Search Results for - Narrowed by: S&eacute;curit&eacute; informatique. - Sources d'information &eacute;lectroniques -- Acc&egrave;s -- Contr&ocirc;le. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509Sources$002bd$002527information$002b$0025C3$0025A9lectroniques$002b--$002bAcc$0025C3$0025A8s$002b--$002bContr$0025C3$0025B4le.$002509Sources$002bd$002527information$002b$0025C3$0025A9lectroniques$002b--$002bAcc$0025C3$0025A8s$002b--$002bContr$0025C3$0025B4le.$0026ps$003d300? 2024-05-30T13:56:24Z Foundations of information security : a straightforward introduction ent://SD_ILS/0/SD_ILS:2322313 2024-05-30T13:56:24Z 2024-05-30T13:56:24Z by&#160;Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098122546/?ar">https://learning.oreilly.com/library/view/~/9781098122546/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098122546">https://learning.oreilly.com/library/view/~/9781098122546</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing risk and information security : protect to enable ent://SD_ILS/0/SD_ILS:2311491 2024-05-30T13:56:24Z 2024-05-30T13:56:24Z by&#160;Harkins, Malcolm, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484214558/?ar">https://learning.oreilly.com/library/view/~/9781484214558/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484214558">https://learning.oreilly.com/library/view/~/9781484214558</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484214558/?ar">https://go.oreilly.com/library-access/library/view/-/9781484214558/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing information security breaches : studies from real life ent://SD_ILS/0/SD_ILS:2308836 2024-05-30T13:56:24Z 2024-05-30T13:56:24Z by&#160;Krausz, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285964/?ar">https://learning.oreilly.com/library/view/~/9781849285964/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing risk and information security : protect to enable ent://SD_ILS/0/SD_ILS:2297326 2024-05-30T13:56:24Z 2024-05-30T13:56:24Z by&#160;Harkins, Malcolm.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430251132/?ar">https://go.oreilly.com/library-access/library/view/-/9781430251132/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430251132">https://learning.oreilly.com/library/view/~/9781430251132</a> <a href="https://learning.oreilly.com/library/view/~/9781430251132/?ar">https://learning.oreilly.com/library/view/~/9781430251132/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security Breaches : Studies from Real Life. ent://SD_ILS/0/SD_ILS:2290674 2024-05-30T13:56:24Z 2024-05-30T13:56:24Z by&#160;Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format:&#160;Electronic Resources<br/>