Search Results for - Narrowed by: Data protection. - Information technology -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Information$002btechnology$002b--$002bSecurity$002bmeasures.$002509Information$002btechnology$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue?2024-06-23T17:59:28ZTransitioning to quantum-safe cryptography on IBM Zent://SD_ILS/0/SD_ILS:23339332024-06-23T17:59:28Z2024-06-23T17:59:28Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460680">https://learning.oreilly.com/library/view/~/9780738460680</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460680/?ar">https://learning.oreilly.com/library/view/~/9780738460680/?ar</a><br/>Format: Electronic Resources<br/>Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copyent://SD_ILS/0/SD_ILS:23339502024-06-23T17:59:28Z2024-06-23T17:59:28Zby Shingornikar, Shashank, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460710/?ar">https://learning.oreilly.com/library/view/~/9780738460710/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460710">https://learning.oreilly.com/library/view/~/9780738460710</a><br/>Format: Electronic Resources<br/>Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000ent://SD_ILS/0/SD_ILS:23320672024-06-23T17:59:28Z2024-06-23T17:59:28Zby International Business Machines Corporation, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406/?ar">https://learning.oreilly.com/library/view/~/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406">https://learning.oreilly.com/library/view/~/9780738460406</a><br/>Format: Electronic Resources<br/>Secure operations and protectionsent://SD_ILS/0/SD_ILS:23320922024-06-23T17:59:28Z2024-06-23T17:59:28Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format: Video recording<br/>Privileged attack vectors : building effective cyber-defense strategies to protect organizationsent://SD_ILS/0/SD_ILS:23246642024-06-23T17:59:28Z2024-06-23T17:59:28Zby Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146/?ar">https://learning.oreilly.com/library/view/~/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146">https://learning.oreilly.com/library/view/~/9781484259146</a><br/>Format: Electronic Resources<br/>Protecting Data Privacy Beyond the Trusted System of Recordent://SD_ILS/0/SD_ILS:23239182024-06-23T17:59:28Z2024-06-23T17:59:28Zby White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format: Electronic Resources<br/>Privileged attack vectors : building effective cyber-defense strategies to protect organizationsent://SD_ILS/0/SD_ILS:23148702024-06-23T17:59:28Z2024-06-23T17:59:28Zby Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format: Electronic Resources<br/>Investigating the Cyber Breach : the digital forensics guide for the network engineerent://SD_ILS/0/SD_ILS:23153452024-06-23T17:59:28Z2024-06-23T17:59:28Zby Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar">https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134755885/?ar">https://learning.oreilly.com/library/view/~/9780134755885/?ar</a><br/>Format: Electronic Resources<br/>IBM QRadar Version 7.3 : planning and installation guideent://SD_ILS/0/SD_ILS:23154742024-06-23T17:59:28Z2024-06-23T17:59:28Zby Carabaguiaz, Elias, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442877/?ar">https://learning.oreilly.com/library/view/~/9780738442877/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar</a><br/>Format: Electronic Resources<br/>IT-Sicherheitsmanagement - Praxiswissen für IT Security Manager, 2. Auflageent://SD_ILS/0/SD_ILS:23201052024-06-23T17:59:28Z2024-06-23T17:59:28Zby Harich, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9783958452756/?ar">https://learning.oreilly.com/library/view/~/9783958452756/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452756">https://learning.oreilly.com/library/view/~/9783958452756</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar</a><br/>Format: Electronic Resources<br/>The Board's Role in Managing Cybersecurity Risksent://SD_ILS/0/SD_ILS:23207492024-06-23T17:59:28Z2024-06-23T17:59:28Zby Rothrock, Ray, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221/?ar">https://learning.oreilly.com/library/view/~/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221">https://learning.oreilly.com/library/view/~/53863MIT59221</a><br/>Format: Electronic Resources<br/>Take Control of 1Password, 4th Editionent://SD_ILS/0/SD_ILS:23194742024-06-23T17:59:28Z2024-06-23T17:59:28Zby Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format: Electronic Resources<br/>ISO 37001 : an introduction to anti-bribery management systems : doing the right thingsent://SD_ILS/0/SD_ILS:21122852024-06-23T17:59:28Z2024-06-23T17:59:28Zby Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5211339">Click to View</a><br/>Format: Electronic Resources<br/>ISO 37001 : an Introduction to Anti-Bribery Management Systems.ent://SD_ILS/0/SD_ILS:23150202024-06-23T17:59:28Z2024-06-23T17:59:28Zby Field, Alan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559">https://learning.oreilly.com/library/view/~/9781849289559</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559/?ar">https://learning.oreilly.com/library/view/~/9781849289559/?ar</a><br/>Format: Electronic Resources<br/>Distributed Networksent://SD_ILS/0/SD_ILS:23199072024-06-23T17:59:28Z2024-06-23T17:59:28Zby Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format: Electronic Resources<br/>Guide: Reporting on an Entity's Cyberse.ent://SD_ILS/0/SD_ILS:23167562024-06-23T17:59:28Z2024-06-23T17:59:28Zby AICPA Staff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781943546725/?ar">https://learning.oreilly.com/library/view/~/9781943546725/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar">https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781943546725">https://learning.oreilly.com/library/view/~/9781943546725</a><br/>Format: Electronic Resources<br/>Facing cyber threats head on : protecting yourself and your businessent://SD_ILS/0/SD_ILS:22662742024-06-23T17:59:28Z2024-06-23T17:59:28Zby Minick, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4773207">Click to View</a><br/>Format: Electronic Resources<br/>The cloud security ecosystem : technical, legal, business and management issuesent://SD_ILS/0/SD_ILS:23076492024-06-23T17:59:28Z2024-06-23T17:59:28Zby Ko, Ryan, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar">https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128017807/?ar">https://learning.oreilly.com/library/view/~/9780128017807/?ar</a><br/>Format: Electronic Resources<br/>IT-Sicherheit im Unternehmenent://SD_ILS/0/SD_ILS:23083242024-06-23T17:59:28Z2024-06-23T17:59:28Zby Harich, Thomas W., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958451285/?ar">https://learning.oreilly.com/library/view/~/9783958451285/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958451285">https://learning.oreilly.com/library/view/~/9783958451285</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar">https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar</a><br/>Format: Electronic Resources<br/>Data stewardship : an actionable guide to effective data management and data governanceent://SD_ILS/0/SD_ILS:22065792024-06-23T17:59:28Z2024-06-23T17:59:28Zby Plotkin, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418375">Click to View</a><br/>Format: Electronic Resources<br/>Responsive security : be ready to be secureent://SD_ILS/0/SD_ILS:23006432024-06-23T17:59:28Z2024-06-23T17:59:28Zby Kang, Meng-Chow.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584310/?ar">https://learning.oreilly.com/library/view/~/9781466584310/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar</a><br/>Format: Electronic Resources<br/>Total information risk management : maximizing the value of data and information assetsent://SD_ILS/0/SD_ILS:22998982024-06-23T17:59:28Z2024-06-23T17:59:28Zby Borek, Alexander.<br/><a href="https://learning.oreilly.com/library/view/~/9780124055476/?ar">https://learning.oreilly.com/library/view/~/9780124055476/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar">https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar</a><br/>Format: Electronic Resources<br/>Data stewardship : an actionable guide to effective data management and data governanceent://SD_ILS/0/SD_ILS:23014992024-06-23T17:59:28Z2024-06-23T17:59:28Zby Plotkin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780124103894/?ar">https://learning.oreilly.com/library/view/~/9780124103894/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124103894">https://learning.oreilly.com/library/view/~/9780124103894</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar">https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar</a><br/>Format: Electronic Resources<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:23034122024-06-23T17:59:28Z2024-06-23T17:59:28Zby Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format: Electronic Resources<br/>Integrated Security Systems Design, 2nd Editionent://SD_ILS/0/SD_ILS:23209742024-06-23T17:59:28Z2024-06-23T17:59:28Zby Norman, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000229/?ar">https://learning.oreilly.com/library/view/~/9780128000229/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000229">https://learning.oreilly.com/library/view/~/9780128000229</a><br/>Format: Electronic Resources<br/>The Science and Technology of Counterterrorisment://SD_ILS/0/SD_ILS:23199612024-06-23T17:59:28Z2024-06-23T17:59:28Zby Young, Carl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562">https://learning.oreilly.com/library/view/~/9780124200562</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562/?ar">https://learning.oreilly.com/library/view/~/9780124200562/?ar</a><br/>Format: Electronic Resources<br/>Total Information Risk Management : Maximizing the Value of Data and Information Assets.ent://SD_ILS/0/SD_ILS:12620542024-06-23T17:59:28Z2024-06-23T17:59:28Zby Borek, Alexander.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1386476">Click to View</a><br/>Format: Electronic Resources<br/>Surviving the Top Ten Challenges of Software Testing : a People-Oriented Approachent://SD_ILS/0/SD_ILS:23058322024-06-23T17:59:28Z2024-06-23T17:59:28Zby Rice, William E. Perry. Randall W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163">https://learning.oreilly.com/library/view/~/9780133489163</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163/?ar">https://learning.oreilly.com/library/view/~/9780133489163/?ar</a><br/>Format: Electronic Resources<br/>Best Practices for the Formal Software Testing Process : a Menu of Testing Tasksent://SD_ILS/0/SD_ILS:23206912024-06-23T17:59:28Z2024-06-23T17:59:28Zby Drabick, Rodger, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309/?ar">https://learning.oreilly.com/library/view/~/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309">https://learning.oreilly.com/library/view/~/9780133489309</a><br/>Format: Electronic Resources<br/>Strategic Information Management, 3rd Editionent://SD_ILS/0/SD_ILS:23199142024-06-23T17:59:28Z2024-06-23T17:59:28Zby Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format: Electronic Resources<br/>Information Warfare.ent://SD_ILS/0/SD_ILS:12526522024-06-23T17:59:28Z2024-06-23T17:59:28Zby Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106528">Click to View</a><br/>Format: Electronic Resources<br/>Once more unto the breach : managing information security in an uncertain worldent://SD_ILS/0/SD_ILS:22980222024-06-23T17:59:28Z2024-06-23T17:59:28Zby Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format: Electronic Resources<br/>The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)ent://SD_ILS/0/SD_ILS:22941702024-06-23T17:59:28Z2024-06-23T17:59:28Zby Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format: Electronic Resources<br/>Security de-engineering : solving the problems in information risk managementent://SD_ILS/0/SD_ILS:22959952024-06-23T17:59:28Z2024-06-23T17:59:28Zby Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a>
<a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format: Electronic Resources<br/>Auditing cloud computing a security and privacy guideent://SD_ILS/0/SD_ILS:22697722024-06-23T17:59:28Z2024-06-23T17:59:28Zby Halpert, Ben, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=697627">Click to View</a><br/>Format: Electronic Resources<br/>Practical risk management for the CIOent://SD_ILS/0/SD_ILS:22913672024-06-23T17:59:28Z2024-06-23T17:59:28Zby Scherling, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856543/?ar">https://learning.oreilly.com/library/view/~/9781439856543/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856543">https://learning.oreilly.com/library/view/~/9781439856543</a><br/>Format: Electronic Resources<br/>Auditing cloud computing : a security and privacy guideent://SD_ILS/0/SD_ILS:22922552024-06-23T17:59:28Z2024-06-23T17:59:28Zby Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format: Electronic Resources<br/>Network security auditingent://SD_ILS/0/SD_ILS:22894632024-06-23T17:59:28Z2024-06-23T17:59:28Zby Jackson, Chris, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9781587059407">https://learning.oreilly.com/library/view/~/9781587059407</a>
<a href="https://learning.oreilly.com/library/view/~/9781587059407/?ar">https://learning.oreilly.com/library/view/~/9781587059407/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587059407/?ar">https://go.oreilly.com/library-access/library/view/-/9781587059407/?ar</a><br/>Format: Electronic Resources<br/>Advances in Artificial Intelligence for Privacy Protection and Security.ent://SD_ILS/0/SD_ILS:12707052024-06-23T17:59:28Z2024-06-23T17:59:28Zby Solanas, Agusti.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679374">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise Information Security and Privacy.ent://SD_ILS/0/SD_ILS:12077182024-06-23T17:59:28Z2024-06-23T17:59:28Zby Axelrod, C. Warren.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456886">Click to View</a><br/>Format: Electronic Resources<br/>Definitive Guide to the C&A Transformation Process : The First Publication of a Comprehensive View of the C&A Transformation.ent://SD_ILS/0/SD_ILS:12161552024-06-23T17:59:28Z2024-06-23T17:59:28Zby Mehan, Julie.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=547041">Click to View</a><br/>Format: Electronic Resources<br/>Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issuesent://SD_ILS/0/SD_ILS:22619692024-06-23T17:59:28Z2024-06-23T17:59:28Zby Nemati, Hamid R., 1958-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7</a><br/>Format: Electronic Resources<br/>Cyber-security and global information assurance threat analysis and response solutionsent://SD_ILS/0/SD_ILS:22612722024-06-23T17:59:28Z2024-06-23T17:59:28Zby Knapp, Kenneth J.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5</a><br/>Format: Electronic Resources<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:22866302024-06-23T17:59:28Z2024-06-23T17:59:28Zby Brotby, W. Krag, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar">https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862/?ar">https://learning.oreilly.com/library/view/~/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862">https://learning.oreilly.com/library/view/~/9781420052862</a><br/>Format: Electronic Resources<br/>The Prompt Payment Act Answer Bookent://SD_ILS/0/SD_ILS:23152632024-06-23T17:59:28Z2024-06-23T17:59:28Zby Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263336">https://learning.oreilly.com/library/view/~/9781567263336</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263336/?ar">https://learning.oreilly.com/library/view/~/9781567263336/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar</a><br/>Format: Electronic Resources<br/>Microsoftent://SD_ILS/0/SD_ILS:23210692024-06-23T17:59:28Z2024-06-23T17:59:28Zby Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format: Electronic Resources<br/>The Antideficiency Act Answer Bookent://SD_ILS/0/SD_ILS:23152732024-06-23T17:59:28Z2024-06-23T17:59:28Zby Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263343/?ar">https://learning.oreilly.com/library/view/~/9781567263343/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263343">https://learning.oreilly.com/library/view/~/9781567263343</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar</a><br/>Format: Electronic Resources<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:20480172024-06-23T17:59:28Z2024-06-23T17:59:28Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=339307">Click to View</a><br/>Format: Electronic Resources<br/>ISO27001 / ISO27002 : a pocket guide / Alan Calder.ent://SD_ILS/0/SD_ILS:22998172024-06-23T17:59:28Z2024-06-23T17:59:28Zby Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281669/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281669/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285230/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285230/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281669/?ar">https://learning.oreilly.com/library/view/~/9781849281669/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285230/?ar">https://learning.oreilly.com/library/view/~/9781849285230/?ar</a><br/>Format: Electronic Resources<br/>Information security management principles : an ISEB certificateent://SD_ILS/0/SD_ILS:22903002024-06-23T17:59:28Z2024-06-23T17:59:28Zby Taylor, Andy.<br/><a href="https://learning.oreilly.com/library/view/~/9781902505909/?ar">https://learning.oreilly.com/library/view/~/9781902505909/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781902505909/?ar">https://go.oreilly.com/library-access/library/view/-/9781902505909/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781902505909">https://learning.oreilly.com/library/view/~/9781902505909</a><br/>Format: Electronic Resources<br/>Advances in enterprise information technology securityent://SD_ILS/0/SD_ILS:22611032024-06-23T17:59:28Z2024-06-23T17:59:28Zby Khadraoui, Djamel.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5</a><br/>Format: Electronic Resources<br/>Solving the Enigma : History of Cryptanalytic Bombeent://SD_ILS/0/SD_ILS:23107982024-06-23T17:59:28Z2024-06-23T17:59:28Zby Wilcox, Jennifer.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100015SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100015SI/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/01120100015SI">https://learning.oreilly.com/library/view/~/01120100015SI</a>
<a href="https://learning.oreilly.com/library/view/~/01120100015SI/?ar">https://learning.oreilly.com/library/view/~/01120100015SI/?ar</a><br/>Format: Electronic Resources<br/>Mapping security : the corporate security sourcebook for today's global economyent://SD_ILS/0/SD_ILS:23151912024-06-23T17:59:28Z2024-06-23T17:59:28Zby Patterson, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321304527/?ar">https://go.oreilly.com/library-access/library/view/-/0321304527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321304527/?ar">https://learning.oreilly.com/library/view/~/0321304527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321304527">https://learning.oreilly.com/library/view/~/0321304527</a><br/>Format: Electronic Resources<br/>HIGH-TECH CRIMES REVEALED : CYBERWAR STORIES FROM THE DIGITAL FRONTent://SD_ILS/0/SD_ILS:23206882024-06-23T17:59:28Z2024-06-23T17:59:28Zby Branigan, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321218736/?ar">https://go.oreilly.com/library-access/library/view/-/0321218736/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321218736/?ar">https://learning.oreilly.com/library/view/~/0321218736/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321218736">https://learning.oreilly.com/library/view/~/0321218736</a><br/>Format: Electronic Resources<br/>Security + Study Guide and DVD Training Systement://SD_ILS/0/SD_ILS:23205992024-06-23T17:59:28Z2024-06-23T17:59:28Zby Syngress, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836722">https://learning.oreilly.com/library/view/~/9781931836722</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836722/?ar">https://learning.oreilly.com/library/view/~/9781931836722/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar</a><br/>Format: Electronic Resources<br/>Inside the Security Mind : Making the Tough Decisions.ent://SD_ILS/0/SD_ILS:23225652024-06-23T17:59:28Z2024-06-23T17:59:28Zby Day, Kevin, 1975- author.<br/><a href="https://learning.oreilly.com/library/view/~/0131118293/?ar">https://learning.oreilly.com/library/view/~/0131118293/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131118293">https://learning.oreilly.com/library/view/~/0131118293</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131118293/?ar">https://go.oreilly.com/library-access/library/view/-/0131118293/?ar</a><br/>Format: Electronic Resources<br/>Firewalls and Internet Security : Repelling the Wily Hacker, Second Editionent://SD_ILS/0/SD_ILS:23247852024-06-23T17:59:28Z2024-06-23T17:59:28Zby Cheswick, William, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/020163466X/?ar">https://go.oreilly.com/library-access/library/view/-/020163466X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/020163466X/?ar">https://learning.oreilly.com/library/view/~/020163466X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/020163466X">https://learning.oreilly.com/library/view/~/020163466X</a><br/>Format: Electronic Resources<br/>Managing Information Security Risks : the OCTAVESM Approachent://SD_ILS/0/SD_ILS:23215822024-06-23T17:59:28Z2024-06-23T17:59:28Zby Alberts, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/0321118863/?ar">https://learning.oreilly.com/library/view/~/0321118863/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321118863/?ar">https://go.oreilly.com/library-access/library/view/-/0321118863/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321118863">https://learning.oreilly.com/library/view/~/0321118863</a><br/>Format: Electronic Resources<br/>Understanding PKI : Concepts, Standards, and Deployment Considerations, Second Editionent://SD_ILS/0/SD_ILS:23216252024-06-23T17:59:28Z2024-06-23T17:59:28Zby Adams, Carlisle, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672323915/?ar">https://go.oreilly.com/library-access/library/view/-/0672323915/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672323915/?ar">https://learning.oreilly.com/library/view/~/0672323915/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672323915">https://learning.oreilly.com/library/view/~/0672323915</a><br/>Format: Electronic Resources<br/>