Search Results for - Narrowed by: Information technology -- Management. - Technologie de l'information -- Sécurité -- Mesures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Information$002btechnology$002b--$002bManagement.$002509Information$002btechnology$002b--$002bManagement.$0026qf$003dSUBJECT$002509Subject$002509Technologie$002bde$002bl$002527information$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509Technologie$002bde$002bl$002527information$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300?2024-05-27T20:18:22ZShifting left for application security : bridging the divide between DevOps and security with the right security toolsent://SD_ILS/0/SD_ILS:23325752024-05-27T20:18:22Z2024-05-27T20:18:22Zby Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format: Electronic Resources<br/>Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your dataent://SD_ILS/0/SD_ILS:23222042024-05-27T20:18:22Z2024-05-27T20:18:22Zby Chakrabarty, Boudhayan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458014/?ar">https://learning.oreilly.com/library/view/~/9780738458014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458014">https://learning.oreilly.com/library/view/~/9780738458014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar</a><br/>Format: Electronic Resources<br/>Technische IT-Security für IT Security Manager : Von Cloud Computing über WLAN bis zu Penetrationstestsent://SD_ILS/0/SD_ILS:23185372024-05-27T20:18:22Z2024-05-27T20:18:22Zby Harich, Thomas W., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958454439/?ar">https://learning.oreilly.com/library/view/~/9783958454439/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958454439/?ar">https://go.oreilly.com/library-access/library/view/-/9783958454439/?ar</a><br/>Format: Electronic Resources<br/>Information security handbook : develop a threat model and incident response strategy to build a strong information security frameworkent://SD_ILS/0/SD_ILS:23153192024-05-27T20:18:22Z2024-05-27T20:18:22Zby Death, Darren, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788478830">https://learning.oreilly.com/library/view/~/9781788478830</a>
<a href="https://learning.oreilly.com/library/view/~/9781788478830/?ar">https://learning.oreilly.com/library/view/~/9781788478830/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788478830/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478830/?ar</a><br/>Format: Electronic Resources<br/>The value of operations securityent://SD_ILS/0/SD_ILS:23113392024-05-27T20:18:22Z2024-05-27T20:18:22Zby Messier, Ric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491972441/?ar">https://learning.oreilly.com/videos/~/9781491972441/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491972441/?ar">https://go.oreilly.com/library-access/library/view/-/9781491972441/?ar</a><br/>Format: Electronic Resources<br/>Projekt Phoenix.ent://SD_ILS/0/SD_ILS:23087522024-05-27T20:18:22Z2024-05-27T20:18:22Zby Kim, Gene.<br/><a href="https://learning.oreilly.com/library/view/~/9783958751781">https://learning.oreilly.com/library/view/~/9783958751781</a>
<a href="https://learning.oreilly.com/library/view/~/9783958751781/?ar">https://learning.oreilly.com/library/view/~/9783958751781/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958751781/?ar">https://go.oreilly.com/library-access/library/view/-/9783958751781/?ar</a><br/>Format: Electronic Resources<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:23031052024-05-27T20:18:22Z2024-05-27T20:18:22Zby Messier, Ric.<br/><a href="https://learning.oreilly.com/library/view/~/9780124170407/?ar">https://learning.oreilly.com/library/view/~/9780124170407/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar">https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar</a><br/>Format: Electronic Resources<br/>Governance and Internal Controls for Cutting Edge IT.ent://SD_ILS/0/SD_ILS:22986082024-05-27T20:18:22Z2024-05-27T20:18:22Zby Worstell, Karen F.<br/><a href="https://learning.oreilly.com/library/view/~/9781849284547">https://learning.oreilly.com/library/view/~/9781849284547</a>
<a href="https://learning.oreilly.com/library/view/~/9781849284547/?ar">https://learning.oreilly.com/library/view/~/9781849284547/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849284547/?ar">https://go.oreilly.com/library-access/library/view/-/9781849284547/?ar</a><br/>Format: Electronic Resources<br/>Security : the Human Factor.ent://SD_ILS/0/SD_ILS:22906752024-05-27T20:18:22Z2024-05-27T20:18:22Zby Kearney, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281843/?ar">https://learning.oreilly.com/library/view/~/9781849281843/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar</a><br/>Format: Electronic Resources<br/>