Search Results for - Narrowed by: Data protection. - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-05-31T20:22:55Z System and privacy data protection. ent://SD_ILS/0/SD_ILS:2331777 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a> <a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format:&#160;Video recording<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:2333211 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Moyo, Siegfried, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119863113">https://learning.oreilly.com/library/view/~/9781119863113</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar">https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119863113/?ar">https://learning.oreilly.com/library/view/~/9781119863113/?ar</a><br/>Format:&#160;Electronic Resources<br/> Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict ent://SD_ILS/0/SD_ILS:2334696 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Borges, Dan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812818/?ar">https://learning.oreilly.com/library/view/~/9781801812818/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812818">https://learning.oreilly.com/library/view/~/9781801812818</a><br/>Format:&#160;Sound recording<br/> Digital Earth : cyber threats, privacy and ethics in an age of paranoia ent://SD_ILS/0/SD_ILS:2332896 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Katz, Sarah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783614">https://learning.oreilly.com/library/view/~/9781787783614</a> <a href="https://learning.oreilly.com/library/view/~/9781787783614/?ar">https://learning.oreilly.com/library/view/~/9781787783614/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar</a><br/>Format:&#160;Electronic Resources<br/> Self-sovereign identity : decentralized digital identity and verifiable credentials ent://SD_ILS/0/SD_ILS:2330270 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format:&#160;Electronic Resources<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:2327053 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Moschovitis, Christos J. P., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119658740">https://learning.oreilly.com/library/view/~/9781119658740</a> <a href="https://learning.oreilly.com/library/view/~/9781119658740/?ar">https://learning.oreilly.com/library/view/~/9781119658740/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar">https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar</a><br/>Format:&#160;Electronic Resources<br/> Big breaches : cybersecurity lessons for everyone ent://SD_ILS/0/SD_ILS:2328126 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Daswani, Neil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484266557">https://learning.oreilly.com/library/view/~/9781484266557</a> <a href="https://learning.oreilly.com/library/view/~/9781484266557/?ar">https://learning.oreilly.com/library/view/~/9781484266557/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar">https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data privacy and GDPR handbook ent://SD_ILS/0/SD_ILS:2322558 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Sharma, Sanjay (Financial executive), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119594246">https://learning.oreilly.com/library/view/~/9781119594246</a> <a href="https://learning.oreilly.com/library/view/~/9781119594246/?ar">https://learning.oreilly.com/library/view/~/9781119594246/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar">https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar</a><br/>Format:&#160;Electronic Resources<br/> Protecting Data Privacy Beyond the Trusted System of Record ent://SD_ILS/0/SD_ILS:2323918 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a> <a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format:&#160;Electronic Resources<br/> Exposed : how revealing your data and eliminating privacy increases trust and liberates humanity ent://SD_ILS/0/SD_ILS:2326413 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a> <a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building secure firmware : armoring the foundation of the platform ent://SD_ILS/0/SD_ILS:2326020 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Yao, Jiewen.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261064">https://learning.oreilly.com/library/view/~/9781484261064</a> <a href="https://learning.oreilly.com/library/view/~/9781484261064/?ar">https://learning.oreilly.com/library/view/~/9781484261064/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar</a><br/>Format:&#160;Electronic Resources<br/> Encryption for organizations and individuals : basics of contemporary and quantum cryptography ent://SD_ILS/0/SD_ILS:2325463 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Ciesla, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260562">https://learning.oreilly.com/library/view/~/9781484260562</a> <a href="https://learning.oreilly.com/library/view/~/9781484260562/?ar">https://learning.oreilly.com/library/view/~/9781484260562/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Security, 2nd Edition ent://SD_ILS/0/SD_ILS:2331101 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a> <a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data privacy and GDPR handbook ent://SD_ILS/0/SD_ILS:2273935 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Sharma, Sanjay, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986738">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced API Security : OAuth 2. 0 and Beyond ent://SD_ILS/0/SD_ILS:2322734 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Siriwardena, Prabath.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484220504">https://learning.oreilly.com/library/view/~/9781484220504</a> <a href="https://learning.oreilly.com/library/view/~/9781484220504/?ar">https://learning.oreilly.com/library/view/~/9781484220504/?ar</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:2321452 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Enterprise Mobility and Security training ent://SD_ILS/0/SD_ILS:2319556 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format:&#160;Electronic Resources<br/> Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments ent://SD_ILS/0/SD_ILS:2322055 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to build privacy and security into deep learning models ent://SD_ILS/0/SD_ILS:2322791 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:2316152 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privileged attack vectors : building effective cyber-defense strategies to protect organizations ent://SD_ILS/0/SD_ILS:2314870 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format:&#160;Electronic Resources<br/> What is cybersecurity? ent://SD_ILS/0/SD_ILS:2318722 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format:&#160;Electronic Resources<br/> Solving Cyber Risk : Protecting Your Company and Society. ent://SD_ILS/0/SD_ILS:2318282 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Coburn, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781119490937">https://learning.oreilly.com/library/view/~/9781119490937</a> <a href="https://learning.oreilly.com/library/view/~/9781119490937/?ar">https://learning.oreilly.com/library/view/~/9781119490937/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar">https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar</a><br/>Format:&#160;Electronic Resources<br/> The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets ent://SD_ILS/0/SD_ILS:2315032 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Wallace, Michael, 1960- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814438770/?ar">https://learning.oreilly.com/library/view/~/9780814438770/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar">https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar</a><br/>Format:&#160;Electronic Resources<br/> Dynamic itemset hiding under multiple support thresholds ent://SD_ILS/0/SD_ILS:2075408 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;&Ouml;zt&uuml;rk, Ahmet Cumhur, author.<br/><a href="http://hdl.handle.net/11147/6998">Access to Electronic Versiyon.</a><br/>Format:&#160;Manuscript<br/> Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:2084340 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084401 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format:&#160;Electronic Resources<br/> Versatile Cybersecurity ent://SD_ILS/0/SD_ILS:2084292 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Conti, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084511 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format:&#160;Electronic Resources<br/> Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084520 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format:&#160;Electronic Resources<br/> Introductory Computer Forensics A Hands-on Practical Approach ent://SD_ILS/0/SD_ILS:2084051 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format:&#160;Electronic Resources<br/> Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18&ndash;19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084268 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/><a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084481 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Security Reduction ent://SD_ILS/0/SD_ILS:2084128 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084657 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format:&#160;Electronic Resources<br/> Honeypot Frameworks and Their Applications: A New Framework ent://SD_ILS/0/SD_ILS:2084144 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format:&#160;Electronic Resources<br/> Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17&ndash;18, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084858 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25&ndash;26, and December 15&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084880 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084797 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Matou&scaron;ek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format:&#160;Electronic Resources<br/> Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084720 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format:&#160;Electronic Resources<br/> 99 privacy breaches to beware of : practical data protection tips from real-life experiences ent://SD_ILS/0/SD_ILS:2268306 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5879671">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced Monitoring in P2P Botnets A Dual Perspective ent://SD_ILS/0/SD_ILS:2084473 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Karuppayah, Shankar. author.<br/><a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format:&#160;Electronic Resources<br/> Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation ent://SD_ILS/0/SD_ILS:2084803 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format:&#160;Electronic Resources<br/> Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084813 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086054 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format:&#160;Electronic Resources<br/> Cloud computing security : foundations and challenges ent://SD_ILS/0/SD_ILS:2311524 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format:&#160;Electronic Resources<br/> Die Kunst der Anonymit&auml;t im Internet : so sch&uuml;tzen Sie Ihre Identit&auml;t und Ihre Daten ent://SD_ILS/0/SD_ILS:2315011 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format:&#160;Electronic Resources<br/> Data hiding techniques in Windows OS : a practical approach to investigation and defense ent://SD_ILS/0/SD_ILS:2210720 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4676113">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Security Management Handbook, Volume 6, 6th Edition ent://SD_ILS/0/SD_ILS:2323397 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a> <a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format:&#160;Electronic Resources<br/> You--for sale : protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:2308465 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Sumner, Stuart, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034231/?ar">https://learning.oreilly.com/library/view/~/9780128034231/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:2313484 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format:&#160;Electronic Resources<br/> Information security policies, procedures, and standards : a practitioner's reference ent://SD_ILS/0/SD_ILS:2310749 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Landoll, Douglas J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482245912/?ar">https://learning.oreilly.com/library/view/~/9781482245912/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar">https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar</a><br/>Format:&#160;Electronic Resources<br/> The CISO Handbook ent://SD_ILS/0/SD_ILS:2323677 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Gentile, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031379">https://learning.oreilly.com/library/view/~/9781420031379</a> <a href="https://learning.oreilly.com/library/view/~/9781420031379/?ar">https://learning.oreilly.com/library/view/~/9781420031379/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar</a><br/>Format:&#160;Electronic Resources<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:2310290 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information theft prevention : theory and practice ent://SD_ILS/0/SD_ILS:2315550 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084839 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085036 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084254 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084105 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085086 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format:&#160;Electronic Resources<br/> Data breach aftermath and recovery for individuals and institutions : proceedings of a workshop ent://SD_ILS/0/SD_ILS:2027620 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Johnson, Anne, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Data-Breach-Aftermath.pdf">An electronic book accessible through the World Wide Web; click for information</a> <a href="http://dx.doi.org/10.17226/23559">http://dx.doi.org/10.17226/23559</a><br/>Format:&#160;Electronic Resources<br/> 88 privacy breaches to beware of : practical data protection tips from real-life experiences ent://SD_ILS/0/SD_ILS:2265185 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4558135">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Facing cyber threats head on : protecting yourself and your business ent://SD_ILS/0/SD_ILS:2266274 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Minick, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4773207">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086143 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086070 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format:&#160;Electronic Resources<br/> Information technology security fundamentals ent://SD_ILS/0/SD_ILS:2110952 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4009415">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:2209444 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4334673">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data breach aftermath and recovery for individuals and institutions : proceedings of a workshop ent://SD_ILS/0/SD_ILS:2228331 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Johnson, Anne, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4690560">Click to View</a><br/>Format:&#160;Electronic Resources<br/> You : for sale protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:2208965 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security in computing ent://SD_ILS/0/SD_ILS:2305897 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Pfleeger, Charles P., 1948- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134085074/?ar">https://learning.oreilly.com/library/view/~/9780134085074/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar">https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data protection and the cloud : are the risks too great? ent://SD_ILS/0/SD_ILS:2308847 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Ticher, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287135/?ar">https://learning.oreilly.com/library/view/~/9781849287135/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar</a><br/>Format:&#160;Electronic Resources<br/> Risk centric threat modeling : process for attack simulation and threat analysis ent://SD_ILS/0/SD_ILS:2308792 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Uceda V&eacute;lez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Python forensics : master the art of digital forensics and analysis with Python ent://SD_ILS/0/SD_ILS:2309227 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Spreitzenbarth, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783988044/?ar">https://learning.oreilly.com/library/view/~/9781783988044/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar">https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783988044">https://learning.oreilly.com/library/view/~/9781783988044</a><br/>Format:&#160;Electronic Resources<br/> Digital privacy in the marketplace : perspectives on the information exchange ent://SD_ILS/0/SD_ILS:2056185 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1920895">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data protection and the cloud : are the risks too great? ent://SD_ILS/0/SD_ILS:2155320 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192125">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering Python forensics : master the art of digital forensics and analysis with Python ent://SD_ILS/0/SD_ILS:2219461 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Spreitzenbarth, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191124">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Measuring and managing information risk : a FAIR approach ent://SD_ILS/0/SD_ILS:2304245 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Freund, Jack, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar">https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124202313/?ar">https://learning.oreilly.com/library/view/~/9780124202313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124202313">https://learning.oreilly.com/library/view/~/9780124202313</a><br/>Format:&#160;Electronic Resources<br/> Introduction to information security : LiveLessons (Sneak Peek Video Training) ent://SD_ILS/0/SD_ILS:2306346 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Aurnou, Scott, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar">https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780134135823/?ar">https://learning.oreilly.com/videos/~/9780134135823/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information assurance handbook : effective computer security and risk management strategies ent://SD_ILS/0/SD_ILS:2304875 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Schou, Corey.<br/><a href="https://learning.oreilly.com/library/view/~/9780071821650">https://learning.oreilly.com/library/view/~/9780071821650</a> <a href="https://learning.oreilly.com/library/view/~/9780071821650/?ar">https://learning.oreilly.com/library/view/~/9780071821650/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar">https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security leader insights for information protection : lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:2207467 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699254">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:2300180 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security : principles and practices ent://SD_ILS/0/SD_ILS:2303412 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format:&#160;Electronic Resources<br/> 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy ent://SD_ILS/0/SD_ILS:2304861 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format:&#160;Electronic Resources<br/> The privacy engineer's manifesto : getting from policy to code to QA to value ent://SD_ILS/0/SD_ILS:2302296 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Dennedy, Michelle Finneran.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263555">https://learning.oreilly.com/library/view/~/9781430263555</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430263555/?ar">https://learning.oreilly.com/library/view/~/9781430263555/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to computer and network security : navigating shades of gray ent://SD_ILS/0/SD_ILS:2313482 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format:&#160;Electronic Resources<br/> Afet durumunda kamuda veri g&uuml;venliği ent://SD_ILS/0/SD_ILS:430493 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;İstanbul İl &Ouml;zel İdaresi<br/>Format:&#160;Books<br/> Pragmatic security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:2297966 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Brotby, W. Krag.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881538/?ar">https://learning.oreilly.com/library/view/~/9781439881538/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:2296616 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Raggo, Michael T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format:&#160;Electronic Resources<br/> Pragmatic security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:2129847 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1153198">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 / ISO27002 : a pocket guide ent://SD_ILS/0/SD_ILS:2154909 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463579">Click to View</a><br/>Format:&#160;Electronic Resources<br/> An introduction to information security and ISO27001:2013 : a pocket guide ent://SD_ILS/0/SD_ILS:2154908 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463578">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The dark side of personalization online privacy concerns influence customer behavior ent://SD_ILS/0/SD_ILS:2237976 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Ziesak, J&ouml;rg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1324048">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:2206583 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418381">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols ent://SD_ILS/0/SD_ILS:2206043 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073014">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The PayPal official insider guide to internet security : spot scams and protect your online business ent://SD_ILS/0/SD_ILS:2297259 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Savage, Michelle.<br/><a href="https://learning.oreilly.com/library/view/~/9780133154573">https://learning.oreilly.com/library/view/~/9780133154573</a> <a href="https://learning.oreilly.com/library/view/~/9780133154573/?ar">https://learning.oreilly.com/library/view/~/9780133154573/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar">https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nine steps to success : an ISO27001:2013 implementation overview ent://SD_ILS/0/SD_ILS:2300436 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285117/?ar">https://learning.oreilly.com/library/view/~/9781849285117/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285117">https://learning.oreilly.com/library/view/~/9781849285117</a><br/>Format:&#160;Electronic Resources<br/> The complete book of data anonymization : from planning to implementation ent://SD_ILS/0/SD_ILS:409830 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Raghunathan, Balaji, author.<br/>Format:&#160;Books<br/> Getting Started with FortiGate. ent://SD_ILS/0/SD_ILS:1265007 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Fabbri, Rosato.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572901">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Analyzing computer security : a threat/vulnerability/countermeasure approach ent://SD_ILS/0/SD_ILS:2291806 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Pfleeger, Charles P., 1948-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar">https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132789493/?ar">https://learning.oreilly.com/library/view/~/9780132789493/?ar</a><br/>Format:&#160;Electronic Resources<br/> The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) ent://SD_ILS/0/SD_ILS:2294170 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format:&#160;Electronic Resources<br/> IT Governance : An International Guide to Data Security and ISO27001/ISO27002. ent://SD_ILS/0/SD_ILS:1238164 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Calder, Alan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=838114">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber security standards, practices and industrial applications systems and methodologies ent://SD_ILS/0/SD_ILS:476348 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Zubairi, Junaid Ahmed, 1961-<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/</a><br/>Format:&#160;Electronic Resources<br/> Mobile device security for dummies ent://SD_ILS/0/SD_ILS:2293515 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Campagna, Rich R.<br/><a href="https://learning.oreilly.com/library/view/~/9781118093801/?ar">https://learning.oreilly.com/library/view/~/9781118093801/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar">https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar</a><br/>Format:&#160;Electronic Resources<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:2291653 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Landoll, Douglas J.<br/><a href="https://learning.oreilly.com/library/view/~/9781439821497">https://learning.oreilly.com/library/view/~/9781439821497</a> <a href="https://learning.oreilly.com/library/view/~/9781439821497/?ar">https://learning.oreilly.com/library/view/~/9781439821497/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar">https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar</a><br/>Format:&#160;Electronic Resources<br/> Preventing good people from doing bad things : implementing least privilege ent://SD_ILS/0/SD_ILS:2293278 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format:&#160;Electronic Resources<br/> The chief information security officer : insights, tools and survival skills ent://SD_ILS/0/SD_ILS:2291384 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Kouns, Barry.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281966">https://learning.oreilly.com/library/view/~/9781849281966</a> <a href="https://learning.oreilly.com/library/view/~/9781849281966/?ar">https://learning.oreilly.com/library/view/~/9781849281966/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar</a><br/>Format:&#160;Electronic Resources<br/> The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets ent://SD_ILS/0/SD_ILS:2290884 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Wallace, Michael, 1960-<br/><a href="https://learning.oreilly.com/library/view/~/9780814416136/?ar">https://learning.oreilly.com/library/view/~/9780814416136/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar">https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:2295995 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a> <a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format:&#160;Electronic Resources<br/> Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection ent://SD_ILS/0/SD_ILS:2286982 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Collberg, Christian.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591258/?ar">https://learning.oreilly.com/library/view/~/9780321591258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar</a><br/>Format:&#160;Electronic Resources<br/> Collaborative computer security and trust management ent://SD_ILS/0/SD_ILS:2261215 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Seigneur, Jean-Marc.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security Breaches : Studies from Real Life. ent://SD_ILS/0/SD_ILS:2290674 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format:&#160;Electronic Resources<br/> The myths of security : what the computer security industry doesn't want you to know ent://SD_ILS/0/SD_ILS:2106561 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Viega, John.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821</a><br/>Format:&#160;Electronic Resources<br/> How to secure and audit Oracle 10g and 11g ent://SD_ILS/0/SD_ILS:2286324 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Ben-Natan, Ron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar">https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420084139/?ar">https://learning.oreilly.com/library/view/~/9781420084139/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420084139">https://learning.oreilly.com/library/view/~/9781420084139</a><br/>Format:&#160;Electronic Resources<br/> Digital rights management for e-commerce systems ent://SD_ILS/0/SD_ILS:2261319 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Tsolis, Dimitrios.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6</a><br/>Format:&#160;Electronic Resources<br/> Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issues ent://SD_ILS/0/SD_ILS:2261969 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Nemati, Hamid R., 1958-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7</a><br/>Format:&#160;Electronic Resources<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:2286630 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Brotby, W. Krag, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar">https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420052862/?ar">https://learning.oreilly.com/library/view/~/9781420052862/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420052862">https://learning.oreilly.com/library/view/~/9781420052862</a><br/>Format:&#160;Electronic Resources<br/> Definitive Guide to the C&amp;A Transformation Process : The First Publication of a Comprehensive View of the C&amp;A Transformation. ent://SD_ILS/0/SD_ILS:1216155 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Mehan, Julie.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=547041">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Information Security and Privacy. ent://SD_ILS/0/SD_ILS:1207718 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Axelrod, C. Warren.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456886">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in Artificial Intelligence for Privacy Protection and Security. ent://SD_ILS/0/SD_ILS:1270705 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Solanas, Agusti.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679374">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Security+ 2008 In Depth. ent://SD_ILS/0/SD_ILS:1304858 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Ciampa, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136117">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Panoptikon g&ouml;z&uuml;n iktidarı =b Panoptikon : vart gjennomsiktige samfunn ent://SD_ILS/0/SD_ILS:85741 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Apenes, Georg.<br/>Format:&#160;Books<br/> Privacy-preserving data mining : models and algorithms ent://SD_ILS/0/SD_ILS:81396 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Aggarwal, Charu C.<br/>Format:&#160;Books<br/> Information security policy, processes, and practices ent://SD_ILS/0/SD_ILS:293000 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Straub, Detmar W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513</a><br/>Format:&#160;Electronic Resources<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:343739 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Clark, Champ, III.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542</a><br/>Format:&#160;Electronic Resources<br/> Information Security : Policy, Processes, and Practices. ent://SD_ILS/0/SD_ILS:1205359 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Goodman, Seymour.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=435197">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:2285226 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Clark, Champ, III.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492249">https://learning.oreilly.com/library/view/~/9781597492249</a> <a href="https://learning.oreilly.com/library/view/~/9781597492249/?ar">https://learning.oreilly.com/library/view/~/9781597492249/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security and Usability : Designing Secure Systems that People Can Use. ent://SD_ILS/0/SD_ILS:2288610 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Cranor, Lorrie Faith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008279/?ar">https://go.oreilly.com/library-access/library/view/-/0596008279/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008279/?ar">https://learning.oreilly.com/library/view/~/0596008279/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008279">https://learning.oreilly.com/library/view/~/0596008279</a><br/>Format:&#160;Electronic Resources<br/> An introduction to information security and ISO27001 : a pocket guide ent://SD_ILS/0/SD_ILS:2288932 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Watkins, Steve, 1970-<br/><a href="https://learning.oreilly.com/library/view/~/9781905356683">https://learning.oreilly.com/library/view/~/9781905356683</a> <a href="https://learning.oreilly.com/library/view/~/9781905356683/?ar">https://learning.oreilly.com/library/view/~/9781905356683/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781905356683/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356683/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering System Center Data Protection Manager 2007 ent://SD_ILS/0/SD_ILS:2284542 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Ganger, Devin L.<br/><a href="https://learning.oreilly.com/library/view/~/9780470181522/?ar">https://learning.oreilly.com/library/view/~/9780470181522/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar">https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470181522">https://learning.oreilly.com/library/view/~/9780470181522</a><br/>Format:&#160;Electronic Resources<br/> Deployment guides series. IBM Tivoli Compliance Insight Manager ent://SD_ILS/0/SD_ILS:2294667 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;B&uuml;cker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738485705/?ar">https://go.oreilly.com/library-access/library/view/-/0738485705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738485705/?ar">https://learning.oreilly.com/library/view/~/0738485705/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing catastrophic loss of sensitive data ent://SD_ILS/0/SD_ILS:2284690 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Photopoulos, Constantine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492393/?ar">https://learning.oreilly.com/library/view/~/9781597492393/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:2048017 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The shellcoder's handbook : discovering and exploiting security holes ent://SD_ILS/0/SD_ILS:2283852 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Anley, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780470080238">https://learning.oreilly.com/library/view/~/9780470080238</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar">https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470080238/?ar">https://learning.oreilly.com/library/view/~/9780470080238/?ar</a><br/>Format:&#160;Electronic Resources<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:2283639 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Taylor, Laura.<br/><a href="https://www.sciencedirect.com/science/book/9781597491167">https://www.sciencedirect.com/science/book/9781597491167</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491167/?ar">https://learning.oreilly.com/library/view/~/9781597491167/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing information assurance in financial services ent://SD_ILS/0/SD_ILS:2261738 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Rao, H. R. (H. Raghav)<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-171-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-171-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in enterprise information technology security ent://SD_ILS/0/SD_ILS:2261103 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Khadraoui, Djamel.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5</a><br/>Format:&#160;Electronic Resources<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:64190 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking and Steganography. ent://SD_ILS/0/SD_ILS:1196457 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Cox, Ingemar.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328311">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Papers from the First European Workshop on Technological &amp; Security Issues in Digital Rights Management (EuDiRights&rsquo;06). ent://SD_ILS/0/SD_ILS:1191720 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Yague, Mariemma.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=291585">Click to View</a><br/>Format:&#160;Electronic Resources<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:341700 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Taylor, Laura.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012</a><br/>Format:&#160;Electronic Resources<br/> Process for Developing a Common Vocabulary in the Information Security Area. ent://SD_ILS/0/SD_ILS:1195949 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Von Knop, J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=320313">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for SCADA systems ent://SD_ILS/0/SD_ILS:474839 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Shaw, William T.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpCSCADAS2">http://app.knovel.com/web/toc.v/cid:kpCSCADAS2</a><br/>Format:&#160;Electronic Resources<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:2281991 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490481">https://learning.oreilly.com/library/view/~/9781597490481</a> <a href="https://www.sciencedirect.com/science/book/9781597490481">https://www.sciencedirect.com/science/book/9781597490481</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490481/?ar">https://learning.oreilly.com/library/view/~/9781597490481/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privacy protection for e-services ent://SD_ILS/0/SD_ILS:2261853 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Yee, George.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-914-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-914-4</a><br/>Format:&#160;Electronic Resources<br/> Information Assurance and Computer Security. ent://SD_ILS/0/SD_ILS:1190742 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Thomas, J.P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=287000">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building a global information assurance program ent://SD_ILS/0/SD_ILS:2322916 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Curts, Raymond J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780203997550/?ar">https://learning.oreilly.com/library/view/~/9780203997550/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar">https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar</a><br/>Format:&#160;Electronic Resources<br/> The business case for network security : advocacy, governance, and ROI ent://SD_ILS/0/SD_ILS:2281646 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587201216/?ar">https://go.oreilly.com/library-access/library/view/-/1587201216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587201216/?ar">https://learning.oreilly.com/library/view/~/1587201216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587201216">https://learning.oreilly.com/library/view/~/1587201216</a><br/>Format:&#160;Electronic Resources<br/> Data Protection and Information Lifecycle Management. ent://SD_ILS/0/SD_ILS:2290466 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Petrocelli, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0131927574/?ar">https://go.oreilly.com/library-access/library/view/-/0131927574/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131927574/?ar">https://learning.oreilly.com/library/view/~/0131927574/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131927574">https://learning.oreilly.com/library/view/~/0131927574</a><br/>Format:&#160;Electronic Resources<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:2281823 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Kairab, Sudhanshu.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203507230/?ar">https://go.oreilly.com/library-access/library/view/-/9780203507230/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780203507230/?ar">https://learning.oreilly.com/library/view/~/9780203507230/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780203507230">https://learning.oreilly.com/library/view/~/9780203507230</a><br/>Format:&#160;Electronic Resources<br/> Nine steps to success : an ISO 27001 implementation overview ent://SD_ILS/0/SD_ILS:2289743 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Calder, Alan, 1957-<br/><a href="https://learning.oreilly.com/library/view/~/9781905356126/?ar">https://learning.oreilly.com/library/view/~/9781905356126/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar</a><br/>Format:&#160;Electronic Resources<br/> Implementing database security and auditing a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:65675 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Black Hat Physical Device Security : Exploiting Hardware and Software. ent://SD_ILS/0/SD_ILS:1182502 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Miller, Drew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=222851">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing Database Security and Auditing. ent://SD_ILS/0/SD_ILS:1190646 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Ben Natan, Ron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=286701">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malicious cryptography : exposing cryptovirology ent://SD_ILS/0/SD_ILS:2310281 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Young, Adam, 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar">https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780764568466">https://learning.oreilly.com/library/view/~/9780764568466</a> <a href="https://learning.oreilly.com/library/view/~/9780764568466/?ar">https://learning.oreilly.com/library/view/~/9780764568466/?ar</a><br/>Format:&#160;Electronic Resources<br/> The shellcoder's handbook : discovering and exploiting security holes ent://SD_ILS/0/SD_ILS:2281833 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9780764544682">https://learning.oreilly.com/library/view/~/9780764544682</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780764544682/?ar">https://go.oreilly.com/library-access/library/view/-/9780764544682/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780764544682/?ar">https://learning.oreilly.com/library/view/~/9780764544682/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privacy Protection and Computer Forensics. ent://SD_ILS/0/SD_ILS:1183401 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Caloyannides, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227692">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Watermarking Techniques : Series On Innovative Intelligence. ent://SD_ILS/0/SD_ILS:1183629 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Pan, Jeng-Shyang.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=231561">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Finding and Fixing Vulnerabilities in Information Systems : The Vulnerability Assessment and Mitigation Methodology. ent://SD_ILS/0/SD_ILS:1181099 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Anton, Philip S.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=197482">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Protecting Your Library's Digital Sources : The Essential Guide to Planning and Preservation. ent://SD_ILS/0/SD_ILS:1182414 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Kahn, Miriam B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=218937">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Assessing and Managing Security Risk in IT Systems ent://SD_ILS/0/SD_ILS:2326305 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;McCumber, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar">https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780203490426">https://learning.oreilly.com/library/view/~/9780203490426</a> <a href="https://learning.oreilly.com/library/view/~/9780203490426/?ar">https://learning.oreilly.com/library/view/~/9780203490426/?ar</a><br/>Format:&#160;Electronic Resources<br/> Techniques and Applications of Digital Watermarking and Content Protection : Techniques and Applications. ent://SD_ILS/0/SD_ILS:1183299 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Arnold, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227587">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Crackproof your software the best ways to protect your software against crackers ent://SD_ILS/0/SD_ILS:2047636 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;C̆ervĕn, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273482">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building an information security awareness program ent://SD_ILS/0/SD_ILS:2281782 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Desman, Mark B.<br/><a href="https://learning.oreilly.com/library/view/~/9781420000054">https://learning.oreilly.com/library/view/~/9781420000054</a> <a href="https://learning.oreilly.com/library/view/~/9781420000054/?ar">https://learning.oreilly.com/library/view/~/9781420000054/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar">https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing, Third Edition ent://SD_ILS/0/SD_ILS:2326579 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Pfleeger, Charles, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0130355488/?ar">https://go.oreilly.com/library-access/library/view/-/0130355488/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0130355488/?ar">https://learning.oreilly.com/library/view/~/0130355488/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0130355488">https://learning.oreilly.com/library/view/~/0130355488</a><br/>Format:&#160;Electronic Resources<br/> Digital watermarking ent://SD_ILS/0/SD_ILS:65654 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2001094368.html">http://www.loc.gov/catdir/description/els031/2001094368.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2001094368.html">http://www.loc.gov/catdir/toc/els031/2001094368.html</a><br/>Format:&#160;Electronic Resources<br/> Backing up Oracle : using Tivoli Storage Management ent://SD_ILS/0/SD_ILS:2281365 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Hewgill, Deirdre.<br/><a href="https://learning.oreilly.com/library/view/~/0738421855">https://learning.oreilly.com/library/view/~/0738421855</a> <a href="https://learning.oreilly.com/library/view/~/0738421855/?ar">https://learning.oreilly.com/library/view/~/0738421855/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738421855/?ar">https://go.oreilly.com/library-access/library/view/-/0738421855/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data privacy in the information age ent://SD_ILS/0/SD_ILS:265140 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Klosek, Jacqueline, 1972-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy in the Information Age. ent://SD_ILS/0/SD_ILS:1190154 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Klosek, Jacqueline.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=282745">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Technology and Privacy : The New Landscape. ent://SD_ILS/0/SD_ILS:1315850 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Agre, Philip E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3338469">Click to View</a><br/>Format:&#160;Electronic Resources<br/> LAN Times guide to security and data integrity= Guide to security and data integrity ent://SD_ILS/0/SD_ILS:1316 2024-05-31T20:22:55Z 2024-05-31T20:22:55Z by&#160;Farley, Marc.<br/>Format:&#160;Books<br/>