Search Results for Law and Legislation - Narrowed by: Computer networks -- Security measures.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dLaw$002band$002bLegislation$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026te$003dILS$0026ps$003d300?
2024-09-13T03:08:02Z
Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crime
ent://SD_ILS/0/SD_ILS:483013
2024-09-13T03:08:02Z
2024-09-13T03:08:02Z
Author Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484186
2024-09-13T03:08:02Z
2024-09-13T03:08:02Z
Author Dolev, Shlomi. editor. Hendler, Danny. editor. Lodha, Sachin. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Computing and Communication Third International Conference, SmartCom 2018, Tokyo, Japan, December 10–12, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400107
2024-09-13T03:08:02Z
2024-09-13T03:08:02Z
Author Qiu, Meikang. editor. (orcid)0000-0002-1004-0140 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05755-8">https://doi.org/10.1007/978-3-030-05755-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security metrics a beginner's guide
ent://SD_ILS/0/SD_ILS:293238
2024-09-13T03:08:02Z
2024-09-13T03:08:02Z
Author Wong, Caroline.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the clicks network security in the age of social media
ent://SD_ILS/0/SD_ILS:293240
2024-09-13T03:08:02Z
2024-09-13T03:08:02Z
Author Bahadur, Gary. Inasi, Jason. Carvalho, Alex de. Powell, Juliette, 1976- Valencia, Connie.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/securing-clicks-network-security-in-age-social-media">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Gray hat hacking the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:293255
2024-09-13T03:08:02Z
2024-09-13T03:08:02Z
Author Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security information and event management (SIEM) implementation
ent://SD_ILS/0/SD_ILS:293279
2024-09-13T03:08:02Z
2024-09-13T03:08:02Z
Author Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>