Search Results for - Narrowed by: O'Reilly for Higher Education (Firm), distributor. - S&eacute;curit&eacute; informatique. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509O$002527Reilly$002bfor$002bHigher$002bEducation$002b$002528Firm$002529$00252C$002bdistributor.$002509O$002527Reilly$002bfor$002bHigher$002bEducation$002b$002528Firm$002529$00252C$002bdistributor.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300? 2024-06-18T00:22:46Z Enterprise DevOps for Architects ent://SD_ILS/0/SD_ILS:2330978 2024-06-18T00:22:46Z 2024-06-18T00:22:46Z by&#160;Mulder, Jeroen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801812153">https://learning.oreilly.com/library/view/~/9781801812153</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812153/?ar">https://learning.oreilly.com/library/view/~/9781801812153/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with z/OS Data Set Encryption ent://SD_ILS/0/SD_ILS:2331252 2024-06-18T00:22:46Z 2024-06-18T00:22:46Z by&#160;White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a> <a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering VMware NSX for vSphere ent://SD_ILS/0/SD_ILS:2327302 2024-06-18T00:22:46Z 2024-06-18T00:22:46Z by&#160;Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119513544">https://learning.oreilly.com/library/view/~/9781119513544</a> <a href="https://learning.oreilly.com/library/view/~/9781119513544/?ar">https://learning.oreilly.com/library/view/~/9781119513544/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar">https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security for Wireless Sensor Networks using Identity-Based Cryptography ent://SD_ILS/0/SD_ILS:2327286 2024-06-18T00:22:46Z 2024-06-18T00:22:46Z by&#160;Patil, Harsh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439869024">https://learning.oreilly.com/library/view/~/9781439869024</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar">https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439869024/?ar">https://learning.oreilly.com/library/view/~/9781439869024/?ar</a><br/>Format:&#160;Electronic Resources<br/> Biometrics for Network Security ent://SD_ILS/0/SD_ILS:2326814 2024-06-18T00:22:46Z 2024-06-18T00:22:46Z by&#160;Reid, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131015494">https://learning.oreilly.com/library/view/~/0131015494</a> <a href="https://learning.oreilly.com/library/view/~/0131015494/?ar">https://learning.oreilly.com/library/view/~/0131015494/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131015494/?ar">https://go.oreilly.com/library-access/library/view/-/0131015494/?ar</a><br/>Format:&#160;Electronic Resources<br/>