Search Results for - Narrowed by: Data protection. - ComputersicherheitSirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Computersicherheit$002509Computersicherheit$0026ps$003d300?2024-05-23T20:59:10ZMobile device security for dummiesent://SD_ILS/0/SD_ILS:22935152024-05-23T20:59:10Z2024-05-23T20:59:10Zby Campagna, Rich R.<br/><a href="https://learning.oreilly.com/library/view/~/9781118093801/?ar">https://learning.oreilly.com/library/view/~/9781118093801/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar">https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar</a><br/>Format: Electronic Resources<br/>The myths of security : what the computer security industry doesn't want you to knowent://SD_ILS/0/SD_ILS:21065612024-05-23T20:59:10Z2024-05-23T20:59:10Zby Viega, John.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821</a><br/>Format: Electronic Resources<br/>The business case for network security : advocacy, governance, and ROIent://SD_ILS/0/SD_ILS:22816462024-05-23T20:59:10Z2024-05-23T20:59:10Zby Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587201216/?ar">https://go.oreilly.com/library-access/library/view/-/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216/?ar">https://learning.oreilly.com/library/view/~/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216">https://learning.oreilly.com/library/view/~/1587201216</a><br/>Format: Electronic Resources<br/>