Search Results for - Narrowed by: Podjarny, Guy, author. - S&eacute;curit&eacute; informatique. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509Podjarny$00252C$002bGuy$00252C$002bauthor.$002509Podjarny$00252C$002bGuy$00252C$002bauthor.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300? 2024-06-22T17:58:16Z Serverless security : protect functions using the CLAD security model ent://SD_ILS/0/SD_ILS:2323066 2024-06-22T17:58:16Z 2024-06-22T17:58:16Z by&#160;Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar">https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492082538/?ar">https://learning.oreilly.com/library/view/~/9781492082538/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492082538">https://learning.oreilly.com/library/view/~/9781492082538</a><br/>Format:&#160;Electronic Resources<br/> Securing open source libraries : managing vulnerabilities in open source code packages ent://SD_ILS/0/SD_ILS:2314890 2024-06-22T17:58:16Z 2024-06-22T17:58:16Z by&#160;Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996980/?ar">https://learning.oreilly.com/library/view/~/9781491996980/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996980">https://learning.oreilly.com/library/view/~/9781491996980</a><br/>Format:&#160;Electronic Resources<br/>