Search Results for - Narrowed by: 2009 - R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300? 2024-06-17T23:11:26Z Microsoft ent://SD_ILS/0/SD_ILS:2321069 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Prompt Payment Act Answer Book ent://SD_ILS/0/SD_ILS:2315263 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263336">https://learning.oreilly.com/library/view/~/9781567263336</a> <a href="https://learning.oreilly.com/library/view/~/9781567263336/?ar">https://learning.oreilly.com/library/view/~/9781567263336/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Antideficiency Act Answer Book ent://SD_ILS/0/SD_ILS:2315273 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263343/?ar">https://learning.oreilly.com/library/view/~/9781567263343/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781567263343">https://learning.oreilly.com/library/view/~/9781567263343</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCSP SNAF quick reference ent://SD_ILS/0/SD_ILS:2285270 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781587058691/?ar">https://learning.oreilly.com/library/view/~/9781587058691/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587058691">https://learning.oreilly.com/library/view/~/9781587058691</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587058691/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058691/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security bible ent://SD_ILS/0/SD_ILS:2288476 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Cole, Eric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar">https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470502495/?ar">https://learning.oreilly.com/library/view/~/9780470502495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem ent://SD_ILS/0/SD_ILS:2285580 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Walker, Andy (Andy G.), 1967-<br/><a href="https://learning.oreilly.com/library/view/~/9780789736727">https://learning.oreilly.com/library/view/~/9780789736727</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar">https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780789736727/?ar">https://learning.oreilly.com/library/view/~/9780789736727/?ar</a><br/>Format:&#160;Electronic Resources<br/> IPv6 security ent://SD_ILS/0/SD_ILS:2286769 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Hogg, Scott.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587058387/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587058387/?ar">https://learning.oreilly.com/library/view/~/9781587058387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587058387">https://learning.oreilly.com/library/view/~/9781587058387</a><br/>Format:&#160;Electronic Resources<br/> Disappearing cryptography : information hiding, steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:2287580 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Wayner, Peter, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780123744791/?ar">https://learning.oreilly.com/library/view/~/9780123744791/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar">https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar</a><br/>Format:&#160;Electronic Resources<br/> Unauthorised access : physical penetration testing for IT security teams ent://SD_ILS/0/SD_ILS:2288452 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Allsopp, Wil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar">https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470747612/?ar">https://learning.oreilly.com/library/view/~/9780470747612/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470747612">https://learning.oreilly.com/library/view/~/9780470747612</a><br/>Format:&#160;Electronic Resources<br/> Cisco CCSP SNRS quick reference ent://SD_ILS/0/SD_ILS:2287704 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781587059063/?ar">https://learning.oreilly.com/library/view/~/9781587059063/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587059063">https://learning.oreilly.com/library/view/~/9781587059063</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587059063/?ar">https://go.oreilly.com/library-access/library/view/-/9781587059063/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network access control for dummies ent://SD_ILS/0/SD_ILS:2288733 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Kelley, Jay.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470398678/?ar">https://go.oreilly.com/library-access/library/view/-/9780470398678/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470398678/?ar">https://learning.oreilly.com/library/view/~/9780470398678/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470398678">https://learning.oreilly.com/library/view/~/9780470398678</a><br/>Format:&#160;Electronic Resources<br/> Googling security : how much does Google know about you? ent://SD_ILS/0/SD_ILS:2285350 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Conti, Greg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321591265/?ar">https://learning.oreilly.com/library/view/~/9780321591265/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking VoIP ent://SD_ILS/0/SD_ILS:2285825 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Dwivedi, Himanshu.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593271633/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271633/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593271633/?ar">https://learning.oreilly.com/library/view/~/9781593271633/?ar</a><br/>Format:&#160;Electronic Resources<br/> Chained exploits : advanced hacking attacks from start to finish ent://SD_ILS/0/SD_ILS:2286103 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Whitaker, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780321620637">https://learning.oreilly.com/library/view/~/9780321620637</a> <a href="https://learning.oreilly.com/library/view/~/9780321620637/?ar">https://learning.oreilly.com/library/view/~/9780321620637/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar">https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security monitoring ent://SD_ILS/0/SD_ILS:2286050 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Fry, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780596157944/?ar">https://learning.oreilly.com/library/view/~/9780596157944/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596157944">https://learning.oreilly.com/library/view/~/9780596157944</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar">https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis DVD toolkit 2E ent://SD_ILS/0/SD_ILS:2287802 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format:&#160;Electronic Resources<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:2285986 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security and privacy ent://SD_ILS/0/SD_ILS:2287451 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Mather, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806453/?ar">https://learning.oreilly.com/library/view/~/9780596806453/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596806453">https://learning.oreilly.com/library/view/~/9780596806453</a><br/>Format:&#160;Electronic Resources<br/> Cisco secure firewall services module (FWSM) ent://SD_ILS/0/SD_ILS:2285484 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Blair, Ray, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781587056093">https://learning.oreilly.com/library/view/~/9781587056093</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587056093/?ar">https://go.oreilly.com/library-access/library/view/-/9781587056093/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587056093/?ar">https://learning.oreilly.com/library/view/~/9781587056093/?ar</a><br/>Format:&#160;Electronic Resources<br/> Beautiful security ent://SD_ILS/0/SD_ILS:2286888 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Oram, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780596801786/?ar">https://learning.oreilly.com/library/view/~/9780596801786/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596801786">https://learning.oreilly.com/library/view/~/9780596801786</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar">https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking : the next generation ent://SD_ILS/0/SD_ILS:2286898 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Dhanjani, Nitesh.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806309">https://learning.oreilly.com/library/view/~/9780596806309</a> <a href="https://learning.oreilly.com/library/view/~/9780596806309/?ar">https://learning.oreilly.com/library/view/~/9780596806309/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596806309/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806309/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco router and switch forensics : investigating and analyzing malicious network activity ent://SD_ILS/0/SD_ILS:2287180 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494182">https://learning.oreilly.com/library/view/~/9781597494182</a> <a href="https://learning.oreilly.com/library/view/~/9781597494182/?ar">https://learning.oreilly.com/library/view/~/9781597494182/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2286804 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a> <a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format:&#160;Electronic Resources<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:2285492 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Marty, Raffael, 1976-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar">https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321585530/?ar">https://learning.oreilly.com/library/view/~/9780321585530/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCSP SNAA quick reference ent://SD_ILS/0/SD_ILS:2285830 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Lindfield, Ryan.<br/><a href="https://learning.oreilly.com/library/view/~/9781587058943/?ar">https://learning.oreilly.com/library/view/~/9781587058943/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587058943/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058943/?ar</a><br/>Format:&#160;Electronic Resources<br/> Implementing Cisco IOS network security (IINS) ent://SD_ILS/0/SD_ILS:2286761 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587058813/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058813/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587058813/?ar">https://learning.oreilly.com/library/view/~/9781587058813/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587058813">https://learning.oreilly.com/library/view/~/9781587058813</a><br/>Format:&#160;Electronic Resources<br/> Apache : receptury ent://SD_ILS/0/SD_ILS:2296868 2024-06-17T23:11:26Z 2024-06-17T23:11:26Z by&#160;Bowen, Richard Cooper, 1971-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176425/?ar">https://learning.oreilly.com/library/view/~/9781457176425/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176425">https://learning.oreilly.com/library/view/~/9781457176425</a><br/>Format:&#160;Electronic Resources<br/>