Search Results for - Narrowed by: O'reilly E-Books - Computer Science. - Réseaux d'ordinateurs -- Sécurité -- Mesures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AOREILLY$002509O$002527reilly$002bE-Books$0026qf$003dSUBJECT$002509Subject$002509Computer$002bScience.$002509Computer$002bScience.$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300?
2024-09-27T09:45:40Z
Privileged attack vectors : building effective cyber-defense strategies to protect organizations
ent://SD_ILS/0/SD_ILS:2314870
2024-09-27T09:45:40Z
2024-09-27T09:45:40Z
by Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format: Electronic Resources<br/>
Advanced persistent training : take your security awareness program to the next level
ent://SD_ILS/0/SD_ILS:2313452
2024-09-27T09:45:40Z
2024-09-27T09:45:40Z
by Schroeder, Jordan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228357/?ar">https://learning.oreilly.com/library/view/~/9781484228357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228357">https://learning.oreilly.com/library/view/~/9781484228357</a><br/>Format: Electronic Resources<br/>
CCNP security VPN 642-647 official cert guide
ent://SD_ILS/0/SD_ILS:2291830
2024-09-27T09:45:40Z
2024-09-27T09:45:40Z
by Hooper, Howard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132372046/?ar">https://go.oreilly.com/library-access/library/view/-/9780132372046/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132372046/?ar">https://learning.oreilly.com/library/view/~/9780132372046/?ar</a><br/>Format: Electronic Resources<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:2294655
2024-09-27T09:45:40Z
2024-09-27T09:45:40Z
by Easttom, Chuck.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar">https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132828284/?ar">https://learning.oreilly.com/library/view/~/9780132828284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132828284">https://learning.oreilly.com/library/view/~/9780132828284</a><br/>Format: Electronic Resources<br/>
AAA identity management security
ent://SD_ILS/0/SD_ILS:2290533
2024-09-27T09:45:40Z
2024-09-27T09:45:40Z
by Santuka, Vivek.<br/><a href="https://learning.oreilly.com/library/view/~/9781587141560">https://learning.oreilly.com/library/view/~/9781587141560</a>
<a href="https://learning.oreilly.com/library/view/~/9781587141560/?ar">https://learning.oreilly.com/library/view/~/9781587141560/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587141560/?ar">https://go.oreilly.com/library-access/library/view/-/9781587141560/?ar</a><br/>Format: Electronic Resources<br/>
Deploying Microsoft Forefront Unified Access Gateway 2010
ent://SD_ILS/0/SD_ILS:2290710
2024-09-27T09:45:40Z
2024-09-27T09:45:40Z
by Diogenes, Yuri.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735656758/?ar">https://learning.oreilly.com/library/view/~/9780735656758/?ar</a><br/>Format: Electronic Resources<br/>
Deploying Microsoft Forefront Protection 2010 for Exchange Server
ent://SD_ILS/0/SD_ILS:2290701
2024-09-27T09:45:40Z
2024-09-27T09:45:40Z
by Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656734/?ar">https://learning.oreilly.com/library/view/~/9780735656734/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar</a><br/>Format: Electronic Resources<br/>
Deploying Microsoft Forefront Threat Management Gateway 2010
ent://SD_ILS/0/SD_ILS:2290730
2024-09-27T09:45:40Z
2024-09-27T09:45:40Z
by Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656741/?ar">https://learning.oreilly.com/library/view/~/9780735656741/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar</a><br/>Format: Electronic Resources<br/>
Foundations of Mac OS X Leopard security
ent://SD_ILS/0/SD_ILS:2284628
2024-09-27T09:45:40Z
2024-09-27T09:45:40Z
by Edge, Charles S., Jr.<br/><a href="https://learning.oreilly.com/library/view/~/9781590599891/?ar">https://learning.oreilly.com/library/view/~/9781590599891/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar">https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781590599891">https://learning.oreilly.com/library/view/~/9781590599891</a><br/>Format: Electronic Resources<br/>
Mastering System Center Data Protection Manager 2007
ent://SD_ILS/0/SD_ILS:2284542
2024-09-27T09:45:40Z
2024-09-27T09:45:40Z
by Ganger, Devin L.<br/><a href="https://learning.oreilly.com/library/view/~/9780470181522/?ar">https://learning.oreilly.com/library/view/~/9780470181522/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar">https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470181522">https://learning.oreilly.com/library/view/~/9780470181522</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2282490
2024-09-27T09:45:40Z
2024-09-27T09:45:40Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format: Electronic Resources<br/>
Hunting security bugs
ent://SD_ILS/0/SD_ILS:2282720
2024-09-27T09:45:40Z
2024-09-27T09:45:40Z
by Gallagher, Tom.<br/><a href="https://learning.oreilly.com/library/view/~/073562187X">https://learning.oreilly.com/library/view/~/073562187X</a>
<a href="https://learning.oreilly.com/library/view/~/073562187X/?ar">https://learning.oreilly.com/library/view/~/073562187X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/073562187X/?ar">https://go.oreilly.com/library-access/library/view/-/073562187X/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft windows security resource kit
ent://SD_ILS/0/SD_ILS:2282820
2024-09-27T09:45:40Z
2024-09-27T09:45:40Z
by Smith, Ben, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780735621749">https://learning.oreilly.com/library/view/~/9780735621749</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar">https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735621749/?ar">https://learning.oreilly.com/library/view/~/9780735621749/?ar</a><br/>Format: Electronic Resources<br/>