Search Results for - Narrowed by: Safari, an O'Reilly Media Company. - IYTE Library - Sécurité informatique.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509Safari$00252C$002ban$002bO$002527Reilly$002bMedia$002bCompany.$002509Safari$00252C$002ban$002bO$002527Reilly$002bMedia$002bCompany.$0026qf$003dLIBRARY$002509Library$0025091$00253AIYTE$002509IYTE$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300?
2024-09-27T08:42:40Z
Getting started with IBM Hyper Protect Data Controller
ent://SD_ILS/0/SD_ILS:2331451
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format: Electronic Resources<br/>
Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environment
ent://SD_ILS/0/SD_ILS:2330315
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800202092/?ar">https://learning.oreilly.com/library/view/~/9781800202092/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202092">https://learning.oreilly.com/library/view/~/9781800202092</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar</a><br/>Format: Electronic Resources<br/>
Enterprise DevOps for Architects
ent://SD_ILS/0/SD_ILS:2330978
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Mulder, Jeroen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801812153">https://learning.oreilly.com/library/view/~/9781801812153</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812153/?ar">https://learning.oreilly.com/library/view/~/9781801812153/?ar</a><br/>Format: Electronic Resources<br/>
Getting Started with z/OS Data Set Encryption
ent://SD_ILS/0/SD_ILS:2331252
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format: Electronic Resources<br/>
Temenos on IBM LinuxONE Best Practices Guide
ent://SD_ILS/0/SD_ILS:2323440
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Coble, Deana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458458">https://learning.oreilly.com/library/view/~/9780738458458</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458458/?ar">https://learning.oreilly.com/library/view/~/9780738458458/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar</a><br/>Format: Electronic Resources<br/>
IBM Security Key Lifecycle Manager
ent://SD_ILS/0/SD_ILS:2323982
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Chen, An, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458786/?ar">https://learning.oreilly.com/library/view/~/9780738458786/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458786">https://learning.oreilly.com/library/view/~/9780738458786</a><br/>Format: Electronic Resources<br/>
Cloud Computing Security, 2nd Edition
ent://SD_ILS/0/SD_ILS:2331101
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>
Build Your Own Cybersecurity Testing Lab : Low-cost Solutions for Testing in Virtual and Cloud-based Environments
ent://SD_ILS/0/SD_ILS:2323438
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260458329">https://learning.oreilly.com/library/view/~/9781260458329</a>
<a href="https://learning.oreilly.com/library/view/~/9781260458329/?ar">https://learning.oreilly.com/library/view/~/9781260458329/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar">https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar</a><br/>Format: Electronic Resources<br/>
Cyber Warfare - Truth, Tactics, and Strategies
ent://SD_ILS/0/SD_ILS:2323667
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format: Electronic Resources<br/>
Protecting Data Privacy Beyond the Trusted System of Record
ent://SD_ILS/0/SD_ILS:2323918
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format: Electronic Resources<br/>
Mastering VMware NSX for vSphere
ent://SD_ILS/0/SD_ILS:2327302
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119513544">https://learning.oreilly.com/library/view/~/9781119513544</a>
<a href="https://learning.oreilly.com/library/view/~/9781119513544/?ar">https://learning.oreilly.com/library/view/~/9781119513544/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar">https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar</a><br/>Format: Electronic Resources<br/>
Cyber-Vigilance and Digital Trust
ent://SD_ILS/0/SD_ILS:2324869
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Tounsi, Wiem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786304483">https://learning.oreilly.com/library/view/~/9781786304483</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304483/?ar">https://learning.oreilly.com/library/view/~/9781786304483/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar</a><br/>Format: Electronic Resources<br/>
Getting Started with Ghidra
ent://SD_ILS/0/SD_ILS:2322605
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar">https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265/?ar">https://learning.oreilly.com/library/view/~/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265">https://learning.oreilly.com/library/view/~/9781098115265</a><br/>Format: Electronic Resources<br/>
The Complete Ethical Hacking Course
ent://SD_ILS/0/SD_ILS:2323185
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format: Electronic Resources<br/>
Securing DevOps
ent://SD_ILS/0/SD_ILS:2319465
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Vehent, Julien, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar">https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617294136">https://learning.oreilly.com/library/view/~/9781617294136</a>
<a href="https://learning.oreilly.com/library/view/~/9781617294136/?ar">https://learning.oreilly.com/library/view/~/9781617294136/?ar</a><br/>Format: Electronic Resources<br/>
The Complete Guide to Cybersecurity Risks and Controls
ent://SD_ILS/0/SD_ILS:2324524
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Kohnke, Anne, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar">https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579/?ar">https://learning.oreilly.com/library/view/~/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579">https://learning.oreilly.com/library/view/~/9781498740579</a><br/>Format: Electronic Resources<br/>
Computer Security Literacy
ent://SD_ILS/0/SD_ILS:2323426
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Jacobson, Douglas, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856192/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856192/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856192/?ar">https://learning.oreilly.com/library/view/~/9781439856192/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856192">https://learning.oreilly.com/library/view/~/9781439856192</a><br/>Format: Electronic Resources<br/>
The CISO Handbook
ent://SD_ILS/0/SD_ILS:2323677
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Gentile, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031379">https://learning.oreilly.com/library/view/~/9781420031379</a>
<a href="https://learning.oreilly.com/library/view/~/9781420031379/?ar">https://learning.oreilly.com/library/view/~/9781420031379/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar</a><br/>Format: Electronic Resources<br/>
Information Security Management Handbook, Volume 6, 6th Edition
ent://SD_ILS/0/SD_ILS:2323397
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a>
<a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format: Electronic Resources<br/>
Security for Wireless Sensor Networks using Identity-Based Cryptography
ent://SD_ILS/0/SD_ILS:2327286
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Patil, Harsh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439869024">https://learning.oreilly.com/library/view/~/9781439869024</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar">https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439869024/?ar">https://learning.oreilly.com/library/view/~/9781439869024/?ar</a><br/>Format: Electronic Resources<br/>
Secure and Resilient Software
ent://SD_ILS/0/SD_ILS:2323699
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Merkow, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439866221/?ar">https://learning.oreilly.com/library/view/~/9781439866221/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439866221/?ar">https://go.oreilly.com/library-access/library/view/-/9781439866221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439866221">https://learning.oreilly.com/library/view/~/9781439866221</a><br/>Format: Electronic Resources<br/>
Set Up Security and Integration with the DataPower XI50z for zEnterprise
ent://SD_ILS/0/SD_ILS:2323901
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Credle, Rufus, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738436348/?ar">https://learning.oreilly.com/library/view/~/0738436348/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738436348">https://learning.oreilly.com/library/view/~/0738436348</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738436348/?ar">https://go.oreilly.com/library-access/library/view/-/0738436348/?ar</a><br/>Format: Electronic Resources<br/>
Biometrics for Network Security
ent://SD_ILS/0/SD_ILS:2326814
2024-09-27T08:42:40Z
2024-09-27T08:42:40Z
by Reid, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131015494">https://learning.oreilly.com/library/view/~/0131015494</a>
<a href="https://learning.oreilly.com/library/view/~/0131015494/?ar">https://learning.oreilly.com/library/view/~/0131015494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131015494/?ar">https://go.oreilly.com/library-access/library/view/-/0131015494/?ar</a><br/>Format: Electronic Resources<br/>