Search Results for - Narrowed by: 2009 - S&eacute;curit&eacute; informatique. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300$0026isd$003dtrue? 2024-06-17T02:55:17Z Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection ent://SD_ILS/0/SD_ILS:2286982 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Collberg, Christian.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591258/?ar">https://learning.oreilly.com/library/view/~/9780321591258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:2286630 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Brotby, W. Krag, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar">https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420052862/?ar">https://learning.oreilly.com/library/view/~/9781420052862/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420052862">https://learning.oreilly.com/library/view/~/9781420052862</a><br/>Format:&#160;Electronic Resources<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:2285492 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Marty, Raffael, 1976-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar">https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321585530/?ar">https://learning.oreilly.com/library/view/~/9780321585530/?ar</a><br/>Format:&#160;Electronic Resources<br/> Solaris security essentials. ent://SD_ILS/0/SD_ILS:2286257 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z <a href="https://learning.oreilly.com/library/view/~/9780131365414/?ar">https://learning.oreilly.com/library/view/~/9780131365414/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780131365414/?ar">https://go.oreilly.com/library-access/library/view/-/9780131365414/?ar</a><br/>Format:&#160;Electronic Resources<br/> The CERT C secure coding standard ent://SD_ILS/0/SD_ILS:2285328 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Seacord, Robert C.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321603197/?ar">https://go.oreilly.com/library-access/library/view/-/9780321603197/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321603197/?ar">https://learning.oreilly.com/library/view/~/9780321603197/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security and privacy ent://SD_ILS/0/SD_ILS:2287451 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Mather, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806453/?ar">https://learning.oreilly.com/library/view/~/9780596806453/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596806453">https://learning.oreilly.com/library/view/~/9780596806453</a><br/>Format:&#160;Electronic Resources<br/> Chained exploits : advanced hacking attacks from start to finish ent://SD_ILS/0/SD_ILS:2286103 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Whitaker, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780321620637">https://learning.oreilly.com/library/view/~/9780321620637</a> <a href="https://learning.oreilly.com/library/view/~/9780321620637/?ar">https://learning.oreilly.com/library/view/~/9780321620637/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar">https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar</a><br/>Format:&#160;Electronic Resources<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:2285986 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem ent://SD_ILS/0/SD_ILS:2285580 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Walker, Andy (Andy G.), 1967-<br/><a href="https://learning.oreilly.com/library/view/~/9780789736727">https://learning.oreilly.com/library/view/~/9780789736727</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar">https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780789736727/?ar">https://learning.oreilly.com/library/view/~/9780789736727/?ar</a><br/>Format:&#160;Electronic Resources<br/> Gray hat Python : Python programming for hackers and reverse engineers ent://SD_ILS/0/SD_ILS:2287862 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Seitz, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/9781593271923">https://learning.oreilly.com/library/view/~/9781593271923</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593271923/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271923/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593271923/?ar">https://learning.oreilly.com/library/view/~/9781593271923/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2286804 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a> <a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format:&#160;Electronic Resources<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:2287188 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Clarke, Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080958576/?ar">https://go.oreilly.com/library-access/library/view/-/9780080958576/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080958576/?ar">https://learning.oreilly.com/library/view/~/9780080958576/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080958576">https://learning.oreilly.com/library/view/~/9780080958576</a><br/>Format:&#160;Electronic Resources<br/> Cyber fraud tactics, techniques and procedures ent://SD_ILS/0/SD_ILS:2287651 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Howard, Rick.<br/><a href="https://learning.oreilly.com/library/view/~/9781420091281">https://learning.oreilly.com/library/view/~/9781420091281</a> <a href="https://learning.oreilly.com/library/view/~/9781420091281/?ar">https://learning.oreilly.com/library/view/~/9781420091281/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420091281/?ar">https://go.oreilly.com/library-access/library/view/-/9781420091281/?ar</a><br/>Format:&#160;Electronic Resources<br/> VMware vSphere and virtual infrastructure security : securing the virtual environment ent://SD_ILS/0/SD_ILS:2288049 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Haletky, Edward.<br/><a href="https://learning.oreilly.com/library/view/~/9780136083214/?ar">https://learning.oreilly.com/library/view/~/9780136083214/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780136083214/?ar">https://go.oreilly.com/library-access/library/view/-/9780136083214/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security bible ent://SD_ILS/0/SD_ILS:2288476 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Cole, Eric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar">https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470502495/?ar">https://learning.oreilly.com/library/view/~/9780470502495/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to secure and audit Oracle 10g and 11g ent://SD_ILS/0/SD_ILS:2286324 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Ben-Natan, Ron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar">https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420084139/?ar">https://learning.oreilly.com/library/view/~/9781420084139/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420084139">https://learning.oreilly.com/library/view/~/9781420084139</a><br/>Format:&#160;Electronic Resources<br/> The myths of security : what the computer security industry doesn't want you to know ent://SD_ILS/0/SD_ILS:2286938 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Viega, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar">https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596803957/?ar">https://learning.oreilly.com/library/view/~/9780596803957/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596803957">https://learning.oreilly.com/library/view/~/9780596803957</a><br/>Format:&#160;Electronic Resources<br/> Mac OS X, iPod, and iPhone forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:2287201 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Kubasiak, Ryan R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080949185/?ar">https://learning.oreilly.com/library/view/~/9780080949185/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080949185">https://learning.oreilly.com/library/view/~/9780080949185</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar">https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar</a><br/>Format:&#160;Electronic Resources<br/> Beautiful security ent://SD_ILS/0/SD_ILS:2286888 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Oram, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780596801786/?ar">https://learning.oreilly.com/library/view/~/9780596801786/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596801786">https://learning.oreilly.com/library/view/~/9780596801786</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar">https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar</a><br/>Format:&#160;Electronic Resources<br/> Googling security : how much does Google know about you? ent://SD_ILS/0/SD_ILS:2285350 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Conti, Greg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321591265/?ar">https://learning.oreilly.com/library/view/~/9780321591265/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Mac hacker's handbook ent://SD_ILS/0/SD_ILS:2286341 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Miller, Charles, 1951-<br/><a href="https://learning.oreilly.com/library/view/~/9781118080337/?ar">https://learning.oreilly.com/library/view/~/9781118080337/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118080337/?ar">https://go.oreilly.com/library-access/library/view/-/9781118080337/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118080337">https://learning.oreilly.com/library/view/~/9781118080337</a><br/>Format:&#160;Electronic Resources<br/> Hacking : the next generation ent://SD_ILS/0/SD_ILS:2286898 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Dhanjani, Nitesh.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806309">https://learning.oreilly.com/library/view/~/9780596806309</a> <a href="https://learning.oreilly.com/library/view/~/9780596806309/?ar">https://learning.oreilly.com/library/view/~/9780596806309/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596806309/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806309/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis DVD toolkit 2E ent://SD_ILS/0/SD_ILS:2287802 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security testing handbook for banking applications ent://SD_ILS/0/SD_ILS:2288620 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Doraiswamy, Arvind.<br/><a href="https://learning.oreilly.com/library/view/~/9781905356829/?ar">https://learning.oreilly.com/library/view/~/9781905356829/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781905356829/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356829/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281089">https://learning.oreilly.com/library/view/~/9781849281089</a> <a href="https://learning.oreilly.com/library/view/~/9781905356829">https://learning.oreilly.com/library/view/~/9781905356829</a><br/>Format:&#160;Electronic Resources<br/> Professional ASP.NET 3.5 security, membership, and role management with C♯ and VB ent://SD_ILS/0/SD_ILS:2291742 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Haidar, Bilal.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470379301/?ar">https://go.oreilly.com/library-access/library/view/-/9780470379301/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470379301/?ar">https://learning.oreilly.com/library/view/~/9780470379301/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security testing handbook for banking applications ent://SD_ILS/0/SD_ILS:2310561 2024-06-17T02:55:17Z 2024-06-17T02:55:17Z by&#160;Doraiswamy, Arvind, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281089/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281089/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281089/?ar">https://learning.oreilly.com/library/view/~/9781849281089/?ar</a><br/>Format:&#160;Electronic Resources<br/>