Search Results for - Narrowed by: Information technology -- Management. - Technologie de l'information -- S&eacute;curit&eacute; -- Mesures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Information$002btechnology$002b--$002bManagement.$002509Information$002btechnology$002b--$002bManagement.$0026qf$003dSUBJECT$002509Subject$002509Technologie$002bde$002bl$002527information$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509Technologie$002bde$002bl$002527information$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300? 2024-05-27T20:18:22Z Shifting left for application security : bridging the divide between DevOps and security with the right security tools ent://SD_ILS/0/SD_ILS:2332575 2024-05-27T20:18:22Z 2024-05-27T20:18:22Z by&#160;Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a> <a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your data ent://SD_ILS/0/SD_ILS:2322204 2024-05-27T20:18:22Z 2024-05-27T20:18:22Z by&#160;Chakrabarty, Boudhayan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458014/?ar">https://learning.oreilly.com/library/view/~/9780738458014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458014">https://learning.oreilly.com/library/view/~/9780738458014</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar</a><br/>Format:&#160;Electronic Resources<br/> Technische IT-Security f&uuml;r IT Security Manager : Von Cloud Computing &uuml;ber WLAN bis zu Penetrationstests ent://SD_ILS/0/SD_ILS:2318537 2024-05-27T20:18:22Z 2024-05-27T20:18:22Z by&#160;Harich, Thomas W., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958454439/?ar">https://learning.oreilly.com/library/view/~/9783958454439/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958454439/?ar">https://go.oreilly.com/library-access/library/view/-/9783958454439/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security handbook : develop a threat model and incident response strategy to build a strong information security framework ent://SD_ILS/0/SD_ILS:2315319 2024-05-27T20:18:22Z 2024-05-27T20:18:22Z by&#160;Death, Darren, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788478830">https://learning.oreilly.com/library/view/~/9781788478830</a> <a href="https://learning.oreilly.com/library/view/~/9781788478830/?ar">https://learning.oreilly.com/library/view/~/9781788478830/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788478830/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478830/?ar</a><br/>Format:&#160;Electronic Resources<br/> The value of operations security ent://SD_ILS/0/SD_ILS:2311339 2024-05-27T20:18:22Z 2024-05-27T20:18:22Z by&#160;Messier, Ric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491972441/?ar">https://learning.oreilly.com/videos/~/9781491972441/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491972441/?ar">https://go.oreilly.com/library-access/library/view/-/9781491972441/?ar</a><br/>Format:&#160;Electronic Resources<br/> Projekt Phoenix. ent://SD_ILS/0/SD_ILS:2308752 2024-05-27T20:18:22Z 2024-05-27T20:18:22Z by&#160;Kim, Gene.<br/><a href="https://learning.oreilly.com/library/view/~/9783958751781">https://learning.oreilly.com/library/view/~/9783958751781</a> <a href="https://learning.oreilly.com/library/view/~/9783958751781/?ar">https://learning.oreilly.com/library/view/~/9783958751781/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958751781/?ar">https://go.oreilly.com/library-access/library/view/-/9783958751781/?ar</a><br/>Format:&#160;Electronic Resources<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:2303105 2024-05-27T20:18:22Z 2024-05-27T20:18:22Z by&#160;Messier, Ric.<br/><a href="https://learning.oreilly.com/library/view/~/9780124170407/?ar">https://learning.oreilly.com/library/view/~/9780124170407/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar">https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar</a><br/>Format:&#160;Electronic Resources<br/> Governance and Internal Controls for Cutting Edge IT. ent://SD_ILS/0/SD_ILS:2298608 2024-05-27T20:18:22Z 2024-05-27T20:18:22Z by&#160;Worstell, Karen F.<br/><a href="https://learning.oreilly.com/library/view/~/9781849284547">https://learning.oreilly.com/library/view/~/9781849284547</a> <a href="https://learning.oreilly.com/library/view/~/9781849284547/?ar">https://learning.oreilly.com/library/view/~/9781849284547/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849284547/?ar">https://go.oreilly.com/library-access/library/view/-/9781849284547/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security : the Human Factor. ent://SD_ILS/0/SD_ILS:2290675 2024-05-27T20:18:22Z 2024-05-27T20:18:22Z by&#160;Kearney, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281843/?ar">https://learning.oreilly.com/library/view/~/9781849281843/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar</a><br/>Format:&#160;Electronic Resources<br/>