Search Results for - Narrowed by: 2008 - Sécurité informatique.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300$0026isd$003dtrue?
2024-09-27T06:35:12Z
Professional ASP.NET 3.5 security, membership, and role management with C♯ and VB
ent://SD_ILS/0/SD_ILS:2291742
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Haidar, Bilal.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470379301/?ar">https://go.oreilly.com/library-access/library/view/-/9780470379301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470379301/?ar">https://learning.oreilly.com/library/view/~/9780470379301/?ar</a><br/>Format: Electronic Resources<br/>
Is it safe? : protecting your computer, your business, and yourself online
ent://SD_ILS/0/SD_ILS:2285554
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Miller, Michael, 1958-<br/><a href="https://learning.oreilly.com/library/view/~/9780768683080/?ar">https://learning.oreilly.com/library/view/~/9780768683080/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar">https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768683080">https://learning.oreilly.com/library/view/~/9780768683080</a><br/>Format: Electronic Resources<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:2284222
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Harris, Shon.<br/><a href="https://learning.oreilly.com/library/view/~/9780071495684/?ar">https://learning.oreilly.com/library/view/~/9780071495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar">https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar</a><br/>Format: Electronic Resources<br/>
The new school of information security
ent://SD_ILS/0/SD_ILS:2285032
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Shostack, Adam.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321562753/?ar">https://go.oreilly.com/library-access/library/view/-/9780321562753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321562753/?ar">https://learning.oreilly.com/library/view/~/9780321562753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321562753">https://learning.oreilly.com/library/view/~/9780321562753</a><br/>Format: Electronic Resources<br/>
A practical guide to trusted computing
ent://SD_ILS/0/SD_ILS:2284460
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Challener, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780132398428">https://learning.oreilly.com/library/view/~/9780132398428</a>
<a href="https://learning.oreilly.com/library/view/~/9780132398428/?ar">https://learning.oreilly.com/library/view/~/9780132398428/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132398428/?ar">https://go.oreilly.com/library-access/library/view/-/9780132398428/?ar</a><br/>Format: Electronic Resources<br/>
Google hacking for penetration testers. Volume 2
ent://SD_ILS/0/SD_ILS:2284509
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Long, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491761/?ar">https://learning.oreilly.com/library/view/~/9781597491761/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar</a><br/>Format: Electronic Resources<br/>
OSSEC host-based intrusion detection guide
ent://SD_ILS/0/SD_ILS:2285140
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Hay, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492409">https://learning.oreilly.com/library/view/~/9781597492409</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492409/?ar">https://learning.oreilly.com/library/view/~/9781597492409/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar</a><br/>Format: Electronic Resources<br/>
Securing Windows server 2008 : prevent attacks from outside and inside your organization.
ent://SD_ILS/0/SD_ILS:2285141
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
<a href="https://learning.oreilly.com/library/view/~/9781597492805">https://learning.oreilly.com/library/view/~/9781597492805</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492805/?ar">https://learning.oreilly.com/library/view/~/9781597492805/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Windows server 2008 security resource kit
ent://SD_ILS/0/SD_ILS:2284887
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Johansson, Jesper M.<br/><a href="https://learning.oreilly.com/library/view/~/9780735625044/?ar">https://learning.oreilly.com/library/view/~/9780735625044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735625044">https://learning.oreilly.com/library/view/~/9780735625044</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735625044/?ar">https://go.oreilly.com/library-access/library/view/-/9780735625044/?ar</a><br/>Format: Electronic Resources<br/>
Geekonomics : the real cost of insecure software
ent://SD_ILS/0/SD_ILS:2284350
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Rice, David, 1971-<br/><a href="https://learning.oreilly.com/library/view/~/9780321477897/?ar">https://learning.oreilly.com/library/view/~/9780321477897/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321477897/?ar">https://go.oreilly.com/library-access/library/view/-/9780321477897/?ar</a><br/>Format: Electronic Resources<br/>
Software security engineering : a guide for project managers
ent://SD_ILS/0/SD_ILS:2284470
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Allen, Julia H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar">https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321559685/?ar">https://learning.oreilly.com/library/view/~/9780321559685/?ar</a><br/>Format: Electronic Resources<br/>
No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing
ent://SD_ILS/0/SD_ILS:2285143
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Long, Johnny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492157/?ar">https://learning.oreilly.com/library/view/~/9781597492157/?ar</a><br/>Format: Electronic Resources<br/>
Creating the secure managed desktop : using group policy, SoftGrid, Microsoft deployment toolkit, and other management tools
ent://SD_ILS/0/SD_ILS:2288756
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470277645/?ar">https://learning.oreilly.com/library/view/~/9780470277645/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470277645/?ar">https://go.oreilly.com/library-access/library/view/-/9780470277645/?ar</a><br/>Format: Electronic Resources<br/>
Group policy : fundamentals, security, and troubleshooting
ent://SD_ILS/0/SD_ILS:2288763
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470275894/?ar">https://learning.oreilly.com/library/view/~/9780470275894/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar">https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar</a><br/>Format: Electronic Resources<br/>
Deployment guides series. IBM Tivoli Compliance Insight Manager
ent://SD_ILS/0/SD_ILS:2294667
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738485705/?ar">https://go.oreilly.com/library-access/library/view/-/0738485705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738485705/?ar">https://learning.oreilly.com/library/view/~/0738485705/?ar</a><br/>Format: Electronic Resources<br/>
Scene of the cybercrime.
ent://SD_ILS/0/SD_ILS:2285149
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492768">https://learning.oreilly.com/library/view/~/9781597492768</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492768/?ar">https://learning.oreilly.com/library/view/~/9781597492768/?ar</a><br/>Format: Electronic Resources<br/>
OS X exploits and defense
ent://SD_ILS/0/SD_ILS:2285157
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Baccas, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492546/?ar">https://learning.oreilly.com/library/view/~/9781597492546/?ar</a><br/>Format: Electronic Resources<br/>
The craft of system security
ent://SD_ILS/0/SD_ILS:2284058
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Smith, Sean W., 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780321434838">https://learning.oreilly.com/library/view/~/9780321434838</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321434838/?ar">https://go.oreilly.com/library-access/library/view/-/9780321434838/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321434838/?ar">https://learning.oreilly.com/library/view/~/9780321434838/?ar</a><br/>Format: Electronic Resources<br/>
Mainframe basics for security professionals : getting started with RACF
ent://SD_ILS/0/SD_ILS:2284327
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Pomerantz, Ori.<br/><a href="https://learning.oreilly.com/library/view/~/9780137137596/?ar">https://learning.oreilly.com/library/view/~/9780137137596/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137137596/?ar">https://go.oreilly.com/library-access/library/view/-/9780137137596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137137596">https://learning.oreilly.com/library/view/~/9780137137596</a><br/>Format: Electronic Resources<br/>
Ajax security
ent://SD_ILS/0/SD_ILS:2284335
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Hoffman, Billy, 1980-<br/><a href="https://learning.oreilly.com/library/view/~/9780321491930">https://learning.oreilly.com/library/view/~/9780321491930</a>
<a href="https://learning.oreilly.com/library/view/~/9780321491930/?ar">https://learning.oreilly.com/library/view/~/9780321491930/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321491930/?ar">https://go.oreilly.com/library-access/library/view/-/9780321491930/?ar</a><br/>Format: Electronic Resources<br/>
Modern cryptanalysis : techniques for advanced code breaking
ent://SD_ILS/0/SD_ILS:2284627
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Swenson, Christopher, 1983-<br/><a href="https://learning.oreilly.com/library/view/~/9780470135938">https://learning.oreilly.com/library/view/~/9780470135938</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar">https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470135938/?ar">https://learning.oreilly.com/library/view/~/9780470135938/?ar</a><br/>Format: Electronic Resources<br/>
Foundations of Mac OS X Leopard security
ent://SD_ILS/0/SD_ILS:2284628
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Edge, Charles S., Jr.<br/><a href="https://learning.oreilly.com/library/view/~/9781590599891/?ar">https://learning.oreilly.com/library/view/~/9781590599891/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar">https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781590599891">https://learning.oreilly.com/library/view/~/9781590599891</a><br/>Format: Electronic Resources<br/>
Mastering System Center Data Protection Manager 2007
ent://SD_ILS/0/SD_ILS:2284542
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Ganger, Devin L.<br/><a href="https://learning.oreilly.com/library/view/~/9780470181522/?ar">https://learning.oreilly.com/library/view/~/9780470181522/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar">https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470181522">https://learning.oreilly.com/library/view/~/9780470181522</a><br/>Format: Electronic Resources<br/>
Securing Citrix XenApp Server in the enterprise
ent://SD_ILS/0/SD_ILS:2285144
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Bin Azad, Tariq.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492812/?ar">https://learning.oreilly.com/library/view/~/9781597492812/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492812/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492812/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492812">https://learning.oreilly.com/library/view/~/9781597492812</a><br/>Format: Electronic Resources<br/>
Managing catastrophic loss of sensitive data
ent://SD_ILS/0/SD_ILS:2284690
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Photopoulos, Constantine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492393/?ar">https://learning.oreilly.com/library/view/~/9781597492393/?ar</a><br/>Format: Electronic Resources<br/>
Infosecurity 2008 threat analysis
ent://SD_ILS/0/SD_ILS:2285226
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Clark, Champ, III.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492249">https://learning.oreilly.com/library/view/~/9781597492249</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492249/?ar">https://learning.oreilly.com/library/view/~/9781597492249/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar</a><br/>Format: Electronic Resources<br/>
Security engineering : a guide to building dependable distributed systems
ent://SD_ILS/0/SD_ILS:2289990
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Anderson, Ross, 1956-<br/><a href="https://learning.oreilly.com/library/view/~/9780470068526">https://learning.oreilly.com/library/view/~/9780470068526</a>
<a href="https://learning.oreilly.com/library/view/~/9780470068526/?ar">https://learning.oreilly.com/library/view/~/9780470068526/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470068526/?ar">https://go.oreilly.com/library-access/library/view/-/9780470068526/?ar</a><br/>Format: Electronic Resources<br/>
Security and Usability : Designing Secure Systems that People Can Use.
ent://SD_ILS/0/SD_ILS:2288610
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Cranor, Lorrie Faith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008279/?ar">https://go.oreilly.com/library-access/library/view/-/0596008279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008279/?ar">https://learning.oreilly.com/library/view/~/0596008279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008279">https://learning.oreilly.com/library/view/~/0596008279</a><br/>Format: Electronic Resources<br/>
Malware forensics : investigating and analyzing malicious code
ent://SD_ILS/0/SD_ILS:2285693
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Aquilina, James M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492683/?ar">https://learning.oreilly.com/library/view/~/9781597492683/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492683">https://learning.oreilly.com/library/view/~/9781597492683</a><br/>Format: Electronic Resources<br/>
Deployment guide series. IBM Tivoli Identity Manager 5.0
ent://SD_ILS/0/SD_ILS:2285844
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738432067/?ar">https://go.oreilly.com/library-access/library/view/-/0738432067/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738432067/?ar">https://learning.oreilly.com/library/view/~/0738432067/?ar</a><br/>Format: Electronic Resources<br/>
Crimeware : understanding new attacks and defenses
ent://SD_ILS/0/SD_ILS:2285587
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Jakobsson, Markus.<br/><a href="https://learning.oreilly.com/library/view/~/9780321553744/?ar">https://learning.oreilly.com/library/view/~/9780321553744/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar">https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar</a><br/>Format: Electronic Resources<br/>
SOA security
ent://SD_ILS/0/SD_ILS:2284936
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Kanneganti, Ramarao.<br/><a href="https://learning.oreilly.com/library/view/~/9781932394689">https://learning.oreilly.com/library/view/~/9781932394689</a>
<a href="https://learning.oreilly.com/library/view/~/9781932394689/?ar">https://learning.oreilly.com/library/view/~/9781932394689/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar">https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar</a><br/>Format: Electronic Resources<br/>
Hacking : the art of exploitation
ent://SD_ILS/0/SD_ILS:2287983
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Erickson, Jon, 1977-<br/><a href="https://learning.oreilly.com/library/view/~/9781593271442">https://learning.oreilly.com/library/view/~/9781593271442</a>
<a href="https://learning.oreilly.com/library/view/~/9781593271442/?ar">https://learning.oreilly.com/library/view/~/9781593271442/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar</a><br/>Format: Electronic Resources<br/>
Ten rules of information security for the smaller business : a plain English guide
ent://SD_ILS/0/SD_ILS:2289629
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781905356553/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356553/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356553/?ar">https://learning.oreilly.com/library/view/~/9781905356553/?ar</a><br/>Format: Electronic Resources<br/>
The web application hacker's handbook : discovering and exploiting security flaws
ent://SD_ILS/0/SD_ILS:2288534
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Stuttard, Dafydd, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470170779/?ar">https://learning.oreilly.com/library/view/~/9780470170779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar">https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470170779">https://learning.oreilly.com/library/view/~/9780470170779</a><br/>Format: Electronic Resources<br/>
Windows Vista security for dummies
ent://SD_ILS/0/SD_ILS:2284218
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Koerner, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9780470118054">https://learning.oreilly.com/library/view/~/9780470118054</a>
<a href="https://learning.oreilly.com/library/view/~/9780470118054/?ar">https://learning.oreilly.com/library/view/~/9780470118054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar">https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft forefront security administration guide
ent://SD_ILS/0/SD_ILS:2284517
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Varsalone, Jesse.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492447">https://learning.oreilly.com/library/view/~/9781597492447</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492447/?ar">https://learning.oreilly.com/library/view/~/9781597492447/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar</a><br/>Format: Electronic Resources<br/>
Practical embedded security : building secure resource-constrained systems
ent://SD_ILS/0/SD_ILS:2284523
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Stapko, Timothy John.<br/><a href="https://learning.oreilly.com/library/view/~/9780750682152/?ar">https://learning.oreilly.com/library/view/~/9780750682152/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750682152/?ar">https://go.oreilly.com/library-access/library/view/-/9780750682152/?ar</a><br/>Format: Electronic Resources<br/>
Understanding Windows CardSpace : an introduction to the concepts and challenges of digital identities
ent://SD_ILS/0/SD_ILS:2284402
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Bertocci, Vittorio.<br/><a href="https://learning.oreilly.com/library/view/~/9780321496843/?ar">https://learning.oreilly.com/library/view/~/9780321496843/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar">https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar</a><br/>Format: Electronic Resources<br/>
Information assurance : dependability and security in networked systems
ent://SD_ILS/0/SD_ILS:2286245
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Qian, Yi, 1962-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar">https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123735669/?ar">https://learning.oreilly.com/library/view/~/9780123735669/?ar</a><br/>Format: Electronic Resources<br/>
Computer forensics for dummies
ent://SD_ILS/0/SD_ILS:2285672
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Volonino, Linda.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470371916/?ar">https://learning.oreilly.com/library/view/~/9780470371916/?ar</a><br/>Format: Electronic Resources<br/>
Netzwerkangriffe von innen
ent://SD_ILS/0/SD_ILS:2286474
2024-09-27T06:35:12Z
2024-09-27T06:35:12Z
by Ziegler, Paul Sebastian.<br/><a href="https://learning.oreilly.com/library/view/~/9783897217782">https://learning.oreilly.com/library/view/~/9783897217782</a>
<a href="https://learning.oreilly.com/library/view/~/9783897217782/?ar">https://learning.oreilly.com/library/view/~/9783897217782/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783897217782/?ar">https://go.oreilly.com/library-access/library/view/-/9783897217782/?ar</a><br/>Format: Electronic Resources<br/>