Search Results for - Narrowed by: O'Reilly (Firm), publisher. - Computer networks -- Security measures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509O$002527Reilly$002b$002528Firm$002529$00252C$002bpublisher.$002509O$002527Reilly$002b$002528Firm$002529$00252C$002bpublisher.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue?
2024-09-23T07:25:59Z
Defensive cybersecurity fundamentals
ent://SD_ILS/0/SD_ILS:2333379
2024-09-23T07:25:59Z
2024-09-23T07:25:59Z
by Berlin, Amanda, author.<br/><a href="https://learning.oreilly.com/videos/~/0636920670896/?ar">https://learning.oreilly.com/videos/~/0636920670896/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920670896/?ar">https://go.oreilly.com/library-access/library/view/-/0636920670896/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920670896">https://learning.oreilly.com/videos/~/0636920670896</a><br/>Format: Video recording<br/>
Hands-on threat modeling
ent://SD_ILS/0/SD_ILS:2333383
2024-09-23T07:25:59Z
2024-09-23T07:25:59Z
by Deleersnyder, Sebastien, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671268">https://learning.oreilly.com/videos/~/0636920671268</a>
<a href="https://learning.oreilly.com/videos/~/0636920671268/?ar">https://learning.oreilly.com/videos/~/0636920671268/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar</a><br/>Format: Video recording<br/>
Windows Network security fundamentals
ent://SD_ILS/0/SD_ILS:2333384
2024-09-23T07:25:59Z
2024-09-23T07:25:59Z
by Weadock, Glenn E., presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206">https://learning.oreilly.com/videos/~/0636920671206</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206/?ar">https://learning.oreilly.com/videos/~/0636920671206/?ar</a><br/>Format: Video recording<br/>
Identity and access management fundamentals.
ent://SD_ILS/0/SD_ILS:2335277
2024-09-23T07:25:59Z
2024-09-23T07:25:59Z
by Kohli, Harpreet, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671145/?ar">https://learning.oreilly.com/videos/~/0636920671145/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920671145">https://learning.oreilly.com/videos/~/0636920671145</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar</a><br/>Format: Video recording<br/>
How Lyft migrated to a service mesh with Envoy
ent://SD_ILS/0/SD_ILS:2323296
2024-09-23T07:25:59Z
2024-09-23T07:25:59Z
by Hochman, Daniel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338390/?ar">https://learning.oreilly.com/videos/~/0636920338390/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920338390">https://learning.oreilly.com/videos/~/0636920338390</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar</a><br/>Format: Electronic Resources<br/>
O'Reilly Velocity Conference 2019, San Jose, California.
ent://SD_ILS/0/SD_ILS:2322886
2024-09-23T07:25:59Z
2024-09-23T07:25:59Z
by O'Reilly Velocity Conference (2019 : San Jose, Calif.) issuing body.<br/><a href="https://learning.oreilly.com/videos/~/9781492050582/?ar">https://learning.oreilly.com/videos/~/9781492050582/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492050582/?ar">https://go.oreilly.com/library-access/library/view/-/9781492050582/?ar</a><br/>Format: Electronic Resources<br/>
Implementing Cisco network security, Part 2.
ent://SD_ILS/0/SD_ILS:2334801
2024-09-23T07:25:59Z
2024-09-23T07:25:59Z
by Pickard, John, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar">https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920303213">https://learning.oreilly.com/videos/~/0636920303213</a>
<a href="https://learning.oreilly.com/videos/~/0636920303213/?ar">https://learning.oreilly.com/videos/~/0636920303213/?ar</a><br/>Format: Video recording<br/>
Practical cloud security.
ent://SD_ILS/0/SD_ILS:2334616
2024-09-23T07:25:59Z
2024-09-23T07:25:59Z
by Dotson, Chris, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar">https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727">https://learning.oreilly.com/videos/~/9781492060727</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727/?ar">https://learning.oreilly.com/videos/~/9781492060727/?ar</a><br/>Format: Video recording<br/>
Supervised machine learning in security applications.
ent://SD_ILS/0/SD_ILS:2334773
2024-09-23T07:25:59Z
2024-09-23T07:25:59Z
by Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032410">https://learning.oreilly.com/videos/~/9781492032410</a>
<a href="https://learning.oreilly.com/videos/~/9781492032410/?ar">https://learning.oreilly.com/videos/~/9781492032410/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar</a><br/>Format: Video recording<br/>
Unsupervised machine learning in security applications.
ent://SD_ILS/0/SD_ILS:2334784
2024-09-23T07:25:59Z
2024-09-23T07:25:59Z
by Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032373">https://learning.oreilly.com/videos/~/9781492032373</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492032373/?ar">https://learning.oreilly.com/videos/~/9781492032373/?ar</a><br/>Format: Video recording<br/>
Securing microservices : protect sensitive data in transit and at rest.
ent://SD_ILS/0/SD_ILS:2334787
2024-09-23T07:25:59Z
2024-09-23T07:25:59Z
by Newman, Sam, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar">https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492038986/?ar">https://learning.oreilly.com/videos/~/9781492038986/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492038986">https://learning.oreilly.com/videos/~/9781492038986</a><br/>Format: Video recording<br/>
Preparing and exploring security data for machine learning.
ent://SD_ILS/0/SD_ILS:2334770
2024-09-23T07:25:59Z
2024-09-23T07:25:59Z
by Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032335">https://learning.oreilly.com/videos/~/9781492032335</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492032335/?ar">https://learning.oreilly.com/videos/~/9781492032335/?ar</a><br/>Format: Video recording<br/>
Managing SSH clients and servers.
ent://SD_ILS/0/SD_ILS:2334344
2024-09-23T07:25:59Z
2024-09-23T07:25:59Z
by Wallen, Jack, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar">https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492031666">https://learning.oreilly.com/videos/~/9781492031666</a>
<a href="https://learning.oreilly.com/videos/~/9781492031666/?ar">https://learning.oreilly.com/videos/~/9781492031666/?ar</a><br/>Format: Video recording<br/>
Capture and analysis of network-based evidence.
ent://SD_ILS/0/SD_ILS:2334767
2024-09-23T07:25:59Z
2024-09-23T07:25:59Z
by Messier, Ric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492029182">https://learning.oreilly.com/videos/~/9781492029182</a>
<a href="https://learning.oreilly.com/videos/~/9781492029182/?ar">https://learning.oreilly.com/videos/~/9781492029182/?ar</a><br/>Format: Video recording<br/>
Forensic analysis of computer memory.
ent://SD_ILS/0/SD_ILS:2334797
2024-09-23T07:25:59Z
2024-09-23T07:25:59Z
by Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029144">https://learning.oreilly.com/videos/~/9781492029144</a>
<a href="https://learning.oreilly.com/videos/~/9781492029144/?ar">https://learning.oreilly.com/videos/~/9781492029144/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar</a><br/>Format: Video recording<br/>