Search Results for - Narrowed by: E-Book - COMPUTERS -- Reference. - Computer networks -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dITYPE$002509Material$002bType$0025091$00253AE-BOOKS$002509E-Book$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bReference.$002509COMPUTERS$002b--$002bReference.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-09-27T01:49:01ZMastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and dataent://SD_ILS/0/SD_ILS:23192382024-09-27T01:49:01Z2024-09-27T01:49:01Zby Nickel, Jochen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789132304/?ar">https://learning.oreilly.com/library/view/~/9781789132304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar">https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar</a><br/>Format: Electronic Resources<br/>Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threatsent://SD_ILS/0/SD_ILS:23168332024-09-27T01:49:01Z2024-09-27T01:49:01Zby Crouthamel, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788626521/?ar">https://learning.oreilly.com/library/view/~/9781788626521/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar">https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar</a><br/>Format: Electronic Resources<br/>Practical Industrial Internet of Things security : a practitioner's guide to securing connected industriesent://SD_ILS/0/SD_ILS:23172852024-09-27T01:49:01Z2024-09-27T01:49:01Zby Bhattacharjee, Sravani, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788832687/?ar">https://learning.oreilly.com/library/view/~/9781788832687/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788832687">https://learning.oreilly.com/library/view/~/9781788832687</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar">https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar</a><br/>Format: Electronic Resources<br/>Network functions virtualization (NFV) with a touch of SDNent://SD_ILS/0/SD_ILS:23119832024-09-27T01:49:01Z2024-09-27T01:49:01Zby Chayapathi, Rajendra, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134464312">https://learning.oreilly.com/library/view/~/9780134464312</a>
<a href="https://learning.oreilly.com/library/view/~/9780134464312/?ar">https://learning.oreilly.com/library/view/~/9780134464312/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134464312/?ar">https://go.oreilly.com/library-access/library/view/-/9780134464312/?ar</a><br/>Format: Electronic Resources<br/>Securing the internet of thingsent://SD_ILS/0/SD_ILS:23123482024-09-27T01:49:01Z2024-09-27T01:49:01Zby Li, Shancang, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045053">https://learning.oreilly.com/library/view/~/9780128045053</a>
<a href="https://learning.oreilly.com/library/view/~/9780128045053/?ar">https://learning.oreilly.com/library/view/~/9780128045053/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar</a><br/>Format: Electronic Resources<br/>A study of black hole attack solutions : on AODV routing protocol in MANETent://SD_ILS/0/SD_ILS:23090382024-09-27T01:49:01Z2024-09-27T01:49:01Zby Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format: Electronic Resources<br/>Foundations of modern networking : SDN, NFV, QoE, IoT, and Cloudent://SD_ILS/0/SD_ILS:23088002024-09-27T01:49:01Z2024-09-27T01:49:01Zby Stallings, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134175478/?ar">https://learning.oreilly.com/library/view/~/9780134175478/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar">https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar</a><br/>Format: Electronic Resources<br/>Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniquesent://SD_ILS/0/SD_ILS:23068592024-09-27T01:49:01Z2024-09-27T01:49:01Zby Chauhan, Sudhanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128018675">https://learning.oreilly.com/library/view/~/9780128018675</a>
<a href="https://learning.oreilly.com/library/view/~/9780128018675/?ar">https://learning.oreilly.com/library/view/~/9780128018675/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128018675/?ar">https://go.oreilly.com/library-access/library/view/-/9780128018675/?ar</a><br/>Format: Electronic Resources<br/>Packet analysis with Wireshark : leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysisent://SD_ILS/0/SD_ILS:23093482024-09-27T01:49:01Z2024-09-27T01:49:01Zby Nath, Anish, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785887819/?ar">https://learning.oreilly.com/library/view/~/9781785887819/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785887819">https://learning.oreilly.com/library/view/~/9781785887819</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785887819/?ar">https://go.oreilly.com/library-access/library/view/-/9781785887819/?ar</a><br/>Format: Electronic Resources<br/>The basics of IT audit : Purposes, processes, and practical information.ent://SD_ILS/0/SD_ILS:23015012024-09-27T01:49:01Z2024-09-27T01:49:01Zby Gantz, Stephen D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596/?ar">https://learning.oreilly.com/library/view/~/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596">https://learning.oreilly.com/library/view/~/9780124171596</a><br/>Format: Electronic Resources<br/>Unauthorised access : physical penetration testing for IT security teamsent://SD_ILS/0/SD_ILS:22884522024-09-27T01:49:01Z2024-09-27T01:49:01Zby Allsopp, Wil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar">https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470747612/?ar">https://learning.oreilly.com/library/view/~/9780470747612/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470747612">https://learning.oreilly.com/library/view/~/9780470747612</a><br/>Format: Electronic Resources<br/>IT compliance and controls : best practices for implementationent://SD_ILS/0/SD_ILS:22885332024-09-27T01:49:01Z2024-09-27T01:49:01Zby DeLuccia, James J., 1977-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470145012/?ar">https://go.oreilly.com/library-access/library/view/-/9780470145012/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470145012/?ar">https://learning.oreilly.com/library/view/~/9780470145012/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470145012">https://learning.oreilly.com/library/view/~/9780470145012</a><br/>Format: Electronic Resources<br/>