Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: Information technology. - Colorado Technical University. Computer Science. degree granting institution. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Information$002btechnology.$002509Information$002btechnology.$0026qf$003dAUTHOR$002509Yazar$002509Colorado$002bTechnical$002bUniversity.$002bComputer$002bScience.$002bdegree$002bgranting$002binstitution.$002509Colorado$002bTechnical$002bUniversity.$002bComputer$002bScience.$002bdegree$002bgranting$002binstitution.$0026ps$003d300? 2024-05-30T22:37:37Z Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare ent://SD_ILS/0/SD_ILS:700253 2024-05-30T22:37:37Z 2024-05-30T22:37:37Z by&#160;Scalise, Benjamin F., III, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:13807364">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:13807364</a><br/>Format:&#160;Kitap<br/> Exploring the Cloud Adoption Processes SMEs Need to Secure Their Business ent://SD_ILS/0/SD_ILS:701227 2024-05-30T22:37:37Z 2024-05-30T22:37:37Z by&#160;Adeghe, John I., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:13813322">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:13813322</a><br/>Format:&#160;Kitap<br/> Zero-Day Vulnerability In Software-Defined Networks: A Quantitative Study ent://SD_ILS/0/SD_ILS:681876 2024-05-30T22:37:37Z 2024-05-30T22:37:37Z by&#160;Olorunsola, Folorunso Allan, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10823009">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10823009</a><br/>Format:&#160;Kitap<br/> The mHealth Wireless Technology Adoption of the Nurse Practitioner ent://SD_ILS/0/SD_ILS:698870 2024-05-30T22:37:37Z 2024-05-30T22:37:37Z by&#160;Walker, Germaine, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10977522">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10977522</a><br/>Format:&#160;Kitap<br/>