Search Results for - Narrowed by: English - O'reilly E-Books - Computer networks -- Security measures. - Vid&eacute;os sur Internet. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AOREILLY$002509O$002527reilly$002bE-Books$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Vid$0025C3$0025A9os$002bsur$002bInternet.$002509Vid$0025C3$0025A9os$002bsur$002bInternet.$0026ps$003d300? 2024-06-26T01:06:08Z SC-300 : Microsoft Identity and Access Administrator. ent://SD_ILS/0/SD_ILS:2331717 2024-06-26T01:06:08Z 2024-06-26T01:06:08Z by&#160;Nednur, Anand Rao, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803238043/?ar">https://learning.oreilly.com/videos/~/9781803238043/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803238043">https://learning.oreilly.com/videos/~/9781803238043</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803238043/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238043/?ar</a><br/>Format:&#160;Video recording<br/> Cybersecurity pevention and detection (Video collection). ent://SD_ILS/0/SD_ILS:2332252 2024-06-26T01:06:08Z 2024-06-26T01:06:08Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137929351">https://learning.oreilly.com/videos/~/9780137929351</a> <a href="https://learning.oreilly.com/videos/~/9780137929351/?ar">https://learning.oreilly.com/videos/~/9780137929351/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137929351/?ar">https://go.oreilly.com/library-access/library/view/-/9780137929351/?ar</a><br/>Format:&#160;Video recording<br/> Finding your cyber security path. ent://SD_ILS/0/SD_ILS:2332701 2024-06-26T01:06:08Z 2024-06-26T01:06:08Z by&#160;Miller, Alyssa, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202258">https://learning.oreilly.com/videos/~/10000MNHV202258</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202258/?ar">https://learning.oreilly.com/videos/~/10000MNHV202258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar</a><br/>Format:&#160;Video recording<br/> Threat modeling with Owasp Threat Dragon &amp; risk rating a vulnerability. ent://SD_ILS/0/SD_ILS:2332599 2024-06-26T01:06:08Z 2024-06-26T01:06:08Z by&#160;Fisher, Derek, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202248/?ar">https://learning.oreilly.com/videos/~/10000MNHV202248/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202248">https://learning.oreilly.com/videos/~/10000MNHV202248</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar</a><br/>Format:&#160;Video recording<br/> Digital forensics for pentesters : hands-on learning. ent://SD_ILS/0/SD_ILS:2331969 2024-06-26T01:06:08Z 2024-06-26T01:06:08Z by&#160;Krahenbill, Cliff, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803231969">https://learning.oreilly.com/videos/~/9781803231969</a> <a href="https://learning.oreilly.com/videos/~/9781803231969/?ar">https://learning.oreilly.com/videos/~/9781803231969/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar</a><br/>Format:&#160;Video recording<br/> Secure operations and protections ent://SD_ILS/0/SD_ILS:2332092 2024-06-26T01:06:08Z 2024-06-26T01:06:08Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format:&#160;Video recording<br/> Securing microservices with Istio Service Mesh ent://SD_ILS/0/SD_ILS:2331950 2024-06-26T01:06:08Z 2024-06-26T01:06:08Z by&#160;Siriwardena, Prabath, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202172">https://learning.oreilly.com/videos/~/10000MNLV202172</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202172/?ar">https://learning.oreilly.com/videos/~/10000MNLV202172/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar</a><br/>Format:&#160;Video recording<br/> Secrets management with Terraform ent://SD_ILS/0/SD_ILS:2331925 2024-06-26T01:06:08Z 2024-06-26T01:06:08Z by&#160;Winkler, Scott, author, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202178">https://learning.oreilly.com/videos/~/10000MNLV202178</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202178/?ar">https://learning.oreilly.com/videos/~/10000MNLV202178/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202178/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202178/?ar</a><br/>Format:&#160;Video recording<br/>