Search Results for - Narrowed by: O'reilly E-Books - Cloud computing. - Computer Security SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AOREILLY$002509O$002527reilly$002bE-Books$0026qf$003dSUBJECT$002509Subject$002509Cloud$002bcomputing.$002509Cloud$002bcomputing.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bSecurity$002509Computer$002bSecurity$0026ps$003d300? 2024-06-21T00:22:21Z The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more ent://SD_ILS/0/SD_ILS:2332630 2024-06-21T00:22:21Z 2024-06-21T00:22:21Z by&#160;Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format:&#160;Electronic Resources<br/> Snowflake security : securing your Snowflake data cloud ent://SD_ILS/0/SD_ILS:2330261 2024-06-21T00:22:21Z 2024-06-21T00:22:21Z by&#160;Herzberg, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484273890">https://learning.oreilly.com/library/view/~/9781484273890</a> <a href="https://learning.oreilly.com/library/view/~/9781484273890/?ar">https://learning.oreilly.com/library/view/~/9781484273890/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar">https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe ent://SD_ILS/0/SD_ILS:2324802 2024-06-21T00:22:21Z 2024-06-21T00:22:21Z by&#160;Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format:&#160;Electronic Resources<br/> Temenos on IBM LinuxONE Best Practices Guide ent://SD_ILS/0/SD_ILS:2323440 2024-06-21T00:22:21Z 2024-06-21T00:22:21Z by&#160;Coble, Deana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458458">https://learning.oreilly.com/library/view/~/9780738458458</a> <a href="https://learning.oreilly.com/library/view/~/9780738458458/?ar">https://learning.oreilly.com/library/view/~/9780738458458/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar</a><br/>Format:&#160;Electronic Resources<br/> Oracle cloud user security : providing for separation of duties and appropriate access by job function. ent://SD_ILS/0/SD_ILS:2322966 2024-06-21T00:22:21Z 2024-06-21T00:22:21Z by&#160;Malcher, Michelle, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar">https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781484255643/?ar">https://learning.oreilly.com/videos/~/9781484255643/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781484255643">https://learning.oreilly.com/videos/~/9781484255643</a><br/>Format:&#160;Electronic Resources<br/> Serverless security : protect functions using the CLAD security model ent://SD_ILS/0/SD_ILS:2323066 2024-06-21T00:22:21Z 2024-06-21T00:22:21Z by&#160;Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar">https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492082538/?ar">https://learning.oreilly.com/library/view/~/9781492082538/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492082538">https://learning.oreilly.com/library/view/~/9781492082538</a><br/>Format:&#160;Electronic Resources<br/> Securing your cloud : IBM security for LinuxONE ent://SD_ILS/0/SD_ILS:2321597 2024-06-21T00:22:21Z 2024-06-21T00:22:21Z by&#160;Alves, Edi Lopes, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457949/?ar">https://learning.oreilly.com/library/view/~/9780738457949/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2316778 2024-06-21T00:22:21Z 2024-06-21T00:22:21Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing cloud services ent://SD_ILS/0/SD_ILS:2306121 2024-06-21T00:22:21Z 2024-06-21T00:22:21Z by&#160;Miller, David, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar">https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771373340/?ar">https://learning.oreilly.com/videos/~/9781771373340/?ar</a><br/>Format:&#160;Electronic Resources<br/>