Search Results for - Narrowed by: S&eacute;curit&eacute; informatique. - COMPUTERS -- Data Processing. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bData$002bProcessing.$002509COMPUTERS$002b--$002bData$002bProcessing.$0026ps$003d300? 2024-05-27T19:34:32Z Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threats ent://SD_ILS/0/SD_ILS:2316016 2024-05-27T19:34:32Z 2024-05-27T19:34:32Z by&#160;Donaldson, Scott E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232583/?ar">https://learning.oreilly.com/library/view/~/9781484232583/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484232583">https://learning.oreilly.com/library/view/~/9781484232583</a><br/>Format:&#160;Electronic Resources<br/> Incident management for operations ent://SD_ILS/0/SD_ILS:2313545 2024-05-27T19:34:32Z 2024-05-27T19:34:32Z by&#160;Schnepp, Rob, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491917619/?ar">https://learning.oreilly.com/library/view/~/9781491917619/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar">https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491917619">https://learning.oreilly.com/library/view/~/9781491917619</a><br/>Format:&#160;Electronic Resources<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:2312348 2024-05-27T19:34:32Z 2024-05-27T19:34:32Z by&#160;Li, Shancang, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045053">https://learning.oreilly.com/library/view/~/9780128045053</a> <a href="https://learning.oreilly.com/library/view/~/9780128045053/?ar">https://learning.oreilly.com/library/view/~/9780128045053/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : a practitioner's guide ent://SD_ILS/0/SD_ILS:2313763 2024-05-27T19:34:32Z 2024-05-27T19:34:32Z by&#160;Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format:&#160;Electronic Resources<br/> Die Kunst der Anonymit&auml;t im Internet : so sch&uuml;tzen Sie Ihre Identit&auml;t und Ihre Daten ent://SD_ILS/0/SD_ILS:2315011 2024-05-27T19:34:32Z 2024-05-27T19:34:32Z by&#160;Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format:&#160;Electronic Resources<br/> A study of black hole attack solutions : on AODV routing protocol in MANET ent://SD_ILS/0/SD_ILS:2309038 2024-05-27T19:34:32Z 2024-05-27T19:34:32Z by&#160;Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format:&#160;Electronic Resources<br/> CSA guide to cloud computing : implementing cloud privacy and security ent://SD_ILS/0/SD_ILS:2304776 2024-05-27T19:34:32Z 2024-05-27T19:34:32Z by&#160;Samani, Raj, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar">https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124201255/?ar">https://learning.oreilly.com/library/view/~/9780124201255/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124201255">https://learning.oreilly.com/library/view/~/9780124201255</a><br/>Format:&#160;Electronic Resources<br/> The basics of IT audit : Purposes, processes, and practical information. ent://SD_ILS/0/SD_ILS:2301501 2024-05-27T19:34:32Z 2024-05-27T19:34:32Z by&#160;Gantz, Stephen D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124171596/?ar">https://learning.oreilly.com/library/view/~/9780124171596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124171596">https://learning.oreilly.com/library/view/~/9780124171596</a><br/>Format:&#160;Electronic Resources<br/> Oracle 11g Anti-hacker's Cookbook. ent://SD_ILS/0/SD_ILS:2296554 2024-05-27T19:34:32Z 2024-05-27T19:34:32Z by&#160;Neagu, Adrian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849685269/?ar">https://go.oreilly.com/library-access/library/view/-/9781849685269/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849685269/?ar">https://learning.oreilly.com/library/view/~/9781849685269/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849685269">https://learning.oreilly.com/library/view/~/9781849685269</a><br/>Format:&#160;Electronic Resources<br/>