Search Results for - Narrowed by: 2012 - R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300$0026isd$003dtrue? 2024-09-24T07:08:32Z Network security first-step ent://SD_ILS/0/SD_ILS:2293683 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Thomas, Thomas M.<br/><a href="https://learning.oreilly.com/library/view/~/9781587204142/?ar">https://learning.oreilly.com/library/view/~/9781587204142/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587204142/?ar">https://go.oreilly.com/library-access/library/view/-/9781587204142/?ar</a><br/>Format:&#160;Electronic Resources<br/> Once more unto the breach : managing information security in an uncertain world ent://SD_ILS/0/SD_ILS:2298022 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a> <a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format:&#160;Electronic Resources<br/> Monitoring i bezpieczeństwo sieci ent://SD_ILS/0/SD_ILS:2299375 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Fry, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9781457167102/?ar">https://learning.oreilly.com/library/view/~/9781457167102/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457167102">https://learning.oreilly.com/library/view/~/9781457167102</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457167102/?ar">https://go.oreilly.com/library-access/library/view/-/9781457167102/?ar</a><br/>Format:&#160;Electronic Resources<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:2295369 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Clarke, Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499637/?ar">https://learning.oreilly.com/library/view/~/9781597499637/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit ent://SD_ILS/0/SD_ILS:2295823 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:2296392 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Fichera, Joe, 1966-<br/><a href="https://learning.oreilly.com/library/view/~/9781597499620">https://learning.oreilly.com/library/view/~/9781597499620</a> <a href="https://learning.oreilly.com/library/view/~/9781597499620/?ar">https://learning.oreilly.com/library/view/~/9781597499620/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:2295951 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a> <a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber conflict : competing national perspectives ent://SD_ILS/0/SD_ILS:2297590 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Ventre, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781118562741">https://learning.oreilly.com/library/view/~/9781118562741</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118562741/?ar">https://go.oreilly.com/library-access/library/view/-/9781118562741/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118562741/?ar">https://learning.oreilly.com/library/view/~/9781118562741/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning Whitehat hacking and penetration testing ent://SD_ILS/0/SD_ILS:2297866 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Messier, Ric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771370349/?ar">https://learning.oreilly.com/videos/~/9781771370349/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCNA security live lessons : a hands-on guide to implementing security on Cisco routers and switches. ent://SD_ILS/0/SD_ILS:2297867 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Barker, Keith.<br/><a href="https://learning.oreilly.com/videos/~/9780133259001/?ar">https://learning.oreilly.com/videos/~/9780133259001/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133259001/?ar">https://go.oreilly.com/library-access/library/view/-/9780133259001/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCNP security VPN 642-647 official cert guide ent://SD_ILS/0/SD_ILS:2291830 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Hooper, Howard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132372046/?ar">https://go.oreilly.com/library-access/library/view/-/9780132372046/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132372046/?ar">https://learning.oreilly.com/library/view/~/9780132372046/?ar</a><br/>Format:&#160;Electronic Resources<br/> Predicting malicious behavior : tools and techniques for ensuring global security ent://SD_ILS/0/SD_ILS:2295845 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Jackson, Gary M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118239568/?ar">https://go.oreilly.com/library-access/library/view/-/9781118239568/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118239568/?ar">https://learning.oreilly.com/library/view/~/9781118239568/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2296528 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;McClure, Stuart.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar">https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071780285/?ar">https://learning.oreilly.com/library/view/~/9780071780285/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing the clicks : network security in the age of social media ent://SD_ILS/0/SD_ILS:2293761 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Bahadur, Gary.<br/><a href="https://learning.oreilly.com/library/view/~/9780071769051">https://learning.oreilly.com/library/view/~/9780071769051</a> <a href="https://learning.oreilly.com/library/view/~/9780071769051/?ar">https://learning.oreilly.com/library/view/~/9780071769051/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071769051/?ar">https://go.oreilly.com/library-access/library/view/-/9780071769051/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web application security : a beginner's guide ent://SD_ILS/0/SD_ILS:2293762 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Sullivan, Bryan, 1974-<br/><a href="https://learning.oreilly.com/library/view/~/9780071776165/?ar">https://learning.oreilly.com/library/view/~/9780071776165/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071776165/?ar">https://go.oreilly.com/library-access/library/view/-/9780071776165/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071776165">https://learning.oreilly.com/library/view/~/9780071776165</a><br/>Format:&#160;Electronic Resources<br/> The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) ent://SD_ILS/0/SD_ILS:2294170 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format:&#160;Electronic Resources<br/> Reverse Deception Organized Cyber Threat Counter-Exploitation. ent://SD_ILS/0/SD_ILS:2295096 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Kilger, Dr Max.<br/><a href="https://learning.oreilly.com/library/view/~/9780071772495">https://learning.oreilly.com/library/view/~/9780071772495</a> <a href="https://learning.oreilly.com/library/view/~/9780071772495/?ar">https://learning.oreilly.com/library/view/~/9780071772495/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar">https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kerberos : Single Sign-on in gemischten Linux/Windows-Umgebungen. ent://SD_ILS/0/SD_ILS:2295135 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Pr&ouml;hl, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9781457170393/?ar">https://learning.oreilly.com/library/view/~/9781457170393/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457170393/?ar">https://go.oreilly.com/library-access/library/view/-/9781457170393/?ar</a><br/>Format:&#160;Electronic Resources<br/> The tangled Web : a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:2293949 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Zalewski, Michal.<br/><a href="https://learning.oreilly.com/library/view/~/9781593273880">https://learning.oreilly.com/library/view/~/9781593273880</a> <a href="https://learning.oreilly.com/library/view/~/9781593273880/?ar">https://learning.oreilly.com/library/view/~/9781593273880/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:2296625 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Winterfeld, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047372/?ar">https://learning.oreilly.com/library/view/~/9780124047372/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124047372">https://learning.oreilly.com/library/view/~/9780124047372</a><br/>Format:&#160;Electronic Resources<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:2294655 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Easttom, Chuck.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar">https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132828284/?ar">https://learning.oreilly.com/library/view/~/9780132828284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132828284">https://learning.oreilly.com/library/view/~/9780132828284</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing : protecting networks and systems ent://SD_ILS/0/SD_ILS:2295898 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Henry, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283731">https://learning.oreilly.com/library/view/~/9781849283731</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849283731/?ar">https://learning.oreilly.com/library/view/~/9781849283731/?ar</a><br/>Format:&#160;Electronic Resources<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:2298518 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Shimonski, Robert.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495905/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495905/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495905/?ar">https://learning.oreilly.com/library/view/~/9781597495905/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI compliance : understand and implement effective PCI data security standard compliance, third edition ent://SD_ILS/0/SD_ILS:2298067 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Williams, Branden R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499484/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499484/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499484/?ar">https://learning.oreilly.com/library/view/~/9781597499484/?ar</a><br/>Format:&#160;Electronic Resources<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:2293442 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Speed, Tyler Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar">https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439809839/?ar">https://learning.oreilly.com/library/view/~/9781439809839/?ar</a><br/>Format:&#160;Electronic Resources<br/> 125 sposob&oacute;w na bezpieczeństwo sieci ent://SD_ILS/0/SD_ILS:2299439 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176357/?ar">https://learning.oreilly.com/library/view/~/9781457176357/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Single Sign-On design guide : using IBM Security Access Manager for Enterprise Single Sign-On 8.2 ent://SD_ILS/0/SD_ILS:2302060 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;B&uuml;cker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738437034/?ar">https://go.oreilly.com/library-access/library/view/-/0738437034/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738437034/?ar">https://learning.oreilly.com/library/view/~/0738437034/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network Attacks and Defenses : a Hands-on Approach ent://SD_ILS/0/SD_ILS:2313475 2024-09-24T07:08:32Z 2024-09-24T07:08:32Z by&#160;Trabelsi, Zouheir, author<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466517974/?ar">https://go.oreilly.com/library-access/library/view/-/9781466517974/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466517974/?ar">https://learning.oreilly.com/library/view/~/9781466517974/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466517974">https://learning.oreilly.com/library/view/~/9781466517974</a><br/>Format:&#160;Electronic Resources<br/>