Search Results for - Narrowed by: 2004 - Réseaux d'ordinateurs -- Sécurité -- Mesures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092004$0025092004$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300?
2024-05-30T11:21:06Z
The Tao of Network Security Monitoring Beyond Intrusion Detection
ent://SD_ILS/0/SD_ILS:2319768
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Bejtlich, Richard, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321246772/?ar">https://go.oreilly.com/library-access/library/view/-/0321246772/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321246772/?ar">https://learning.oreilly.com/library/view/~/0321246772/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321246772">https://learning.oreilly.com/library/view/~/0321246772</a><br/>Format: Electronic Resources<br/>
Mapping security : the corporate security sourcebook for today's global economy
ent://SD_ILS/0/SD_ILS:2315191
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Patterson, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321304527/?ar">https://go.oreilly.com/library-access/library/view/-/0321304527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321304527/?ar">https://learning.oreilly.com/library/view/~/0321304527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321304527">https://learning.oreilly.com/library/view/~/0321304527</a><br/>Format: Electronic Resources<br/>
Ethical Hack
ent://SD_ILS/0/SD_ILS:2326226
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Tiller, James S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203495414/?ar">https://go.oreilly.com/library-access/library/view/-/9780203495414/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203495414/?ar">https://learning.oreilly.com/library/view/~/9780203495414/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203495414">https://learning.oreilly.com/library/view/~/9780203495414</a><br/>Format: Electronic Resources<br/>
Defend I.T. : security by example
ent://SD_ILS/0/SD_ILS:2281496
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Gupta, Ajay.<br/><a href="https://learning.oreilly.com/library/view/~/0321197674">https://learning.oreilly.com/library/view/~/0321197674</a>
<a href="https://learning.oreilly.com/library/view/~/0321197674/?ar">https://learning.oreilly.com/library/view/~/0321197674/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321197674/?ar">https://go.oreilly.com/library-access/library/view/-/0321197674/?ar</a><br/>Format: Electronic Resources<br/>
Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ent://SD_ILS/0/SD_ILS:2281670
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Rosenberg, Jonathan B., 1956-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672326515/?ar">https://go.oreilly.com/library-access/library/view/-/0672326515/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672326515/?ar">https://learning.oreilly.com/library/view/~/0672326515/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672326515">https://learning.oreilly.com/library/view/~/0672326515</a><br/>Format: Electronic Resources<br/>
Securing Windows server 2003
ent://SD_ILS/0/SD_ILS:2282552
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Danseglio, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/0596006853">https://learning.oreilly.com/library/view/~/0596006853</a>
<a href="https://learning.oreilly.com/library/view/~/0596006853/?ar">https://learning.oreilly.com/library/view/~/0596006853/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006853/?ar">https://go.oreilly.com/library-access/library/view/-/0596006853/?ar</a><br/>Format: Electronic Resources<br/>
Hacking the code : ASP.NET web application security
ent://SD_ILS/0/SD_ILS:2281371
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Burnett, Mark (Mark M.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781932266658/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266658/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266658">https://learning.oreilly.com/library/view/~/9781932266658</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266658/?ar">https://learning.oreilly.com/library/view/~/9781932266658/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781932266658">https://www.sciencedirect.com/science/book/9781932266658</a><br/>Format: Electronic Resources<br/>
Network security hacks
ent://SD_ILS/0/SD_ILS:2281377
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596006438/?ar">https://go.oreilly.com/library-access/library/view/-/0596006438/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006438/?ar">https://learning.oreilly.com/library/view/~/0596006438/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006438">https://learning.oreilly.com/library/view/~/0596006438</a><br/>Format: Electronic Resources<br/>
Ethereal : packet sniffing
ent://SD_ILS/0/SD_ILS:2281331
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266825">https://learning.oreilly.com/library/view/~/9781932266825</a>
<a href="https://www.sciencedirect.com/science/book/9781932266825">https://www.sciencedirect.com/science/book/9781932266825</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266825/?ar">https://learning.oreilly.com/library/view/~/9781932266825/?ar</a><br/>Format: Electronic Resources<br/>
CCSP self-study : Cisco secure intrusion detection system (CSIDS)
ent://SD_ILS/0/SD_ILS:2283188
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Carter, Earl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587051443/?ar">https://go.oreilly.com/library-access/library/view/-/1587051443/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587051443/?ar">https://learning.oreilly.com/library/view/~/1587051443/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587051443">https://learning.oreilly.com/library/view/~/1587051443</a><br/>Format: Electronic Resources<br/>
Network security first-step
ent://SD_ILS/0/SD_ILS:2286922
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Thomas, Thomas M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587203206/?ar">https://go.oreilly.com/library-access/library/view/-/9781587203206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587203206/?ar">https://learning.oreilly.com/library/view/~/9781587203206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587203206">https://learning.oreilly.com/library/view/~/9781587203206</a><br/>Format: Electronic Resources<br/>
Managing security with Snort and IDS tools
ent://SD_ILS/0/SD_ILS:2291450
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Cox, Kerry.<br/><a href="https://learning.oreilly.com/library/view/~/0596006616">https://learning.oreilly.com/library/view/~/0596006616</a>
<a href="https://learning.oreilly.com/library/view/~/0596006616/?ar">https://learning.oreilly.com/library/view/~/0596006616/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006616/?ar">https://go.oreilly.com/library-access/library/view/-/0596006616/?ar</a><br/>Format: Electronic Resources<br/>
Apache cookbook
ent://SD_ILS/0/SD_ILS:2284337
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Coar, Ken A. L.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596001916/?ar">https://go.oreilly.com/library-access/library/view/-/0596001916/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596001916/?ar">https://learning.oreilly.com/library/view/~/0596001916/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596001916">https://learning.oreilly.com/library/view/~/0596001916</a><br/>Format: Electronic Resources<br/>
Assessing network security
ent://SD_ILS/0/SD_ILS:2281759
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Lam, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735620334/?ar">https://go.oreilly.com/library-access/library/view/-/0735620334/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735620334/?ar">https://learning.oreilly.com/library/view/~/0735620334/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735620334">https://learning.oreilly.com/library/view/~/0735620334</a><br/>Format: Electronic Resources<br/>
Network security architectures
ent://SD_ILS/0/SD_ILS:2281719
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Convery, Sean.<br/><a href="https://learning.oreilly.com/library/view/~/158705115X">https://learning.oreilly.com/library/view/~/158705115X</a>
<a href="https://learning.oreilly.com/library/view/~/158705115X/?ar">https://learning.oreilly.com/library/view/~/158705115X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/158705115X/?ar">https://go.oreilly.com/library-access/library/view/-/158705115X/?ar</a><br/>Format: Electronic Resources<br/>
Snort 2.1 intrusion detection
ent://SD_ILS/0/SD_ILS:2283640
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Beale, Jay.<br/><a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836043/?ar">https://learning.oreilly.com/library/view/~/9781931836043/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836043/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836043/?ar</a><br/>Format: Electronic Resources<br/>
Security warrior
ent://SD_ILS/0/SD_ILS:2283903
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Peikari, Cyrus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596005458/?ar">https://go.oreilly.com/library-access/library/view/-/0596005458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596005458/?ar">https://learning.oreilly.com/library/view/~/0596005458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596005458">https://learning.oreilly.com/library/view/~/0596005458</a><br/>Format: Electronic Resources<br/>
HIGH-TECH CRIMES REVEALED : CYBERWAR STORIES FROM THE DIGITAL FRONT
ent://SD_ILS/0/SD_ILS:2320688
2024-05-30T11:21:06Z
2024-05-30T11:21:06Z
by Branigan, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321218736/?ar">https://go.oreilly.com/library-access/library/view/-/0321218736/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321218736/?ar">https://learning.oreilly.com/library/view/~/0321218736/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321218736">https://learning.oreilly.com/library/view/~/0321218736</a><br/>Format: Electronic Resources<br/>