Search Results for - Narrowed by: Data protection. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue? 2024-05-25T02:03:58Z Learning digital identity : design, deploy, and manage identity architectures ent://SD_ILS/0/SD_ILS:2334739 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Windley, Phillip J., 1958- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098117689/?ar">https://learning.oreilly.com/library/view/~/9781098117689/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098117689">https://learning.oreilly.com/library/view/~/9781098117689</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar">https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data governance ent://SD_ILS/0/SD_ILS:2335201 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Reichental, Jonathan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119906773/?ar">https://go.oreilly.com/library-access/library/view/-/9781119906773/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119906773">https://learning.oreilly.com/library/view/~/9781119906773</a> <a href="https://learning.oreilly.com/library/view/~/9781119906773/?ar">https://learning.oreilly.com/library/view/~/9781119906773/?ar</a><br/>Format:&#160;Electronic Resources<br/> Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy ent://SD_ILS/0/SD_ILS:2333950 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Shingornikar, Shashank, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460710/?ar">https://learning.oreilly.com/library/view/~/9780738460710/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460710">https://learning.oreilly.com/library/view/~/9780738460710</a><br/>Format:&#160;Electronic Resources<br/> Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict ent://SD_ILS/0/SD_ILS:2334696 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Borges, Dan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812818/?ar">https://learning.oreilly.com/library/view/~/9781801812818/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812818">https://learning.oreilly.com/library/view/~/9781801812818</a><br/>Format:&#160;Sound recording<br/> Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000 ent://SD_ILS/0/SD_ILS:2332067 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;International Business Machines Corporation, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460406/?ar">https://learning.oreilly.com/library/view/~/9780738460406/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460406">https://learning.oreilly.com/library/view/~/9780738460406</a><br/>Format:&#160;Electronic Resources<br/> Mastering cyber intelligence : gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense ent://SD_ILS/0/SD_ILS:2332668 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Dahj, Jean Nestor M.<br/><a href="https://learning.oreilly.com/library/view/~/9781800209404">https://learning.oreilly.com/library/view/~/9781800209404</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar">https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800209404/?ar">https://learning.oreilly.com/library/view/~/9781800209404/?ar</a><br/>Format:&#160;Electronic Resources<br/> System and privacy data protection. ent://SD_ILS/0/SD_ILS:2331777 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a> <a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format:&#160;Video recording<br/> Transitioning to quantum-safe cryptography on IBM Z ent://SD_ILS/0/SD_ILS:2333933 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460680">https://learning.oreilly.com/library/view/~/9780738460680</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460680/?ar">https://learning.oreilly.com/library/view/~/9780738460680/?ar</a><br/>Format:&#160;Electronic Resources<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:2333211 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Moyo, Siegfried, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119863113">https://learning.oreilly.com/library/view/~/9781119863113</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar">https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119863113/?ar">https://learning.oreilly.com/library/view/~/9781119863113/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking artificial intelligence : a leader's guide from deepfakes to breaking deep learning ent://SD_ILS/0/SD_ILS:2332912 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Gibian, Davey, 1988- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663719379/?ar">https://go.oreilly.com/library-access/library/view/-/9781663719379/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781663719379">https://learning.oreilly.com/library/view/~/9781663719379</a> <a href="https://learning.oreilly.com/library/view/~/9781663719379/?ar">https://learning.oreilly.com/library/view/~/9781663719379/?ar</a><br/>Format:&#160;Sound recording<br/> ASP.NET Core Security ent://SD_ILS/0/SD_ILS:2333962 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Wenz, Christian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781633439986/?ar">https://learning.oreilly.com/library/view/~/9781633439986/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781633439986">https://learning.oreilly.com/library/view/~/9781633439986</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781633439986/?ar">https://go.oreilly.com/library-access/library/view/-/9781633439986/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy : a Runbook for Engineers. ent://SD_ILS/0/SD_ILS:2331650 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Bhajaria, Nishant.<br/><a href="https://learning.oreilly.com/library/view/~/9781617298998/?ar">https://learning.oreilly.com/library/view/~/9781617298998/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781617298998/?ar">https://go.oreilly.com/library-access/library/view/-/9781617298998/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617298998">https://learning.oreilly.com/library/view/~/9781617298998</a><br/>Format:&#160;Electronic Resources<br/> Digital Earth : cyber threats, privacy and ethics in an age of paranoia ent://SD_ILS/0/SD_ILS:2332896 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Katz, Sarah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783614">https://learning.oreilly.com/library/view/~/9781787783614</a> <a href="https://learning.oreilly.com/library/view/~/9781787783614/?ar">https://learning.oreilly.com/library/view/~/9781787783614/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar</a><br/>Format:&#160;Electronic Resources<br/> Pro Google cloud automation : with Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins ent://SD_ILS/0/SD_ILS:2327509 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Sabharwal, Navin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265734/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265734/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484265734/?ar">https://learning.oreilly.com/library/view/~/9781484265734/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484265734">https://learning.oreilly.com/library/view/~/9781484265734</a><br/>Format:&#160;Electronic Resources<br/> Mastering Active Directory - Third Edition ent://SD_ILS/0/SD_ILS:2331105 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format:&#160;Electronic Resources<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:2327053 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Moschovitis, Christos J. P., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119658740">https://learning.oreilly.com/library/view/~/9781119658740</a> <a href="https://learning.oreilly.com/library/view/~/9781119658740/?ar">https://learning.oreilly.com/library/view/~/9781119658740/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar">https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisions ent://SD_ILS/0/SD_ILS:2328485 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Moore, Richard O., III, 1971- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469082707">https://learning.oreilly.com/library/view/~/9781469082707</a> <a href="https://learning.oreilly.com/library/view/~/9781469082707/?ar">https://learning.oreilly.com/library/view/~/9781469082707/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781469082707/?ar">https://go.oreilly.com/library-access/library/view/-/9781469082707/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure operations and protections ent://SD_ILS/0/SD_ILS:2332092 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format:&#160;Video recording<br/> Google xi tong jia gou jie mi : gou jian an quan ke kao de xi tong = Building secure and reliable systems ent://SD_ILS/0/SD_ILS:2332928 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Adkins, Heather, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar">https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9787115569257/?ar">https://learning.oreilly.com/library/view/~/9787115569257/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9787115569257">https://learning.oreilly.com/library/view/~/9787115569257</a><br/>Format:&#160;Electronic Resources<br/> Big breaches : cybersecurity lessons for everyone ent://SD_ILS/0/SD_ILS:2328126 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Daswani, Neil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484266557">https://learning.oreilly.com/library/view/~/9781484266557</a> <a href="https://learning.oreilly.com/library/view/~/9781484266557/?ar">https://learning.oreilly.com/library/view/~/9781484266557/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar">https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar</a><br/>Format:&#160;Electronic Resources<br/> Self-sovereign identity : decentralized digital identity and verifiable credentials ent://SD_ILS/0/SD_ILS:2330270 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format:&#160;Electronic Resources<br/> Advanced API Security : OAuth 2. 0 and Beyond ent://SD_ILS/0/SD_ILS:2322734 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Siriwardena, Prabath.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484220504">https://learning.oreilly.com/library/view/~/9781484220504</a> <a href="https://learning.oreilly.com/library/view/~/9781484220504/?ar">https://learning.oreilly.com/library/view/~/9781484220504/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Complete 2020 Ethereum and Solidity Developer Bootcamp ent://SD_ILS/0/SD_ILS:2323478 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Wiesner, Thomas, author.<br/><a href="https://learning.oreilly.com/videos/~/9781800201019/?ar">https://learning.oreilly.com/videos/~/9781800201019/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar">https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781800201019">https://learning.oreilly.com/videos/~/9781800201019</a><br/>Format:&#160;Electronic Resources<br/> Data privacy and GDPR handbook ent://SD_ILS/0/SD_ILS:2322558 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Sharma, Sanjay (Financial executive), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119594246">https://learning.oreilly.com/library/view/~/9781119594246</a> <a href="https://learning.oreilly.com/library/view/~/9781119594246/?ar">https://learning.oreilly.com/library/view/~/9781119594246/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar">https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data privacy and GDPR handbook ent://SD_ILS/0/SD_ILS:2273935 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Sharma, Sanjay, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986738">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud ent://SD_ILS/0/SD_ILS:2326395 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Calles, Miguel A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484261002/?ar">https://learning.oreilly.com/library/view/~/9781484261002/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484261002">https://learning.oreilly.com/library/view/~/9781484261002</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Security, 2nd Edition ent://SD_ILS/0/SD_ILS:2331101 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a> <a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format:&#160;Electronic Resources<br/> Encryption for organizations and individuals : basics of contemporary and quantum cryptography ent://SD_ILS/0/SD_ILS:2325463 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Ciesla, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260562">https://learning.oreilly.com/library/view/~/9781484260562</a> <a href="https://learning.oreilly.com/library/view/~/9781484260562/?ar">https://learning.oreilly.com/library/view/~/9781484260562/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar</a><br/>Format:&#160;Electronic Resources<br/> Exposed : how revealing your data and eliminating privacy increases trust and liberates humanity ent://SD_ILS/0/SD_ILS:2326413 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a> <a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privileged attack vectors : building effective cyber-defense strategies to protect organizations ent://SD_ILS/0/SD_ILS:2324664 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484259146/?ar">https://learning.oreilly.com/library/view/~/9781484259146/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484259146">https://learning.oreilly.com/library/view/~/9781484259146</a><br/>Format:&#160;Electronic Resources<br/> Building secure firmware : armoring the foundation of the platform ent://SD_ILS/0/SD_ILS:2326020 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Yao, Jiewen.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261064">https://learning.oreilly.com/library/view/~/9781484261064</a> <a href="https://learning.oreilly.com/library/view/~/9781484261064/?ar">https://learning.oreilly.com/library/view/~/9781484261064/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced ASP.NET Core 3 Security : understanding hacks, attacks, and vulnerabilities to secure your website ent://SD_ILS/0/SD_ILS:2326424 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Norberg, Scott, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260142/?ar">https://learning.oreilly.com/library/view/~/9781484260142/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484260142">https://learning.oreilly.com/library/view/~/9781484260142</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484260142/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260142/?ar</a><br/>Format:&#160;Electronic Resources<br/> Protecting Data Privacy Beyond the Trusted System of Record ent://SD_ILS/0/SD_ILS:2323918 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a> <a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for industrial scada systems ent://SD_ILS/0/SD_ILS:2351400 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Shaw, William T., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6468131">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering Active Directory - Second Edition ent://SD_ILS/0/SD_ILS:2323979 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789800203/?ar">https://learning.oreilly.com/library/view/~/9781789800203/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar">https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789800203">https://learning.oreilly.com/library/view/~/9781789800203</a><br/>Format:&#160;Electronic Resources<br/> Managing SQL Server encryption certificates : getting started with SQL Server encryption ent://SD_ILS/0/SD_ILS:2321359 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Blinn, Eric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484251515/?ar">https://learning.oreilly.com/videos/~/9781484251515/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484251515/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251515/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Enterprise Mobility and Security training ent://SD_ILS/0/SD_ILS:2319556 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format:&#160;Electronic Resources<br/> Modern defense in depth : an integrated approach to better web application security ent://SD_ILS/0/SD_ILS:2319873 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Gates, Stephen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492050360/?ar">https://learning.oreilly.com/library/view/~/9781492050360/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492050360">https://learning.oreilly.com/library/view/~/9781492050360</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar">https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital identities in tension : between autonomy and control ent://SD_ILS/0/SD_ILS:2273509 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Khatchatourov, Armen, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5785310">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Il nuovo codice in materia di protezione dei dati personali : la normativa italiana dopo il d.lgs. n. 101/2018 ent://SD_ILS/0/SD_ILS:2268494 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Scagliarini, Simone, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5971279">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Take Control of Your Online Privacy, 4th Edition ent://SD_ILS/0/SD_ILS:2321070 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Kissell, Joe.<br/><a href="https://learning.oreilly.com/library/view/~/9781947282377">https://learning.oreilly.com/library/view/~/9781947282377</a> <a href="https://learning.oreilly.com/library/view/~/9781947282377/?ar">https://learning.oreilly.com/library/view/~/9781947282377/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781947282377/?ar">https://go.oreilly.com/library-access/library/view/-/9781947282377/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to build privacy and security into deep learning models ent://SD_ILS/0/SD_ILS:2322791 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format:&#160;Electronic Resources<br/> How digital trust drives culture change : privacy is a right, not a privilege : but organizations and leadership often struggle with it comes to adapting their culture toward digital trust and stewardship ent://SD_ILS/0/SD_ILS:2320855 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Abraham, Chon, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT60430/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT60430/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT60430/?ar">https://learning.oreilly.com/library/view/~/53863MIT60430/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT60430">https://learning.oreilly.com/library/view/~/53863MIT60430</a><br/>Format:&#160;Electronic Resources<br/> How to choose the right digital leader for your company : Striking the right competence-credibility balance for digital leaders depends largely on how the role of the CDO is defined in a particular company ent://SD_ILS/0/SD_ILS:2321277 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Wade, Michael R., author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT60442/?ar">https://learning.oreilly.com/library/view/~/53863MIT60442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT60442">https://learning.oreilly.com/library/view/~/53863MIT60442</a> <a href="https://go.oreilly.com/library-access/library/view/-/53863MIT60442/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT60442/?ar</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:2321452 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format:&#160;Electronic Resources<br/> Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments ent://SD_ILS/0/SD_ILS:2322055 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format:&#160;Electronic Resources<br/> Karma-based API on Apple platforms : building privacy into iOS and macOS apps ent://SD_ILS/0/SD_ILS:2322061 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Carrasco Molina, Manuel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242919/?ar">https://learning.oreilly.com/library/view/~/9781484242919/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484242919/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242919/?ar</a><br/>Format:&#160;Electronic Resources<br/> ISO22301 : a Pocket Guide ent://SD_ILS/0/SD_ILS:2325278 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Drewitt, Tony, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781016/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781016/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787781016/?ar">https://learning.oreilly.com/library/view/~/9781787781016/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787781016">https://learning.oreilly.com/library/view/~/9781787781016</a><br/>Format:&#160;Electronic Resources<br/> GDPR For Dummies ent://SD_ILS/0/SD_ILS:2327235 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Dibble, Suzanne, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119546092/?ar">https://learning.oreilly.com/library/view/~/9781119546092/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119546092/?ar">https://go.oreilly.com/library-access/library/view/-/9781119546092/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119546092">https://learning.oreilly.com/library/view/~/9781119546092</a><br/>Format:&#160;Electronic Resources<br/> Cyber-Physical Systems Security ent://SD_ILS/0/SD_ILS:2084352 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98935-8">https://doi.org/10.1007/978-3-319-98935-8</a><br/>Format:&#160;Electronic Resources<br/> Honeypot Frameworks and Their Applications: A New Framework ent://SD_ILS/0/SD_ILS:2084144 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Enhancing Fog Computing and Its Applications ent://SD_ILS/0/SD_ILS:2084063 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-02113-9">https://doi.org/10.1007/978-3-030-02113-9</a><br/>Format:&#160;Electronic Resources<br/> Edge Computing: A Primer ent://SD_ILS/0/SD_ILS:2084072 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Cao, Jie. author.<br/><a href="https://doi.org/10.1007/978-3-030-02083-5">https://doi.org/10.1007/978-3-030-02083-5</a><br/>Format:&#160;Electronic Resources<br/> Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:2084340 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084401 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format:&#160;Electronic Resources<br/> Advanced Monitoring in P2P Botnets A Dual Perspective ent://SD_ILS/0/SD_ILS:2084473 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Karuppayah, Shankar. author.<br/><a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Smart Grid ent://SD_ILS/0/SD_ILS:2084158 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Abdallah, Asmaa. author.<br/><a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28&ndash;29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084530 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Zhou, Yifeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74439-1">https://doi.org/10.1007/978-3-319-74439-1</a><br/>Format:&#160;Electronic Resources<br/> Mathematics and Computing 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084442 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Ghosh, Debdas. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0023-3">https://doi.org/10.1007/978-981-13-0023-3</a><br/>Format:&#160;Electronic Resources<br/> Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18&ndash;19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084268 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/><a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format:&#160;Electronic Resources<br/> Versatile Cybersecurity ent://SD_ILS/0/SD_ILS:2084292 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Conti, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format:&#160;Electronic Resources<br/> Innovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11&ndash;12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084890 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;M. F. Kebe, Cheikh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format:&#160;Electronic Resources<br/> Communications and Networking 11th EAI International Conference, ChinaCom 2016, Chongqing, China, September 24-26, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2084850 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66625-9">https://doi.org/10.1007/978-3-319-66625-9</a><br/>Format:&#160;Electronic Resources<br/> Communications and Networking 11th EAI international Conference, ChinaCom 2016 Chongqing, China, September 24-26, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2084851 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66628-0">https://doi.org/10.1007/978-3-319-66628-0</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals and Applications of Hardcopy Communication Conveying Side Information by Printed Media ent://SD_ILS/0/SD_ILS:2084852 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Mayer, Joceli. author.<br/><a href="https://doi.org/10.1007/978-3-319-74083-6">https://doi.org/10.1007/978-3-319-74083-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084481 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format:&#160;Electronic Resources<br/> Engineering Applications of Neural Networks 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084298 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Pimenidis, Elias. editor. (orcid)0000-0003-3593-8640<br/><a href="https://doi.org/10.1007/978-3-319-98204-5">https://doi.org/10.1007/978-3-319-98204-5</a><br/>Format:&#160;Electronic Resources<br/> Cyber Threat Intelligence ent://SD_ILS/0/SD_ILS:2084503 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Dehghantanha, Ali. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084511 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format:&#160;Electronic Resources<br/> Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084520 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format:&#160;Electronic Resources<br/> Dynamic itemset hiding under multiple support thresholds ent://SD_ILS/0/SD_ILS:2075408 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;&Ouml;zt&uuml;rk, Ahmet Cumhur, author.<br/><a href="http://hdl.handle.net/11147/6998">Access to Electronic Versiyon.</a><br/>Format:&#160;Manuscript<br/> Introduction to Security Reduction ent://SD_ILS/0/SD_ILS:2084128 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format:&#160;Electronic Resources<br/> Introductory Computer Forensics A Hands-on Practical Approach ent://SD_ILS/0/SD_ILS:2084051 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format:&#160;Electronic Resources<br/> Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17&ndash;18, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084858 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084657 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format:&#160;Electronic Resources<br/> 5G for Future Wireless Networks First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084498 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Long, Keping. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72823-0">https://doi.org/10.1007/978-3-319-72823-0</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25&ndash;26, and December 15&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084880 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format:&#160;Electronic Resources<br/> Industrial Networks and Intelligent Systems 3rd International Conference, INISCOM 2017, Ho Chi Minh City, Vietnam, September 4, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084888 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Chen, Yuanfang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74176-5">https://doi.org/10.1007/978-3-319-74176-5</a><br/>Format:&#160;Electronic Resources<br/> 99 privacy breaches to beware of : practical data protection tips from real-life experiences ent://SD_ILS/0/SD_ILS:2268306 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5879671">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Lessons learned : critical information infrastructure protection : how to protect critical information infrastructure ent://SD_ILS/0/SD_ILS:2112303 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Viira, Toomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5244626">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084720 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format:&#160;Electronic Resources<br/> Smart Multimedia First International Conference, ICSM 2018, Toulon, France, August 24&ndash;26, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085393 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Basu, Anup. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04375-9">https://doi.org/10.1007/978-3-030-04375-9</a><br/>Format:&#160;Electronic Resources<br/> Future Internet Technologies and Trends First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084772 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Patel, Zuber. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73712-6">https://doi.org/10.1007/978-3-319-73712-6</a><br/>Format:&#160;Electronic Resources<br/> Dynamic Games for Network Security ent://SD_ILS/0/SD_ILS:2087057 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;He, Xiaofan. author.<br/><a href="https://doi.org/10.1007/978-3-319-75871-8">https://doi.org/10.1007/978-3-319-75871-8</a><br/>Format:&#160;Electronic Resources<br/> Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084992 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201<br/><a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format:&#160;Electronic Resources<br/> Adversary Detection For Cognitive Radio Networks ent://SD_ILS/0/SD_ILS:2087400 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;He, Xiaofan. author.<br/><a href="https://doi.org/10.1007/978-3-319-75868-8">https://doi.org/10.1007/978-3-319-75868-8</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:2132928 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4987646">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security with Intelligent Computing and Big-data Services ent://SD_ILS/0/SD_ILS:2086850 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Peng, Sheng-Lung. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76451-1">https://doi.org/10.1007/978-3-319-76451-1</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Computational Science XXXII Special Issue on Cybersecurity and Biometrics ent://SD_ILS/0/SD_ILS:2085025 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56672-5">https://doi.org/10.1007/978-3-662-56672-5</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084797 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Matou&scaron;ek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format:&#160;Electronic Resources<br/> Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation ent://SD_ILS/0/SD_ILS:2084803 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086054 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format:&#160;Electronic Resources<br/> Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085510 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXVI 26th International Workshop, Cambridge, UK, March 19&ndash;21, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085532 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Maty&aacute;&scaron;, Vashek. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03251-7">https://doi.org/10.1007/978-3-030-03251-7</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085390 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983<br/><a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format:&#160;Electronic Resources<br/> Smart Blockchain First International Conference, SmartBlock 2018, Tokyo, Japan, December 10&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085391 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Qiu, Meikang. editor. (orcid)0000-0002-1004-0140<br/><a href="https://doi.org/10.1007/978-3-030-05764-0">https://doi.org/10.1007/978-3-030-05764-0</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085392 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05345-1">https://doi.org/10.1007/978-3-030-05345-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Trends in Information Technology and Computer Communications Second International Conference, SmartCom 2017, Pune, India, August 18-19, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084216 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Deshpande, A.V. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1423-0">https://doi.org/10.1007/978-981-13-1423-0</a><br/>Format:&#160;Electronic Resources<br/> Artificial Intelligence Tools for Cyber Attribution ent://SD_ILS/0/SD_ILS:2084793 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Nunes, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-319-73788-1">https://doi.org/10.1007/978-3-319-73788-1</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085302 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Saracino, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format:&#160;Electronic Resources<br/> Network and Parallel Computing 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29 &ndash; December 1, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085553 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Zhang, Feng. editor. (orcid)0000-0003-1983-7321<br/><a href="https://doi.org/10.1007/978-3-030-05677-3">https://doi.org/10.1007/978-3-030-05677-3</a><br/>Format:&#160;Electronic Resources<br/> Information Technology - New Generations 15th International Conference on Information Technology ent://SD_ILS/0/SD_ILS:2086220 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Latifi, Shahram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-77028-4">https://doi.org/10.1007/978-3-319-77028-4</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technologies for Developing Countries First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedings ent://SD_ILS/0/SD_ILS:2084718 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Belqasmi, Fatna. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67837-5">https://doi.org/10.1007/978-3-319-67837-5</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085404 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Ganapathy, Vinod. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format:&#160;Electronic Resources<br/> Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084813 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format:&#160;Electronic Resources<br/> Smart Micro-Grid Systems Security and Privacy ent://SD_ILS/0/SD_ILS:2084235 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Kayem, Anne V. D. M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91427-5">https://doi.org/10.1007/978-3-319-91427-5</a><br/>Format:&#160;Electronic Resources<br/> The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets ent://SD_ILS/0/SD_ILS:2315032 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Wallace, Michael, 1960- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814438770/?ar">https://learning.oreilly.com/library/view/~/9780814438770/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar">https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:2316152 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format:&#160;Electronic Resources<br/> Investigating the Cyber Breach : the digital forensics guide for the network engineer ent://SD_ILS/0/SD_ILS:2315345 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar">https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134755885/?ar">https://learning.oreilly.com/library/view/~/9780134755885/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM QRadar Version 7.3 : planning and installation guide ent://SD_ILS/0/SD_ILS:2315474 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Carabaguiaz, Elias, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442877/?ar">https://learning.oreilly.com/library/view/~/9780738442877/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar</a><br/>Format:&#160;Electronic Resources<br/> What is cybersecurity? ent://SD_ILS/0/SD_ILS:2318722 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Board's Role in Managing Cybersecurity Risks ent://SD_ILS/0/SD_ILS:2320749 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Rothrock, Ray, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT59221/?ar">https://learning.oreilly.com/library/view/~/53863MIT59221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT59221">https://learning.oreilly.com/library/view/~/53863MIT59221</a><br/>Format:&#160;Electronic Resources<br/> Privileged attack vectors : building effective cyber-defense strategies to protect organizations ent://SD_ILS/0/SD_ILS:2314870 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format:&#160;Electronic Resources<br/> Lessons Learned : How to protect critical information infrastructure ent://SD_ILS/0/SD_ILS:2315498 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Viira, Toomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849289597/?ar">https://learning.oreilly.com/library/view/~/9781849289597/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849289597/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289597/?ar</a><br/>Format:&#160;Electronic Resources<br/> Solving Cyber Risk : Protecting Your Company and Society. ent://SD_ILS/0/SD_ILS:2318282 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Coburn, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781119490937">https://learning.oreilly.com/library/view/~/9781119490937</a> <a href="https://learning.oreilly.com/library/view/~/9781119490937/?ar">https://learning.oreilly.com/library/view/~/9781119490937/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar">https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar</a><br/>Format:&#160;Electronic Resources<br/> Take Control of 1Password, 4th Edition ent://SD_ILS/0/SD_ILS:2319474 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format:&#160;Electronic Resources<br/> Securing web applications : building a strategy for defense against malicious bots ent://SD_ILS/0/SD_ILS:2319261 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Gates, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar">https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492040279">https://learning.oreilly.com/library/view/~/9781492040279</a> <a href="https://learning.oreilly.com/library/view/~/9781492040279/?ar">https://learning.oreilly.com/library/view/~/9781492040279/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheitsmanagement - Praxiswissen f&uuml;r IT Security Manager, 2. Auflage ent://SD_ILS/0/SD_ILS:2320105 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Harich, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9783958452756/?ar">https://learning.oreilly.com/library/view/~/9783958452756/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958452756">https://learning.oreilly.com/library/view/~/9783958452756</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar</a><br/>Format:&#160;Electronic Resources<br/> Big data e privacy by design : anonimizzazione pseudonimizzazione sicurezza ent://SD_ILS/0/SD_ILS:2121265 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;D'Acquisto, Giuseppe, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4818389">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Distributed Networks ent://SD_ILS/0/SD_ILS:2319907 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data hiding techniques in Windows OS : a practical approach to investigation and defense ent://SD_ILS/0/SD_ILS:2311629 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Hassan, Nihad Ahmad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128044964/?ar">https://learning.oreilly.com/library/view/~/9780128044964/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128044964/?ar">https://go.oreilly.com/library-access/library/view/-/9780128044964/?ar</a><br/>Format:&#160;Electronic Resources<br/> OAuth 2 in action ent://SD_ILS/0/SD_ILS:2313185 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Richer, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617293276/?ar">https://go.oreilly.com/library-access/library/view/-/9781617293276/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617293276">https://learning.oreilly.com/library/view/~/9781617293276</a> <a href="https://learning.oreilly.com/library/view/~/9781617293276/?ar">https://learning.oreilly.com/library/view/~/9781617293276/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Active Directory : automate tasks by leveraging PowerShell for Active Directory Domain Services 2016 ent://SD_ILS/0/SD_ILS:2313809 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787289352">https://learning.oreilly.com/library/view/~/9781787289352</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar">https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787289352/?ar">https://learning.oreilly.com/library/view/~/9781787289352/?ar</a><br/>Format:&#160;Electronic Resources<br/> Versteckte Botschaften : die faszinierende Geschichte der Steganografie ent://SD_ILS/0/SD_ILS:2314676 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Schmeh, Klaus, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492064855">https://learning.oreilly.com/library/view/~/9781492064855</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar">https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492064855/?ar">https://learning.oreilly.com/library/view/~/9781492064855/?ar</a><br/>Format:&#160;Electronic Resources<br/> Loseless information : hiding in images ent://SD_ILS/0/SD_ILS:2211280 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4743573">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data hiding techniques in Windows OS : a practical approach to investigation and defense ent://SD_ILS/0/SD_ILS:2210720 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4676113">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ISO 37001 : an introduction to anti-bribery management systems : doing the right things ent://SD_ILS/0/SD_ILS:2112285 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5211339">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Die Kunst der Anonymit&auml;t im Internet : so sch&uuml;tzen Sie Ihre Identit&auml;t und Ihre Daten ent://SD_ILS/0/SD_ILS:2315011 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format:&#160;Electronic Resources<br/> ISO 37001 : an Introduction to Anti-Bribery Management Systems. ent://SD_ILS/0/SD_ILS:2315020 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Field, Alan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849289559">https://learning.oreilly.com/library/view/~/9781849289559</a> <a href="https://learning.oreilly.com/library/view/~/9781849289559/?ar">https://learning.oreilly.com/library/view/~/9781849289559/?ar</a><br/>Format:&#160;Electronic Resources<br/> Guide: Reporting on an Entity's Cyberse. ent://SD_ILS/0/SD_ILS:2316756 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;AICPA Staff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781943546725/?ar">https://learning.oreilly.com/library/view/~/9781943546725/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar">https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781943546725">https://learning.oreilly.com/library/view/~/9781943546725</a><br/>Format:&#160;Electronic Resources<br/> Cloud computing security : foundations and challenges ent://SD_ILS/0/SD_ILS:2311524 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084105 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format:&#160;Electronic Resources<br/> Innovations for Community Services 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084644 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Fahrnberger, G&uuml;nter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49466-1">https://doi.org/10.1007/978-3-319-49466-1</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS 3.1 : the standard that killed SSL ent://SD_ILS/0/SD_ILS:2098335 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4053870">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The CISO Handbook ent://SD_ILS/0/SD_ILS:2323677 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Gentile, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031379">https://learning.oreilly.com/library/view/~/9781420031379</a> <a href="https://learning.oreilly.com/library/view/~/9781420031379/?ar">https://learning.oreilly.com/library/view/~/9781420031379/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information Security Management Handbook, Volume 6, 6th Edition ent://SD_ILS/0/SD_ILS:2323397 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a> <a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data breach aftermath and recovery for individuals and institutions : proceedings of a workshop ent://SD_ILS/0/SD_ILS:2027620 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Johnson, Anne, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Data-Breach-Aftermath.pdf">An electronic book accessible through the World Wide Web; click for information</a> <a href="http://dx.doi.org/10.17226/23559">http://dx.doi.org/10.17226/23559</a><br/>Format:&#160;Electronic Resources<br/> Data breach aftermath and recovery for individuals and institutions : proceedings of a workshop ent://SD_ILS/0/SD_ILS:2228331 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Johnson, Anne, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4690560">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084839 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085036 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format:&#160;Electronic Resources<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:2310290 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format:&#160;Electronic Resources<br/> Analyzing and securing social networks ent://SD_ILS/0/SD_ILS:2313385 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Thuraisingham, Bhavani M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar">https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482243284/?ar">https://learning.oreilly.com/library/view/~/9781482243284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482243284">https://learning.oreilly.com/library/view/~/9781482243284</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Hadoop security : a hands-on approach to securing big data clusters ent://SD_ILS/0/SD_ILS:2310270 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Bean, Jeff, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar">https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771375054/?ar">https://learning.oreilly.com/videos/~/9781771375054/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data governance : frameworks and strategies ent://SD_ILS/0/SD_ILS:2309871 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Adler, John, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar">https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491942352/?ar">https://learning.oreilly.com/videos/~/9781491942352/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security policies, procedures, and standards : a practitioner's reference ent://SD_ILS/0/SD_ILS:2310749 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Landoll, Douglas J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482245912/?ar">https://learning.oreilly.com/library/view/~/9781482245912/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar">https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar</a><br/>Format:&#160;Electronic Resources<br/> 88 privacy breaches to beware of : practical data protection tips from real-life experiences ent://SD_ILS/0/SD_ILS:2265185 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4558135">Click to View</a><br/>Format:&#160;Electronic Resources<br/> You--for sale : protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:2308465 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Sumner, Stuart, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034231/?ar">https://learning.oreilly.com/library/view/~/9780128034231/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS 3.1 : the standard that killed SSL ent://SD_ILS/0/SD_ILS:2308468 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Williams, Branden R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128046494">https://learning.oreilly.com/library/view/~/9780128046494</a> <a href="https://learning.oreilly.com/library/view/~/9780128046494/?ar">https://learning.oreilly.com/library/view/~/9780128046494/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar">https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM ProtecTIER implementation and best practices guide ent://SD_ILS/0/SD_ILS:2310839 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Orlando, Karen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738441696/?ar">https://learning.oreilly.com/library/view/~/9780738441696/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738441696/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441696/?ar</a><br/>Format:&#160;Electronic Resources<br/> Big data and ethics : the medical datasphere ent://SD_ILS/0/SD_ILS:2210068 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;B&eacute;ranger, J&eacute;r&ocirc;me, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4529549">Click to View</a><br/>Format:&#160;Electronic Resources<br/> You : for sale protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:2208965 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:2209444 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4334673">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085086 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086070 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5&ndash;6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085888 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086143 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 &ndash; December 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085698 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Deletion ent://SD_ILS/0/SD_ILS:2084749 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Reardon, Joel. author.<br/><a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084254 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format:&#160;Electronic Resources<br/> Information technology security fundamentals ent://SD_ILS/0/SD_ILS:2110952 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4009415">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Facing cyber threats head on : protecting yourself and your business ent://SD_ILS/0/SD_ILS:2266274 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Minick, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4773207">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information theft prevention : theory and practice ent://SD_ILS/0/SD_ILS:2315550 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format:&#160;Electronic Resources<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:2313484 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format:&#160;Electronic Resources<br/> Digital privacy in the marketplace : perspectives on the information exchange ent://SD_ILS/0/SD_ILS:2056185 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1920895">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Technology Disaster Response and Recovery Planning : A LITA Guide. ent://SD_ILS/0/SD_ILS:1285371 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Mallery, Mary.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2068199">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft system center data protection manager 2012 R2 cookbook : over 100 recipes to build your own designs exploring the advanced functionality and features of system center DPM 2012 R2 ent://SD_ILS/0/SD_ILS:2238353 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Hedblom, Robert, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2040609">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Application of big data for national security : a practitioner's guide to emerging technologies ent://SD_ILS/0/SD_ILS:2208466 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Akhgar, Babak, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1962519">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering Python forensics : master the art of digital forensics and analysis with Python ent://SD_ILS/0/SD_ILS:2309227 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Spreitzenbarth, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783988044/?ar">https://learning.oreilly.com/library/view/~/9781783988044/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar">https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783988044">https://learning.oreilly.com/library/view/~/9781783988044</a><br/>Format:&#160;Electronic Resources<br/> Mastering OAuth 2.0 : create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework ent://SD_ILS/0/SD_ILS:2309547 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Bihis, Charles, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784395407/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395407/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784395407">https://learning.oreilly.com/library/view/~/9781784395407</a> <a href="https://learning.oreilly.com/library/view/~/9781784395407/?ar">https://learning.oreilly.com/library/view/~/9781784395407/?ar</a><br/>Format:&#160;Electronic Resources<br/> Measuring and managing information risk : a FAIR approach ent://SD_ILS/0/SD_ILS:2304245 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Freund, Jack, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar">https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124202313/?ar">https://learning.oreilly.com/library/view/~/9780124202313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124202313">https://learning.oreilly.com/library/view/~/9780124202313</a><br/>Format:&#160;Electronic Resources<br/> Information assurance handbook : effective computer security and risk management strategies ent://SD_ILS/0/SD_ILS:2304875 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Schou, Corey.<br/><a href="https://learning.oreilly.com/library/view/~/9780071821650">https://learning.oreilly.com/library/view/~/9780071821650</a> <a href="https://learning.oreilly.com/library/view/~/9780071821650/?ar">https://learning.oreilly.com/library/view/~/9780071821650/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar">https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar</a><br/>Format:&#160;Electronic Resources<br/> Implementing high availability and disaster recovery in IBM PureApplication Systems V2 ent://SD_ILS/0/SD_ILS:2306469 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Gadepalli, Venkata, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738440337">https://learning.oreilly.com/library/view/~/0738440337</a> <a href="https://learning.oreilly.com/library/view/~/0738440337/?ar">https://learning.oreilly.com/library/view/~/0738440337/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738440337/?ar">https://go.oreilly.com/library-access/library/view/-/0738440337/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to information security : LiveLessons (Sneak Peek Video Training) ent://SD_ILS/0/SD_ILS:2306346 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Aurnou, Scott, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar">https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780134135823/?ar">https://learning.oreilly.com/videos/~/9780134135823/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security in computing ent://SD_ILS/0/SD_ILS:2305897 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Pfleeger, Charles P., 1948- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134085074/?ar">https://learning.oreilly.com/library/view/~/9780134085074/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar">https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security, privacy, and governance : protecting data, and using data to protect systems ent://SD_ILS/0/SD_ILS:2307756 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Lorica, Ben, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar">https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491931042/?ar">https://learning.oreilly.com/videos/~/9781491931042/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheit im Unternehmen ent://SD_ILS/0/SD_ILS:2308324 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Harich, Thomas W., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958451285/?ar">https://learning.oreilly.com/library/view/~/9783958451285/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958451285">https://learning.oreilly.com/library/view/~/9783958451285</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar">https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar</a><br/>Format:&#160;Electronic Resources<br/> Multi-domain master data management : advanced MDM and data governance in practice ent://SD_ILS/0/SD_ILS:2306701 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Allen, Mark, 1953- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008355/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008355/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128008355/?ar">https://learning.oreilly.com/library/view/~/9780128008355/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128008355">https://learning.oreilly.com/library/view/~/9780128008355</a><br/>Format:&#160;Electronic Resources<br/> Cloud storage security : a practical guide ent://SD_ILS/0/SD_ILS:2307935 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Wheeler, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029312/?ar">https://learning.oreilly.com/library/view/~/9780128029312/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar</a><br/>Format:&#160;Electronic Resources<br/> Sharing big data safely : managing data security ent://SD_ILS/0/SD_ILS:2309245 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Dunning, Ted, 1956- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491953624/?ar">https://go.oreilly.com/library-access/library/view/-/9781491953624/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491953624/?ar">https://learning.oreilly.com/library/view/~/9781491953624/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491953624">https://learning.oreilly.com/library/view/~/9781491953624</a><br/>Format:&#160;Electronic Resources<br/> Mastering Python forensics : master the art of digital forensics and analysis with Python ent://SD_ILS/0/SD_ILS:2219461 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Spreitzenbarth, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191124">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cloud storage security : a practical guide ent://SD_ILS/0/SD_ILS:2208852 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Wheeler, Aaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2084976">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Measuring and managing information risk : a FAIR approach ent://SD_ILS/0/SD_ILS:2207829 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Freund, Jack, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1772300">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital identity management ent://SD_ILS/0/SD_ILS:2208574 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2007485">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data protection and the cloud : are the risks too great? ent://SD_ILS/0/SD_ILS:2155320 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192125">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Risk centric threat modeling : process for attack simulation and threat analysis ent://SD_ILS/0/SD_ILS:2308792 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Uceda V&eacute;lez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning to love data science : explorations of emerging technologies and platforms for predictive analytics, machine learning, digital manufacturing, and supply chain optimization ent://SD_ILS/0/SD_ILS:2308913 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Barlow, Mike (Michael Alan), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491936573">https://learning.oreilly.com/library/view/~/9781491936573</a> <a href="https://learning.oreilly.com/library/view/~/9781491936573/?ar">https://learning.oreilly.com/library/view/~/9781491936573/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491936573/?ar">https://go.oreilly.com/library-access/library/view/-/9781491936573/?ar</a><br/>Format:&#160;Electronic Resources<br/> Application of big data for national security : a practitioner's guide to emerging technologies ent://SD_ILS/0/SD_ILS:2306232 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Akhgar, Babak, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128019672/?ar">https://learning.oreilly.com/library/view/~/9780128019672/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128019672/?ar">https://go.oreilly.com/library-access/library/view/-/9780128019672/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128019672">https://learning.oreilly.com/library/view/~/9780128019672</a><br/>Format:&#160;Electronic Resources<br/> The cloud security ecosystem : technical, legal, business and management issues ent://SD_ILS/0/SD_ILS:2307649 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Ko, Ryan, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar">https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128017807/?ar">https://learning.oreilly.com/library/view/~/9780128017807/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hadoop security ent://SD_ILS/0/SD_ILS:2307773 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Spivey, Ben, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar">https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491900970/?ar">https://learning.oreilly.com/library/view/~/9781491900970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491900970">https://learning.oreilly.com/library/view/~/9781491900970</a><br/>Format:&#160;Electronic Resources<br/> Data protection and the cloud : are the risks too great? ent://SD_ILS/0/SD_ILS:2308847 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Ticher, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287135/?ar">https://learning.oreilly.com/library/view/~/9781849287135/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated Security Systems Design, 2nd Edition ent://SD_ILS/0/SD_ILS:2320974 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Norman, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000229/?ar">https://learning.oreilly.com/library/view/~/9780128000229/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000229">https://learning.oreilly.com/library/view/~/9780128000229</a><br/>Format:&#160;Electronic Resources<br/> The Science and Technology of Counterterrorism ent://SD_ILS/0/SD_ILS:2319961 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Young, Carl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124200562">https://learning.oreilly.com/library/view/~/9780124200562</a> <a href="https://learning.oreilly.com/library/view/~/9780124200562/?ar">https://learning.oreilly.com/library/view/~/9780124200562/?ar</a><br/>Format:&#160;Electronic Resources<br/> G3P - Good Privacy Protection Practice in Clinical Research : Principles of Pseudonymization and Anonymization. ent://SD_ILS/0/SD_ILS:1271891 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Schriever, Karl-Heinz.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1685362">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information governance and assurance : reducing risk, promoting policy ent://SD_ILS/0/SD_ILS:2235784 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Maclennan, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4923765">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data stewardship : an actionable guide to effective data management and data governance ent://SD_ILS/0/SD_ILS:2206579 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Plotkin, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418375">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:2299279 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Scholz, James A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar">https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439841594/?ar">https://learning.oreilly.com/library/view/~/9781439841594/?ar</a><br/>Format:&#160;Electronic Resources<br/> Total information risk management : maximizing the value of data and information assets ent://SD_ILS/0/SD_ILS:2299898 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Borek, Alexander.<br/><a href="https://learning.oreilly.com/library/view/~/9780124055476/?ar">https://learning.oreilly.com/library/view/~/9780124055476/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar">https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar</a><br/>Format:&#160;Electronic Resources<br/> Responsive security : be ready to be secure ent://SD_ILS/0/SD_ILS:2300643 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Kang, Meng-Chow.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584310/?ar">https://learning.oreilly.com/library/view/~/9781466584310/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security management handbook . Volume 7 ent://SD_ILS/0/SD_ILS:2300299 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;O'Hanley, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar">https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466567498">https://learning.oreilly.com/library/view/~/9781466567498</a> <a href="https://learning.oreilly.com/library/view/~/9781466567498/?ar">https://learning.oreilly.com/library/view/~/9781466567498/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:2300180 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format:&#160;Electronic Resources<br/> Healthcare information privacy and security : regulatory compliance and data security in the age of electronic health records ent://SD_ILS/0/SD_ILS:2303646 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Robichau, Bernard Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430266778">https://learning.oreilly.com/library/view/~/9781430266778</a> <a href="https://learning.oreilly.com/library/view/~/9781430266778/?ar">https://learning.oreilly.com/library/view/~/9781430266778/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430266778/?ar">https://go.oreilly.com/library-access/library/view/-/9781430266778/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security : principles and practices ent://SD_ILS/0/SD_ILS:2303412 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format:&#160;Electronic Resources<br/> Anti-hacker tool kit. ent://SD_ILS/0/SD_ILS:2303630 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Shema, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar">https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071800143/?ar">https://learning.oreilly.com/library/view/~/9780071800143/?ar</a><br/>Format:&#160;Electronic Resources<br/> 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy ent://SD_ILS/0/SD_ILS:2304861 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format:&#160;Electronic Resources<br/> Dropbox : Sicher speichern und effektiv arbeiten in der Cloud ent://SD_ILS/0/SD_ILS:2308601 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Schilling, Christian O., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783826687235/?ar">https://learning.oreilly.com/library/view/~/9783826687235/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783826687235/?ar">https://go.oreilly.com/library-access/library/view/-/9783826687235/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security leader insights for information protection : lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:2207467 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699254">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Deployment guide for Infosphere Guardium ent://SD_ILS/0/SD_ILS:2304011 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Chen, Whei-Jen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738439355/?ar">https://go.oreilly.com/library-access/library/view/-/0738439355/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738439355/?ar">https://learning.oreilly.com/library/view/~/0738439355/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data stewardship : an actionable guide to effective data management and data governance ent://SD_ILS/0/SD_ILS:2301499 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Plotkin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780124103894/?ar">https://learning.oreilly.com/library/view/~/9780124103894/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124103894">https://learning.oreilly.com/library/view/~/9780124103894</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar">https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM ProtecTIER implementation and best practices guide ent://SD_ILS/0/SD_ILS:2304526 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Orlando, Karen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738440027/?ar">https://go.oreilly.com/library-access/library/view/-/0738440027/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738440027/?ar">https://learning.oreilly.com/library/view/~/0738440027/?ar</a><br/>Format:&#160;Electronic Resources<br/> The privacy engineer's manifesto : getting from policy to code to QA to value ent://SD_ILS/0/SD_ILS:2302296 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Dennedy, Michelle Finneran.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263555">https://learning.oreilly.com/library/view/~/9781430263555</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430263555/?ar">https://learning.oreilly.com/library/view/~/9781430263555/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Hadoop security ent://SD_ILS/0/SD_ILS:2305422 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Lakhe, Bhushan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265450">https://learning.oreilly.com/library/view/~/9781430265450</a> <a href="https://learning.oreilly.com/library/view/~/9781430265450/?ar">https://learning.oreilly.com/library/view/~/9781430265450/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar</a><br/>Format:&#160;Electronic Resources<br/> Anonymous Communication Networks ent://SD_ILS/0/SD_ILS:2327268 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Peng, Kun, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881606">https://learning.oreilly.com/library/view/~/9781439881606</a> <a href="https://learning.oreilly.com/library/view/~/9781439881606/?ar">https://learning.oreilly.com/library/view/~/9781439881606/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439881606/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881606/?ar</a><br/>Format:&#160;Electronic Resources<br/> Best Practices for the Formal Software Testing Process : a Menu of Testing Tasks ent://SD_ILS/0/SD_ILS:2320691 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Drabick, Rodger, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133489309/?ar">https://learning.oreilly.com/library/view/~/9780133489309/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133489309">https://learning.oreilly.com/library/view/~/9780133489309</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with FortiGate. ent://SD_ILS/0/SD_ILS:1265007 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Fabbri, Rosato.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572901">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM InfoSphere : A Platform for Big Data Governance and Process Data Governance. ent://SD_ILS/0/SD_ILS:1290644 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Soares, Sunil.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3015277">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The complete book of data anonymization : from planning to implementation ent://SD_ILS/0/SD_ILS:409830 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Raghunathan, Balaji, author.<br/>Format:&#160;Books<br/> Afet durumunda kamuda veri g&uuml;venliÄŸi ent://SD_ILS/0/SD_ILS:430493 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Ä°stanbul Ä°l &Ouml;zel Ä°daresi<br/>Format:&#160;Books<br/> Introduction to Cyber-Warfare : A Multidisciplinary Approach. ent://SD_ILS/0/SD_ILS:1253491 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Shakarian, Paulo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115159">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Total Information Risk Management : Maximizing the Value of Data and Information Assets. ent://SD_ILS/0/SD_ILS:1262054 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Borek, Alexander.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1386476">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Security Management Principles. ent://SD_ILS/0/SD_ILS:1259073 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Alexander, David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1213992">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Oracle Data Guard 11gR2 Administration Beginner's Guide. ent://SD_ILS/0/SD_ILS:1258262 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Baransel, Emre.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1192652">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The dark side of personalization online privacy concerns influence customer behavior ent://SD_ILS/0/SD_ILS:2237976 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Ziesak, J&ouml;rg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1324048">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols ent://SD_ILS/0/SD_ILS:2206043 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073014">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The PayPal official insider guide to internet security : spot scams and protect your online business ent://SD_ILS/0/SD_ILS:2297259 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Savage, Michelle.<br/><a href="https://learning.oreilly.com/library/view/~/9780133154573">https://learning.oreilly.com/library/view/~/9780133154573</a> <a href="https://learning.oreilly.com/library/view/~/9780133154573/?ar">https://learning.oreilly.com/library/view/~/9780133154573/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar">https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to cyber-warfare : a multidisciplinary approach ent://SD_ILS/0/SD_ILS:2300196 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Shakarian, Paulo.<br/><a href="https://learning.oreilly.com/library/view/~/9780124078147">https://learning.oreilly.com/library/view/~/9780124078147</a> <a href="https://learning.oreilly.com/library/view/~/9780124078147/?ar">https://learning.oreilly.com/library/view/~/9780124078147/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar">https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar</a><br/>Format:&#160;Electronic Resources<br/> Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day ent://SD_ILS/0/SD_ILS:2298053 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Yerrid, K. C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519960/?ar">https://learning.oreilly.com/library/view/~/9781849519960/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519960">https://learning.oreilly.com/library/view/~/9781849519960</a><br/>Format:&#160;Electronic Resources<br/> Oracle Data Guard 11gR2 Administration Beginner's Guide : Learn How to Build and Maintain Data Guard Configurations with Real-Life, Practical Examples ent://SD_ILS/0/SD_ILS:2299449 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Baransel, Emre.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849687904/?ar">https://go.oreilly.com/library-access/library/view/-/9781849687904/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849687904/?ar">https://learning.oreilly.com/library/view/~/9781849687904/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849687904">https://learning.oreilly.com/library/view/~/9781849687904</a><br/>Format:&#160;Electronic Resources<br/> Information security management principles ent://SD_ILS/0/SD_ILS:2299451 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Alexander, David (Information security practitioner)<br/><a href="https://learning.oreilly.com/library/view/~/9781780171753/?ar">https://learning.oreilly.com/library/view/~/9781780171753/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar">https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780171753">https://learning.oreilly.com/library/view/~/9781780171753</a><br/>Format:&#160;Electronic Resources<br/> Nine steps to success : an ISO27001:2013 implementation overview ent://SD_ILS/0/SD_ILS:2300436 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285117/?ar">https://learning.oreilly.com/library/view/~/9781849285117/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285117">https://learning.oreilly.com/library/view/~/9781849285117</a><br/>Format:&#160;Electronic Resources<br/> ISO27001/ISO27002 : a pocket guide ent://SD_ILS/0/SD_ILS:2310742 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285247/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285247/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285247/?ar">https://learning.oreilly.com/library/view/~/9781849285247/?ar</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 / ISO27002 : a pocket guide ent://SD_ILS/0/SD_ILS:2154909 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463579">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Surviving the Top Ten Challenges of Software Testing : a People-Oriented Approach ent://SD_ILS/0/SD_ILS:2305832 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Rice, William E. Perry. Randall W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133489163">https://learning.oreilly.com/library/view/~/9780133489163</a> <a href="https://learning.oreilly.com/library/view/~/9780133489163/?ar">https://learning.oreilly.com/library/view/~/9780133489163/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:2206583 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418381">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Pragmatic security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:2129847 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1153198">Click to View</a><br/>Format:&#160;Electronic Resources<br/> An introduction to information security and ISO27001:2013 : a pocket guide ent://SD_ILS/0/SD_ILS:2154908 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463578">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Pragmatic security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:2297966 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Brotby, W. Krag.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881538/?ar">https://learning.oreilly.com/library/view/~/9781439881538/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:2296616 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Raggo, Michael T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format:&#160;Electronic Resources<br/> Introduction to computer and network security : navigating shades of gray ent://SD_ILS/0/SD_ILS:2313482 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format:&#160;Electronic Resources<br/> Strategic Information Management, 3rd Edition ent://SD_ILS/0/SD_ILS:2319914 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format:&#160;Electronic Resources<br/> Cyber security standards, practices and industrial applications systems and methodologies ent://SD_ILS/0/SD_ILS:476348 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Zubairi, Junaid Ahmed, 1961-<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/</a><br/>Format:&#160;Electronic Resources<br/> Death of the Internet. ent://SD_ILS/0/SD_ILS:1239227 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Jakobsson, Markus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=848529">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network Backup with Bacula How-to. ent://SD_ILS/0/SD_ILS:1252166 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Pankov, Eugene.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085229">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Warfare. ent://SD_ILS/0/SD_ILS:1252652 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106528">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT Governance : An International Guide to Data Security and ISO27001/ISO27002. ent://SD_ILS/0/SD_ILS:1238164 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Calder, Alan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=838114">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data Governance : How to Design, Deploy and Sustain an Effective Data Governance Program. ent://SD_ILS/0/SD_ILS:1248491 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Ladley, John.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1032951">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Governance, Risk, and Compliance Handbook for Oracle Applications. ent://SD_ILS/0/SD_ILS:1247813 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;King, Nigel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1019540">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Analyzing computer security : a threat/vulnerability/countermeasure approach ent://SD_ILS/0/SD_ILS:2291806 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Pfleeger, Charles P., 1948-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar">https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132789493/?ar">https://learning.oreilly.com/library/view/~/9780132789493/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with OAuth 2.0 ent://SD_ILS/0/SD_ILS:2295150 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Boyd, Ryan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449317843/?ar">https://go.oreilly.com/library-access/library/view/-/9781449317843/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781449317843">https://learning.oreilly.com/library/view/~/9781449317843</a> <a href="https://learning.oreilly.com/library/view/~/9781449317843/?ar">https://learning.oreilly.com/library/view/~/9781449317843/?ar</a><br/>Format:&#160;Electronic Resources<br/> Internet and surveillance : the challenges of Web 2.0 and social media ent://SD_ILS/0/SD_ILS:2294996 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Fuchs, Christian, 1976-<br/><a href="https://learning.oreilly.com/library/view/~/9780415891608/?ar">https://learning.oreilly.com/library/view/~/9780415891608/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780415891608/?ar">https://go.oreilly.com/library-access/library/view/-/9780415891608/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data governance : how to design, deploy and sustain an effective data governance program ent://SD_ILS/0/SD_ILS:2295485 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Ladley, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124158290/?ar">https://go.oreilly.com/library-access/library/view/-/9780124158290/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124158290/?ar">https://learning.oreilly.com/library/view/~/9780124158290/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124158290">https://learning.oreilly.com/library/view/~/9780124158290</a><br/>Format:&#160;Electronic Resources<br/> Information storage and management : storing, managing, and protecting digital information in classic, virtualized, and cloud environments ent://SD_ILS/0/SD_ILS:2296350 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;EMC Corporation.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118236963/?ar">https://go.oreilly.com/library-access/library/view/-/9781118236963/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118236963/?ar">https://learning.oreilly.com/library/view/~/9781118236963/?ar</a><br/>Format:&#160;Electronic Resources<br/> Once more unto the breach : managing information security in an uncertain world ent://SD_ILS/0/SD_ILS:2298022 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a> <a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format:&#160;Electronic Resources<br/> The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) ent://SD_ILS/0/SD_ILS:2294170 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format:&#160;Electronic Resources<br/> Information security management handbook. Volume 5 ent://SD_ILS/0/SD_ILS:2303124 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Tipton, Harold F.<br/><a href="https://learning.oreilly.com/library/view/~/9781439853467/?ar">https://learning.oreilly.com/library/view/~/9781439853467/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439853467/?ar">https://go.oreilly.com/library-access/library/view/-/9781439853467/?ar</a><br/>Format:&#160;Electronic Resources<br/> Internet and surveillance the challenges of Web 2.0 and social media ent://SD_ILS/0/SD_ILS:2127624 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Fuchs, Christian, 1976-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=981641">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Der hypothetische Vergleich des [section][section] 269 StGB unter Berucksichtigung der tatsachlichen und normativen Vergleichbarkeit von Schrifturkunde und moderner (Computer-) Datenurkund ent://SD_ILS/0/SD_ILS:2350546 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Hoinghaus, Nils, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5782103">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:2291653 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Landoll, Douglas J.<br/><a href="https://learning.oreilly.com/library/view/~/9781439821497">https://learning.oreilly.com/library/view/~/9781439821497</a> <a href="https://learning.oreilly.com/library/view/~/9781439821497/?ar">https://learning.oreilly.com/library/view/~/9781439821497/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar">https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical risk management for the CIO ent://SD_ILS/0/SD_ILS:2291367 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Scherling, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439856543/?ar">https://learning.oreilly.com/library/view/~/9781439856543/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439856543">https://learning.oreilly.com/library/view/~/9781439856543</a><br/>Format:&#160;Electronic Resources<br/> Preventing good people from doing bad things : implementing least privilege ent://SD_ILS/0/SD_ILS:2293278 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format:&#160;Electronic Resources<br/> Use of Risk Analysis in Computer-Aided Persuasion. ent://SD_ILS/0/SD_ILS:1237740 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Duman, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=836226">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:140311 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Canavan, Tom.<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy1202/2011922796-b.html">http://www.loc.gov/catdir/enhancements/fy1202/2011922796-b.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy1202/2011922796-d.html">http://www.loc.gov/catdir/enhancements/fy1202/2011922796-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy1202/2011922796-t.html">http://www.loc.gov/catdir/enhancements/fy1202/2011922796-t.html</a><br/>Format:&#160;Books<br/> CMS Security Handbook : The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone. ent://SD_ILS/0/SD_ILS:1228917 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Canavan, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706893">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Security, Coding Theory and Related Combinatorics : Information Coding and Combinatorics. ent://SD_ILS/0/SD_ILS:1226367 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Crnkovic, D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=682727">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Data Protection Manager 2010. ent://SD_ILS/0/SD_ILS:1245902 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Buchanan, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=950601">Click to View</a><br/>Format:&#160;Electronic Resources<br/> WordPress 3 Ultimate Security. ent://SD_ILS/0/SD_ILS:1245647 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Connelly, Olly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=948509">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Expert Oracle and Java security : programming secure Oracle database applications with Java ent://SD_ILS/0/SD_ILS:2293224 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Coffin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781430238317">https://learning.oreilly.com/library/view/~/9781430238317</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar">https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430238317/?ar">https://learning.oreilly.com/library/view/~/9781430238317/?ar</a><br/>Format:&#160;Electronic Resources<br/> The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets ent://SD_ILS/0/SD_ILS:2290884 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Wallace, Michael, 1960-<br/><a href="https://learning.oreilly.com/library/view/~/9780814416136/?ar">https://learning.oreilly.com/library/view/~/9780814416136/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar">https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar</a><br/>Format:&#160;Electronic Resources<br/> The chief information security officer : insights, tools and survival skills ent://SD_ILS/0/SD_ILS:2291384 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Kouns, Barry.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281966">https://learning.oreilly.com/library/view/~/9781849281966</a> <a href="https://learning.oreilly.com/library/view/~/9781849281966/?ar">https://learning.oreilly.com/library/view/~/9781849281966/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM system storage solutions for smarter systems ent://SD_ILS/0/SD_ILS:2292555 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Dufrasne, Bertrand.<br/><a href="https://learning.oreilly.com/library/view/~/073843583X/?ar">https://learning.oreilly.com/library/view/~/073843583X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/073843583X/?ar">https://go.oreilly.com/library-access/library/view/-/073843583X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Big Data. ent://SD_ILS/0/SD_ILS:2293554 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Craig, Terence.<br/><a href="https://learning.oreilly.com/library/view/~/9781449314842">https://learning.oreilly.com/library/view/~/9781449314842</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781449314842/?ar">https://go.oreilly.com/library-access/library/view/-/9781449314842/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781449314842/?ar">https://learning.oreilly.com/library/view/~/9781449314842/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:2295995 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a> <a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format:&#160;Electronic Resources<br/> Auditing cloud computing : a security and privacy guide ent://SD_ILS/0/SD_ILS:2292255 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format:&#160;Electronic Resources<br/> CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:2291661 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Canavan, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar">https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470916216/?ar">https://learning.oreilly.com/library/view/~/9780470916216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470916216">https://learning.oreilly.com/library/view/~/9780470916216</a><br/>Format:&#160;Electronic Resources<br/> Auditing cloud computing a security and privacy guide ent://SD_ILS/0/SD_ILS:2269772 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Halpert, Ben, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=697627">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mobile device security for dummies ent://SD_ILS/0/SD_ILS:2293515 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Campagna, Rich R.<br/><a href="https://learning.oreilly.com/library/view/~/9781118093801/?ar">https://learning.oreilly.com/library/view/~/9781118093801/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar">https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM System Storage TS7650, TS7650G, and TS7610 ent://SD_ILS/0/SD_ILS:2326793 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Osuna, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738435848">https://learning.oreilly.com/library/view/~/0738435848</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738435848/?ar">https://go.oreilly.com/library-access/library/view/-/0738435848/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738435848/?ar">https://learning.oreilly.com/library/view/~/0738435848/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security for management ent://SD_ILS/0/SD_ILS:2101338 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Iyengar, Venugopal.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3011230">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security Breaches : Studies from Real Life. ent://SD_ILS/0/SD_ILS:2290674 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security for management ent://SD_ILS/0/SD_ILS:309255 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Iyengar, Venugopal.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178</a><br/>Format:&#160;Electronic Resources<br/> Information security management : concepts and practice ent://SD_ILS/0/SD_ILS:2131441 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Raggad, Bel G., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1449482">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection ent://SD_ILS/0/SD_ILS:2286982 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Collberg, Christian.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591258/?ar">https://learning.oreilly.com/library/view/~/9780321591258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar</a><br/>Format:&#160;Electronic Resources<br/> Collaborative computer security and trust management ent://SD_ILS/0/SD_ILS:2261215 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Seigneur, Jean-Marc.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format:&#160;Electronic Resources<br/> PCI compliance : understand and implement effective PCI data security standard compliance. ent://SD_ILS/0/SD_ILS:2288641 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Chuvakin, Anton.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494991/?ar">https://learning.oreilly.com/library/view/~/9781597494991/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security auditing ent://SD_ILS/0/SD_ILS:2289463 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Jackson, Chris, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9781587059407">https://learning.oreilly.com/library/view/~/9781587059407</a> <a href="https://learning.oreilly.com/library/view/~/9781587059407/?ar">https://learning.oreilly.com/library/view/~/9781587059407/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587059407/?ar">https://go.oreilly.com/library-access/library/view/-/9781587059407/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security strategy : from requirements to reality ent://SD_ILS/0/SD_ILS:2321638 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Stackpole, Bill. http://viaf.org/viaf/sourceID/LC%7cn2007046244<br/><a href="https://learning.oreilly.com/library/view/~/9781439827345">https://learning.oreilly.com/library/view/~/9781439827345</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar">https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439827345/?ar">https://learning.oreilly.com/library/view/~/9781439827345/?ar</a><br/>Format:&#160;Electronic Resources<br/> The myths of security : what the computer security industry doesn't want you to know ent://SD_ILS/0/SD_ILS:2106561 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Viega, John.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Risk : A Director's Guide. ent://SD_ILS/0/SD_ILS:1212151 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Mitchell, Stewart.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=480407">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data Governance Imperative. ent://SD_ILS/0/SD_ILS:1212152 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Sarsfield, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=480410">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in Artificial Intelligence for Privacy Protection and Security. ent://SD_ILS/0/SD_ILS:1270705 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Solanas, Agusti.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679374">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Security for Management. ent://SD_ILS/0/SD_ILS:1289654 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Iyengar, Venugopal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3011230">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Definitive Guide to the C&amp;A Transformation Process : The First Publication of a Comprehensive View of the C&amp;A Transformation. ent://SD_ILS/0/SD_ILS:1216155 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Mehan, Julie.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=547041">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Insider Threat : Combatting the Enemy Within. ent://SD_ILS/0/SD_ILS:1212142 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Blackwell, Clive.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=480373">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Information Security and Privacy. ent://SD_ILS/0/SD_ILS:1207718 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Axelrod, C. Warren.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456886">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to survive a data breach : a pocket guide ent://SD_ILS/0/SD_ILS:2290079 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Mitchell, Stewart.<br/><a href="https://learning.oreilly.com/library/view/~/9781905356966">https://learning.oreilly.com/library/view/~/9781905356966</a> <a href="https://learning.oreilly.com/library/view/~/9781905356966/?ar">https://learning.oreilly.com/library/view/~/9781905356966/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital rights management for e-commerce systems ent://SD_ILS/0/SD_ILS:2261319 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Tsolis, Dimitrios.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6</a><br/>Format:&#160;Electronic Resources<br/> Cyber-security and global information assurance threat analysis and response solutions ent://SD_ILS/0/SD_ILS:2261272 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Knapp, Kenneth J.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5</a><br/>Format:&#160;Electronic Resources<br/> Social implications of data mining and information privacy interdisciplinary frameworks and solutions ent://SD_ILS/0/SD_ILS:2261917 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Eyob, Ephrem, 1954-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-196-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-196-4</a><br/>Format:&#160;Electronic Resources<br/> Oracle data guard 11g handbook ent://SD_ILS/0/SD_ILS:2286936 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Carpenter, Larry.<br/><a href="https://learning.oreilly.com/library/view/~/9780071621113">https://learning.oreilly.com/library/view/~/9780071621113</a> <a href="https://learning.oreilly.com/library/view/~/9780071621113/?ar">https://learning.oreilly.com/library/view/~/9780071621113/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071621113/?ar">https://go.oreilly.com/library-access/library/view/-/9780071621113/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information storage and management : storing, managing, and protecting digital information ent://SD_ILS/0/SD_ILS:2286629 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Somasundaram, G.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470294215/?ar">https://go.oreilly.com/library-access/library/view/-/9780470294215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470294215/?ar">https://learning.oreilly.com/library/view/~/9780470294215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470294215">https://learning.oreilly.com/library/view/~/9780470294215</a><br/>Format:&#160;Electronic Resources<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:2286630 2024-05-25T02:03:58Z 2024-05-25T02:03:58Z by&#160;Brotby, W. Krag, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar">https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420052862/?ar">https://learning.oreilly.com/library/view/~/9781420052862/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420052862">https://learning.oreilly.com/library/view/~/9781420052862</a><br/>Format:&#160;Electronic Resources<br/>