Search Results for - Narrowed by: Data protection. - Information technology -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Information$002btechnology$002b--$002bSecurity$002bmeasures.$002509Information$002btechnology$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue? 2024-06-23T17:59:28Z Transitioning to quantum-safe cryptography on IBM Z ent://SD_ILS/0/SD_ILS:2333933 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460680">https://learning.oreilly.com/library/view/~/9780738460680</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460680/?ar">https://learning.oreilly.com/library/view/~/9780738460680/?ar</a><br/>Format:&#160;Electronic Resources<br/> Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy ent://SD_ILS/0/SD_ILS:2333950 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Shingornikar, Shashank, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460710/?ar">https://learning.oreilly.com/library/view/~/9780738460710/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460710">https://learning.oreilly.com/library/view/~/9780738460710</a><br/>Format:&#160;Electronic Resources<br/> Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000 ent://SD_ILS/0/SD_ILS:2332067 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;International Business Machines Corporation, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460406/?ar">https://learning.oreilly.com/library/view/~/9780738460406/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460406">https://learning.oreilly.com/library/view/~/9780738460406</a><br/>Format:&#160;Electronic Resources<br/> Secure operations and protections ent://SD_ILS/0/SD_ILS:2332092 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format:&#160;Video recording<br/> Privileged attack vectors : building effective cyber-defense strategies to protect organizations ent://SD_ILS/0/SD_ILS:2324664 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484259146/?ar">https://learning.oreilly.com/library/view/~/9781484259146/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484259146">https://learning.oreilly.com/library/view/~/9781484259146</a><br/>Format:&#160;Electronic Resources<br/> Protecting Data Privacy Beyond the Trusted System of Record ent://SD_ILS/0/SD_ILS:2323918 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a> <a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privileged attack vectors : building effective cyber-defense strategies to protect organizations ent://SD_ILS/0/SD_ILS:2314870 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format:&#160;Electronic Resources<br/> Investigating the Cyber Breach : the digital forensics guide for the network engineer ent://SD_ILS/0/SD_ILS:2315345 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar">https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134755885/?ar">https://learning.oreilly.com/library/view/~/9780134755885/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM QRadar Version 7.3 : planning and installation guide ent://SD_ILS/0/SD_ILS:2315474 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Carabaguiaz, Elias, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442877/?ar">https://learning.oreilly.com/library/view/~/9780738442877/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheitsmanagement - Praxiswissen f&uuml;r IT Security Manager, 2. Auflage ent://SD_ILS/0/SD_ILS:2320105 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Harich, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9783958452756/?ar">https://learning.oreilly.com/library/view/~/9783958452756/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958452756">https://learning.oreilly.com/library/view/~/9783958452756</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Board's Role in Managing Cybersecurity Risks ent://SD_ILS/0/SD_ILS:2320749 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Rothrock, Ray, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT59221/?ar">https://learning.oreilly.com/library/view/~/53863MIT59221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT59221">https://learning.oreilly.com/library/view/~/53863MIT59221</a><br/>Format:&#160;Electronic Resources<br/> Take Control of 1Password, 4th Edition ent://SD_ILS/0/SD_ILS:2319474 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format:&#160;Electronic Resources<br/> ISO 37001 : an introduction to anti-bribery management systems : doing the right things ent://SD_ILS/0/SD_ILS:2112285 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5211339">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ISO 37001 : an Introduction to Anti-Bribery Management Systems. ent://SD_ILS/0/SD_ILS:2315020 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Field, Alan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849289559">https://learning.oreilly.com/library/view/~/9781849289559</a> <a href="https://learning.oreilly.com/library/view/~/9781849289559/?ar">https://learning.oreilly.com/library/view/~/9781849289559/?ar</a><br/>Format:&#160;Electronic Resources<br/> Distributed Networks ent://SD_ILS/0/SD_ILS:2319907 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format:&#160;Electronic Resources<br/> Guide: Reporting on an Entity's Cyberse. ent://SD_ILS/0/SD_ILS:2316756 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;AICPA Staff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781943546725/?ar">https://learning.oreilly.com/library/view/~/9781943546725/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar">https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781943546725">https://learning.oreilly.com/library/view/~/9781943546725</a><br/>Format:&#160;Electronic Resources<br/> Facing cyber threats head on : protecting yourself and your business ent://SD_ILS/0/SD_ILS:2266274 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Minick, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4773207">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The cloud security ecosystem : technical, legal, business and management issues ent://SD_ILS/0/SD_ILS:2307649 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Ko, Ryan, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar">https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128017807/?ar">https://learning.oreilly.com/library/view/~/9780128017807/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheit im Unternehmen ent://SD_ILS/0/SD_ILS:2308324 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Harich, Thomas W., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958451285/?ar">https://learning.oreilly.com/library/view/~/9783958451285/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958451285">https://learning.oreilly.com/library/view/~/9783958451285</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar">https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data stewardship : an actionable guide to effective data management and data governance ent://SD_ILS/0/SD_ILS:2206579 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Plotkin, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418375">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Responsive security : be ready to be secure ent://SD_ILS/0/SD_ILS:2300643 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Kang, Meng-Chow.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584310/?ar">https://learning.oreilly.com/library/view/~/9781466584310/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar</a><br/>Format:&#160;Electronic Resources<br/> Total information risk management : maximizing the value of data and information assets ent://SD_ILS/0/SD_ILS:2299898 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Borek, Alexander.<br/><a href="https://learning.oreilly.com/library/view/~/9780124055476/?ar">https://learning.oreilly.com/library/view/~/9780124055476/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar">https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data stewardship : an actionable guide to effective data management and data governance ent://SD_ILS/0/SD_ILS:2301499 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Plotkin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780124103894/?ar">https://learning.oreilly.com/library/view/~/9780124103894/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124103894">https://learning.oreilly.com/library/view/~/9780124103894</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar">https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security : principles and practices ent://SD_ILS/0/SD_ILS:2303412 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated Security Systems Design, 2nd Edition ent://SD_ILS/0/SD_ILS:2320974 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Norman, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000229/?ar">https://learning.oreilly.com/library/view/~/9780128000229/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000229">https://learning.oreilly.com/library/view/~/9780128000229</a><br/>Format:&#160;Electronic Resources<br/> The Science and Technology of Counterterrorism ent://SD_ILS/0/SD_ILS:2319961 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Young, Carl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124200562">https://learning.oreilly.com/library/view/~/9780124200562</a> <a href="https://learning.oreilly.com/library/view/~/9780124200562/?ar">https://learning.oreilly.com/library/view/~/9780124200562/?ar</a><br/>Format:&#160;Electronic Resources<br/> Total Information Risk Management : Maximizing the Value of Data and Information Assets. ent://SD_ILS/0/SD_ILS:1262054 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Borek, Alexander.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1386476">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Surviving the Top Ten Challenges of Software Testing : a People-Oriented Approach ent://SD_ILS/0/SD_ILS:2305832 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Rice, William E. Perry. Randall W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133489163">https://learning.oreilly.com/library/view/~/9780133489163</a> <a href="https://learning.oreilly.com/library/view/~/9780133489163/?ar">https://learning.oreilly.com/library/view/~/9780133489163/?ar</a><br/>Format:&#160;Electronic Resources<br/> Best Practices for the Formal Software Testing Process : a Menu of Testing Tasks ent://SD_ILS/0/SD_ILS:2320691 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Drabick, Rodger, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133489309/?ar">https://learning.oreilly.com/library/view/~/9780133489309/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133489309">https://learning.oreilly.com/library/view/~/9780133489309</a><br/>Format:&#160;Electronic Resources<br/> Strategic Information Management, 3rd Edition ent://SD_ILS/0/SD_ILS:2319914 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format:&#160;Electronic Resources<br/> Information Warfare. ent://SD_ILS/0/SD_ILS:1252652 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106528">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Once more unto the breach : managing information security in an uncertain world ent://SD_ILS/0/SD_ILS:2298022 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a> <a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format:&#160;Electronic Resources<br/> The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) ent://SD_ILS/0/SD_ILS:2294170 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format:&#160;Electronic Resources<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:2295995 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a> <a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format:&#160;Electronic Resources<br/> Auditing cloud computing a security and privacy guide ent://SD_ILS/0/SD_ILS:2269772 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Halpert, Ben, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=697627">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical risk management for the CIO ent://SD_ILS/0/SD_ILS:2291367 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Scherling, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439856543/?ar">https://learning.oreilly.com/library/view/~/9781439856543/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439856543">https://learning.oreilly.com/library/view/~/9781439856543</a><br/>Format:&#160;Electronic Resources<br/> Auditing cloud computing : a security and privacy guide ent://SD_ILS/0/SD_ILS:2292255 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format:&#160;Electronic Resources<br/> Network security auditing ent://SD_ILS/0/SD_ILS:2289463 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Jackson, Chris, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9781587059407">https://learning.oreilly.com/library/view/~/9781587059407</a> <a href="https://learning.oreilly.com/library/view/~/9781587059407/?ar">https://learning.oreilly.com/library/view/~/9781587059407/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587059407/?ar">https://go.oreilly.com/library-access/library/view/-/9781587059407/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advances in Artificial Intelligence for Privacy Protection and Security. ent://SD_ILS/0/SD_ILS:1270705 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Solanas, Agusti.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679374">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Information Security and Privacy. ent://SD_ILS/0/SD_ILS:1207718 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Axelrod, C. Warren.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456886">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Definitive Guide to the C&amp;A Transformation Process : The First Publication of a Comprehensive View of the C&amp;A Transformation. ent://SD_ILS/0/SD_ILS:1216155 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Mehan, Julie.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=547041">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issues ent://SD_ILS/0/SD_ILS:2261969 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Nemati, Hamid R., 1958-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7</a><br/>Format:&#160;Electronic Resources<br/> Cyber-security and global information assurance threat analysis and response solutions ent://SD_ILS/0/SD_ILS:2261272 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Knapp, Kenneth J.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5</a><br/>Format:&#160;Electronic Resources<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:2286630 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Brotby, W. Krag, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar">https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420052862/?ar">https://learning.oreilly.com/library/view/~/9781420052862/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420052862">https://learning.oreilly.com/library/view/~/9781420052862</a><br/>Format:&#160;Electronic Resources<br/> The Prompt Payment Act Answer Book ent://SD_ILS/0/SD_ILS:2315263 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263336">https://learning.oreilly.com/library/view/~/9781567263336</a> <a href="https://learning.oreilly.com/library/view/~/9781567263336/?ar">https://learning.oreilly.com/library/view/~/9781567263336/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft ent://SD_ILS/0/SD_ILS:2321069 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Antideficiency Act Answer Book ent://SD_ILS/0/SD_ILS:2315273 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263343/?ar">https://learning.oreilly.com/library/view/~/9781567263343/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781567263343">https://learning.oreilly.com/library/view/~/9781567263343</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:2048017 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 / ISO27002 : a pocket guide / Alan Calder. ent://SD_ILS/0/SD_ILS:2299817 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281669/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281669/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285230/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285230/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281669/?ar">https://learning.oreilly.com/library/view/~/9781849281669/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285230/?ar">https://learning.oreilly.com/library/view/~/9781849285230/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security management principles : an ISEB certificate ent://SD_ILS/0/SD_ILS:2290300 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Taylor, Andy.<br/><a href="https://learning.oreilly.com/library/view/~/9781902505909/?ar">https://learning.oreilly.com/library/view/~/9781902505909/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781902505909/?ar">https://go.oreilly.com/library-access/library/view/-/9781902505909/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781902505909">https://learning.oreilly.com/library/view/~/9781902505909</a><br/>Format:&#160;Electronic Resources<br/> Advances in enterprise information technology security ent://SD_ILS/0/SD_ILS:2261103 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Khadraoui, Djamel.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5</a><br/>Format:&#160;Electronic Resources<br/> Solving the Enigma : History of Cryptanalytic Bombe ent://SD_ILS/0/SD_ILS:2310798 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Wilcox, Jennifer.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100015SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100015SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100015SI">https://learning.oreilly.com/library/view/~/01120100015SI</a> <a href="https://learning.oreilly.com/library/view/~/01120100015SI/?ar">https://learning.oreilly.com/library/view/~/01120100015SI/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mapping security : the corporate security sourcebook for today's global economy ent://SD_ILS/0/SD_ILS:2315191 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Patterson, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321304527/?ar">https://go.oreilly.com/library-access/library/view/-/0321304527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321304527/?ar">https://learning.oreilly.com/library/view/~/0321304527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321304527">https://learning.oreilly.com/library/view/~/0321304527</a><br/>Format:&#160;Electronic Resources<br/> HIGH-TECH CRIMES REVEALED : CYBERWAR STORIES FROM THE DIGITAL FRONT ent://SD_ILS/0/SD_ILS:2320688 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Branigan, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321218736/?ar">https://go.oreilly.com/library-access/library/view/-/0321218736/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321218736/?ar">https://learning.oreilly.com/library/view/~/0321218736/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321218736">https://learning.oreilly.com/library/view/~/0321218736</a><br/>Format:&#160;Electronic Resources<br/> Security + Study Guide and DVD Training System ent://SD_ILS/0/SD_ILS:2320599 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Syngress, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836722">https://learning.oreilly.com/library/view/~/9781931836722</a> <a href="https://learning.oreilly.com/library/view/~/9781931836722/?ar">https://learning.oreilly.com/library/view/~/9781931836722/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar</a><br/>Format:&#160;Electronic Resources<br/> Inside the Security Mind : Making the Tough Decisions. ent://SD_ILS/0/SD_ILS:2322565 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Day, Kevin, 1975- author.<br/><a href="https://learning.oreilly.com/library/view/~/0131118293/?ar">https://learning.oreilly.com/library/view/~/0131118293/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131118293">https://learning.oreilly.com/library/view/~/0131118293</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131118293/?ar">https://go.oreilly.com/library-access/library/view/-/0131118293/?ar</a><br/>Format:&#160;Electronic Resources<br/> Firewalls and Internet Security : Repelling the Wily Hacker, Second Edition ent://SD_ILS/0/SD_ILS:2324785 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Cheswick, William, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/020163466X/?ar">https://go.oreilly.com/library-access/library/view/-/020163466X/?ar</a> <a href="https://learning.oreilly.com/library/view/~/020163466X/?ar">https://learning.oreilly.com/library/view/~/020163466X/?ar</a> <a href="https://learning.oreilly.com/library/view/~/020163466X">https://learning.oreilly.com/library/view/~/020163466X</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security Risks : the OCTAVESM Approach ent://SD_ILS/0/SD_ILS:2321582 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Alberts, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/0321118863/?ar">https://learning.oreilly.com/library/view/~/0321118863/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321118863/?ar">https://go.oreilly.com/library-access/library/view/-/0321118863/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321118863">https://learning.oreilly.com/library/view/~/0321118863</a><br/>Format:&#160;Electronic Resources<br/> Understanding PKI : Concepts, Standards, and Deployment Considerations, Second Edition ent://SD_ILS/0/SD_ILS:2321625 2024-06-23T17:59:28Z 2024-06-23T17:59:28Z by&#160;Adams, Carlisle, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672323915/?ar">https://go.oreilly.com/library-access/library/view/-/0672323915/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672323915/?ar">https://learning.oreilly.com/library/view/~/0672323915/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672323915">https://learning.oreilly.com/library/view/~/0672323915</a><br/>Format:&#160;Electronic Resources<br/>