Logging in...
User ID
:
Password
:
Register
Forgot your PIN?
Forgot my PIN
Enter your username and a recovery link will be emailed to the email address on file at your library.
User ID
:
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
All Fields
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
To enable accessibility mode, return to the beginning of the page and use the link in the menu bar.
Advanced Search
Home Room
Book Collection
E-Book Collection
Multimedia Collection
Thesis Collection
Transportation Engineering Collection
Periodicals Collections
Green Campus
Limit Search Results
Narrowed by:
Included
Material Type: E-Book
Included
Subject: Réseaux d'ordinateurs -- Sécurité -- Mesures.
Author
Include
Exclude
Safari, an O'Reilly Media Company.
(24)
Cisco Systems, Inc.
(7)
International Business Machines Corporation. International Technical Support Organization.
(6)
Gupta, Sunil, speaker.
(5)
Liska, Allan, author.
(4)
Messier, Ric, author.
(4)
O'Reilly for Higher Education (Firm)
(4)
Velu, Vijay Kumar, author.
(4)
Woland, Aaron T., author.
(4)
Barth, Doug, on-screen presenter.
(3)
Calder, Alan, 1957-
(3)
Calder, Alan, 1957- author.
(3)
Carvey, Harlan A., author.
(3)
Collins, Michael (Michael Patrick), author.
(3)
Dalziel, Henry, author.
(3)
Diogenes, Yuri, author.
(3)
Diogenes, Yuri.
(3)
Francis, Dishan, author.
(3)
Gilman, Evan, on-screen presenter.
(3)
Manning (Firm), publisher.
(3)
Messier, Ric, speaker.
(3)
O'Reilly for Higher Education (Firm), distributor.
(3)
Packt Publishing, publisher.
(3)
Sabih, Zaid, on-screen presenter.
(3)
Santos, Omar, on-screen presenter.
(3)
Scambray, Joel.
(3)
Sharma, Himanshu, author.
(3)
Shinder, Thomas W.
(3)
Vacca, John R., editor.
(3)
Williams, Geraint, author.
(3)
Adams, Carlisle, author.
(2)
Addison-Wesley Professional (Firm), publisher.
(2)
Akanbi, Oluwatobi Ayodeji, author.
(2)
Albing, Carl, author.
(2)
Amiri, Iraj Sadegh, 1977- author.
(2)
Andress, Jason, author.
(2)
Anonymous, author.
(2)
Ansari, Juned Ahmed, author.
(2)
Arnold, William, author.
(2)
Beaver, Kevin, author.
(2)
Bücker, Axel.
(2)
Carey, Marcus J. (Cybersecurity professional), author.
(2)
Carpenter, Perry, author.
(2)
Cerra, Allison, author.
(2)
Chebbi, Chiheb, author.
(2)
Dion, Jason, on-screen presenter.
(2)
Duffy, Christopher, author.
(2)
Easttom, Chuck, author.
(2)
Fazeldehkordi, Elahe, author.
(2)
Haber, Morey J., author.
(2)
Harris, Shon.
(2)
Julian, Mike, author.
(2)
Kaplan, James M., 1970- author.
(2)
Kissell, Joe, author.
(2)
Lakhani, Aamir, presenter.
(2)
Liu, Vincent.
(2)
Mason, Andrew.
(2)
Messier, Ric.
(2)
Muniz, Joseph, author.
(2)
Nickel, Jochen, author.
(2)
Olups, Rihards, author.
(2)
Ozkaya, Erdal, author.
(2)
Pearson (Firm), publisher.
(2)
Pröhl, Mark.
(2)
Rice, Liz, author.
(2)
Russell, Brian, author.
(2)
Sanbower, Jamie, author.
(2)
Santos, Omar, author.
(2)
Santos, Omar, presenter.
(2)
Santuka, Vivek, author.
(2)
Shimonski, Robert.
(2)
Shinder, Thomas W., author.
(2)
Singh, Glen D., author.
(2)
Steinberg, Joseph (Cybersecurity expert), author.
(2)
Tiller, James S.
(2)
Timms, Natalie.
(2)
Troncone, Paul, author.
(2)
Vacca, John R.
(2)
Van Duren, Drew, author.
(2)
Watkins, Steve, 1970-
(2)
Winnard, Keith, author.
(2)
AICPA Staff, author.
(1)
Abdullah, Azween Bin, 1961- editor.
(1)
Ackerman, Pascal, author.
(1)
Afzal, Imran, speaker.
(1)
Agboma, Florence, author.
(1)
Aggarwal, Manuj, author.
(1)
Akin, Thomas.
(1)
Akula, Madhu, author.
(1)
Al Braiki, Arwa, author.
(1)
Alberts, Christopher, author.
(1)
Alcorn, Wade.
(1)
Alibi, Mohamed, author.
(1)
Allison, Steve.
(1)
Amberg, Eric, author
(1)
Amberg, Eric, author.
(1)
Anbalahan, Siddharth, author.
(1)
Anderson, Brian.
(1)
Andress, Jason.
(1)
Anson, Steve.
(1)
Arthur, Will, author.
(1)
Bachrach, Daniel G., author.
(1)
Bahadur, Gary.
(1)
Bailey, Tucker, author.
(1)
Baloch, Rafay, author.
(1)
Banga, Premdeep.
(1)
Barbour, Jesse, on-screen presenter.
(1)
Barker, Keith.
(1)
Barnett, Ryan C.
(1)
Barth, Doug, author.
(1)
Baskin, Brian, author.
(1)
Baumrucker, C. Tate, author.
(1)
Bautista, Wilson, Jr., author.
(1)
Beaver, Kevin.
(1)
Beggs, Robert, author.
(1)
Behl, Akhil.
(1)
Bejtlich, Richard, author.
(1)
Bejtlich, Richard.
(1)
Bellovin, Steven M., author.
(1)
Bellovin, Steven, author.
(1)
Beltrame, Jason, author.
(1)
Bergman, Neil.
(1)
Berkouwer, Sander, author.
(1)
Bhattacharjee, Sravani, author.
(1)
Bierer, Doug.
(1)
Bindner, Andrew.
(1)
Bingley, Richard, author.
(1)
Bird, Jim, author.
(1)
Bishop, Matt (Matthew A.), author.
(1)
Bloch, Laurent, author.
(1)
Blum, Dan.
(1)
Bodmer, Sean, author.
(1)
Bolt, Steven.
(1)
Born, Michael, author.
(1)
Bose, S., author.
(1)
Boutaba, Raouf, author.
(1)
Bowen, Richard Cooper, 1971-
(1)
Branigan, Steven, author.
(1)
Brant, Justin M.
(1)
Breithaupt, Jim, 1955-
(1)
Broad, James.
(1)
Brooks, Charles J., author.
(1)
Brooks, R. R. (Richard R.)
(1)
Brown, Justin, author.
(1)
Brown, Martin, speaker.
(1)
Brunton-Spall, Michael, on-screen presenter.
(1)
Bryce, Chapin, author.
(1)
Burley, Diana L., author.
(1)
Burney, Sabrina, author.
(1)
Burney, Sonia, author.
(1)
Burton, James D., author.
(1)
Bussche, Martina vondem, author.
(1)
Cada, Libor, author.
(1)
Calles, Miguel A., author.
(1)
Canavan, Tom.
(1)
Cannon, Jason, speaker.
(1)
Cappelli, Dawn.
(1)
Carabaguiaz, Elias, author.
(1)
Cardwell, Kevin, author.
(1)
Carroll, Brandon.
(1)
Carvalho, Alex de.
(1)
Carvey, Harlan A.
(1)
Case, Andrew (Digital forensics researcher), author.
(1)
Caudill, Benjamin, author.
(1)
Challener, David, author.
(1)
Chapa, David A.
(1)
Chapman, Chris, author.
(1)
Chapman, D. Brent.
(1)
Chapman, Jerry W., author.
(1)
Chauhan, Ajay Singh, author.
(1)
Chauhan, Sudhanshu, author.
(1)
Chayapathi, Rajendra, author.
(1)
Cherry, Denny.
(1)
Cheswick, William, author.
(1)
Chimes, Steven, author.
(1)
Choi, Wai, author.
(1)
Chuvakin, Anton A., author.
(1)
Chuvakin, Anton.
(1)
Clarke, Justin.
(1)
Clarke, Nathan.
(1)
Clarke, Richard A., writer of foreword.
(1)
Coar, Ken A. L.
(1)
Cole, Eric.
(1)
Coles, Matthew J., author.
(1)
Collier, Mark D., author.
(1)
Conrad, Peter, author.
(1)
Coombs, Ted, author.
(1)
Cooper, Simon.
(1)
Copeland, Marshall.
(1)
Coulson, Andy, author.
(1)
Courcier, Scar de, author.
(1)
Cox, Kerry.
(1)
Cox, Michael.
(1)
Craig, Philip, author.
(1)
Crawley, Kim, author.
(1)
Credle, Rufus, author.
(1)
Crouthamel, Andrew, author.
(1)
Cunningham, Chase, author.
(1)
Curry, Mike.
(1)
CyberTraining 365, issuing body.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(492)
German
(9)
Polish
(3)
Undetermined
(3)
Chinese
(2)
French
(1)
Japanese
(1)
More
View All
Fewer
Collapse All
Publication Date
Include
Exclude
This graph shows the distribution of publication dates for use with a date range slider. Switch to Years view for a more detailed breakdown of search results by year.
From Publication Year
-
To Publication Year
2018
(74)
2019
(54)
2016
(49)
2014
(48)
2015
(48)
2017
(46)
2013
(31)
2012
(28)
2020
(28)
2011
(26)
2022
(18)
2021
(15)
2010
(12)
2002
(8)
2003
(8)
2004
(5)
2005
(4)
2009
(4)
2001
(3)
2000
(2)
2006
(2)
2008
(2)
1
(1)
3
(1)
1999
(1)
2007
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer networks -- Security measures.
(511)
Electronic books.
(269)
Computer security.
(221)
Sécurité informatique.
(212)
Computer Security
(133)
COMPUTERS -- Security -- General.
(83)
Penetration testing (Computer security)
(62)
Tests d'intrusion.
(62)
Data protection.
(55)
Protection de l'information (Informatique)
(55)
COMPUTERS -- Networking -- Security.
(49)
Information technology -- Security measures.
(46)
Technologie de l'information -- Sécurité -- Mesures.
(46)
COMPUTERS -- Internet -- Security.
(42)
Computer security -- Management.
(33)
Sécurité informatique -- Gestion.
(32)
Ordinateurs -- Accès -- Contrôle.
(25)
COMPUTERS -- Security -- Networking.
(24)
Computers -- Access control.
(24)
Electronic videos.
(24)
Hacking.
(23)
Information technology -- Management.
(23)
Piratage informatique.
(23)
Technologie de l'information -- Gestion.
(23)
Computer crimes -- Investigation.
(21)
Criminalité informatique -- Enquêtes.
(21)
Internet -- Security measures.
(21)
Internet -- Sécurité -- Mesures.
(21)
Kali Linux.
(21)
Computer networks -- Access control.
(19)
Engineering & Applied Sciences.
(18)
Computer crimes -- Prevention.
(17)
Electrical & Computer Engineering.
(17)
Telecommunications.
(17)
Hackers.
(16)
Pirates informatiques.
(16)
Application software -- Development.
(14)
Coupe-feu (Sécurité informatique)
(14)
Firewalls (Computer security)
(14)
Logiciels d'application -- Développement.
(14)
Business enterprises -- Computer networks -- Security measures.
(13)
COMPUTERS -- Information Technology.
(13)
Cloud computing.
(13)
Infonuagique.
(13)
Cloud computing -- Security measures.
(12)
Infonuagique -- Sécurité -- Mesures.
(12)
Chiffrement (Informatique)
(11)
Data encryption (Computer science)
(11)
Microsoft Windows (Computer file)
(11)
COMPUTERS -- Computer Literacy.
(10)
COMPUTERS -- Computer Science.
(10)
COMPUTERS -- Data Processing.
(10)
COMPUTERS -- Hardware -- General.
(10)
COMPUTERS -- Machine Theory.
(10)
COMPUTERS -- Reference.
(10)
Computer crimes.
(10)
Films autres que de fiction.
(10)
Films de formation.
(10)
Instructional films.
(10)
Internet videos.
(10)
Nonfiction films.
(10)
Vidéos sur Internet.
(10)
Web sites -- Security measures.
(10)
Webcast
(10)
Criminalité informatique.
(9)
Data protection -- Standards.
(9)
Network security.
(9)
Protection de l'information (Informatique) -- Normes.
(9)
Sites Web -- Sécurité -- Mesures.
(9)
Application software -- Testing.
(8)
Computer Science.
(8)
Computer networks.
(8)
Computers -- Security -- General.
(8)
Linux.
(8)
Python (Computer program language)
(8)
Python (Langage de programmation)
(8)
COMPUTERS -- Networking -- General.
(7)
Cyberspace -- Security measures.
(7)
Internet des objets.
(7)
Internet of things.
(7)
Réseaux d'ordinateurs.
(7)
Cartes de crédit.
(6)
Computer network protocols.
(6)
Computer networks -- Management.
(6)
Computer networks -- Monitoring.
(6)
Credit cards.
(6)
Datensicherung
(6)
Liability for credit information.
(6)
Protocoles de réseaux d'ordinateurs.
(6)
Responsabilité pour renseignements sur la solvabilité.
(6)
Réseaux d'ordinateurs -- Gestion.
(6)
Réseaux d'ordinateurs -- Surveillance.
(6)
Transmission sans fil -- Sécurité -- Mesures.
(6)
Wireless communication systems -- Security measures.
(6)
Apprentissage automatique.
(5)
BUSINESS & ECONOMICS -- Industrial Management.
(5)
BUSINESS & ECONOMICS -- Management Science.
(5)
BUSINESS & ECONOMICS -- Management.
(5)
BUSINESS & ECONOMICS -- Organizational Behavior.
(5)
Bases de données -- Gestion.
(5)
COMPUTERS -- Security -- Cryptography.
(5)
Database management.
(5)
Electronic commerce -- Security measures.
(5)
Gestion du risque.
(5)
Java (Computer program language)
(5)
Java (Langage de programmation)
(5)
Local area networks (Computer networks) -- Security measures.
(5)
Machine learning.
(5)
Operating systems (Computers)
(5)
Risk management.
(5)
Réseaux locaux (Informatique) -- Sécurité -- Mesures.
(5)
Sites Web -- Développement.
(5)
Study guides.
(5)
Systèmes d'exploitation (Ordinateurs)
(5)
Web site development.
(5)
Windows Azure.
(5)
operating systems.
(5)
Application software -- Security measures.
(4)
Architecture client-serveur (Informatique) -- Sécurité -- Mesures.
(4)
BUSINESS & ECONOMICS -- Corporate Governance.
(4)
Business -- Data processing -- Security measures.
(4)
COMPUTERS / Security / General.
(4)
Client/server computing -- Security measures.
(4)
Commerce électronique -- Sécurité -- Mesures.
(4)
Computer network architectures.
(4)
Computer networks -- Security measures -- Examinations -- Study guides.
(4)
Computer networks -- Security measures -- Examinations.
(4)
Computer science.
(4)
Computer technicians -- Certification.
(4)
Computersicherheit
(4)
Criminalistique.
(4)
Cyberterrorism.
(4)
Cyberterrorisme.
(4)
Directory services (Computer network technology)
(4)
Electronic information resources -- Access control.
(4)
Embedded Internet devices.
(4)
Forensic Sciences
(4)
Forensic sciences.
(4)
Gestion -- Informatique -- Sécurité -- Mesures.
(4)
Génie logiciel.
(4)
Handbooks and manuals.
(4)
Internet intégré.
(4)
Logiciels d'application -- Sécurité -- Mesures.
(4)
Logiciels libres.
(4)
Logiciels malveillants.
(4)
Malware (Computer software)
(4)
Microsoft Windows server.
(4)
Open source software.
(4)
Routers (Computer networks)
(4)
Routeurs (Réseaux d'ordinateurs)
(4)
Réseaux d'ordinateurs -- Architectures.
(4)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant.
(4)
Services d'annuaires (Technologie des réseaux)
(4)
Software engineering.
(4)
Sources d'information électroniques -- Accès -- Contrôle.
(4)
forensic science.
(4)
Application software.
(3)
Applications Web -- Sécurité -- Mesures.
(3)
Applications Web.
(3)
Audiobooks.
(3)
BUSINESS & ECONOMICS -- Leadership.
(3)
BUSINESS & ECONOMICS -- Organizational Development.
(3)
BUSINESS & ECONOMICS -- Workplace Culture.
(3)
Bases de données -- Sécurité -- Mesures.
(3)
COMPUTERS -- Security -- Online Safety & Privacy.
(3)
Coding theory & cryptology.
(3)
Computer Communication Networks
(3)
Computer crimes -- Investigation -- Methodology.
(3)
Computer networking & communications.
(3)
Computer security -- Testing.
(3)
Corporate culture.
(3)
Criminalité informatique -- Enquêtes -- Méthodologie.
(3)
Cryptographie.
(3)
Cryptography.
(3)
Culture d'entreprise.
(3)
Cyber intelligence (Computer security)
(3)
Data recovery (Computer science)
(3)
Database security.
(3)
Downloadable audio books.
(3)
Electronic data processing personnel -- Certification.
(3)
Guides et manuels.
(3)
Handbook
(3)
Industrie -- Sécurité -- Mesures.
(3)
Industries -- Security measures.
(3)
Information technology -- Security measures -- Management.
(3)
Informatique mobile -- Sécurité -- Mesures.
(3)
Informatique.
(3)
Infrastructure à clé publique (Sécurité informatique)
(3)
Livres audio.
(3)
Logiciels d'application.
(3)
Management information systems -- Security measures.
(3)
Mobile computing -- Security measures.
(3)
Operating systems.
(3)
Organizational Culture
(3)
Public key infrastructure (Computer security)
(3)
Récupération des données (Informatique)
(3)
Sites Web -- Conception.
(3)
Surveillance des menaces informatiques.
(3)
Systèmes d'information de gestion -- Sécurité -- Mesures.
(3)
Technologie de l'information -- Sécurité -- Mesures -- Gestion.
(3)
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
O'reilly E-Books
(511)
Library
Include
Exclude
IYTE Library
(511)
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
No results found