Search Results for - Narrowed by: Data protection. - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-05-31T20:22:55ZSystem and privacy data protection.ent://SD_ILS/0/SD_ILS:23317772024-05-31T20:22:55Z2024-05-31T20:22:55Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a>
<a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format: Video recording<br/>Executive's guide to cyber risk : securing the future todayent://SD_ILS/0/SD_ILS:23332112024-05-31T20:22:55Z2024-05-31T20:22:55Zby Moyo, Siegfried, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119863113">https://learning.oreilly.com/library/view/~/9781119863113</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar">https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119863113/?ar">https://learning.oreilly.com/library/view/~/9781119863113/?ar</a><br/>Format: Electronic Resources<br/>Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflictent://SD_ILS/0/SD_ILS:23346962024-05-31T20:22:55Z2024-05-31T20:22:55Zby Borges, Dan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818/?ar">https://learning.oreilly.com/library/view/~/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818">https://learning.oreilly.com/library/view/~/9781801812818</a><br/>Format: Sound recording<br/>Digital Earth : cyber threats, privacy and ethics in an age of paranoiaent://SD_ILS/0/SD_ILS:23328962024-05-31T20:22:55Z2024-05-31T20:22:55Zby Katz, Sarah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783614">https://learning.oreilly.com/library/view/~/9781787783614</a>
<a href="https://learning.oreilly.com/library/view/~/9781787783614/?ar">https://learning.oreilly.com/library/view/~/9781787783614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar</a><br/>Format: Electronic Resources<br/>Self-sovereign identity : decentralized digital identity and verifiable credentialsent://SD_ILS/0/SD_ILS:23302702024-05-31T20:22:55Z2024-05-31T20:22:55Zby Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format: Electronic Resources<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:23270532024-05-31T20:22:55Z2024-05-31T20:22:55Zby Moschovitis, Christos J. P., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119658740">https://learning.oreilly.com/library/view/~/9781119658740</a>
<a href="https://learning.oreilly.com/library/view/~/9781119658740/?ar">https://learning.oreilly.com/library/view/~/9781119658740/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar">https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar</a><br/>Format: Electronic Resources<br/>Big breaches : cybersecurity lessons for everyoneent://SD_ILS/0/SD_ILS:23281262024-05-31T20:22:55Z2024-05-31T20:22:55Zby Daswani, Neil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484266557">https://learning.oreilly.com/library/view/~/9781484266557</a>
<a href="https://learning.oreilly.com/library/view/~/9781484266557/?ar">https://learning.oreilly.com/library/view/~/9781484266557/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar">https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar</a><br/>Format: Electronic Resources<br/>Data privacy and GDPR handbookent://SD_ILS/0/SD_ILS:23225582024-05-31T20:22:55Z2024-05-31T20:22:55Zby Sharma, Sanjay (Financial executive), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119594246">https://learning.oreilly.com/library/view/~/9781119594246</a>
<a href="https://learning.oreilly.com/library/view/~/9781119594246/?ar">https://learning.oreilly.com/library/view/~/9781119594246/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar">https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar</a><br/>Format: Electronic Resources<br/>Protecting Data Privacy Beyond the Trusted System of Recordent://SD_ILS/0/SD_ILS:23239182024-05-31T20:22:55Z2024-05-31T20:22:55Zby White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format: Electronic Resources<br/>Exposed : how revealing your data and eliminating privacy increases trust and liberates humanityent://SD_ILS/0/SD_ILS:23264132024-05-31T20:22:55Z2024-05-31T20:22:55Zby Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a>
<a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format: Electronic Resources<br/>Building secure firmware : armoring the foundation of the platforment://SD_ILS/0/SD_ILS:23260202024-05-31T20:22:55Z2024-05-31T20:22:55Zby Yao, Jiewen.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261064">https://learning.oreilly.com/library/view/~/9781484261064</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261064/?ar">https://learning.oreilly.com/library/view/~/9781484261064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar</a><br/>Format: Electronic Resources<br/>Encryption for organizations and individuals : basics of contemporary and quantum cryptographyent://SD_ILS/0/SD_ILS:23254632024-05-31T20:22:55Z2024-05-31T20:22:55Zby Ciesla, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260562">https://learning.oreilly.com/library/view/~/9781484260562</a>
<a href="https://learning.oreilly.com/library/view/~/9781484260562/?ar">https://learning.oreilly.com/library/view/~/9781484260562/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar</a><br/>Format: Electronic Resources<br/>Cloud Computing Security, 2nd Editionent://SD_ILS/0/SD_ILS:23311012024-05-31T20:22:55Z2024-05-31T20:22:55Zby Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>Data privacy and GDPR handbookent://SD_ILS/0/SD_ILS:22739352024-05-31T20:22:55Z2024-05-31T20:22:55Zby Sharma, Sanjay, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986738">Click to View</a><br/>Format: Electronic Resources<br/>Advanced API Security : OAuth 2. 0 and Beyondent://SD_ILS/0/SD_ILS:23227342024-05-31T20:22:55Z2024-05-31T20:22:55Zby Siriwardena, Prabath.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220504">https://learning.oreilly.com/library/view/~/9781484220504</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220504/?ar">https://learning.oreilly.com/library/view/~/9781484220504/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers : cybersecurity advice from the best hackers in the worldent://SD_ILS/0/SD_ILS:23214522024-05-31T20:22:55Z2024-05-31T20:22:55Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Enterprise Mobility and Security trainingent://SD_ILS/0/SD_ILS:23195562024-05-31T20:22:55Z2024-05-31T20:22:55Zby Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format: Electronic Resources<br/>Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environmentsent://SD_ILS/0/SD_ILS:23220552024-05-31T20:22:55Z2024-05-31T20:22:55Zby Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format: Electronic Resources<br/>How to build privacy and security into deep learning modelsent://SD_ILS/0/SD_ILS:23227912024-05-31T20:22:55Z2024-05-31T20:22:55Zby Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format: Electronic Resources<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:23161522024-05-31T20:22:55Z2024-05-31T20:22:55Zby Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format: Electronic Resources<br/>Privileged attack vectors : building effective cyber-defense strategies to protect organizationsent://SD_ILS/0/SD_ILS:23148702024-05-31T20:22:55Z2024-05-31T20:22:55Zby Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format: Electronic Resources<br/>What is cybersecurity?ent://SD_ILS/0/SD_ILS:23187222024-05-31T20:22:55Z2024-05-31T20:22:55Zby Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format: Electronic Resources<br/>Solving Cyber Risk : Protecting Your Company and Society.ent://SD_ILS/0/SD_ILS:23182822024-05-31T20:22:55Z2024-05-31T20:22:55Zby Coburn, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781119490937">https://learning.oreilly.com/library/view/~/9781119490937</a>
<a href="https://learning.oreilly.com/library/view/~/9781119490937/?ar">https://learning.oreilly.com/library/view/~/9781119490937/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar">https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar</a><br/>Format: Electronic Resources<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:23150322024-05-31T20:22:55Z2024-05-31T20:22:55Zby Wallace, Michael, 1960- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814438770/?ar">https://learning.oreilly.com/library/view/~/9780814438770/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar">https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar</a><br/>Format: Electronic Resources<br/>Dynamic itemset hiding under multiple support thresholdsent://SD_ILS/0/SD_ILS:20754082024-05-31T20:22:55Z2024-05-31T20:22:55Zby Öztürk, Ahmet Cumhur, author.<br/><a href="http://hdl.handle.net/11147/6998">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Network Intrusion Detection using Deep Learning A Feature Learning Approachent://SD_ILS/0/SD_ILS:20843402024-05-31T20:22:55Z2024-05-31T20:22:55Zby Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844012024-05-31T20:22:55Z2024-05-31T20:22:55Zby Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Versatile Cybersecurityent://SD_ILS/0/SD_ILS:20842922024-05-31T20:22:55Z2024-05-31T20:22:55Zby Conti, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845112024-05-31T20:22:55Z2024-05-31T20:22:55Zby Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Electronic Resources<br/>Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20845202024-05-31T20:22:55Z2024-05-31T20:22:55Zby You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format: Electronic Resources<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:20840512024-05-31T20:22:55Z2024-05-31T20:22:55Zby Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842682024-05-31T20:22:55Z2024-05-31T20:22:55Zby Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/><a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20844812024-05-31T20:22:55Z2024-05-31T20:22:55Zby Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Electronic Resources<br/>Introduction to Security Reductionent://SD_ILS/0/SD_ILS:20841282024-05-31T20:22:55Z2024-05-31T20:22:55Zby Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846572024-05-31T20:22:55Z2024-05-31T20:22:55Zby Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Electronic Resources<br/>Honeypot Frameworks and Their Applications: A New Frameworkent://SD_ILS/0/SD_ILS:20841442024-05-31T20:22:55Z2024-05-31T20:22:55Zby NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Electronic Resources<br/>Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848582024-05-31T20:22:55Z2024-05-31T20:22:55Zby Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Electronic Resources<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848802024-05-31T20:22:55Z2024-05-31T20:22:55Zby Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20847972024-05-31T20:22:55Z2024-05-31T20:22:55Zby Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20847202024-05-31T20:22:55Z2024-05-31T20:22:55Zby Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>99 privacy breaches to beware of : practical data protection tips from real-life experiencesent://SD_ILS/0/SD_ILS:22683062024-05-31T20:22:55Z2024-05-31T20:22:55Zby Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5879671">Click to View</a><br/>Format: Electronic Resources<br/>Advanced Monitoring in P2P Botnets A Dual Perspectiveent://SD_ILS/0/SD_ILS:20844732024-05-31T20:22:55Z2024-05-31T20:22:55Zby Karuppayah, Shankar. author.<br/><a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Electronic Resources<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:20848032024-05-31T20:22:55Z2024-05-31T20:22:55Zby Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20848132024-05-31T20:22:55Z2024-05-31T20:22:55Zby Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860542024-05-31T20:22:55Z2024-05-31T20:22:55Zby Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Cloud computing security : foundations and challengesent://SD_ILS/0/SD_ILS:23115242024-05-31T20:22:55Z2024-05-31T20:22:55Zby Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format: Electronic Resources<br/>Die Kunst der Anonymität im Internet : so schützen Sie Ihre Identität und Ihre Datenent://SD_ILS/0/SD_ILS:23150112024-05-31T20:22:55Z2024-05-31T20:22:55Zby Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format: Electronic Resources<br/>Data hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:22107202024-05-31T20:22:55Z2024-05-31T20:22:55Zby Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4676113">Click to View</a><br/>Format: Electronic Resources<br/>Information Security Management Handbook, Volume 6, 6th Editionent://SD_ILS/0/SD_ILS:23233972024-05-31T20:22:55Z2024-05-31T20:22:55Zby Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a>
<a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format: Electronic Resources<br/>You--for sale : protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:23084652024-05-31T20:22:55Z2024-05-31T20:22:55Zby Sumner, Stuart, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034231/?ar">https://learning.oreilly.com/library/view/~/9780128034231/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar</a><br/>Format: Electronic Resources<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:23134842024-05-31T20:22:55Z2024-05-31T20:22:55Zby Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format: Electronic Resources<br/>Information security policies, procedures, and standards : a practitioner's referenceent://SD_ILS/0/SD_ILS:23107492024-05-31T20:22:55Z2024-05-31T20:22:55Zby Landoll, Douglas J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482245912/?ar">https://learning.oreilly.com/library/view/~/9781482245912/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar">https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar</a><br/>Format: Electronic Resources<br/>The CISO Handbookent://SD_ILS/0/SD_ILS:23236772024-05-31T20:22:55Z2024-05-31T20:22:55Zby Gentile, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031379">https://learning.oreilly.com/library/view/~/9781420031379</a>
<a href="https://learning.oreilly.com/library/view/~/9781420031379/?ar">https://learning.oreilly.com/library/view/~/9781420031379/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:23102902024-05-31T20:22:55Z2024-05-31T20:22:55Zby Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format: Electronic Resources<br/>Information theft prevention : theory and practiceent://SD_ILS/0/SD_ILS:23155502024-05-31T20:22:55Z2024-05-31T20:22:55Zby Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848392024-05-31T20:22:55Z2024-05-31T20:22:55Zby Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format: Electronic Resources<br/>Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850362024-05-31T20:22:55Z2024-05-31T20:22:55Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842542024-05-31T20:22:55Z2024-05-31T20:22:55Zby Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-05-31T20:22:55Z2024-05-31T20:22:55Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850862024-05-31T20:22:55Z2024-05-31T20:22:55Zby Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format: Electronic Resources<br/>Data breach aftermath and recovery for individuals and institutions : proceedings of a workshopent://SD_ILS/0/SD_ILS:20276202024-05-31T20:22:55Z2024-05-31T20:22:55Zby Johnson, Anne, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Data-Breach-Aftermath.pdf">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://dx.doi.org/10.17226/23559">http://dx.doi.org/10.17226/23559</a><br/>Format: Electronic Resources<br/>88 privacy breaches to beware of : practical data protection tips from real-life experiencesent://SD_ILS/0/SD_ILS:22651852024-05-31T20:22:55Z2024-05-31T20:22:55Zby Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4558135">Click to View</a><br/>Format: Electronic Resources<br/>Facing cyber threats head on : protecting yourself and your businessent://SD_ILS/0/SD_ILS:22662742024-05-31T20:22:55Z2024-05-31T20:22:55Zby Minick, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4773207">Click to View</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861432024-05-31T20:22:55Z2024-05-31T20:22:55Zby Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860702024-05-31T20:22:55Z2024-05-31T20:22:55Zby Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format: Electronic Resources<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:21109522024-05-31T20:22:55Z2024-05-31T20:22:55Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4009415">Click to View</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:22094442024-05-31T20:22:55Z2024-05-31T20:22:55Zby Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4334673">Click to View</a><br/>Format: Electronic Resources<br/>Data breach aftermath and recovery for individuals and institutions : proceedings of a workshopent://SD_ILS/0/SD_ILS:22283312024-05-31T20:22:55Z2024-05-31T20:22:55Zby Johnson, Anne, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4690560">Click to View</a><br/>Format: Electronic Resources<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:22089652024-05-31T20:22:55Z2024-05-31T20:22:55Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format: Electronic Resources<br/>Security in computingent://SD_ILS/0/SD_ILS:23058972024-05-31T20:22:55Z2024-05-31T20:22:55Zby Pfleeger, Charles P., 1948- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134085074/?ar">https://learning.oreilly.com/library/view/~/9780134085074/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar">https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:23088472024-05-31T20:22:55Z2024-05-31T20:22:55Zby Ticher, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287135/?ar">https://learning.oreilly.com/library/view/~/9781849287135/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar</a><br/>Format: Electronic Resources<br/>Risk centric threat modeling : process for attack simulation and threat analysisent://SD_ILS/0/SD_ILS:23087922024-05-31T20:22:55Z2024-05-31T20:22:55Zby Uceda Vélez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format: Electronic Resources<br/>Mastering Python forensics : master the art of digital forensics and analysis with Pythonent://SD_ILS/0/SD_ILS:23092272024-05-31T20:22:55Z2024-05-31T20:22:55Zby Spreitzenbarth, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783988044/?ar">https://learning.oreilly.com/library/view/~/9781783988044/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar">https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783988044">https://learning.oreilly.com/library/view/~/9781783988044</a><br/>Format: Electronic Resources<br/>Digital privacy in the marketplace : perspectives on the information exchangeent://SD_ILS/0/SD_ILS:20561852024-05-31T20:22:55Z2024-05-31T20:22:55Zby Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1920895">Click to View</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:21553202024-05-31T20:22:55Z2024-05-31T20:22:55Zby Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192125">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Python forensics : master the art of digital forensics and analysis with Pythonent://SD_ILS/0/SD_ILS:22194612024-05-31T20:22:55Z2024-05-31T20:22:55Zby Spreitzenbarth, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191124">Click to View</a><br/>Format: Electronic Resources<br/>Measuring and managing information risk : a FAIR approachent://SD_ILS/0/SD_ILS:23042452024-05-31T20:22:55Z2024-05-31T20:22:55Zby Freund, Jack, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar">https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124202313/?ar">https://learning.oreilly.com/library/view/~/9780124202313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124202313">https://learning.oreilly.com/library/view/~/9780124202313</a><br/>Format: Electronic Resources<br/>Introduction to information security : LiveLessons (Sneak Peek Video Training)ent://SD_ILS/0/SD_ILS:23063462024-05-31T20:22:55Z2024-05-31T20:22:55Zby Aurnou, Scott, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar">https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134135823/?ar">https://learning.oreilly.com/videos/~/9780134135823/?ar</a><br/>Format: Electronic Resources<br/>Information assurance handbook : effective computer security and risk management strategiesent://SD_ILS/0/SD_ILS:23048752024-05-31T20:22:55Z2024-05-31T20:22:55Zby Schou, Corey.<br/><a href="https://learning.oreilly.com/library/view/~/9780071821650">https://learning.oreilly.com/library/view/~/9780071821650</a>
<a href="https://learning.oreilly.com/library/view/~/9780071821650/?ar">https://learning.oreilly.com/library/view/~/9780071821650/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar">https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar</a><br/>Format: Electronic Resources<br/>Security leader insights for information protection : lessons and strategies from leading security professionalsent://SD_ILS/0/SD_ILS:22074672024-05-31T20:22:55Z2024-05-31T20:22:55Zby Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699254">Click to View</a><br/>Format: Electronic Resources<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:23001802024-05-31T20:22:55Z2024-05-31T20:22:55Zby Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format: Electronic Resources<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:23034122024-05-31T20:22:55Z2024-05-31T20:22:55Zby Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format: Electronic Resources<br/>10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacyent://SD_ILS/0/SD_ILS:23048612024-05-31T20:22:55Z2024-05-31T20:22:55Zby Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format: Electronic Resources<br/>The privacy engineer's manifesto : getting from policy to code to QA to valueent://SD_ILS/0/SD_ILS:23022962024-05-31T20:22:55Z2024-05-31T20:22:55Zby Dennedy, Michelle Finneran.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263555">https://learning.oreilly.com/library/view/~/9781430263555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430263555/?ar">https://learning.oreilly.com/library/view/~/9781430263555/?ar</a><br/>Format: Electronic Resources<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:23134822024-05-31T20:22:55Z2024-05-31T20:22:55Zby Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format: Electronic Resources<br/>Afet durumunda kamuda veri güvenliğient://SD_ILS/0/SD_ILS:4304932024-05-31T20:22:55Z2024-05-31T20:22:55Zby İstanbul İl Özel İdaresi<br/>Format: Books<br/>Pragmatic security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:22979662024-05-31T20:22:55Z2024-05-31T20:22:55Zby Brotby, W. Krag.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881538/?ar">https://learning.oreilly.com/library/view/~/9781439881538/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar</a><br/>Format: Electronic Resources<br/>Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:22966162024-05-31T20:22:55Z2024-05-31T20:22:55Zby Raggo, Michael T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:21298472024-05-31T20:22:55Z2024-05-31T20:22:55Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1153198">Click to View</a><br/>Format: Electronic Resources<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:21549092024-05-31T20:22:55Z2024-05-31T20:22:55Zby Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463579">Click to View</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:21549082024-05-31T20:22:55Z2024-05-31T20:22:55Zby Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463578">Click to View</a><br/>Format: Electronic Resources<br/>The dark side of personalization online privacy concerns influence customer behaviorent://SD_ILS/0/SD_ILS:22379762024-05-31T20:22:55Z2024-05-31T20:22:55Zby Ziesak, Jörg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1324048">Click to View</a><br/>Format: Electronic Resources<br/>Information protection playbookent://SD_ILS/0/SD_ILS:22065832024-05-31T20:22:55Z2024-05-31T20:22:55Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418381">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocolsent://SD_ILS/0/SD_ILS:22060432024-05-31T20:22:55Z2024-05-31T20:22:55Zby Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073014">Click to View</a><br/>Format: Electronic Resources<br/>The PayPal official insider guide to internet security : spot scams and protect your online businessent://SD_ILS/0/SD_ILS:22972592024-05-31T20:22:55Z2024-05-31T20:22:55Zby Savage, Michelle.<br/><a href="https://learning.oreilly.com/library/view/~/9780133154573">https://learning.oreilly.com/library/view/~/9780133154573</a>
<a href="https://learning.oreilly.com/library/view/~/9780133154573/?ar">https://learning.oreilly.com/library/view/~/9780133154573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar">https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar</a><br/>Format: Electronic Resources<br/>Nine steps to success : an ISO27001:2013 implementation overviewent://SD_ILS/0/SD_ILS:23004362024-05-31T20:22:55Z2024-05-31T20:22:55Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117/?ar">https://learning.oreilly.com/library/view/~/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117">https://learning.oreilly.com/library/view/~/9781849285117</a><br/>Format: Electronic Resources<br/>The complete book of data anonymization : from planning to implementationent://SD_ILS/0/SD_ILS:4098302024-05-31T20:22:55Z2024-05-31T20:22:55Zby Raghunathan, Balaji, author.<br/>Format: Books<br/>Getting Started with FortiGate.ent://SD_ILS/0/SD_ILS:12650072024-05-31T20:22:55Z2024-05-31T20:22:55Zby Fabbri, Rosato.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572901">Click to View</a><br/>Format: Electronic Resources<br/>Analyzing computer security : a threat/vulnerability/countermeasure approachent://SD_ILS/0/SD_ILS:22918062024-05-31T20:22:55Z2024-05-31T20:22:55Zby Pfleeger, Charles P., 1948-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar">https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132789493/?ar">https://learning.oreilly.com/library/view/~/9780132789493/?ar</a><br/>Format: Electronic Resources<br/>The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)ent://SD_ILS/0/SD_ILS:22941702024-05-31T20:22:55Z2024-05-31T20:22:55Zby Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format: Electronic Resources<br/>IT Governance : An International Guide to Data Security and ISO27001/ISO27002.ent://SD_ILS/0/SD_ILS:12381642024-05-31T20:22:55Z2024-05-31T20:22:55Zby Calder, Alan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=838114">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security standards, practices and industrial applications systems and methodologiesent://SD_ILS/0/SD_ILS:4763482024-05-31T20:22:55Z2024-05-31T20:22:55Zby Zubairi, Junaid Ahmed, 1961-<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/</a><br/>Format: Electronic Resources<br/>Mobile device security for dummiesent://SD_ILS/0/SD_ILS:22935152024-05-31T20:22:55Z2024-05-31T20:22:55Zby Campagna, Rich R.<br/><a href="https://learning.oreilly.com/library/view/~/9781118093801/?ar">https://learning.oreilly.com/library/view/~/9781118093801/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar">https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar</a><br/>Format: Electronic Resources<br/>The security risk assessment handbook : a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:22916532024-05-31T20:22:55Z2024-05-31T20:22:55Zby Landoll, Douglas J.<br/><a href="https://learning.oreilly.com/library/view/~/9781439821497">https://learning.oreilly.com/library/view/~/9781439821497</a>
<a href="https://learning.oreilly.com/library/view/~/9781439821497/?ar">https://learning.oreilly.com/library/view/~/9781439821497/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar">https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar</a><br/>Format: Electronic Resources<br/>Preventing good people from doing bad things : implementing least privilegeent://SD_ILS/0/SD_ILS:22932782024-05-31T20:22:55Z2024-05-31T20:22:55Zby Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format: Electronic Resources<br/>The chief information security officer : insights, tools and survival skillsent://SD_ILS/0/SD_ILS:22913842024-05-31T20:22:55Z2024-05-31T20:22:55Zby Kouns, Barry.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281966">https://learning.oreilly.com/library/view/~/9781849281966</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281966/?ar">https://learning.oreilly.com/library/view/~/9781849281966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar</a><br/>Format: Electronic Resources<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:22908842024-05-31T20:22:55Z2024-05-31T20:22:55Zby Wallace, Michael, 1960-<br/><a href="https://learning.oreilly.com/library/view/~/9780814416136/?ar">https://learning.oreilly.com/library/view/~/9780814416136/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar">https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar</a><br/>Format: Electronic Resources<br/>Security de-engineering : solving the problems in information risk managementent://SD_ILS/0/SD_ILS:22959952024-05-31T20:22:55Z2024-05-31T20:22:55Zby Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a>
<a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format: Electronic Resources<br/>Surreptitious software : obfuscation, watermarking, and tamperproofing for software protectionent://SD_ILS/0/SD_ILS:22869822024-05-31T20:22:55Z2024-05-31T20:22:55Zby Collberg, Christian.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591258/?ar">https://learning.oreilly.com/library/view/~/9780321591258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar</a><br/>Format: Electronic Resources<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:22612152024-05-31T20:22:55Z2024-05-31T20:22:55Zby Seigneur, Jean-Marc.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format: Electronic Resources<br/>Managing Information Security Breaches : Studies from Real Life.ent://SD_ILS/0/SD_ILS:22906742024-05-31T20:22:55Z2024-05-31T20:22:55Zby Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format: Electronic Resources<br/>The myths of security : what the computer security industry doesn't want you to knowent://SD_ILS/0/SD_ILS:21065612024-05-31T20:22:55Z2024-05-31T20:22:55Zby Viega, John.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821</a><br/>Format: Electronic Resources<br/>How to secure and audit Oracle 10g and 11gent://SD_ILS/0/SD_ILS:22863242024-05-31T20:22:55Z2024-05-31T20:22:55Zby Ben-Natan, Ron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar">https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139/?ar">https://learning.oreilly.com/library/view/~/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139">https://learning.oreilly.com/library/view/~/9781420084139</a><br/>Format: Electronic Resources<br/>Digital rights management for e-commerce systemsent://SD_ILS/0/SD_ILS:22613192024-05-31T20:22:55Z2024-05-31T20:22:55Zby Tsolis, Dimitrios.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6</a><br/>Format: Electronic Resources<br/>Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issuesent://SD_ILS/0/SD_ILS:22619692024-05-31T20:22:55Z2024-05-31T20:22:55Zby Nemati, Hamid R., 1958-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7</a><br/>Format: Electronic Resources<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:22866302024-05-31T20:22:55Z2024-05-31T20:22:55Zby Brotby, W. Krag, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar">https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862/?ar">https://learning.oreilly.com/library/view/~/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862">https://learning.oreilly.com/library/view/~/9781420052862</a><br/>Format: Electronic Resources<br/>Definitive Guide to the C&A Transformation Process : The First Publication of a Comprehensive View of the C&A Transformation.ent://SD_ILS/0/SD_ILS:12161552024-05-31T20:22:55Z2024-05-31T20:22:55Zby Mehan, Julie.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=547041">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise Information Security and Privacy.ent://SD_ILS/0/SD_ILS:12077182024-05-31T20:22:55Z2024-05-31T20:22:55Zby Axelrod, C. Warren.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456886">Click to View</a><br/>Format: Electronic Resources<br/>Advances in Artificial Intelligence for Privacy Protection and Security.ent://SD_ILS/0/SD_ILS:12707052024-05-31T20:22:55Z2024-05-31T20:22:55Zby Solanas, Agusti.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679374">Click to View</a><br/>Format: Electronic Resources<br/>CompTIA Security+ 2008 In Depth.ent://SD_ILS/0/SD_ILS:13048582024-05-31T20:22:55Z2024-05-31T20:22:55Zby Ciampa, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136117">Click to View</a><br/>Format: Electronic Resources<br/>Panoptikon gözün iktidarı =b Panoptikon : vart gjennomsiktige samfunnent://SD_ILS/0/SD_ILS:857412024-05-31T20:22:55Z2024-05-31T20:22:55Zby Apenes, Georg.<br/>Format: Books<br/>Privacy-preserving data mining : models and algorithmsent://SD_ILS/0/SD_ILS:813962024-05-31T20:22:55Z2024-05-31T20:22:55Zby Aggarwal, Charu C.<br/>Format: Books<br/>Information security policy, processes, and practicesent://SD_ILS/0/SD_ILS:2930002024-05-31T20:22:55Z2024-05-31T20:22:55Zby Straub, Detmar W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513</a><br/>Format: Electronic Resources<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:3437392024-05-31T20:22:55Z2024-05-31T20:22:55Zby Clark, Champ, III.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542</a><br/>Format: Electronic Resources<br/>Information Security : Policy, Processes, and Practices.ent://SD_ILS/0/SD_ILS:12053592024-05-31T20:22:55Z2024-05-31T20:22:55Zby Goodman, Seymour.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=435197">Click to View</a><br/>Format: Electronic Resources<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:22852262024-05-31T20:22:55Z2024-05-31T20:22:55Zby Clark, Champ, III.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492249">https://learning.oreilly.com/library/view/~/9781597492249</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492249/?ar">https://learning.oreilly.com/library/view/~/9781597492249/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar</a><br/>Format: Electronic Resources<br/>Security and Usability : Designing Secure Systems that People Can Use.ent://SD_ILS/0/SD_ILS:22886102024-05-31T20:22:55Z2024-05-31T20:22:55Zby Cranor, Lorrie Faith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008279/?ar">https://go.oreilly.com/library-access/library/view/-/0596008279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008279/?ar">https://learning.oreilly.com/library/view/~/0596008279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008279">https://learning.oreilly.com/library/view/~/0596008279</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001 : a pocket guideent://SD_ILS/0/SD_ILS:22889322024-05-31T20:22:55Z2024-05-31T20:22:55Zby Watkins, Steve, 1970-<br/><a href="https://learning.oreilly.com/library/view/~/9781905356683">https://learning.oreilly.com/library/view/~/9781905356683</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356683/?ar">https://learning.oreilly.com/library/view/~/9781905356683/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356683/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356683/?ar</a><br/>Format: Electronic Resources<br/>Mastering System Center Data Protection Manager 2007ent://SD_ILS/0/SD_ILS:22845422024-05-31T20:22:55Z2024-05-31T20:22:55Zby Ganger, Devin L.<br/><a href="https://learning.oreilly.com/library/view/~/9780470181522/?ar">https://learning.oreilly.com/library/view/~/9780470181522/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar">https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470181522">https://learning.oreilly.com/library/view/~/9780470181522</a><br/>Format: Electronic Resources<br/>Deployment guides series. IBM Tivoli Compliance Insight Managerent://SD_ILS/0/SD_ILS:22946672024-05-31T20:22:55Z2024-05-31T20:22:55Zby Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738485705/?ar">https://go.oreilly.com/library-access/library/view/-/0738485705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738485705/?ar">https://learning.oreilly.com/library/view/~/0738485705/?ar</a><br/>Format: Electronic Resources<br/>Managing catastrophic loss of sensitive dataent://SD_ILS/0/SD_ILS:22846902024-05-31T20:22:55Z2024-05-31T20:22:55Zby Photopoulos, Constantine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492393/?ar">https://learning.oreilly.com/library/view/~/9781597492393/?ar</a><br/>Format: Electronic Resources<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:20480172024-05-31T20:22:55Z2024-05-31T20:22:55Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=339307">Click to View</a><br/>Format: Electronic Resources<br/>The shellcoder's handbook : discovering and exploiting security holesent://SD_ILS/0/SD_ILS:22838522024-05-31T20:22:55Z2024-05-31T20:22:55Zby Anley, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780470080238">https://learning.oreilly.com/library/view/~/9780470080238</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar">https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470080238/?ar">https://learning.oreilly.com/library/view/~/9780470080238/?ar</a><br/>Format: Electronic Resources<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:22836392024-05-31T20:22:55Z2024-05-31T20:22:55Zby Taylor, Laura.<br/><a href="https://www.sciencedirect.com/science/book/9781597491167">https://www.sciencedirect.com/science/book/9781597491167</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491167/?ar">https://learning.oreilly.com/library/view/~/9781597491167/?ar</a><br/>Format: Electronic Resources<br/>Managing information assurance in financial servicesent://SD_ILS/0/SD_ILS:22617382024-05-31T20:22:55Z2024-05-31T20:22:55Zby Rao, H. R. (H. Raghav)<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-171-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-171-1</a><br/>Format: Electronic Resources<br/>Advances in enterprise information technology securityent://SD_ILS/0/SD_ILS:22611032024-05-31T20:22:55Z2024-05-31T20:22:55Zby Khadraoui, Djamel.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5</a><br/>Format: Electronic Resources<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:641902024-05-31T20:22:55Z2024-05-31T20:22:55Zby Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Digital Watermarking and Steganography.ent://SD_ILS/0/SD_ILS:11964572024-05-31T20:22:55Z2024-05-31T20:22:55Zby Cox, Ingemar.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328311">Click to View</a><br/>Format: Electronic Resources<br/>Papers from the First European Workshop on Technological & Security Issues in Digital Rights Management (EuDiRights’06).ent://SD_ILS/0/SD_ILS:11917202024-05-31T20:22:55Z2024-05-31T20:22:55Zby Yague, Mariemma.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=291585">Click to View</a><br/>Format: Electronic Resources<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:3417002024-05-31T20:22:55Z2024-05-31T20:22:55Zby Taylor, Laura.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012</a><br/>Format: Electronic Resources<br/>Process for Developing a Common Vocabulary in the Information Security Area.ent://SD_ILS/0/SD_ILS:11959492024-05-31T20:22:55Z2024-05-31T20:22:55Zby Von Knop, J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=320313">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity for SCADA systemsent://SD_ILS/0/SD_ILS:4748392024-05-31T20:22:55Z2024-05-31T20:22:55Zby Shaw, William T.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpCSCADAS2">http://app.knovel.com/web/toc.v/cid:kpCSCADAS2</a><br/>Format: Electronic Resources<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:22819912024-05-31T20:22:55Z2024-05-31T20:22:55Zby Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490481">https://learning.oreilly.com/library/view/~/9781597490481</a>
<a href="https://www.sciencedirect.com/science/book/9781597490481">https://www.sciencedirect.com/science/book/9781597490481</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490481/?ar">https://learning.oreilly.com/library/view/~/9781597490481/?ar</a><br/>Format: Electronic Resources<br/>Privacy protection for e-servicesent://SD_ILS/0/SD_ILS:22618532024-05-31T20:22:55Z2024-05-31T20:22:55Zby Yee, George.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-914-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-914-4</a><br/>Format: Electronic Resources<br/>Information Assurance and Computer Security.ent://SD_ILS/0/SD_ILS:11907422024-05-31T20:22:55Z2024-05-31T20:22:55Zby Thomas, J.P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=287000">Click to View</a><br/>Format: Electronic Resources<br/>Building a global information assurance programent://SD_ILS/0/SD_ILS:23229162024-05-31T20:22:55Z2024-05-31T20:22:55Zby Curts, Raymond J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780203997550/?ar">https://learning.oreilly.com/library/view/~/9780203997550/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar">https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar</a><br/>Format: Electronic Resources<br/>The business case for network security : advocacy, governance, and ROIent://SD_ILS/0/SD_ILS:22816462024-05-31T20:22:55Z2024-05-31T20:22:55Zby Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587201216/?ar">https://go.oreilly.com/library-access/library/view/-/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216/?ar">https://learning.oreilly.com/library/view/~/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216">https://learning.oreilly.com/library/view/~/1587201216</a><br/>Format: Electronic Resources<br/>Data Protection and Information Lifecycle Management.ent://SD_ILS/0/SD_ILS:22904662024-05-31T20:22:55Z2024-05-31T20:22:55Zby Petrocelli, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0131927574/?ar">https://go.oreilly.com/library-access/library/view/-/0131927574/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131927574/?ar">https://learning.oreilly.com/library/view/~/0131927574/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131927574">https://learning.oreilly.com/library/view/~/0131927574</a><br/>Format: Electronic Resources<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:22818232024-05-31T20:22:55Z2024-05-31T20:22:55Zby Kairab, Sudhanshu.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203507230/?ar">https://go.oreilly.com/library-access/library/view/-/9780203507230/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203507230/?ar">https://learning.oreilly.com/library/view/~/9780203507230/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203507230">https://learning.oreilly.com/library/view/~/9780203507230</a><br/>Format: Electronic Resources<br/>Nine steps to success : an ISO 27001 implementation overviewent://SD_ILS/0/SD_ILS:22897432024-05-31T20:22:55Z2024-05-31T20:22:55Zby Calder, Alan, 1957-<br/><a href="https://learning.oreilly.com/library/view/~/9781905356126/?ar">https://learning.oreilly.com/library/view/~/9781905356126/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar</a><br/>Format: Electronic Resources<br/>Implementing database security and auditing a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:656752024-05-31T20:22:55Z2024-05-31T20:22:55Zby Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Black Hat Physical Device Security : Exploiting Hardware and Software.ent://SD_ILS/0/SD_ILS:11825022024-05-31T20:22:55Z2024-05-31T20:22:55Zby Miller, Drew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=222851">Click to View</a><br/>Format: Electronic Resources<br/>Implementing Database Security and Auditing.ent://SD_ILS/0/SD_ILS:11906462024-05-31T20:22:55Z2024-05-31T20:22:55Zby Ben Natan, Ron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=286701">Click to View</a><br/>Format: Electronic Resources<br/>Malicious cryptography : exposing cryptovirologyent://SD_ILS/0/SD_ILS:23102812024-05-31T20:22:55Z2024-05-31T20:22:55Zby Young, Adam, 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar">https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764568466">https://learning.oreilly.com/library/view/~/9780764568466</a>
<a href="https://learning.oreilly.com/library/view/~/9780764568466/?ar">https://learning.oreilly.com/library/view/~/9780764568466/?ar</a><br/>Format: Electronic Resources<br/>The shellcoder's handbook : discovering and exploiting security holesent://SD_ILS/0/SD_ILS:22818332024-05-31T20:22:55Z2024-05-31T20:22:55Zby Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9780764544682">https://learning.oreilly.com/library/view/~/9780764544682</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780764544682/?ar">https://go.oreilly.com/library-access/library/view/-/9780764544682/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764544682/?ar">https://learning.oreilly.com/library/view/~/9780764544682/?ar</a><br/>Format: Electronic Resources<br/>Privacy Protection and Computer Forensics.ent://SD_ILS/0/SD_ILS:11834012024-05-31T20:22:55Z2024-05-31T20:22:55Zby Caloyannides, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227692">Click to View</a><br/>Format: Electronic Resources<br/>Intelligent Watermarking Techniques : Series On Innovative Intelligence.ent://SD_ILS/0/SD_ILS:11836292024-05-31T20:22:55Z2024-05-31T20:22:55Zby Pan, Jeng-Shyang.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=231561">Click to View</a><br/>Format: Electronic Resources<br/>Finding and Fixing Vulnerabilities in Information Systems : The Vulnerability Assessment and Mitigation Methodology.ent://SD_ILS/0/SD_ILS:11810992024-05-31T20:22:55Z2024-05-31T20:22:55Zby Anton, Philip S.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=197482">Click to View</a><br/>Format: Electronic Resources<br/>Protecting Your Library's Digital Sources : The Essential Guide to Planning and Preservation.ent://SD_ILS/0/SD_ILS:11824142024-05-31T20:22:55Z2024-05-31T20:22:55Zby Kahn, Miriam B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=218937">Click to View</a><br/>Format: Electronic Resources<br/>Assessing and Managing Security Risk in IT Systemsent://SD_ILS/0/SD_ILS:23263052024-05-31T20:22:55Z2024-05-31T20:22:55Zby McCumber, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar">https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203490426">https://learning.oreilly.com/library/view/~/9780203490426</a>
<a href="https://learning.oreilly.com/library/view/~/9780203490426/?ar">https://learning.oreilly.com/library/view/~/9780203490426/?ar</a><br/>Format: Electronic Resources<br/>Techniques and Applications of Digital Watermarking and Content Protection : Techniques and Applications.ent://SD_ILS/0/SD_ILS:11832992024-05-31T20:22:55Z2024-05-31T20:22:55Zby Arnold, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227587">Click to View</a><br/>Format: Electronic Resources<br/>Crackproof your software the best ways to protect your software against crackersent://SD_ILS/0/SD_ILS:20476362024-05-31T20:22:55Z2024-05-31T20:22:55Zby C̆ervĕn, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273482">Click to View</a><br/>Format: Electronic Resources<br/>Building an information security awareness programent://SD_ILS/0/SD_ILS:22817822024-05-31T20:22:55Z2024-05-31T20:22:55Zby Desman, Mark B.<br/><a href="https://learning.oreilly.com/library/view/~/9781420000054">https://learning.oreilly.com/library/view/~/9781420000054</a>
<a href="https://learning.oreilly.com/library/view/~/9781420000054/?ar">https://learning.oreilly.com/library/view/~/9781420000054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar">https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar</a><br/>Format: Electronic Resources<br/>Security in Computing, Third Editionent://SD_ILS/0/SD_ILS:23265792024-05-31T20:22:55Z2024-05-31T20:22:55Zby Pfleeger, Charles, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0130355488/?ar">https://go.oreilly.com/library-access/library/view/-/0130355488/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0130355488/?ar">https://learning.oreilly.com/library/view/~/0130355488/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0130355488">https://learning.oreilly.com/library/view/~/0130355488</a><br/>Format: Electronic Resources<br/>Digital watermarkingent://SD_ILS/0/SD_ILS:656542024-05-31T20:22:55Z2024-05-31T20:22:55Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2001094368.html">http://www.loc.gov/catdir/description/els031/2001094368.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2001094368.html">http://www.loc.gov/catdir/toc/els031/2001094368.html</a><br/>Format: Electronic Resources<br/>Backing up Oracle : using Tivoli Storage Managementent://SD_ILS/0/SD_ILS:22813652024-05-31T20:22:55Z2024-05-31T20:22:55Zby Hewgill, Deirdre.<br/><a href="https://learning.oreilly.com/library/view/~/0738421855">https://learning.oreilly.com/library/view/~/0738421855</a>
<a href="https://learning.oreilly.com/library/view/~/0738421855/?ar">https://learning.oreilly.com/library/view/~/0738421855/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738421855/?ar">https://go.oreilly.com/library-access/library/view/-/0738421855/?ar</a><br/>Format: Electronic Resources<br/>Data privacy in the information ageent://SD_ILS/0/SD_ILS:2651402024-05-31T20:22:55Z2024-05-31T20:22:55Zby Klosek, Jacqueline, 1972-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194</a><br/>Format: Electronic Resources<br/>Data Privacy in the Information Age.ent://SD_ILS/0/SD_ILS:11901542024-05-31T20:22:55Z2024-05-31T20:22:55Zby Klosek, Jacqueline.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=282745">Click to View</a><br/>Format: Electronic Resources<br/>Technology and Privacy : The New Landscape.ent://SD_ILS/0/SD_ILS:13158502024-05-31T20:22:55Z2024-05-31T20:22:55Zby Agre, Philip E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3338469">Click to View</a><br/>Format: Electronic Resources<br/>LAN Times guide to security and data integrity= Guide to security and data integrityent://SD_ILS/0/SD_ILS:13162024-05-31T20:22:55Z2024-05-31T20:22:55Zby Farley, Marc.<br/>Format: Books<br/>