Search Results for - Narrowed by: O'reilly E-Books - Sécurité informatique. - United States.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AOREILLY$002509O$002527reilly$002bE-Books$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509United$002bStates.$002509United$002bStates.$0026ps$003d300?
2024-06-25T12:51:59Z
Healthcare fraud : auditing and detection guide
ent://SD_ILS/0/SD_ILS:2294132
2024-06-25T12:51:59Z
2024-06-25T12:51:59Z
by Busch, Rebecca S.<br/><a href="https://learning.oreilly.com/library/view/~/9781118240250/?ar">https://learning.oreilly.com/library/view/~/9781118240250/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118240250/?ar">https://go.oreilly.com/library-access/library/view/-/9781118240250/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118240250">https://learning.oreilly.com/library/view/~/9781118240250</a><br/>Format: Electronic Resources<br/>
Windows forensic analysis toolkit
ent://SD_ILS/0/SD_ILS:2295823
2024-06-25T12:51:59Z
2024-06-25T12:51:59Z
by Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format: Electronic Resources<br/>
Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
ent://SD_ILS/0/SD_ILS:2286982
2024-06-25T12:51:59Z
2024-06-25T12:51:59Z
by Collberg, Christian.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591258/?ar">https://learning.oreilly.com/library/view/~/9780321591258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar</a><br/>Format: Electronic Resources<br/>
Geekonomics : the real cost of insecure software
ent://SD_ILS/0/SD_ILS:2284350
2024-06-25T12:51:59Z
2024-06-25T12:51:59Z
by Rice, David, 1971-<br/><a href="https://learning.oreilly.com/library/view/~/9780321477897/?ar">https://learning.oreilly.com/library/view/~/9780321477897/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321477897/?ar">https://go.oreilly.com/library-access/library/view/-/9780321477897/?ar</a><br/>Format: Electronic Resources<br/>
The business case for network security : advocacy, governance, and ROI
ent://SD_ILS/0/SD_ILS:2281646
2024-06-25T12:51:59Z
2024-06-25T12:51:59Z
by Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587201216/?ar">https://go.oreilly.com/library-access/library/view/-/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216/?ar">https://learning.oreilly.com/library/view/~/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216">https://learning.oreilly.com/library/view/~/1587201216</a><br/>Format: Electronic Resources<br/>