Search Results for - Narrowed by: O'reilly E-Books - Sécurité informatique. - Wireless communication systems -- Security measures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AOREILLY$002509O$002527reilly$002bE-Books$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509Wireless$002bcommunication$002bsystems$002b--$002bSecurity$002bmeasures.$002509Wireless$002bcommunication$002bsystems$002b--$002bSecurity$002bmeasures.$0026ps$003d300?
2024-09-23T13:06:16Z
WIRELESS SECURITY ARCHITECTURE designing and maintaining secure wireless for enterprise.
ent://SD_ILS/0/SD_ILS:2331905
2024-09-23T13:06:16Z
2024-09-23T13:06:16Z
by MINELLA, JENNIFER.<br/><a href="https://learning.oreilly.com/library/view/~/9781119883050">https://learning.oreilly.com/library/view/~/9781119883050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119883050/?ar">https://go.oreilly.com/library-access/library/view/-/9781119883050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119883050/?ar">https://learning.oreilly.com/library/view/~/9781119883050/?ar</a><br/>Format: Electronic Resources<br/>
Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers
ent://SD_ILS/0/SD_ILS:2296624
2024-09-23T13:06:16Z
2024-09-23T13:06:16Z
by O'Connor, T. J.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499576/?ar">https://learning.oreilly.com/library/view/~/9781597499576/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499576">https://learning.oreilly.com/library/view/~/9781597499576</a><br/>Format: Electronic Resources<br/>
Honeypot : a new paradigm to information security
ent://SD_ILS/0/SD_ILS:2292506
2024-09-23T13:06:16Z
2024-09-23T13:06:16Z
by Joshi, R. C.<br/><a href="https://learning.oreilly.com/library/view/~/9781578087082">https://learning.oreilly.com/library/view/~/9781578087082</a>
<a href="https://learning.oreilly.com/library/view/~/9781578087082/?ar">https://learning.oreilly.com/library/view/~/9781578087082/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar">https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar</a><br/>Format: Electronic Resources<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:2288720
2024-09-23T13:06:16Z
2024-09-23T13:06:16Z
by Haines, Brad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417/?ar">https://learning.oreilly.com/library/view/~/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417">https://learning.oreilly.com/library/view/~/9781597495417</a><br/>Format: Electronic Resources<br/>
WarDriving & wireless penetration testing
ent://SD_ILS/0/SD_ILS:2282518
2024-09-23T13:06:16Z
2024-09-23T13:06:16Z
by Hurley, Chris.<br/><a href="https://www.sciencedirect.com/science/book/9781597491112">https://www.sciencedirect.com/science/book/9781597491112</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491112">https://learning.oreilly.com/library/view/~/9781597491112</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491112/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491112/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491112/?ar">https://learning.oreilly.com/library/view/~/9781597491112/?ar</a><br/>Format: Electronic Resources<br/>