Search Results for - Narrowed by: 2010 - Sécurité informatique.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300$0026isd$003dtrue?
2024-09-22T09:09:04Z
Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
ent://SD_ILS/0/SD_ILS:2286982
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Collberg, Christian.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591258/?ar">https://learning.oreilly.com/library/view/~/9780321591258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar</a><br/>Format: Electronic Resources<br/>
Mac Security Bible.
ent://SD_ILS/0/SD_ILS:2287722
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Kissell, Joe.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar">https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198/?ar">https://learning.oreilly.com/library/view/~/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198">https://learning.oreilly.com/library/view/~/9780470474198</a><br/>Format: Electronic Resources<br/>
24 deadly sins of software security : programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:2287176
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780071626750/?ar">https://learning.oreilly.com/library/view/~/9780071626750/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar">https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071626750">https://learning.oreilly.com/library/view/~/9780071626750</a><br/>Format: Electronic Resources<br/>
Seven deadliest social network attacks
ent://SD_ILS/0/SD_ILS:2289718
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Timm, Carl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495455/?ar">https://learning.oreilly.com/library/view/~/9781597495455/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495455">https://learning.oreilly.com/library/view/~/9781597495455</a><br/>Format: Electronic Resources<br/>
Secure and resilient software development
ent://SD_ILS/0/SD_ILS:2289816
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Merkow, Mark S.<br/><a href="https://learning.oreilly.com/library/view/~/9781439826973/?ar">https://learning.oreilly.com/library/view/~/9781439826973/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar">https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar</a><br/>Format: Electronic Resources<br/>
ISO27001 in a Windows Environment : the best practice handbook for a Microsoft Windows environment
ent://SD_ILS/0/SD_ILS:2290026
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Honan, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280495/?ar">https://learning.oreilly.com/library/view/~/9781849280495/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar</a><br/>Format: Electronic Resources<br/>
Hashing in computer science : fifty years of slicing and dicing
ent://SD_ILS/0/SD_ILS:2289360
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Konheim, Alan G., 1934-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar">https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118031834/?ar">https://learning.oreilly.com/library/view/~/9781118031834/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118031834">https://learning.oreilly.com/library/view/~/9781118031834</a><br/>Format: Electronic Resources<br/>
IT induction and information security awareness : a pocket guide
ent://SD_ILS/0/SD_ILS:2292243
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Maddock, Valerie.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281195">https://learning.oreilly.com/library/view/~/9781849281195</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281195/?ar">https://learning.oreilly.com/library/view/~/9781849281195/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2287972
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar">https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470550939/?ar">https://learning.oreilly.com/library/view/~/9780470550939/?ar</a><br/>Format: Electronic Resources<br/>
System assurance : beyond detecting vulnerabilities
ent://SD_ILS/0/SD_ILS:2290369
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Mansourov, Nikolai.<br/><a href="https://learning.oreilly.com/library/view/~/9780123814142">https://learning.oreilly.com/library/view/~/9780123814142</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780123814142/?ar">https://go.oreilly.com/library-access/library/view/-/9780123814142/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123814142/?ar">https://learning.oreilly.com/library/view/~/9780123814142/?ar</a><br/>Format: Electronic Resources<br/>
Cloud Security and Governance : Who's on your cloud?.
ent://SD_ILS/0/SD_ILS:2290671
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Blount, Sumner.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280983">https://learning.oreilly.com/library/view/~/9781849280983</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280983/?ar">https://learning.oreilly.com/library/view/~/9781849280983/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar</a><br/>Format: Electronic Resources<br/>
Computer forensics : a pocket guide
ent://SD_ILS/0/SD_ILS:2289616
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format: Electronic Resources<br/>
Managing Information Security Breaches : Studies from Real Life.
ent://SD_ILS/0/SD_ILS:2290674
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format: Electronic Resources<br/>
E-mail Security : a Pocket Guide.
ent://SD_ILS/0/SD_ILS:2290676
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Furnell, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280976">https://learning.oreilly.com/library/view/~/9781849280976</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280976/?ar">https://learning.oreilly.com/library/view/~/9781849280976/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar</a><br/>Format: Electronic Resources<br/>
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:2289149
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Lillard, Terrence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387/?ar">https://learning.oreilly.com/library/view/~/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387">https://learning.oreilly.com/library/view/~/9781597495387</a><br/>Format: Electronic Resources<br/>
Seven deadliest Microsoft attacks
ent://SD_ILS/0/SD_ILS:2289849
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Kraus, Rob.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495516/?ar">https://learning.oreilly.com/library/view/~/9781597495516/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495516/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495516/?ar</a><br/>Format: Electronic Resources<br/>
Cisco DCUCI quick reference
ent://SD_ILS/0/SD_ILS:2289858
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Casaletto, James.<br/><a href="https://learning.oreilly.com/library/view/~/9781587141881/?ar">https://learning.oreilly.com/library/view/~/9781587141881/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587141881/?ar">https://go.oreilly.com/library-access/library/view/-/9781587141881/?ar</a><br/>Format: Electronic Resources<br/>
Enterprise Mac security : MAC OS X Snow Leopard
ent://SD_ILS/0/SD_ILS:2290421
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Edge, Charles S., Jr.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar">https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430227304/?ar">https://learning.oreilly.com/library/view/~/9781430227304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430227304">https://learning.oreilly.com/library/view/~/9781430227304</a><br/>Format: Electronic Resources<br/>
IOS forensic analysis for iPhone, iPad, and iPod Touch
ent://SD_ILS/0/SD_ILS:2291230
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Morrissey, Sean.<br/><a href="https://learning.oreilly.com/library/view/~/9781430233428">https://learning.oreilly.com/library/view/~/9781430233428</a>
<a href="https://learning.oreilly.com/library/view/~/9781430233428/?ar">https://learning.oreilly.com/library/view/~/9781430233428/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430233428/?ar">https://go.oreilly.com/library-access/library/view/-/9781430233428/?ar</a><br/>Format: Electronic Resources<br/>
Dissecting the hack : the f0rb1dd3n network
ent://SD_ILS/0/SD_ILS:2290700
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format: Electronic Resources<br/>
IT Governance to Drive High Performance : Lessons from Accenture.
ent://SD_ILS/0/SD_ILS:2288636
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Kress, Robert E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281188/?ar">https://learning.oreilly.com/library/view/~/9781849281188/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281188">https://learning.oreilly.com/library/view/~/9781849281188</a><br/>Format: Electronic Resources<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:2288720
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Haines, Brad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417/?ar">https://learning.oreilly.com/library/view/~/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417">https://learning.oreilly.com/library/view/~/9781597495417</a><br/>Format: Electronic Resources<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:2288721
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Anderson, Brian (Brian James)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547/?ar">https://learning.oreilly.com/library/view/~/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547">https://learning.oreilly.com/library/view/~/9781597495547</a><br/>Format: Electronic Resources<br/>
Cloud security : a comprehensive guide to secure cloud computing
ent://SD_ILS/0/SD_ILS:2289708
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Krutz, Ronald L., 1938-<br/><a href="https://learning.oreilly.com/library/view/~/9780470589878/?ar">https://learning.oreilly.com/library/view/~/9780470589878/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar">https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470589878">https://learning.oreilly.com/library/view/~/9780470589878</a><br/>Format: Electronic Resources<br/>
Applied Oracle security : developing secure database and middleware environments
ent://SD_ILS/0/SD_ILS:2287303
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Knox, David (David C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar">https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071613705/?ar">https://learning.oreilly.com/library/view/~/9780071613705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071613705">https://learning.oreilly.com/library/view/~/9780071613705</a><br/>Format: Electronic Resources<br/>
Virtualization and forensics : a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:2290041
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Barrett, Diane.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495578/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495578/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495578/?ar">https://learning.oreilly.com/library/view/~/9781597495578/?ar</a><br/>Format: Electronic Resources<br/>
Mac OS X security and mobility v10.6
ent://SD_ILS/0/SD_ILS:2288654
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Kite, Robert.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321685698/?ar">https://go.oreilly.com/library-access/library/view/-/9780321685698/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321685698/?ar">https://learning.oreilly.com/library/view/~/9780321685698/?ar</a><br/>Format: Electronic Resources<br/>
Group policy : fundamentals, security, and the managed desktop
ent://SD_ILS/0/SD_ILS:2288891
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470581858/?ar">https://learning.oreilly.com/library/view/~/9780470581858/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470769805/?ar">https://learning.oreilly.com/library/view/~/9780470769805/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar">https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar">https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470769805">https://learning.oreilly.com/library/view/~/9780470769805</a><br/>Format: Electronic Resources<br/>
Professional Cocoa application security
ent://SD_ILS/0/SD_ILS:2289315
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Lee, Graham J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470525951/?ar">https://go.oreilly.com/library-access/library/view/-/9780470525951/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470525951/?ar">https://learning.oreilly.com/library/view/~/9780470525951/?ar</a><br/>Format: Electronic Resources<br/>
Dear Hacker : letters to the editor of 2600
ent://SD_ILS/0/SD_ILS:2289468
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Goldstein, Emmanuel, 1959-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar">https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470620069/?ar">https://learning.oreilly.com/library/view/~/9780470620069/?ar</a><br/>Format: Electronic Resources<br/>
Vulnerability management
ent://SD_ILS/0/SD_ILS:2293842
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Foreman, Park.<br/><a href="https://learning.oreilly.com/library/view/~/9781439801512">https://learning.oreilly.com/library/view/~/9781439801512</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439801512/?ar">https://go.oreilly.com/library-access/library/view/-/9781439801512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439801512/?ar">https://learning.oreilly.com/library/view/~/9781439801512/?ar</a><br/>Format: Electronic Resources<br/>
Practical intrusion analysis : prevention and detection for the twenty-first century
ent://SD_ILS/0/SD_ILS:2286080
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Trost, Ryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591890/?ar">https://learning.oreilly.com/library/view/~/9780321591890/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar</a><br/>Format: Electronic Resources<br/>
Aus dem Tagebuch eines Bughunters : wie man Softwareschwachstellen aufspürt und behebt
ent://SD_ILS/0/SD_ILS:2297743
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar">https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457169670/?ar">https://learning.oreilly.com/library/view/~/9781457169670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457169670">https://learning.oreilly.com/library/view/~/9781457169670</a><br/>Format: Electronic Resources<br/>
Adaptive Security Management Architecture
ent://SD_ILS/0/SD_ILS:2326064
2024-09-22T09:09:04Z
2024-09-22T09:09:04Z
by Tiller, James S.<br/><a href="https://learning.oreilly.com/library/view/~/9781420013375">https://learning.oreilly.com/library/view/~/9781420013375</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar">https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420013375/?ar">https://learning.oreilly.com/library/view/~/9781420013375/?ar</a><br/>Format: Electronic Resources<br/>