Search Results for - Narrowed by: 2010 - Réseaux d'ordinateurs -- Sécurité -- Mesures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300$0026isd$003dtrue?
2024-06-25T18:01:28Z
Adaptive Security Management Architecture
ent://SD_ILS/0/SD_ILS:2326064
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Tiller, James S.<br/><a href="https://learning.oreilly.com/library/view/~/9781420013375">https://learning.oreilly.com/library/view/~/9781420013375</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar">https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420013375/?ar">https://learning.oreilly.com/library/view/~/9781420013375/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2287972
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar">https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470550939/?ar">https://learning.oreilly.com/library/view/~/9780470550939/?ar</a><br/>Format: Electronic Resources<br/>
Practical intrusion analysis : prevention and detection for the twenty-first century
ent://SD_ILS/0/SD_ILS:2286080
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Trost, Ryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591890/?ar">https://learning.oreilly.com/library/view/~/9780321591890/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar</a><br/>Format: Electronic Resources<br/>
24 deadly sins of software security : programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:2287176
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780071626750/?ar">https://learning.oreilly.com/library/view/~/9780071626750/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar">https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071626750">https://learning.oreilly.com/library/view/~/9780071626750</a><br/>Format: Electronic Resources<br/>
PCI compliance : understand and implement effective PCI data security standard compliance.
ent://SD_ILS/0/SD_ILS:2288641
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Chuvakin, Anton.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494991/?ar">https://learning.oreilly.com/library/view/~/9781597494991/?ar</a><br/>Format: Electronic Resources<br/>
Dissecting the hack : the f0rb1dd3n network
ent://SD_ILS/0/SD_ILS:2290700
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format: Electronic Resources<br/>
Deploying Microsoft Forefront Threat Management Gateway 2010
ent://SD_ILS/0/SD_ILS:2290730
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656741/?ar">https://learning.oreilly.com/library/view/~/9780735656741/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar</a><br/>Format: Electronic Resources<br/>
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:2289149
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Lillard, Terrence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387/?ar">https://learning.oreilly.com/library/view/~/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387">https://learning.oreilly.com/library/view/~/9781597495387</a><br/>Format: Electronic Resources<br/>
Cisco ASA : all-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance
ent://SD_ILS/0/SD_ILS:2288119
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Frahim, Jazib.<br/><a href="https://learning.oreilly.com/library/view/~/9781587141010/?ar">https://learning.oreilly.com/library/view/~/9781587141010/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587141010/?ar">https://go.oreilly.com/library-access/library/view/-/9781587141010/?ar</a><br/>Format: Electronic Resources<br/>
SSCP video mentor
ent://SD_ILS/0/SD_ILS:2289926
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Harris, Shon.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780789743695/?ar">https://go.oreilly.com/library-access/library/view/-/9780789743695/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780789743695/?ar">https://learning.oreilly.com/videos/~/9780789743695/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780789743695">https://learning.oreilly.com/videos/~/9780789743695</a><br/>Format: Electronic Resources<br/>
Mac Security Bible.
ent://SD_ILS/0/SD_ILS:2287722
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Kissell, Joe.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar">https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198/?ar">https://learning.oreilly.com/library/view/~/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198">https://learning.oreilly.com/library/view/~/9780470474198</a><br/>Format: Electronic Resources<br/>
Network and system security
ent://SD_ILS/0/SD_ILS:2288837
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495356">https://learning.oreilly.com/library/view/~/9781597495356</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495356/?ar">https://learning.oreilly.com/library/view/~/9781597495356/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar</a><br/>Format: Electronic Resources<br/>
Seven deadliest network attacks
ent://SD_ILS/0/SD_ILS:2290174
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Prowell, Stacy J.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495493/?ar">https://learning.oreilly.com/library/view/~/9781597495493/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495493/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495493/?ar</a><br/>Format: Electronic Resources<br/>
Deploying Microsoft Forefront Protection 2010 for Exchange Server
ent://SD_ILS/0/SD_ILS:2290701
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656734/?ar">https://learning.oreilly.com/library/view/~/9780735656734/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar</a><br/>Format: Electronic Resources<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:2288720
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Haines, Brad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417/?ar">https://learning.oreilly.com/library/view/~/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417">https://learning.oreilly.com/library/view/~/9781597495417</a><br/>Format: Electronic Resources<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:2288721
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Anderson, Brian (Brian James)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547/?ar">https://learning.oreilly.com/library/view/~/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547">https://learning.oreilly.com/library/view/~/9781597495547</a><br/>Format: Electronic Resources<br/>
Seven deadliest social network attacks
ent://SD_ILS/0/SD_ILS:2289718
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Timm, Carl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495455/?ar">https://learning.oreilly.com/library/view/~/9781597495455/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495455">https://learning.oreilly.com/library/view/~/9781597495455</a><br/>Format: Electronic Resources<br/>
Deploying Microsoft Forefront Unified Access Gateway 2010
ent://SD_ILS/0/SD_ILS:2290710
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Diogenes, Yuri.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735656758/?ar">https://learning.oreilly.com/library/view/~/9780735656758/?ar</a><br/>Format: Electronic Resources<br/>
Seven deadliest web application attacks
ent://SD_ILS/0/SD_ILS:2289552
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Shema, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495431/?ar">https://learning.oreilly.com/library/view/~/9781597495431/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar</a><br/>Format: Electronic Resources<br/>
Information security risk management for ISO27001/ISO27002
ent://SD_ILS/0/SD_ILS:2291936
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281492/?ar">https://learning.oreilly.com/library/view/~/9781849281492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281492">https://learning.oreilly.com/library/view/~/9781849281492</a><br/>Format: Electronic Resources<br/>
CompTIA security+ SYO-201 video mentor : learn exam essentials from the expert
ent://SD_ILS/0/SD_ILS:2289867
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Harris, Shon.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780789743589/?ar">https://go.oreilly.com/library-access/library/view/-/9780789743589/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780789743589/?ar">https://learning.oreilly.com/videos/~/9780789743589/?ar</a><br/>Format: Electronic Resources<br/>
Computer forensics : a pocket guide
ent://SD_ILS/0/SD_ILS:2289616
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format: Electronic Resources<br/>
Designing an IAM framework with Oracle Identity and access management suite
ent://SD_ILS/0/SD_ILS:2289729
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Scheidel, Jeff.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar">https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071741378/?ar">https://learning.oreilly.com/library/view/~/9780071741378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071741378">https://learning.oreilly.com/library/view/~/9780071741378</a><br/>Format: Electronic Resources<br/>
Microsoft Forefront Threat Management Gateway 2010 : das Handbuch
ent://SD_ILS/0/SD_ILS:2295238
2024-06-25T18:01:28Z
2024-06-25T18:01:28Z
by Grote, Marc.<br/><a href="https://learning.oreilly.com/library/view/~/9783866451278">https://learning.oreilly.com/library/view/~/9783866451278</a>
<a href="https://learning.oreilly.com/library/view/~/9783866451278/?ar">https://learning.oreilly.com/library/view/~/9783866451278/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783866451278/?ar">https://go.oreilly.com/library-access/library/view/-/9783866451278/?ar</a><br/>Format: Electronic Resources<br/>