Search Results for - Narrowed by: 2009 - Réseaux d'ordinateurs -- Sécurité -- Mesures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300?
2024-06-17T23:11:26Z
Microsoft
ent://SD_ILS/0/SD_ILS:2321069
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format: Electronic Resources<br/>
The Prompt Payment Act Answer Book
ent://SD_ILS/0/SD_ILS:2315263
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263336">https://learning.oreilly.com/library/view/~/9781567263336</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263336/?ar">https://learning.oreilly.com/library/view/~/9781567263336/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar</a><br/>Format: Electronic Resources<br/>
The Antideficiency Act Answer Book
ent://SD_ILS/0/SD_ILS:2315273
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263343/?ar">https://learning.oreilly.com/library/view/~/9781567263343/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263343">https://learning.oreilly.com/library/view/~/9781567263343</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar</a><br/>Format: Electronic Resources<br/>
CCSP SNAF quick reference
ent://SD_ILS/0/SD_ILS:2285270
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781587058691/?ar">https://learning.oreilly.com/library/view/~/9781587058691/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587058691">https://learning.oreilly.com/library/view/~/9781587058691</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587058691/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058691/?ar</a><br/>Format: Electronic Resources<br/>
Network security bible
ent://SD_ILS/0/SD_ILS:2288476
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Cole, Eric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar">https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470502495/?ar">https://learning.oreilly.com/library/view/~/9780470502495/?ar</a><br/>Format: Electronic Resources<br/>
Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem
ent://SD_ILS/0/SD_ILS:2285580
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Walker, Andy (Andy G.), 1967-<br/><a href="https://learning.oreilly.com/library/view/~/9780789736727">https://learning.oreilly.com/library/view/~/9780789736727</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar">https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780789736727/?ar">https://learning.oreilly.com/library/view/~/9780789736727/?ar</a><br/>Format: Electronic Resources<br/>
IPv6 security
ent://SD_ILS/0/SD_ILS:2286769
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Hogg, Scott.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587058387/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587058387/?ar">https://learning.oreilly.com/library/view/~/9781587058387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587058387">https://learning.oreilly.com/library/view/~/9781587058387</a><br/>Format: Electronic Resources<br/>
Disappearing cryptography : information hiding, steganography & watermarking
ent://SD_ILS/0/SD_ILS:2287580
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Wayner, Peter, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780123744791/?ar">https://learning.oreilly.com/library/view/~/9780123744791/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar">https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar</a><br/>Format: Electronic Resources<br/>
Unauthorised access : physical penetration testing for IT security teams
ent://SD_ILS/0/SD_ILS:2288452
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Allsopp, Wil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar">https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470747612/?ar">https://learning.oreilly.com/library/view/~/9780470747612/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470747612">https://learning.oreilly.com/library/view/~/9780470747612</a><br/>Format: Electronic Resources<br/>
Cisco CCSP SNRS quick reference
ent://SD_ILS/0/SD_ILS:2287704
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781587059063/?ar">https://learning.oreilly.com/library/view/~/9781587059063/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587059063">https://learning.oreilly.com/library/view/~/9781587059063</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587059063/?ar">https://go.oreilly.com/library-access/library/view/-/9781587059063/?ar</a><br/>Format: Electronic Resources<br/>
Network access control for dummies
ent://SD_ILS/0/SD_ILS:2288733
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Kelley, Jay.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470398678/?ar">https://go.oreilly.com/library-access/library/view/-/9780470398678/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470398678/?ar">https://learning.oreilly.com/library/view/~/9780470398678/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470398678">https://learning.oreilly.com/library/view/~/9780470398678</a><br/>Format: Electronic Resources<br/>
Googling security : how much does Google know about you?
ent://SD_ILS/0/SD_ILS:2285350
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Conti, Greg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321591265/?ar">https://learning.oreilly.com/library/view/~/9780321591265/?ar</a><br/>Format: Electronic Resources<br/>
Hacking VoIP
ent://SD_ILS/0/SD_ILS:2285825
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Dwivedi, Himanshu.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593271633/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271633/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593271633/?ar">https://learning.oreilly.com/library/view/~/9781593271633/?ar</a><br/>Format: Electronic Resources<br/>
Chained exploits : advanced hacking attacks from start to finish
ent://SD_ILS/0/SD_ILS:2286103
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Whitaker, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780321620637">https://learning.oreilly.com/library/view/~/9780321620637</a>
<a href="https://learning.oreilly.com/library/view/~/9780321620637/?ar">https://learning.oreilly.com/library/view/~/9780321620637/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar">https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar</a><br/>Format: Electronic Resources<br/>
Security monitoring
ent://SD_ILS/0/SD_ILS:2286050
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Fry, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780596157944/?ar">https://learning.oreilly.com/library/view/~/9780596157944/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596157944">https://learning.oreilly.com/library/view/~/9780596157944</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar">https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar</a><br/>Format: Electronic Resources<br/>
Windows forensic analysis DVD toolkit 2E
ent://SD_ILS/0/SD_ILS:2287802
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format: Electronic Resources<br/>
Next generation SSH2 implementation : securing data in motion
ent://SD_ILS/0/SD_ILS:2285986
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security and privacy
ent://SD_ILS/0/SD_ILS:2287451
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Mather, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806453/?ar">https://learning.oreilly.com/library/view/~/9780596806453/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596806453">https://learning.oreilly.com/library/view/~/9780596806453</a><br/>Format: Electronic Resources<br/>
Cisco secure firewall services module (FWSM)
ent://SD_ILS/0/SD_ILS:2285484
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Blair, Ray, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781587056093">https://learning.oreilly.com/library/view/~/9781587056093</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587056093/?ar">https://go.oreilly.com/library-access/library/view/-/9781587056093/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587056093/?ar">https://learning.oreilly.com/library/view/~/9781587056093/?ar</a><br/>Format: Electronic Resources<br/>
Beautiful security
ent://SD_ILS/0/SD_ILS:2286888
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Oram, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780596801786/?ar">https://learning.oreilly.com/library/view/~/9780596801786/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596801786">https://learning.oreilly.com/library/view/~/9780596801786</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar">https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar</a><br/>Format: Electronic Resources<br/>
Hacking : the next generation
ent://SD_ILS/0/SD_ILS:2286898
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Dhanjani, Nitesh.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806309">https://learning.oreilly.com/library/view/~/9780596806309</a>
<a href="https://learning.oreilly.com/library/view/~/9780596806309/?ar">https://learning.oreilly.com/library/view/~/9780596806309/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596806309/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806309/?ar</a><br/>Format: Electronic Resources<br/>
Cisco router and switch forensics : investigating and analyzing malicious network activity
ent://SD_ILS/0/SD_ILS:2287180
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494182">https://learning.oreilly.com/library/view/~/9781597494182</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494182/?ar">https://learning.oreilly.com/library/view/~/9781597494182/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar</a><br/>Format: Electronic Resources<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:2286804
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a>
<a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format: Electronic Resources<br/>
Applied security visualization
ent://SD_ILS/0/SD_ILS:2285492
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Marty, Raffael, 1976-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar">https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321585530/?ar">https://learning.oreilly.com/library/view/~/9780321585530/?ar</a><br/>Format: Electronic Resources<br/>
CCSP SNAA quick reference
ent://SD_ILS/0/SD_ILS:2285830
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Lindfield, Ryan.<br/><a href="https://learning.oreilly.com/library/view/~/9781587058943/?ar">https://learning.oreilly.com/library/view/~/9781587058943/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587058943/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058943/?ar</a><br/>Format: Electronic Resources<br/>
Implementing Cisco IOS network security (IINS)
ent://SD_ILS/0/SD_ILS:2286761
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587058813/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058813/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587058813/?ar">https://learning.oreilly.com/library/view/~/9781587058813/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587058813">https://learning.oreilly.com/library/view/~/9781587058813</a><br/>Format: Electronic Resources<br/>
Apache : receptury
ent://SD_ILS/0/SD_ILS:2296868
2024-06-17T23:11:26Z
2024-06-17T23:11:26Z
by Bowen, Richard Cooper, 1971-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176425/?ar">https://learning.oreilly.com/library/view/~/9781457176425/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176425">https://learning.oreilly.com/library/view/~/9781457176425</a><br/>Format: Electronic Resources<br/>