD_ILS/0/SD_ILS:20841582024-05-30T22:54:43Z2024-05-30T22:54:43Zby Abdallah, Asmaa. author.<br/><a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format: Electronic Resources<br/>Dynamic itemset hiding under multiple support thresholdsent://SD_ILS/0/SD_ILS:20754082024-05-30T22:54:43Z2024-05-30T22:54:43Zby Öztürk, Ahmet Cumhur, author.<br/><a href="http://hdl.handle.net/11147/6998">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Introduction to Security Reductionent://SD_ILS/0/SD_ILS:20841282024-05-30T22:54:43Z2024-05-30T22:54:43Zby Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Fog Computing and Its Applicationsent://SD_ILS/0/SD_ILS:20840632024-05-30T22:54:43Z2024-05-30T22:54:43Zby Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-02113-9">https://doi.org/10.1007/978-3-030-02113-9</a><br/>Format: Electronic Resources<br/>Edge Computing: A Primerent://SD_ILS/0/SD_ILS:20840722024-05-30T22:54:43Z2024-05-30T22:54:43Zby Cao, Jie. author.<br/><a href="https://doi.org/10.1007/978-3-030-02083-5">https://doi.org/10.1007/978-3-030-02083-5</a><br/>Format: Electronic Resources<br/>Security with Intelligent Computing and Big-data Servicesent://SD_ILS/0/SD_ILS:20868502024-05-30T22:54:43Z2024-05-30T22:54:43Zby Peng, Sheng-Lung. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76451-1">https://doi.org/10.1007/978-3-319-76451-1</a><br/>Format: Electronic Resources<br/>Cyber-Physical Systems Securityent://SD_ILS/0/SD_ILS:20843522024-05-30T22:54:43Z2024-05-30T22:54:43Zby Koç, Çetin Kaya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98935-8">https://doi.org/10.1007/978-3-319-98935-8</a><br/>Format: Electronic Resources<br/>Future Internet Technologies and Trends First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20847722024-05-30T22:54:43Z2024-05-30T22:54:43Zby Patel, Zuber. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73712-6">https://doi.org/10.1007/978-3-319-73712-6</a><br/>Format: Electronic Resources<br/>5G for Future Wireless Networks First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20844982024-05-30T22:54:43Z2024-05-30T22:54:43Zby Long, Keping. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72823-0">https://doi.org/10.1007/978-3-319-72823-0</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845112024-05-30T22:54:43Z2024-05-30T22:54:43Zby Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Developing Countries First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedingsent://SD_ILS/0/SD_ILS:20847182024-05-30T22:54:43Z2024-05-30T22:54:43Zby Belqasmi, Fatna. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67837-5">https://doi.org/10.1007/978-3-319-67837-5</a><br/>Format: Electronic Resources<br/>Smart Micro-Grid Systems Security and Privacyent://SD_ILS/0/SD_ILS:20842352024-05-30T22:54:43Z2024-05-30T22:54:43Zby Kayem, Anne V. D. M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91427-5">https://doi.org/10.1007/978-3-319-91427-5</a><br/>Format: Electronic Resources<br/>Versatile Cybersecurityent://SD_ILS/0/SD_ILS:20842922024-05-30T22:54:43Z2024-05-30T22:54:43Zby Conti, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Electronic Resources<br/>Engineering Applications of Neural Networks 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842982024-05-30T22:54:43Z2024-05-30T22:54:43Zby Pimenidis, Elias. editor. (orcid)0000-0003-3593-8640<br/><a href="https://doi.org/10.1007/978-3-319-98204-5">https://doi.org/10.1007/978-3-319-98204-5</a><br/>Format: Electronic Resources<br/>Mathematics and Computing 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844422024-05-30T22:54:43Z2024-05-30T22:54:43Zby Ghosh, Debdas. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0023-3">https://doi.org/10.1007/978-981-13-0023-3</a><br/>Format: Electronic Resources<br/>99 privacy breaches to beware of : practical data protection tips from real-life experiencesent://SD_ILS/0/SD_ILS:22683062024-05-30T22:54:43Z2024-05-30T22:54:43Zby Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5879671">Click to View</a><br/>Format: Electronic Resources<br/>Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842682024-05-30T22:54:43Z2024-05-30T22:54:43Zby Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/><a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format: Electronic Resources<br/>Smart Trends in Information Technology and Computer Communications Second International Conference, SmartCom 2017, Pune, India, August 18-19, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842162024-05-30T22:54:43Z2024-05-30T22:54:43Zby Deshpande, A.V. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1423-0">https://doi.org/10.1007/978-981-13-1423-0</a><br/>Format: Electronic Resources<br/>Advanced Monitoring in P2P Botnets A Dual Perspectiveent://SD_ILS/0/SD_ILS:20844732024-05-30T22:54:43Z2024-05-30T22:54:43Zby Karuppayah, Shankar. author.<br/><a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Electronic Resources<br/>Network Intrusion Detection using Deep Learning A Feature Learning Approachent://SD_ILS/0/SD_ILS:20843402024-05-30T22:54:43Z2024-05-30T22:54:43Zby Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>Artificial Intelligence Tools for Cyber Attributionent://SD_ILS/0/SD_ILS:20847932024-05-30T22:54:43Z2024-05-30T22:54:43Zby Nunes, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-319-73788-1">https://doi.org/10.1007/978-3-319-73788-1</a><br/>Format: Electronic Resources<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:20840512024-05-30T22:54:43Z2024-05-30T22:54:43Zby Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844012024-05-30T22:54:43Z2024-05-30T22:54:43Zby Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Security Protocols XXVI 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20855322024-05-30T22:54:43Z2024-05-30T22:54:43Zby Matyáš, Vashek. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03251-7">https://doi.org/10.1007/978-3-030-03251-7</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853902024-05-30T22:54:43Z2024-05-30T22:54:43Zby Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983<br/><a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format: Electronic Resources<br/>Smart Blockchain First International Conference, SmartBlock 2018, Tokyo, Japan, December 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853912024-05-30T22:54:43Z2024-05-30T22:54:43Zby Qiu, Meikang. editor. (orcid)0000-0002-1004-0140<br/><a href="https://doi.org/10.1007/978-3-030-05764-0">https://doi.org/10.1007/978-3-030-05764-0</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853922024-05-30T22:54:43Z2024-05-30T22:54:43Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05345-1">https://doi.org/10.1007/978-3-030-05345-1</a><br/>Format: Electronic Resources<br/>Smart Multimedia First International Conference, ICSM 2018, Toulon, France, August 24–26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20853932024-05-30T22:54:43Z2024-05-30T22:54:43Zby Basu, Anup. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04375-9">https://doi.org/10.1007/978-3-030-04375-9</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860542024-05-30T22:54:43Z2024-05-30T22:54:43Zby Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855102024-05-30T22:54:43Z2024-05-30T22:54:43Zby Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format: Electronic Resources<br/>Dynamic Games for Network Securityent://SD_ILS/0/SD_ILS:20870572024-05-30T22:54:43Z2024-05-30T22:54:43Zby He, Xiaofan. author.<br/><a href="https://doi.org/10.1007/978-3-319-75871-8">https://doi.org/10.1007/978-3-319-75871-8</a><br/>Format: Electronic Resources<br/>Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854042024-05-30T22:54:43Z2024-05-30T22:54:43Zby Ganapathy, Vinod. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format: Electronic Resources<br/>Adversary Detection For Cognitive Radio Networksent://SD_ILS/0/SD_ILS:20874002024-05-30T22:54:43Z2024-05-30T22:54:43Zby He, Xiaofan. author.<br/><a href="https://doi.org/10.1007/978-3-319-75868-8">https://doi.org/10.1007/978-3-319-75868-8</a><br/>Format: Electronic Resources<br/>Information Technology - New Generations 15th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:20862202024-05-30T22:54:43Z2024-05-30T22:54:43Zby Latifi, Shahram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-77028-4">https://doi.org/10.1007/978-3-319-77028-4</a><br/>Format: Electronic Resources<br/>Lessons learned : critical information infrastructure protection : how to protect critical information infrastructureent://SD_ILS/0/SD_ILS:21123032024-05-30T22:54:43Z2024-05-30T22:54:43Zby Viira, Toomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5244626">Click to View</a><br/>Format: Electronic Resources<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:21329282024-05-30T22:54:43Z2024-05-30T22:54:43Zby Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4987646">Click to View</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20847202024-05-30T22:54:43Z2024-05-30T22:54:43Zby Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Communications and Networking 11th EAI International Conference, ChinaCom 2016, Chongqing, China, September 24-26, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20848502024-05-30T22:54:43Z2024-05-30T22:54:43Zby Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66625-9">https://doi.org/10.1007/978-3-319-66625-9</a><br/>Format: Electronic Resources<br/>Communications and Networking 11th EAI international Conference, ChinaCom 2016 Chongqing, China, September 24-26, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20848512024-05-30T22:54:43Z2024-05-30T22:54:43Zby Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66628-0">https://doi.org/10.1007/978-3-319-66628-0</a><br/>Format: Electronic Resources<br/>Fundamentals and Applications of Hardcopy Communication Conveying Side Information by Printed Mediaent://SD_ILS/0/SD_ILS:20848522024-05-30T22:54:43Z2024-05-30T22:54:43Zby Mayer, Joceli. author.<br/><a href="https://doi.org/10.1007/978-3-319-74083-6">https://doi.org/10.1007/978-3-319-74083-6</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20847972024-05-30T22:54:43Z2024-05-30T22:54:43Zby Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849922024-05-30T22:54:43Z2024-05-30T22:54:43Zby Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201<br/><a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format: Electronic Resources<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20848132024-05-30T22:54:43Z2024-05-30T22:54:43Zby Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Electronic Resources<br/>Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848582024-05-30T22:54:43Z2024-05-30T22:54:43Zby Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Electronic Resources<br/>Network and Parallel Computing 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29 – December 1, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855532024-05-30T22:54:43Z2024-05-30T22:54:43Zby Zhang, Feng. editor. (orcid)0000-0003-1983-7321<br/><a href="https://doi.org/10.1007/978-3-030-05677-3">https://doi.org/10.1007/978-3-030-05677-3</a><br/>Format: Electronic Resources<br/>Industrial Networks and Intelligent Systems 3rd International Conference, INISCOM 2017, Ho Chi Minh City, Vietnam, September 4, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848882024-05-30T22:54:43Z2024-05-30T22:54:43Zby Chen, Yuanfang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74176-5">https://doi.org/10.1007/978-3-319-74176-5</a><br/>Format: Electronic Resources<br/>Innovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11–12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848902024-05-30T22:54:43Z2024-05-30T22:54:43Zby M. F. Kebe, Cheikh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format: Electronic Resources<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:20848032024-05-30T22:54:43Z2024-05-30T22:54:43Zby Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXXII Special Issue on Cybersecurity and Biometricsent://SD_ILS/0/SD_ILS:20850252024-05-30T22:54:43Z2024-05-30T22:54:43Zby Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56672-5">https://doi.org/10.1007/978-3-662-56672-5</a><br/>Format: Electronic Resources<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848802024-05-30T22:54:43Z2024-05-30T22:54:43Zby Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:23161522024-05-30T22:54:43Z2024-05-30T22:54:43Zby Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format: Electronic Resources<br/>Solving Cyber Risk : Protecting Your Company and Society.ent://SD_ILS/0/SD_ILS:23182822024-05-30T22:54:43Z2024-05-30T22:54:43Zby Coburn, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781119490937">https://learning.oreilly.com/library/view/~/9781119490937</a>
<a href="https://learning.oreilly.com/library/view/~/9781119490937/?ar">https://learning.oreilly.com/library/view/~/9781119490937/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar">https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar</a><br/>Format: Electronic Resources<br/>Securing web applications : building a strategy for defense against malicious botsent://SD_ILS/0/SD_ILS:23192612024-05-30T22:54:43Z2024-05-30T22:54:43Zby Gates, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar">https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492040279">https://learning.oreilly.com/library/view/~/9781492040279</a>
<a href="https://learning.oreilly.com/library/view/~/9781492040279/?ar">https://learning.oreilly.com/library/view/~/9781492040279/?ar</a><br/>Format: Electronic Resources<br/>Take Control of 1Password, 4th Editionent://SD_ILS/0/SD_ILS:23194742024-05-30T22:54:43Z2024-05-30T22:54:43Zby Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format: Electronic Resources<br/>Privileged attack vectors : building effective cyber-defense strategies to protect organizationsent://SD_ILS/0/SD_ILS:23148702024-05-30T22:54:43Z2024-05-30T22:54:43Zby Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format: Electronic Resources<br/>Cloud computing security : foundations and challengesent://SD_ILS/0/SD_ILS:23115242024-05-30T22:54:43Z2024-05-30T22:54:43Zby Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format: Electronic Resources<br/>Data hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:23116292024-05-30T22:54:43Z2024-05-30T22:54:43Zby Hassan, Nihad Ahmad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128044964/?ar">https://learning.oreilly.com/library/view/~/9780128044964/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128044964/?ar">https://go.oreilly.com/library-access/library/view/-/9780128044964/?ar</a><br/>Format: Electronic Resources<br/>Mastering Active Directory : automate tasks by leveraging PowerShell for Active Directory Domain Services 2016ent://SD_ILS/0/SD_ILS:23138092024-05-30T22:54:43Z2024-05-30T22:54:43Zby Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787289352">https://learning.oreilly.com/library/view/~/9781787289352</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar">https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787289352/?ar">https://learning.oreilly.com/library/view/~/9781787289352/?ar</a><br/>Format: Electronic Resources<br/>OAuth 2 in actionent://SD_ILS/0/SD_ILS:23131852024-05-30T22:54:43Z2024-05-30T22:54:43Zby Richer, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617293276/?ar">https://go.oreilly.com/library-access/library/view/-/9781617293276/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617293276">https://learning.oreilly.com/library/view/~/9781617293276</a>
<a href="https://learning.oreilly.com/library/view/~/9781617293276/?ar">https://learning.oreilly.com/library/view/~/9781617293276/?ar</a><br/>Format: Electronic Resources<br/>Distributed Networksent://SD_ILS/0/SD_ILS:23199072024-05-30T22:54:43Z2024-05-30T22:54:43Zby Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format: Electronic Resources<br/>ISO 37001 : an introduction to anti-bribery management systems : doing the right thingsent://SD_ILS/0/SD_ILS:21122852024-05-30T22:54:43Z2024-05-30T22:54:43Zby Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5211339">Click to View</a><br/>Format: Electronic Resources<br/>Big data e privacy by design : anonimizzazione pseudonimizzazione sicurezzaent://SD_ILS/0/SD_ILS:21212652024-05-30T22:54:43Z2024-05-30T22:54:43Zby D'Acquisto, Giuseppe, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4818389">Click to View</a><br/>Format: Electronic Resources<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:22112802024-05-30T22:54:43Z2024-05-30T22:54:43Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4743573">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:22107202024-05-30T22:54:43Z2024-05-30T22:54:43Zby Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4676113">Click to View</a><br/>Format: Electronic Resources<br/>Versteckte Botschaften : die faszinierende Geschichte der Steganografieent://SD_ILS/0/SD_ILS:23146762024-05-30T22:54:43Z2024-05-30T22:54:43Zby Schmeh, Klaus, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492064855">https://learning.oreilly.com/library/view/~/9781492064855</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar">https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492064855/?ar">https://learning.oreilly.com/library/view/~/9781492064855/?ar</a><br/>Format: Electronic Resources<br/>Die Kunst der Anonymität im Internet : so schützen Sie Ihre Identität und Ihre Datenent://SD_ILS/0/SD_ILS:23150112024-05-30T22:54:43Z2024-05-30T22:54:43Zby Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format: Electronic Resources<br/>ISO 37001 : an Introduction to Anti-Bribery Management Systems.ent://SD_ILS/0/SD_ILS:23150202024-05-30T22:54:43Z2024-05-30T22:54:43Zby Field, Alan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559">https://learning.oreilly.com/library/view/~/9781849289559</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559/?ar">https://learning.oreilly.com/library/view/~/9781849289559/?ar</a><br/>Format: Electronic Resources<br/>Guide: Reporting on an Entity's Cyberse.ent://SD_ILS/0/SD_ILS:23167562024-05-30T22:54:43Z2024-05-30T22:54:43Zby AICPA Staff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781943546725/?ar">https://learning.oreilly.com/library/view/~/9781943546725/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar">https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781943546725">https://learning.oreilly.com/library/view/~/9781943546725</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:23102902024-05-30T22:54:43Z2024-05-30T22:54:43Zby Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format: Electronic Resources<br/>You--for sale : protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:23084652024-05-30T22:54:43Z2024-05-30T22:54:43Zby Sumner, Stuart, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034231/?ar">https://learning.oreilly.com/library/view/~/9780128034231/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar</a><br/>Format: Electronic Resources<br/>PCI DSS 3.1 : the standard that killed SSLent://SD_ILS/0/SD_ILS:23084682024-05-30T22:54:43Z2024-05-30T22:54:43Zby Williams, Branden R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128046494">https://learning.oreilly.com/library/view/~/9780128046494</a>
<a href="https://learning.oreilly.com/library/view/~/9780128046494/?ar">https://learning.oreilly.com/library/view/~/9780128046494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar">https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar</a><br/>Format: Electronic Resources<br/>Data governance : frameworks and strategiesent://SD_ILS/0/SD_ILS:23098712024-05-30T22:54:43Z2024-05-30T22:54:43Zby Adler, John, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar">https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491942352/?ar">https://learning.oreilly.com/videos/~/9781491942352/?ar</a><br/>Format: Electronic Resources<br/>Introduction to Hadoop security : a hands-on approach to securing big data clustersent://SD_ILS/0/SD_ILS:23102702024-05-30T22:54:43Z2024-05-30T22:54:43Zby Bean, Jeff, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar">https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771375054/?ar">https://learning.oreilly.com/videos/~/9781771375054/?ar</a><br/>Format: Electronic Resources<br/>Information security policies, procedures, and standards : a practitioner's referenceent://SD_ILS/0/SD_ILS:23107492024-05-30T22:54:43Z2024-05-30T22:54:43Zby Landoll, Douglas J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482245912/?ar">https://learning.oreilly.com/library/view/~/9781482245912/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar">https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar</a><br/>Format: Electronic Resources<br/>Information theft prevention : theory and practiceent://SD_ILS/0/SD_ILS:23155502024-05-30T22:54:43Z2024-05-30T22:54:43Zby Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format: Electronic Resources<br/>Analyzing and securing social networksent://SD_ILS/0/SD_ILS:23133852024-05-30T22:54:43Z2024-05-30T22:54:43Zby Thuraisingham, Bhavani M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar">https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482243284/?ar">https://learning.oreilly.com/library/view/~/9781482243284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482243284">https://learning.oreilly.com/library/view/~/9781482243284</a><br/>Format: Electronic Resources<br/>IBM ProtecTIER implementation and best practices guideent://SD_ILS/0/SD_ILS:23108392024-05-30T22:54:43Z2024-05-30T22:54:43Zby Orlando, Karen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738441696/?ar">https://learning.oreilly.com/library/view/~/9780738441696/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738441696/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441696/?ar</a><br/>Format: Electronic Resources<br/>Information Security Management Handbook, Volume 6, 6th Editionent://SD_ILS/0/SD_ILS:23233972024-05-30T22:54:43Z2024-05-30T22:54:43Zby Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a>
<a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format: Electronic Resources<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:23134842024-05-30T22:54:43Z2024-05-30T22:54:43Zby Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format: Electronic Resources<br/>The CISO Handbookent://SD_ILS/0/SD_ILS:23236772024-05-30T22:54:43Z2024-05-30T22:54:43Zby Gentile, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031379">https://learning.oreilly.com/library/view/~/9781420031379</a>
<a href="https://learning.oreilly.com/library/view/~/9781420031379/?ar">https://learning.oreilly.com/library/view/~/9781420031379/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-05-30T22:54:43Z2024-05-30T22:54:43Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850362024-05-30T22:54:43Z2024-05-30T22:54:43Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842542024-05-30T22:54:43Z2024-05-30T22:54:43Zby Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format: Electronic Resources<br/>Facing cyber threats head on : protecting yourself and your businessent://SD_ILS/0/SD_ILS:22662742024-05-30T22:54:43Z2024-05-30T22:54:43Zby Minick, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4773207">Click to View</a><br/>Format: Electronic Resources<br/>88 privacy breaches to beware of : practical data protection tips from real-life experiencesent://SD_ILS/0/SD_ILS:22651852024-05-30T22:54:43Z2024-05-30T22:54:43Zby Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4558135">Click to View</a><br/>Format: Electronic Resources<br/>Innovations for Community Services 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846442024-05-30T22:54:43Z2024-05-30T22:54:43Zby Fahrnberger, Günter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49466-1">https://doi.org/10.1007/978-3-319-49466-1</a><br/>Format: Electronic Resources<br/>Secure Data Deletionent://SD_ILS/0/SD_ILS:20847492024-05-30T22:54:43Z2024-05-30T22:54:43Zby Reardon, Joel. author.<br/><a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861432024-05-30T22:54:43Z2024-05-30T22:54:43Zby Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858882024-05-30T22:54:43Z2024-05-30T22:54:43Zby Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format: Electronic Resources<br/>Data breach aftermath and recovery for individuals and institutions : proceedings of a workshopent://SD_ILS/0/SD_ILS:22283312024-05-30T22:54:43Z2024-05-30T22:54:43Zby Johnson, Anne, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4690560">Click to View</a><br/>Format: Electronic Resources<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:21109522024-05-30T22:54:43Z2024-05-30T22:54:43Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4009415">Click to View</a><br/>Format: Electronic Resources<br/>Data breach aftermath and recovery for individuals and institutions : proceedings of a workshopent://SD_ILS/0/SD_ILS:20276202024-05-30T22:54:43Z2024-05-30T22:54:43Zby Johnson, Anne, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Data-Breach-Aftermath.pdf">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://dx.doi.org/10.17226/23559">http://dx.doi.org/10.17226/23559</a><br/>Format: Electronic Resources<br/>PCI DSS 3.1 : the standard that killed SSLent://SD_ILS/0/SD_ILS:20983352024-05-30T22:54:43Z2024-05-30T22:54:43Zby Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4053870">Click to View</a><br/>Format: Electronic Resources<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:22089652024-05-30T22:54:43Z2024-05-30T22:54:43Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format: Electronic Resources<br/>Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856982024-05-30T22:54:43Z2024-05-30T22:54:43Zby Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format: Electronic Resources<br/>Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850862024-05-30T22:54:43Z2024-05-30T22:54:43Zby Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860702024-05-30T22:54:43Z2024-05-30T22:54:43Zby Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848392024-05-30T22:54:43Z2024-05-30T22:54:43Zby Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format: Electronic Resources<br/>Big data and ethics : the medical datasphereent://SD_ILS/0/SD_ILS:22100682024-05-30T22:54:43Z2024-05-30T22:54:43Zby Béranger, Jérôme, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4529549">Click to View</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:22094442024-05-30T22:54:43Z2024-05-30T22:54:43Zby Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4334673">Click to View</a><br/>Format: Electronic Resources<br/>Learning to love data science : explorations of emerging technologies and platforms for predictive analytics, machine learning, digital manufacturing, and supply chain optimizationent://SD_ILS/0/SD_ILS:23089132024-05-30T22:54:43Z2024-05-30T22:54:43Zby Barlow, Mike (Michael Alan), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491936573">https://learning.oreilly.com/library/view/~/9781491936573</a>
<a href="https://learning.oreilly.com/library/view/~/9781491936573/?ar">https://learning.oreilly.com/library/view/~/9781491936573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491936573/?ar">https://go.oreilly.com/library-access/library/view/-/9781491936573/?ar</a><br/>Format: Electronic Resources<br/>Risk centric threat modeling : process for attack simulation and threat analysisent://SD_ILS/0/SD_ILS:23087922024-05-30T22:54:43Z2024-05-30T22:54:43Zby Uceda Vélez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format: Electronic Resources<br/>Sharing big data safely : managing data securityent://SD_ILS/0/SD_ILS:23092452024-05-30T22:54:43Z2024-05-30T22:54:43Zby Dunning, Ted, 1956- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491953624/?ar">https://go.oreilly.com/library-access/library/view/-/9781491953624/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491953624/?ar">https://learning.oreilly.com/library/view/~/9781491953624/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491953624">https://learning.oreilly.com/library/view/~/9781491953624</a><br/>Format: Electronic Resources<br/>Mastering OAuth 2.0 : create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Frameworkent://SD_ILS/0/SD_ILS:23095472024-05-30T22:54:43Z2024-05-30T22:54:43Zby Bihis, Charles, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784395407/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395407/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784395407">https://learning.oreilly.com/library/view/~/9781784395407</a>
<a href="https://learning.oreilly.com/library/view/~/9781784395407/?ar">https://learning.oreilly.com/library/view/~/9781784395407/?ar</a><br/>Format: Electronic Resources<br/>Cloud storage security : a practical guideent://SD_ILS/0/SD_ILS:23079352024-05-30T22:54:43Z2024-05-30T22:54:43Zby Wheeler, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029312/?ar">https://learning.oreilly.com/library/view/~/9780128029312/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar</a><br/>Format: Electronic Resources<br/>Security in computingent://SD_ILS/0/SD_ILS:23058972024-05-30T22:54:43Z2024-05-30T22:54:43Zby Pfleeger, Charles P., 1948- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134085074/?ar">https://learning.oreilly.com/library/view/~/9780134085074/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar">https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar</a><br/>Format: Electronic Resources<br/>Application of big data for national security : a practitioner's guide to emerging technologiesent://SD_ILS/0/SD_ILS:23062322024-05-30T22:54:43Z2024-05-30T22:54:43Zby Akhgar, Babak, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128019672/?ar">https://learning.oreilly.com/library/view/~/9780128019672/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128019672/?ar">https://go.oreilly.com/library-access/library/view/-/9780128019672/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128019672">https://learning.oreilly.com/library/view/~/9780128019672</a><br/>Format: Electronic Resources<br/>Information assurance handbook : effective computer security and risk management strategiesent://SD_ILS/0/SD_ILS:23048752024-05-30T22:54:43Z2024-05-30T22:54:43Zby Schou, Corey.<br/><a href="https://learning.oreilly.com/library/view/~/9780071821650">https://learning.oreilly.com/library/view/~/9780071821650</a>
<a href="https://learning.oreilly.com/library/view/~/9780071821650/?ar">https://learning.oreilly.com/library/view/~/9780071821650/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar">https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar</a><br/>Format: Electronic Resources<br/>Measuring and managing information risk : a FAIR approachent://SD_ILS/0/SD_ILS:23042452024-05-30T22:54:43Z2024-05-30T22:54:43Zby Freund, Jack, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar">https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124202313/?ar">https://learning.oreilly.com/library/view/~/9780124202313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124202313">https://learning.oreilly.com/library/view/~/9780124202313</a><br/>Format: Electronic Resources<br/>IT-Sicherheit im Unternehmenent://SD_ILS/0/SD_ILS:23083242024-05-30T22:54:43Z2024-05-30T22:54:43Zby Harich, Thomas W., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958451285/?ar">https://learning.oreilly.com/library/view/~/9783958451285/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958451285">https://learning.oreilly.com/library/view/~/9783958451285</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar">https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:23088472024-05-30T22:54:43Z2024-05-30T22:54:43Zby Ticher, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287135/?ar">https://learning.oreilly.com/library/view/~/9781849287135/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar</a><br/>Format: Electronic Resources<br/>Mastering Python forensics : master the art of digital forensics and analysis with Pythonent://SD_ILS/0/SD_ILS:23092272024-05-30T22:54:43Z2024-05-30T22:54:43Zby Spreitzenbarth, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783988044/?ar">https://learning.oreilly.com/library/view/~/9781783988044/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar">https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783988044">https://learning.oreilly.com/library/view/~/9781783988044</a><br/>Format: Electronic Resources<br/>Multi-domain master data management : advanced MDM and data governance in practiceent://SD_ILS/0/SD_ILS:23067012024-05-30T22:54:43Z2024-05-30T22:54:43Zby Allen, Mark, 1953- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008355/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008355/?ar">https://learning.oreilly.com/library/view/~/9780128008355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008355">https://learning.oreilly.com/library/view/~/9780128008355</a><br/>Format: Electronic Resources<br/>Security, privacy, and governance : protecting data, and using data to protect systemsent://SD_ILS/0/SD_ILS:23077562024-05-30T22:54:43Z2024-05-30T22:54:43Zby Lorica, Ben, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar">https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491931042/?ar">https://learning.oreilly.com/videos/~/9781491931042/?ar</a><br/>Format: Electronic Resources<br/>Hadoop securityent://SD_ILS/0/SD_ILS:23077732024-05-30T22:54:43Z2024-05-30T22:54:43Zby Spivey, Ben, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar">https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491900970/?ar">https://learning.oreilly.com/library/view/~/9781491900970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491900970">https://learning.oreilly.com/library/view/~/9781491900970</a><br/>Format: Electronic Resources<br/>Digital privacy in the marketplace : perspectives on the information exchangeent://SD_ILS/0/SD_ILS:20561852024-05-30T22:54:43Z2024-05-30T22:54:43Zby Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1920895">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft system center data protection manager 2012 R2 cookbook : over 100 recipes to build your own designs exploring the advanced functionality and features of system center DPM 2012 R2ent://SD_ILS/0/SD_ILS:22383532024-05-30T22:54:43Z2024-05-30T22:54:43Zby Hedblom, Robert, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2040609">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Python forensics : master the art of digital forensics and analysis with Pythonent://SD_ILS/0/SD_ILS:22194612024-05-30T22:54:43Z2024-05-30T22:54:43Zby Spreitzenbarth, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191124">Click to View</a><br/>Format: Electronic Resources<br/>Technology Disaster Response and Recovery Planning : A LITA Guide.ent://SD_ILS/0/SD_ILS:12853712024-05-30T22:54:43Z2024-05-30T22:54:43Zby Mallery, Mary.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2068199">Click to View</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:21553202024-05-30T22:54:43Z2024-05-30T22:54:43Zby Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192125">Click to View</a><br/>Format: Electronic Resources<br/>Digital identity managementent://SD_ILS/0/SD_ILS:22085742024-05-30T22:54:43Z2024-05-30T22:54:43Zby Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2007485">Click to View</a><br/>Format: Electronic Resources<br/>Measuring and managing information risk : a FAIR approachent://SD_ILS/0/SD_ILS:22078292024-05-30T22:54:43Z2024-05-30T22:54:43Zby Freund, Jack, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1772300">Click to View</a><br/>Format: Electronic Resources<br/>Application of big data for national security : a practitioner's guide to emerging technologiesent://SD_ILS/0/SD_ILS:22084662024-05-30T22:54:43Z2024-05-30T22:54:43Zby Akhgar, Babak, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1962519">Click to View</a><br/>Format: Electronic Resources<br/>Cloud storage security : a practical guideent://SD_ILS/0/SD_ILS:22088522024-05-30T22:54:43Z2024-05-30T22:54:43Zby Wheeler, Aaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2084976">Click to View</a><br/>Format: Electronic Resources<br/>The cloud security ecosystem : technical, legal, business and management issuesent://SD_ILS/0/SD_ILS:23076492024-05-30T22:54:43Z2024-05-30T22:54:43Zby Ko, Ryan, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar">https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128017807/?ar">https://learning.oreilly.com/library/view/~/9780128017807/?ar</a><br/>Format: Electronic Resources<br/>Introduction to information security : LiveLessons (Sneak Peek Video Training)ent://SD_ILS/0/SD_ILS:23063462024-05-30T22:54:43Z2024-05-30T22:54:43Zby Aurnou, Scott, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar">https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134135823/?ar">https://learning.oreilly.com/videos/~/9780134135823/?ar</a><br/>Format: Electronic Resources<br/>Implementing high availability and disaster recovery in IBM PureApplication Systems V2ent://SD_ILS/0/SD_ILS:23064692024-05-30T22:54:43Z2024-05-30T22:54:43Zby Gadepalli, Venkata, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738440337">https://learning.oreilly.com/library/view/~/0738440337</a>
<a href="https://learning.oreilly.com/library/view/~/0738440337/?ar">https://learning.oreilly.com/library/view/~/0738440337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738440337/?ar">https://go.oreilly.com/library-access/library/view/-/0738440337/?ar</a><br/>Format: Electronic Resources<br/>Dropbox : Sicher speichern und effektiv arbeiten in der Cloudent://SD_ILS/0/SD_ILS:23086012024-05-30T22:54:43Z2024-05-30T22:54:43Zby Schilling, Christian O., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783826687235/?ar">https://learning.oreilly.com/library/view/~/9783826687235/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783826687235/?ar">https://go.oreilly.com/library-access/library/view/-/9783826687235/?ar</a><br/>Format: Electronic Resources<br/>Total information risk management : maximizing the value of data and information assetsent://SD_ILS/0/SD_ILS:22998982024-05-30T22:54:43Z2024-05-30T22:54:43Zby Borek, Alexander.<br/><a href="https://learning.oreilly.com/library/view/~/9780124055476/?ar">https://learning.oreilly.com/library/view/~/9780124055476/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar">https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar</a><br/>Format: Electronic Resources<br/>Deployment guide for Infosphere Guardiument://SD_ILS/0/SD_ILS:23040112024-05-30T22:54:43Z2024-05-30T22:54:43Zby Chen, Whei-Jen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738439355/?ar">https://go.oreilly.com/library-access/library/view/-/0738439355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738439355/?ar">https://learning.oreilly.com/library/view/~/0738439355/?ar</a><br/>Format: Electronic Resources<br/>Practical Hadoop securityent://SD_ILS/0/SD_ILS:23054222024-05-30T22:54:43Z2024-05-30T22:54:43Zby Lakhe, Bhushan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265450">https://learning.oreilly.com/library/view/~/9781430265450</a>
<a href="https://learning.oreilly.com/library/view/~/9781430265450/?ar">https://learning.oreilly.com/library/view/~/9781430265450/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar</a><br/>Format: Electronic Resources<br/>The privacy engineer's manifesto : getting from policy to code to QA to valueent://SD_ILS/0/SD_ILS:23022962024-05-30T22:54:43Z2024-05-30T22:54:43Zby Dennedy, Michelle Finneran.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263555">https://learning.oreilly.com/library/view/~/9781430263555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430263555/?ar">https://learning.oreilly.com/library/view/~/9781430263555/?ar</a><br/>Format: Electronic Resources<br/>IBM ProtecTIER implementation and best practices guideent://SD_ILS/0/SD_ILS:23045262024-05-30T22:54:43Z2024-05-30T22:54:43Zby Orlando, Karen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738440027/?ar">https://go.oreilly.com/library-access/library/view/-/0738440027/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738440027/?ar">https://learning.oreilly.com/library/view/~/0738440027/?ar</a><br/>Format: Electronic Resources<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:23034122024-05-30T22:54:43Z2024-05-30T22:54:43Zby Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format: Electronic Resources<br/>Healthcare information privacy and security : regulatory compliance and data security in the age of electronic health recordsent://SD_ILS/0/SD_ILS:23036462024-05-30T22:54:43Z2024-05-30T22:54:43Zby Robichau, Bernard Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430266778">https://learning.oreilly.com/library/view/~/9781430266778</a>
<a href="https://learning.oreilly.com/library/view/~/9781430266778/?ar">https://learning.oreilly.com/library/view/~/9781430266778/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430266778/?ar">https://go.oreilly.com/library-access/library/view/-/9781430266778/?ar</a><br/>Format: Electronic Resources<br/>10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacyent://SD_ILS/0/SD_ILS:23048612024-05-30T22:54:43Z2024-05-30T22:54:43Zby Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format: Electronic Resources<br/>Anonymous Communication Networksent://SD_ILS/0/SD_ILS:23272682024-05-30T22:54:43Z2024-05-30T22:54:43Zby Peng, Kun, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881606">https://learning.oreilly.com/library/view/~/9781439881606</a>
<a href="https://learning.oreilly.com/library/view/~/9781439881606/?ar">https://learning.oreilly.com/library/view/~/9781439881606/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439881606/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881606/?ar</a><br/>Format: Electronic Resources<br/>The Science and Technology of Counterterrorisment://SD_ILS/0/SD_ILS:23199612024-05-30T22:54:43Z2024-05-30T22:54:43Zby Young, Carl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562">https://learning.oreilly.com/library/view/~/9780124200562</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562/?ar">https://learning.oreilly.com/library/view/~/9780124200562/?ar</a><br/>Format: Electronic Resources<br/>Integrated Security Systems Design, 2nd Editionent://SD_ILS/0/SD_ILS:23209742024-05-30T22:54:43Z2024-05-30T22:54:43Zby Norman, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000229/?ar">https://learning.oreilly.com/library/view/~/9780128000229/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000229">https://learning.oreilly.com/library/view/~/9780128000229</a><br/>Format: Electronic Resources<br/>G3P - Good Privacy Protection Practice in Clinical Research : Principles of Pseudonymization and Anonymization.ent://SD_ILS/0/SD_ILS:12718912024-05-30T22:54:43Z2024-05-30T22:54:43Zby Schriever, Karl-Heinz.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1685362">Click to View</a><br/>Format: Electronic Resources<br/>Information governance and assurance : reducing risk, promoting policyent://SD_ILS/0/SD_ILS:22357842024-05-30T22:54:43Z2024-05-30T22:54:43Zby Maclennan, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4923765">Click to View</a><br/>Format: Electronic Resources<br/>Data stewardship : an actionable guide to effective data management and data governanceent://SD_ILS/0/SD_ILS:22065792024-05-30T22:54:43Z2024-05-30T22:54:43Zby Plotkin, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418375">Click to View</a><br/>Format: Electronic Resources<br/>Security leader insights for information protection : lessons and strategies from leading security professionalsent://SD_ILS/0/SD_ILS:22074672024-05-30T22:54:43Z2024-05-30T22:54:43Zby Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699254">Click to View</a><br/>Format: Electronic Resources<br/>Information security management handbook . Volume 7ent://SD_ILS/0/SD_ILS:23002992024-05-30T22:54:43Z2024-05-30T22:54:43Zby O'Hanley, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar">https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466567498">https://learning.oreilly.com/library/view/~/9781466567498</a>
<a href="https://learning.oreilly.com/library/view/~/9781466567498/?ar">https://learning.oreilly.com/library/view/~/9781466567498/?ar</a><br/>Format: Electronic Resources<br/>Enterprise architecture and information assurance : developing a secure foundationent://SD_ILS/0/SD_ILS:22992792024-05-30T22:54:43Z2024-05-30T22:54:43Zby Scholz, James A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar">https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439841594/?ar">https://learning.oreilly.com/library/view/~/9781439841594/?ar</a><br/>Format: Electronic Resources<br/>Data stewardship : an actionable guide to effective data management and data governanceent://SD_ILS/0/SD_ILS:23014992024-05-30T22:54:43Z2024-05-30T22:54:43Zby Plotkin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780124103894/?ar">https://learning.oreilly.com/library/view/~/9780124103894/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124103894">https://learning.oreilly.com/library/view/~/9780124103894</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar">https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar</a><br/>Format: Electronic Resources<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:23001802024-05-30T22:54:43Z2024-05-30T22:54:43Zby Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format: Electronic Resources<br/>Responsive security : be ready to be secureent://SD_ILS/0/SD_ILS:23006432024-05-30T22:54:43Z2024-05-30T22:54:43Zby Kang, Meng-Chow.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584310/?ar">https://learning.oreilly.com/library/view/~/9781466584310/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar</a><br/>Format: Electronic Resources<br/>Anti-hacker tool kit.ent://SD_ILS/0/SD_ILS:23036302024-05-30T22:54:43Z2024-05-30T22:54:43Zby Shema, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar">https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071800143/?ar">https://learning.oreilly.com/library/view/~/9780071800143/?ar</a><br/>Format: Electronic Resources<br/>The PayPal official insider guide to internet security : spot scams and protect your online businessent://SD_ILS/0/SD_ILS:22972592024-05-30T22:54:43Z2024-05-30T22:54:43Zby Savage, Michelle.<br/><a href="https://learning.oreilly.com/library/view/~/9780133154573">https://learning.oreilly.com/library/view/~/9780133154573</a>
<a href="https://learning.oreilly.com/library/view/~/9780133154573/?ar">https://learning.oreilly.com/library/view/~/9780133154573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar">https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar</a><br/>Format: Electronic Resources<br/>Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:22966162024-05-30T22:54:43Z2024-05-30T22:54:43Zby Raggo, Michael T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format: Electronic Resources<br/>Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this dayent://SD_ILS/0/SD_ILS:22980532024-05-30T22:54:43Z2024-05-30T22:54:43Zby Yerrid, K. C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960/?ar">https://learning.oreilly.com/library/view/~/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960">https://learning.oreilly.com/library/view/~/9781849519960</a><br/>Format: Electronic Resources<br/>Nine steps to success : an ISO27001:2013 implementation overviewent://SD_ILS/0/SD_ILS:23004362024-05-30T22:54:43Z2024-05-30T22:54:43Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117/?ar">https://learning.oreilly.com/library/view/~/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117">https://learning.oreilly.com/library/view/~/9781849285117</a><br/>Format: Electronic Resources<br/>Introduction to cyber-warfare : a multidisciplinary approachent://SD_ILS/0/SD_ILS:23001962024-05-30T22:54:43Z2024-05-30T22:54:43Zby Shakarian, Paulo.<br/><a href="https://learning.oreilly.com/library/view/~/9780124078147">https://learning.oreilly.com/library/view/~/9780124078147</a>
<a href="https://learning.oreilly.com/library/view/~/9780124078147/?ar">https://learning.oreilly.com/library/view/~/9780124078147/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar">https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar</a><br/>Format: Electronic Resources<br/>ISO27001/ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:23107422024-05-30T22:54:43Z2024-05-30T22:54:43Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285247/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285247/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285247/?ar">https://learning.oreilly.com/library/view/~/9781849285247/?ar</a><br/>Format: Electronic Resources<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:23134822024-05-30T22:54:43Z2024-05-30T22:54:43Zby Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format: Electronic Resources<br/>Best Practices for the Formal Software Testing Process : a Menu of Testing Tasksent://SD_ILS/0/SD_ILS:23206912024-05-30T22:54:43Z2024-05-30T22:54:43Zby Drabick, Rodger, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309/?ar">https://learning.oreilly.com/library/view/~/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309">https://learning.oreilly.com/library/view/~/9780133489309</a><br/>Format: Electronic Resources<br/>Strategic Information Management, 3rd Editionent://SD_ILS/0/SD_ILS:23199142024-05-30T22:54:43Z2024-05-30T22:54:43Zby Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format: Electronic Resources<br/>Afet durumunda kamuda veri güvenliÄŸient://SD_ILS/0/SD_ILS:4304932024-05-30T22:54:43Z2024-05-30T22:54:43Zby Ä°stanbul Ä°l Özel Ä°daresi<br/>Format: Books<br/>Getting Started with FortiGate.ent://SD_ILS/0/SD_ILS:12650072024-05-30T22:54:43Z2024-05-30T22:54:43Zby Fabbri, Rosato.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572901">Click to View</a><br/>Format: Electronic Resources<br/>IBM InfoSphere : A Platform for Big Data Governance and Process Data Governance.ent://SD_ILS/0/SD_ILS:12906442024-05-30T22:54:43Z2024-05-30T22:54:43Zby Soares, Sunil.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3015277">Click to View</a><br/>Format: Electronic Resources<br/>The dark side of personalization online privacy concerns influence customer behaviorent://SD_ILS/0/SD_ILS:22379762024-05-30T22:54:43Z2024-05-30T22:54:43Zby Ziesak, Jörg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1324048">Click to View</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:22979662024-05-30T22:54:43Z2024-05-30T22:54:43Zby Brotby, W. Krag.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881538/?ar">https://learning.oreilly.com/library/view/~/9781439881538/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar</a><br/>Format: Electronic Resources<br/>The complete book of data anonymization : from planning to implementationent://SD_ILS/0/SD_ILS:4098302024-05-30T22:54:43Z2024-05-30T22:54:43Zby Raghunathan, Balaji, author.<br/>Format: Books<br/>Oracle Data Guard 11gR2 Administration Beginner's Guide.ent://SD_ILS/0/SD_ILS:12582622024-05-30T22:54:43Z2024-05-30T22:54:43Zby Baransel, Emre.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1192652">Click to View</a><br/>Format: Electronic Resources<br/>Information Security Management Principles.ent://SD_ILS/0/SD_ILS:12590732024-05-30T22:54:43Z2024-05-30T22:54:43Zby Alexander, David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1213992">Click to View</a><br/>Format: Electronic Resources<br/>Total Information Risk Management : Maximizing the Value of Data and Information Assets.ent://SD_ILS/0/SD_ILS:12620542024-05-30T22:54:43Z2024-05-30T22:54:43Zby Borek, Alexander.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1386476">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to Cyber-Warfare : A Multidisciplinary Approach.ent://SD_ILS/0/SD_ILS:12534912024-05-30T22:54:43Z2024-05-30T22:54:43Zby Shakarian, Paulo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115159">Click to View</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:21298472024-05-30T22:54:43Z2024-05-30T22:54:43Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1153198">Click to View</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:21549082024-05-30T22:54:43Z2024-05-30T22:54:43Zby Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463578">Click to View</a><br/>Format: Electronic Resources<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:21549092024-05-30T22:54:43Z2024-05-30T22:54:43Zby Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463579">Click to View</a><br/>Format: Electronic Resources<br/>Information protection playbookent://SD_ILS/0/SD_ILS:22065832024-05-30T22:54:43Z2024-05-30T22:54:43Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418381">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocolsent://SD_ILS/0/SD_ILS:22060432024-05-30T22:54:43Z2024-05-30T22:54:43Zby Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073014">Click to View</a><br/>Format: Electronic Resources<br/>Oracle Data Guard 11gR2 Administration Beginner's Guide : Learn How to Build and Maintain Data Guard Configurations with Real-Life, Practical Examplesent://SD_ILS/0/SD_ILS:22994492024-05-30T22:54:43Z2024-05-30T22:54:43Zby Baransel, Emre.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849687904/?ar">https://go.oreilly.com/library-access/library/view/-/9781849687904/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849687904/?ar">https://learning.oreilly.com/library/view/~/9781849687904/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849687904">https://learning.oreilly.com/library/view/~/9781849687904</a><br/>Format: Electronic Resources<br/>Information security management principlesent://SD_ILS/0/SD_ILS:22994512024-05-30T22:54:43Z2024-05-30T22:54:43Zby Alexander, David (Information security practitioner)<br/><a href="https://learning.oreilly.com/library/view/~/9781780171753/?ar">https://learning.oreilly.com/library/view/~/9781780171753/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar">https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780171753">https://learning.oreilly.com/library/view/~/9781780171753</a><br/>Format: Electronic Resources<br/>Surviving the Top Ten Challenges of Software Testing : a People-Oriented Approachent://SD_ILS/0/SD_ILS:23058322024-05-30T22:54:43Z2024-05-30T22:54:43Zby Rice, William E. Perry. Randall W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163">https://learning.oreilly.com/library/view/~/9780133489163</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163/?ar">https://learning.oreilly.com/library/view/~/9780133489163/?ar</a><br/>Format: Electronic Resources<br/>Data governance : how to design, deploy and sustain an effective data governance programent://SD_ILS/0/SD_ILS:22954852024-05-30T22:54:43Z2024-05-30T22:54:43Zby Ladley, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124158290/?ar">https://go.oreilly.com/library-access/library/view/-/9780124158290/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124158290/?ar">https://learning.oreilly.com/library/view/~/9780124158290/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124158290">https://learning.oreilly.com/library/view/~/9780124158290</a><br/>Format: Electronic Resources<br/>Once more unto the breach : managing information security in an uncertain worldent://SD_ILS/0/SD_ILS:22980222024-05-30T22:54:43Z2024-05-30T22:54:43Zby Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format: Electronic Resources<br/>Information security management handbook. Volume 5ent://SD_ILS/0/SD_ILS:23031242024-05-30T22:54:43Z2024-05-30T22:54:43Zby Tipton, Harold F.<br/><a href="https://learning.oreilly.com/library/view/~/9781439853467/?ar">https://learning.oreilly.com/library/view/~/9781439853467/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439853467/?ar">https://go.oreilly.com/library-access/library/view/-/9781439853467/?ar</a><br/>Format: Electronic Resources<br/>Der hypothetische Vergleich des [section][section] 269 StGB unter Berucksichtigung der tatsachlichen und normativen Vergleichbarkeit von Schrifturkunde und moderner (Computer-) Datenurkundent://SD_ILS/0/SD_ILS:23505462024-05-30T22:54:43Z2024-05-30T22:54:43Zby Hoinghaus, Nils, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5782103">Click to View</a><br/>Format: Electronic Resources<br/>Analyzing computer security : a threat/vulnerability/countermeasure approachent://SD_ILS/0/SD_ILS:22918062024-05-30T22:54:43Z2024-05-30T22:54:43Zby Pfleeger, Charles P., 1948-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar">https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132789493/?ar">https://learning.oreilly.com/library/view/~/9780132789493/?ar</a><br/>Format: Electronic Resources<br/>Information storage and management : storing, managing, and protecting digital information in classic, virtualized, and cloud environmentsent://SD_ILS/0/SD_ILS:22963502024-05-30T22:54:43Z2024-05-30T22:54:43Zby EMC Corporation.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118236963/?ar">https://go.oreilly.com/library-access/library/view/-/9781118236963/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118236963/?ar">https://learning.oreilly.com/library/view/~/9781118236963/?ar</a><br/>Format: Electronic Resources<br/>The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)ent://SD_ILS/0/SD_ILS:22941702024-05-30T22:54:43Z2024-05-30T22:54:43Zby Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format: Electronic Resources<br/>Getting started with OAuth 2.0ent://SD_ILS/0/SD_ILS:22951502024-05-30T22:54:43Z2024-05-30T22:54:43Zby Boyd, Ryan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449317843/?ar">https://go.oreilly.com/library-access/library/view/-/9781449317843/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449317843">https://learning.oreilly.com/library/view/~/9781449317843</a>
<a href="https://learning.oreilly.com/library/view/~/9781449317843/?ar">https://learning.oreilly.com/library/view/~/9781449317843/?ar</a><br/>Format: Electronic Resources<br/>Internet and surveillance : the challenges of Web 2.0 and social mediaent://SD_ILS/0/SD_ILS:22949962024-05-30T22:54:43Z2024-05-30T22:54:43Zby Fuchs, Christian, 1976-<br/><a href="https://learning.oreilly.com/library/view/~/9780415891608/?ar">https://learning.oreilly.com/library/view/~/9780415891608/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780415891608/?ar">https://go.oreilly.com/library-access/library/view/-/9780415891608/?ar</a><br/>Format: Electronic Resources<br/>Cyber security standards, practices and industrial applications systems and methodologiesent://SD_ILS/0/SD_ILS:4763482024-05-30T22:54:43Z2024-05-30T22:54:43Zby Zubairi, Junaid Ahmed, 1961-<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/</a><br/>Format: Electronic Resources<br/>Data Governance : How to Design, Deploy and Sustain an Effective Data Governance Program.ent://SD_ILS/0/SD_ILS:12484912024-05-30T22:54:43Z2024-05-30T22:54:43Zby Ladley, John.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1032951">Click to View</a><br/>Format: Electronic Resources<br/>Network Backup with Bacula How-to.ent://SD_ILS/0/SD_ILS:12521662024-05-30T22:54:43Z2024-05-30T22:54:43Zby Pankov, Eugene.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085229">Click to View</a><br/>Format: Electronic Resources<br/>Death of the Internet.ent://SD_ILS/0/SD_ILS:12392272024-05-30T22:54:43Z2024-05-30T22:54:43Zby Jakobsson, Markus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=848529">Click to View</a><br/>Format: Electronic Resources<br/>IT Governance : An International Guide to Data Security and ISO27001/ISO27002.ent://SD_ILS/0/SD_ILS:12381642024-05-30T22:54:43Z2024-05-30T22:54:43Zby Calder, Alan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=838114">Click to View</a><br/>Format: Electronic Resources<br/>Governance, Risk, and Compliance Handbook for Oracle Applications.ent://SD_ILS/0/SD_ILS:12478132024-05-30T22:54:43Z2024-05-30T22:54:43Zby King, Nigel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1019540">Click to View</a><br/>Format: Electronic Resources<br/>Information Warfare.ent://SD_ILS/0/SD_ILS:12526522024-05-30T22:54:43Z2024-05-30T22:54:43Zby Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106528">Click to View</a><br/>Format: Electronic Resources<br/>Internet and surveillance the challenges of Web 2.0 and social mediaent://SD_ILS/0/SD_ILS:21276242024-05-30T22:54:43Z2024-05-30T22:54:43Zby Fuchs, Christian, 1976-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=981641">Click to View</a><br/>Format: Electronic Resources<br/>Security de-engineering : solving the problems in information risk managementent://SD_ILS/0/SD_ILS:22959952024-05-30T22:54:43Z2024-05-30T22:54:43Zby Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a>
<a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format: Electronic Resources<br/>IBM System Storage TS7650, TS7650G, and TS7610ent://SD_ILS/0/SD_ILS:23267932024-05-30T22:54:43Z2024-05-30T22:54:43Zby Osuna, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738435848">https://learning.oreilly.com/library/view/~/0738435848</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738435848/?ar">https://go.oreilly.com/library-access/library/view/-/0738435848/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738435848/?ar">https://learning.oreilly.com/library/view/~/0738435848/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Data Protection Manager 2010.ent://SD_ILS/0/SD_ILS:12459022024-05-30T22:54:43Z2024-05-30T22:54:43Zby Buchanan, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=950601">Click to View</a><br/>Format: Electronic Resources<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:22908842024-05-30T22:54:43Z2024-05-30T22:54:43Zby Wallace, Michael, 1960-<br/><a href="https://learning.oreilly.com/library/view/~/9780814416136/?ar">https://learning.oreilly.com/library/view/~/9780814416136/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar">https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar</a><br/>Format: Electronic Resources<br/>The security risk assessment handbook : a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:22916532024-05-30T22:54:43Z2024-05-30T22:54:43Zby Landoll, Douglas J.<br/><a href="https://learning.oreilly.com/library/view/~/9781439821497">https://learning.oreilly.com/library/view/~/9781439821497</a>
<a href="https://learning.oreilly.com/library/view/~/9781439821497/?ar">https://learning.oreilly.com/library/view/~/9781439821497/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar">https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar</a><br/>Format: Electronic Resources<br/>CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:22916612024-05-30T22:54:43Z2024-05-30T22:54:43Zby Canavan, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar">https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216/?ar">https://learning.oreilly.com/library/view/~/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216">https://learning.oreilly.com/library/view/~/9780470916216</a><br/>Format: Electronic Resources<br/>Auditing cloud computing : a security and privacy guideent://SD_ILS/0/SD_ILS:22922552024-05-30T22:54:43Z2024-05-30T22:54:43Zby Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format: Electronic Resources<br/>Preventing good people from doing bad things : implementing least privilegeent://SD_ILS/0/SD_ILS:22932782024-05-30T22:54:43Z2024-05-30T22:54:43Zby Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format: Electronic Resources<br/>Mobile device security for dummiesent://SD_ILS/0/SD_ILS:22935152024-05-30T22:54:43Z2024-05-30T22:54:43Zby Campagna, Rich R.<br/><a href="https://learning.oreilly.com/library/view/~/9781118093801/?ar">https://learning.oreilly.com/library/view/~/9781118093801/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar">https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar</a><br/>Format: Electronic Resources<br/>Privacy and Big Data.ent://SD_ILS/0/SD_ILS:22935542024-05-30T22:54:43Z2024-05-30T22:54:43Zby Craig, Terence.<br/><a href="https://learning.oreilly.com/library/view/~/9781449314842">https://learning.oreilly.com/library/view/~/9781449314842</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781449314842/?ar">https://go.oreilly.com/library-access/library/view/-/9781449314842/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449314842/?ar">https://learning.oreilly.com/library/view/~/9781449314842/?ar</a><br/>Format: Electronic Resources<br/>IBM system storage solutions for smarter systemsent://SD_ILS/0/SD_ILS:22925552024-05-30T22:54:43Z2024-05-30T22:54:43Zby Dufrasne, Bertrand.<br/><a href="https://learning.oreilly.com/library/view/~/073843583X/?ar">https://learning.oreilly.com/library/view/~/073843583X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/073843583X/?ar">https://go.oreilly.com/library-access/library/view/-/073843583X/?ar</a><br/>Format: Electronic Resources<br/>Expert Oracle and Java security : programming secure Oracle database applications with Javaent://SD_ILS/0/SD_ILS:22932242024-05-30T22:54:43Z2024-05-30T22:54:43Zby Coffin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781430238317">https://learning.oreilly.com/library/view/~/9781430238317</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar">https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430238317/?ar">https://learning.oreilly.com/library/view/~/9781430238317/?ar</a><br/>Format: Electronic Resources<br/>The chief information security officer : insights, tools and survival skillsent://SD_ILS/0/SD_ILS:22913842024-05-30T22:54:43Z2024-05-30T22:54:43Zby Kouns, Barry.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281966">https://learning.oreilly.com/library/view/~/9781849281966</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281966/?ar">https://learning.oreilly.com/library/view/~/9781849281966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar</a><br/>Format: Electronic Resources<br/>Auditing cloud computing a security and privacy guideent://SD_ILS/0/SD_ILS:22697722024-05-30T22:54:43Z2024-05-30T22:54:43Zby Halpert, Ben, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=697627">Click to View</a><br/>Format: Electronic Resources<br/>CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:1403112024-05-30T22:54:43Z2024-05-30T22:54:43Zby Canavan, Tom.<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy1202/2011922796-b.html">http://www.loc.gov/catdir/enhancements/fy1202/2011922796-b.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy1202/2011922796-d.html">http://www.loc.gov/catdir/enhancements/fy1202/2011922796-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy1202/2011922796-t.html">http://www.loc.gov/catdir/enhancements/fy1202/2011922796-t.html</a><br/>Format: Books<br/>Information Security, Coding Theory and Related Combinatorics : Information Coding and Combinatorics.ent://SD_ILS/0/SD_ILS:12263672024-05-30T22:54:43Z2024-05-30T22:54:43Zby Crnkovic, D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=682727">Click to View</a><br/>Format: Electronic Resources<br/>CMS Security Handbook : The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone.ent://SD_ILS/0/SD_ILS:12289172024-05-30T22:54:43Z2024-05-30T22:54:43Zby Canavan, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706893">Click to View</a><br/>Format: Electronic Resources<br/>WordPress 3 Ultimate Security.ent://SD_ILS/0/SD_ILS:12456472024-05-30T22:54:43Z2024-05-30T22:54:43Zby Connelly, Olly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=948509">Click to View</a><br/>Format: Electronic Resources<br/>Use of Risk Analysis in Computer-Aided Persuasion.ent://SD_ILS/0/SD_ILS:12377402024-05-30T22:54:43Z2024-05-30T22:54:43Zby Duman, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=836226">Click to View</a><br/>Format: Electronic Resources<br/>Practical risk management for the CIOent://SD_ILS/0/SD_ILS:22913672024-05-30T22:54:43Z2024-05-30T22:54:43Zby Scherling, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856543/?ar">https://learning.oreilly.com/library/view/~/9781439856543/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856543">https://learning.oreilly.com/library/view/~/9781439856543</a><br/>Format: Electronic Resources<br/>Security strategy : from requirements to realityent://SD_ILS/0/SD_ILS:23216382024-05-30T22:54:43Z2024-05-30T22:54:43Zby Stackpole, Bill. http://viaf.org/viaf/sourceID/LC%7cn2007046244<br/><a href="https://learning.oreilly.com/library/view/~/9781439827345">https://learning.oreilly.com/library/view/~/9781439827345</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar">https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439827345/?ar">https://learning.oreilly.com/library/view/~/9781439827345/?ar</a><br/>Format: Electronic Resources<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:22612152024-05-30T22:54:43Z2024-05-30T22:54:43Zby Seigneur, Jean-Marc.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format: Electronic Resources<br/>Managing Information Security Breaches : Studies from Real Life.ent://SD_ILS/0/SD_ILS:22906742024-05-30T22:54:43Z2024-05-30T22:54:43Zby Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format: Electronic Resources<br/>Surreptitious software : obfuscation, watermarking, and tamperproofing for software protectionent://SD_ILS/0/SD_ILS:22869822024-05-30T22:54:43Z2024-05-30T22:54:43Zby Collberg, Christian.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591258/?ar">https://learning.oreilly.com/library/view/~/9780321591258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar</a><br/>Format: Electronic Resources<br/>PCI compliance : understand and implement effective PCI data security standard compliance.ent://SD_ILS/0/SD_ILS:22886412024-05-30T22:54:43Z2024-05-30T22:54:43Zby Chuvakin, Anton.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494991/?ar">https://learning.oreilly.com/library/view/~/9781597494991/?ar</a><br/>Format: Electronic Resources<br/>Network security auditingent://SD_ILS/0/SD_ILS:22894632024-05-30T22:54:43Z2024-05-30T22:54:43Zby Jackson, Chris, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9781587059407">https://learning.oreilly.com/library/view/~/9781587059407</a>
<a href="https://learning.oreilly.com/library/view/~/9781587059407/?ar">https://learning.oreilly.com/library/view/~/9781587059407/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587059407/?ar">https://go.oreilly.com/library-access/library/view/-/9781587059407/?ar</a><br/>Format: Electronic Resources<br/>Information security for managementent://SD_ILS/0/SD_ILS:3092552024-05-30T22:54:43Z2024-05-30T22:54:43Zby Iyengar, Venugopal.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178</a><br/>Format: Electronic Resources<br/>Information security management : concepts and practiceent://SD_ILS/0/SD_ILS:21314412024-05-30T22:54:43Z2024-05-30T22:54:43Zby Raggad, Bel G., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1449482">Click to View</a><br/>Format: Electronic Resources<br/>Information security for managementent://SD_ILS/0/SD_ILS:21013382024-05-30T22:54:43Z2024-05-30T22:54:43Zby Iyengar, Venugopal.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3011230">Click to View</a><br/>Format: Electronic Resources<br/>The Antideficiency Act Answer Bookent://SD_ILS/0/SD_ILS:23152732024-05-30T22:54:43Z2024-05-30T22:54:43Zby Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263343/?ar">https://learning.oreilly.com/library/view/~/9781567263343/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263343">https://learning.oreilly.com/library/view/~/9781567263343</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar</a><br/>Format: Electronic Resources<br/>Microsoftent://SD_ILS/0/SD_ILS:23210692024-05-30T22:54:43Z2024-05-30T22:54:43Zby Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format: Electronic Resources<br/>Insider Threat : Combatting the Enemy Within.ent://SD_ILS/0/SD_ILS:12121422024-05-30T22:54:43Z2024-05-30T22:54:43Zby Blackwell, Clive.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=480373">Click to View</a><br/>Format: Electronic Resources<br/>Managing Information Risk : A Director's Guide.ent://SD_ILS/0/SD_ILS:12121512024-05-30T22:54:43Z2024-05-30T22:54:43Zby Mitchell, Stewart.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=480407">Click to View</a><br/>Format: Electronic Resources<br/>Data Governance Imperative.ent://SD_ILS/0/SD_ILS:12121522024-05-30T22:54:43Z2024-05-30T22:54:43Zby Sarsfield, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=480410">Click to View</a><br/>Format: Electronic Resources<br/>Social implications of data mining and information privacy interdisciplinary frameworks and solutionsent://SD_ILS/0/SD_ILS:22619172024-05-30T22:54:43Z2024-05-30T22:54:43Zby Eyob, Ephrem, 1954-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-196-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-196-4</a><br/>Format: Electronic Resources<br/>Digital rights management for e-commerce systemsent://SD_ILS/0/SD_ILS:22613192024-05-30T22:54:43Z2024-05-30T22:54:43Zby Tsolis, Dimitrios.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6</a><br/>Format: Electronic Resources<br/>Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issuesent://SD_ILS/0/SD_ILS:22619692024-05-30T22:54:43Z2024-05-30T22:54:43Zby Nemati, Hamid R., 1958-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7</a><br/>Format: Electronic Resources<br/>Multimedia forensics and securityent://SD_ILS/0/SD_ILS:22617922024-05-30T22:54:43Z2024-05-30T22:54:43Zby Li, Chang-Tsun.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-869-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-869-7</a><br/>Format: Electronic Resources<br/>Cyber-security and global information assurance threat analysis and response solutionsent://SD_ILS/0/SD_ILS:22612722024-05-30T22:54:43Z2024-05-30T22:54:43Zby Knapp, Kenneth J.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5</a><br/>Format: Electronic Resources<br/>How to secure and audit Oracle 10g and 11gent://SD_ILS/0/SD_ILS:22863242024-05-30T22:54:43Z2024-05-30T22:54:43Zby Ben-Natan, Ron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar">https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139/?ar">https://learning.oreilly.com/library/view/~/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139">https://learning.oreilly.com/library/view/~/9781420084139</a><br/>Format: Electronic Resources<br/>Oracle data guard 11g handbookent://SD_ILS/0/SD_ILS:22869362024-05-30T22:54:43Z2024-05-30T22:54:43Zby Carpenter, Larry.<br/><a href="https://learning.oreilly.com/library/view/~/9780071621113">https://learning.oreilly.com/library/view/~/9780071621113</a>
<a href="https://learning.oreilly.com/library/view/~/9780071621113/?ar">https://learning.oreilly.com/library/view/~/9780071621113/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071621113/?ar">https://go.oreilly.com/library-access/library/view/-/9780071621113/?ar</a><br/>Format: Electronic Resources<br/>Data leaks for dummiesent://SD_ILS/0/SD_ILS:22887552024-05-30T22:54:43Z2024-05-30T22:54:43Zby Bunker, Guy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470388433">https://learning.oreilly.com/library/view/~/9780470388433</a>
<a href="https://learning.oreilly.com/library/view/~/9780470388433/?ar">https://learning.oreilly.com/library/view/~/9780470388433/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470388433/?ar">https://go.oreilly.com/library-access/library/view/-/9780470388433/?ar</a><br/>Format: Electronic Resources<br/>Information storage and management : storing, managing, and protecting digital informationent://SD_ILS/0/SD_ILS:22866292024-05-30T22:54:43Z2024-05-30T22:54:43Zby Somasundaram, G.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470294215/?ar">https://go.oreilly.com/library-access/library/view/-/9780470294215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470294215/?ar">https://learning.oreilly.com/library/view/~/9780470294215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470294215">https://learning.oreilly.com/library/view/~/9780470294215</a><br/>Format: Electronic Resources<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:22866302024-05-30T22:54:43Z2024-05-30T22:54:43Zby Brotby, W. Krag, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar">https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862/?ar">https://learning.oreilly.com/library/view/~/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862">https://learning.oreilly.com/library/view/~/9781420052862</a><br/>Format: Electronic Resources<br/>