Search Results for - Narrowed by: 2010 - R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300$0026isd$003dtrue? 2024-06-25T18:01:28Z Adaptive Security Management Architecture ent://SD_ILS/0/SD_ILS:2326064 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Tiller, James S.<br/><a href="https://learning.oreilly.com/library/view/~/9781420013375">https://learning.oreilly.com/library/view/~/9781420013375</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar">https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420013375/?ar">https://learning.oreilly.com/library/view/~/9781420013375/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2287972 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar">https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470550939/?ar">https://learning.oreilly.com/library/view/~/9780470550939/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical intrusion analysis : prevention and detection for the twenty-first century ent://SD_ILS/0/SD_ILS:2286080 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Trost, Ryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591890/?ar">https://learning.oreilly.com/library/view/~/9780321591890/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar</a><br/>Format:&#160;Electronic Resources<br/> 24 deadly sins of software security : programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:2287176 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780071626750/?ar">https://learning.oreilly.com/library/view/~/9780071626750/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar">https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071626750">https://learning.oreilly.com/library/view/~/9780071626750</a><br/>Format:&#160;Electronic Resources<br/> PCI compliance : understand and implement effective PCI data security standard compliance. ent://SD_ILS/0/SD_ILS:2288641 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Chuvakin, Anton.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494991/?ar">https://learning.oreilly.com/library/view/~/9781597494991/?ar</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the f0rb1dd3n network ent://SD_ILS/0/SD_ILS:2290700 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Threat Management Gateway 2010 ent://SD_ILS/0/SD_ILS:2290730 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656741/?ar">https://learning.oreilly.com/library/view/~/9780735656741/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:2289149 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Lillard, Terrence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495387/?ar">https://learning.oreilly.com/library/view/~/9781597495387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495387">https://learning.oreilly.com/library/view/~/9781597495387</a><br/>Format:&#160;Electronic Resources<br/> Cisco ASA : all-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance ent://SD_ILS/0/SD_ILS:2288119 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Frahim, Jazib.<br/><a href="https://learning.oreilly.com/library/view/~/9781587141010/?ar">https://learning.oreilly.com/library/view/~/9781587141010/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587141010/?ar">https://go.oreilly.com/library-access/library/view/-/9781587141010/?ar</a><br/>Format:&#160;Electronic Resources<br/> SSCP video mentor ent://SD_ILS/0/SD_ILS:2289926 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Harris, Shon.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780789743695/?ar">https://go.oreilly.com/library-access/library/view/-/9780789743695/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780789743695/?ar">https://learning.oreilly.com/videos/~/9780789743695/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780789743695">https://learning.oreilly.com/videos/~/9780789743695</a><br/>Format:&#160;Electronic Resources<br/> Mac Security Bible. ent://SD_ILS/0/SD_ILS:2287722 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Kissell, Joe.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar">https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470474198/?ar">https://learning.oreilly.com/library/view/~/9780470474198/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470474198">https://learning.oreilly.com/library/view/~/9780470474198</a><br/>Format:&#160;Electronic Resources<br/> Network and system security ent://SD_ILS/0/SD_ILS:2288837 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495356">https://learning.oreilly.com/library/view/~/9781597495356</a> <a href="https://learning.oreilly.com/library/view/~/9781597495356/?ar">https://learning.oreilly.com/library/view/~/9781597495356/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest network attacks ent://SD_ILS/0/SD_ILS:2290174 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Prowell, Stacy J.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495493/?ar">https://learning.oreilly.com/library/view/~/9781597495493/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495493/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495493/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Protection 2010 for Exchange Server ent://SD_ILS/0/SD_ILS:2290701 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656734/?ar">https://learning.oreilly.com/library/view/~/9780735656734/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:2288720 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Haines, Brad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495417/?ar">https://learning.oreilly.com/library/view/~/9781597495417/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495417">https://learning.oreilly.com/library/view/~/9781597495417</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:2288721 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Anderson, Brian (Brian James)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495547/?ar">https://learning.oreilly.com/library/view/~/9781597495547/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495547">https://learning.oreilly.com/library/view/~/9781597495547</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:2289718 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Timm, Carl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495455/?ar">https://learning.oreilly.com/library/view/~/9781597495455/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495455">https://learning.oreilly.com/library/view/~/9781597495455</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Unified Access Gateway 2010 ent://SD_ILS/0/SD_ILS:2290710 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Diogenes, Yuri.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735656758/?ar">https://learning.oreilly.com/library/view/~/9780735656758/?ar</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:2289552 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Shema, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495431/?ar">https://learning.oreilly.com/library/view/~/9781597495431/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security risk management for ISO27001/ISO27002 ent://SD_ILS/0/SD_ILS:2291936 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281492/?ar">https://learning.oreilly.com/library/view/~/9781849281492/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281492">https://learning.oreilly.com/library/view/~/9781849281492</a><br/>Format:&#160;Electronic Resources<br/> CompTIA security+ SYO-201 video mentor : learn exam essentials from the expert ent://SD_ILS/0/SD_ILS:2289867 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Harris, Shon.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780789743589/?ar">https://go.oreilly.com/library-access/library/view/-/9780789743589/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780789743589/?ar">https://learning.oreilly.com/videos/~/9780789743589/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics : a pocket guide ent://SD_ILS/0/SD_ILS:2289616 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format:&#160;Electronic Resources<br/> Designing an IAM framework with Oracle Identity and access management suite ent://SD_ILS/0/SD_ILS:2289729 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Scheidel, Jeff.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar">https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071741378/?ar">https://learning.oreilly.com/library/view/~/9780071741378/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071741378">https://learning.oreilly.com/library/view/~/9780071741378</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Forefront Threat Management Gateway 2010 : das Handbuch ent://SD_ILS/0/SD_ILS:2295238 2024-06-25T18:01:28Z 2024-06-25T18:01:28Z by&#160;Grote, Marc.<br/><a href="https://learning.oreilly.com/library/view/~/9783866451278">https://learning.oreilly.com/library/view/~/9783866451278</a> <a href="https://learning.oreilly.com/library/view/~/9783866451278/?ar">https://learning.oreilly.com/library/view/~/9783866451278/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783866451278/?ar">https://go.oreilly.com/library-access/library/view/-/9783866451278/?ar</a><br/>Format:&#160;Electronic Resources<br/>