Search Results for - Narrowed by: O'reilly E-Books - Cloud computing. - Computer Security
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AOREILLY$002509O$002527reilly$002bE-Books$0026qf$003dSUBJECT$002509Subject$002509Cloud$002bcomputing.$002509Cloud$002bcomputing.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bSecurity$002509Computer$002bSecurity$0026ps$003d300?
2024-06-21T00:22:21Z
The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more
ent://SD_ILS/0/SD_ILS:2332630
2024-06-21T00:22:21Z
2024-06-21T00:22:21Z
by Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format: Electronic Resources<br/>
Snowflake security : securing your Snowflake data cloud
ent://SD_ILS/0/SD_ILS:2330261
2024-06-21T00:22:21Z
2024-06-21T00:22:21Z
by Herzberg, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484273890">https://learning.oreilly.com/library/view/~/9781484273890</a>
<a href="https://learning.oreilly.com/library/view/~/9781484273890/?ar">https://learning.oreilly.com/library/view/~/9781484273890/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar">https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar</a><br/>Format: Electronic Resources<br/>
Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
ent://SD_ILS/0/SD_ILS:2324802
2024-06-21T00:22:21Z
2024-06-21T00:22:21Z
by Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format: Electronic Resources<br/>
Temenos on IBM LinuxONE Best Practices Guide
ent://SD_ILS/0/SD_ILS:2323440
2024-06-21T00:22:21Z
2024-06-21T00:22:21Z
by Coble, Deana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458458">https://learning.oreilly.com/library/view/~/9780738458458</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458458/?ar">https://learning.oreilly.com/library/view/~/9780738458458/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar</a><br/>Format: Electronic Resources<br/>
Oracle cloud user security : providing for separation of duties and appropriate access by job function.
ent://SD_ILS/0/SD_ILS:2322966
2024-06-21T00:22:21Z
2024-06-21T00:22:21Z
by Malcher, Michelle, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar">https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484255643/?ar">https://learning.oreilly.com/videos/~/9781484255643/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484255643">https://learning.oreilly.com/videos/~/9781484255643</a><br/>Format: Electronic Resources<br/>
Serverless security : protect functions using the CLAD security model
ent://SD_ILS/0/SD_ILS:2323066
2024-06-21T00:22:21Z
2024-06-21T00:22:21Z
by Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar">https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538/?ar">https://learning.oreilly.com/library/view/~/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538">https://learning.oreilly.com/library/view/~/9781492082538</a><br/>Format: Electronic Resources<br/>
Securing your cloud : IBM security for LinuxONE
ent://SD_ILS/0/SD_ILS:2321597
2024-06-21T00:22:21Z
2024-06-21T00:22:21Z
by Alves, Edi Lopes, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457949/?ar">https://learning.oreilly.com/library/view/~/9780738457949/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2316778
2024-06-21T00:22:21Z
2024-06-21T00:22:21Z
by Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format: Electronic Resources<br/>
Securing cloud services
ent://SD_ILS/0/SD_ILS:2306121
2024-06-21T00:22:21Z
2024-06-21T00:22:21Z
by Miller, David, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar">https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771373340/?ar">https://learning.oreilly.com/videos/~/9781771373340/?ar</a><br/>Format: Electronic Resources<br/>