Search Results for - Narrowed by: Akula, Madhu, author. - Computer networks -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509Akula$00252C$002bMadhu$00252C$002bauthor.$002509Akula$00252C$002bMadhu$00252C$002bauthor.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue? 2024-06-21T12:13:18Z Security automation with ansible 2 : leverage ansible 2 to automate complex security tasks like application security, network security, and malware analysis ent://SD_ILS/0/SD_ILS:2272457 2024-06-21T12:13:18Z 2024-06-21T12:13:18Z by&#160;Akula, Madhu, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5188229">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security automation with Ansible 2 : leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis ent://SD_ILS/0/SD_ILS:2315483 2024-06-21T12:13:18Z 2024-06-21T12:13:18Z by&#160;Akula, Madhu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788394512">https://learning.oreilly.com/library/view/~/9781788394512</a> <a href="https://learning.oreilly.com/library/view/~/9781788394512/?ar">https://learning.oreilly.com/library/view/~/9781788394512/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788394512/?ar">https://go.oreilly.com/library-access/library/view/-/9781788394512/?ar</a><br/>Format:&#160;Electronic Resources<br/>