Search Results for - Narrowed by: Data protection. - Protection de l'information (Informatique) -- Guides, manuels, etc. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Protection$002bde$002bl$002527information$002b$002528Informatique$002529$002b--$002bGuides$00252C$002bmanuels$00252C$002betc.$002509Protection$002bde$002bl$002527information$002b$002528Informatique$002529$002b--$002bGuides$00252C$002bmanuels$00252C$002betc.$0026ps$003d300? 2024-06-19T18:25:44Z The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets ent://SD_ILS/0/SD_ILS:2315032 2024-06-19T18:25:44Z 2024-06-19T18:25:44Z by&#160;Wallace, Michael, 1960- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814438770/?ar">https://learning.oreilly.com/library/view/~/9780814438770/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar">https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information Security Management Handbook, Volume 6, 6th Edition ent://SD_ILS/0/SD_ILS:2323397 2024-06-19T18:25:44Z 2024-06-19T18:25:44Z by&#160;Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a> <a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM ProtecTIER implementation and best practices guide ent://SD_ILS/0/SD_ILS:2310839 2024-06-19T18:25:44Z 2024-06-19T18:25:44Z by&#160;Orlando, Karen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738441696/?ar">https://learning.oreilly.com/library/view/~/9780738441696/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738441696/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441696/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information assurance handbook : effective computer security and risk management strategies ent://SD_ILS/0/SD_ILS:2304875 2024-06-19T18:25:44Z 2024-06-19T18:25:44Z by&#160;Schou, Corey.<br/><a href="https://learning.oreilly.com/library/view/~/9780071821650">https://learning.oreilly.com/library/view/~/9780071821650</a> <a href="https://learning.oreilly.com/library/view/~/9780071821650/?ar">https://learning.oreilly.com/library/view/~/9780071821650/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar">https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM ProtecTIER implementation and best practices guide ent://SD_ILS/0/SD_ILS:2304526 2024-06-19T18:25:44Z 2024-06-19T18:25:44Z by&#160;Orlando, Karen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738440027/?ar">https://go.oreilly.com/library-access/library/view/-/0738440027/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738440027/?ar">https://learning.oreilly.com/library/view/~/0738440027/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security management handbook . Volume 7 ent://SD_ILS/0/SD_ILS:2300299 2024-06-19T18:25:44Z 2024-06-19T18:25:44Z by&#160;O'Hanley, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar">https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466567498">https://learning.oreilly.com/library/view/~/9781466567498</a> <a href="https://learning.oreilly.com/library/view/~/9781466567498/?ar">https://learning.oreilly.com/library/view/~/9781466567498/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security management handbook. Volume 5 ent://SD_ILS/0/SD_ILS:2303124 2024-06-19T18:25:44Z 2024-06-19T18:25:44Z by&#160;Tipton, Harold F.<br/><a href="https://learning.oreilly.com/library/view/~/9781439853467/?ar">https://learning.oreilly.com/library/view/~/9781439853467/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439853467/?ar">https://go.oreilly.com/library-access/library/view/-/9781439853467/?ar</a><br/>Format:&#160;Electronic Resources<br/> The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets ent://SD_ILS/0/SD_ILS:2290884 2024-06-19T18:25:44Z 2024-06-19T18:25:44Z by&#160;Wallace, Michael, 1960-<br/><a href="https://learning.oreilly.com/library/view/~/9780814416136/?ar">https://learning.oreilly.com/library/view/~/9780814416136/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar">https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar</a><br/>Format:&#160;Electronic Resources<br/>