Search Results for - Narrowed by: Chinese - Computer SecuritySirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLANGUAGE$002509Language$002509CHI$002509Chinese$0026qf$003dSUBJECT$002509Subject$002509Computer$002bSecurity$002509Computer$002bSecurity$0026ps$003d300?2024-06-04T13:47:49ZQi ye shen tou ce shi he chi xu jian kong.ent://SD_ILS/0/SD_ILS:23322892024-06-04T13:47:49Z2024-06-04T13:47:49Zby Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format: Video recording<br/>Hei ke wang luo ying yong : wang luo qin ru ying yong.ent://SD_ILS/0/SD_ILS:23322882024-06-04T13:47:49Z2024-06-04T13:47:49Zby Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a>
<a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format: Video recording<br/>An quan shen tou ce shi.ent://SD_ILS/0/SD_ILS:23324372024-06-04T13:47:49Z2024-06-04T13:47:49Zby Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882021010401/?ar">https://learning.oreilly.com/videos/~/8882021010401/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010401">https://learning.oreilly.com/videos/~/8882021010401</a>
<a href="https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar</a><br/>Format: Video recording<br/>IOS an quan fang hu = Hacking and securing iOS applicationsent://SD_ILS/0/SD_ILS:23318112024-06-04T13:47:49Z2024-06-04T13:47:49Zby Zdziarski, Jonathan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789862766484">https://learning.oreilly.com/library/view/~/9789862766484</a>
<a href="https://learning.oreilly.com/library/view/~/9789862766484/?ar">https://learning.oreilly.com/library/view/~/9789862766484/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9789862766484/?ar">https://go.oreilly.com/library-access/library/view/-/9789862766484/?ar</a><br/>Format: Electronic Resources<br/>