Search Results for - Narrowed by: Manning (Firm), publisher. - Computer networks -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509Manning$002b$002528Firm$002529$00252C$002bpublisher.$002509Manning$002b$002528Firm$002529$00252C$002bpublisher.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue? 2024-06-16T22:11:27Z Threat modeling with Owasp Threat Dragon &amp; risk rating a vulnerability. ent://SD_ILS/0/SD_ILS:2332599 2024-06-16T22:11:27Z 2024-06-16T22:11:27Z by&#160;Fisher, Derek, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202248/?ar">https://learning.oreilly.com/videos/~/10000MNHV202248/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202248">https://learning.oreilly.com/videos/~/10000MNHV202248</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar</a><br/>Format:&#160;Video recording<br/> Finding your cyber security path. ent://SD_ILS/0/SD_ILS:2332701 2024-06-16T22:11:27Z 2024-06-16T22:11:27Z by&#160;Miller, Alyssa, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202258">https://learning.oreilly.com/videos/~/10000MNHV202258</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202258/?ar">https://learning.oreilly.com/videos/~/10000MNHV202258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar</a><br/>Format:&#160;Video recording<br/> Single sign-on and passwordless authentication : an overview. ent://SD_ILS/0/SD_ILS:2333558 2024-06-16T22:11:27Z 2024-06-16T22:11:27Z by&#160;Ovcharov, Andrey, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202294">https://learning.oreilly.com/videos/~/10000MNHV202294</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202294/?ar">https://learning.oreilly.com/videos/~/10000MNHV202294/?ar</a><br/>Format:&#160;Video recording<br/> Securing microservices with Istio Service Mesh ent://SD_ILS/0/SD_ILS:2331950 2024-06-16T22:11:27Z 2024-06-16T22:11:27Z by&#160;Siriwardena, Prabath, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202172">https://learning.oreilly.com/videos/~/10000MNLV202172</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202172/?ar">https://learning.oreilly.com/videos/~/10000MNLV202172/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar</a><br/>Format:&#160;Video recording<br/>