Search Results for - Narrowed by: 2012 - Réseaux d'ordinateurs -- Sécurité -- Mesures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300$0026isd$003dtrue?
2024-09-24T07:08:32Z
Network security first-step
ent://SD_ILS/0/SD_ILS:2293683
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Thomas, Thomas M.<br/><a href="https://learning.oreilly.com/library/view/~/9781587204142/?ar">https://learning.oreilly.com/library/view/~/9781587204142/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587204142/?ar">https://go.oreilly.com/library-access/library/view/-/9781587204142/?ar</a><br/>Format: Electronic Resources<br/>
Once more unto the breach : managing information security in an uncertain world
ent://SD_ILS/0/SD_ILS:2298022
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format: Electronic Resources<br/>
Monitoring i bezpieczeństwo sieci
ent://SD_ILS/0/SD_ILS:2299375
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Fry, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9781457167102/?ar">https://learning.oreilly.com/library/view/~/9781457167102/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457167102">https://learning.oreilly.com/library/view/~/9781457167102</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457167102/?ar">https://go.oreilly.com/library-access/library/view/-/9781457167102/?ar</a><br/>Format: Electronic Resources<br/>
SQL injection attacks and defense
ent://SD_ILS/0/SD_ILS:2295369
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Clarke, Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499637/?ar">https://learning.oreilly.com/library/view/~/9781597499637/?ar</a><br/>Format: Electronic Resources<br/>
Windows forensic analysis toolkit
ent://SD_ILS/0/SD_ILS:2295823
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format: Electronic Resources<br/>
Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response
ent://SD_ILS/0/SD_ILS:2296392
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Fichera, Joe, 1966-<br/><a href="https://learning.oreilly.com/library/view/~/9781597499620">https://learning.oreilly.com/library/view/~/9781597499620</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499620/?ar">https://learning.oreilly.com/library/view/~/9781597499620/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar</a><br/>Format: Electronic Resources<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:2295951
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format: Electronic Resources<br/>
Cyber conflict : competing national perspectives
ent://SD_ILS/0/SD_ILS:2297590
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Ventre, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781118562741">https://learning.oreilly.com/library/view/~/9781118562741</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118562741/?ar">https://go.oreilly.com/library-access/library/view/-/9781118562741/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118562741/?ar">https://learning.oreilly.com/library/view/~/9781118562741/?ar</a><br/>Format: Electronic Resources<br/>
Learning Whitehat hacking and penetration testing
ent://SD_ILS/0/SD_ILS:2297866
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Messier, Ric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771370349/?ar">https://learning.oreilly.com/videos/~/9781771370349/?ar</a><br/>Format: Electronic Resources<br/>
CCNA security live lessons : a hands-on guide to implementing security on Cisco routers and switches.
ent://SD_ILS/0/SD_ILS:2297867
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Barker, Keith.<br/><a href="https://learning.oreilly.com/videos/~/9780133259001/?ar">https://learning.oreilly.com/videos/~/9780133259001/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133259001/?ar">https://go.oreilly.com/library-access/library/view/-/9780133259001/?ar</a><br/>Format: Electronic Resources<br/>
CCNP security VPN 642-647 official cert guide
ent://SD_ILS/0/SD_ILS:2291830
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Hooper, Howard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132372046/?ar">https://go.oreilly.com/library-access/library/view/-/9780132372046/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132372046/?ar">https://learning.oreilly.com/library/view/~/9780132372046/?ar</a><br/>Format: Electronic Resources<br/>
Predicting malicious behavior : tools and techniques for ensuring global security
ent://SD_ILS/0/SD_ILS:2295845
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Jackson, Gary M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118239568/?ar">https://go.oreilly.com/library-access/library/view/-/9781118239568/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118239568/?ar">https://learning.oreilly.com/library/view/~/9781118239568/?ar</a><br/>Format: Electronic Resources<br/>
Hacking exposed 7 : network security secrets & solutions
ent://SD_ILS/0/SD_ILS:2296528
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by McClure, Stuart.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar">https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071780285/?ar">https://learning.oreilly.com/library/view/~/9780071780285/?ar</a><br/>Format: Electronic Resources<br/>
Securing the clicks : network security in the age of social media
ent://SD_ILS/0/SD_ILS:2293761
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Bahadur, Gary.<br/><a href="https://learning.oreilly.com/library/view/~/9780071769051">https://learning.oreilly.com/library/view/~/9780071769051</a>
<a href="https://learning.oreilly.com/library/view/~/9780071769051/?ar">https://learning.oreilly.com/library/view/~/9780071769051/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071769051/?ar">https://go.oreilly.com/library-access/library/view/-/9780071769051/?ar</a><br/>Format: Electronic Resources<br/>
Web application security : a beginner's guide
ent://SD_ILS/0/SD_ILS:2293762
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Sullivan, Bryan, 1974-<br/><a href="https://learning.oreilly.com/library/view/~/9780071776165/?ar">https://learning.oreilly.com/library/view/~/9780071776165/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071776165/?ar">https://go.oreilly.com/library-access/library/view/-/9780071776165/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071776165">https://learning.oreilly.com/library/view/~/9780071776165</a><br/>Format: Electronic Resources<br/>
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
ent://SD_ILS/0/SD_ILS:2294170
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format: Electronic Resources<br/>
Reverse Deception Organized Cyber Threat Counter-Exploitation.
ent://SD_ILS/0/SD_ILS:2295096
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Kilger, Dr Max.<br/><a href="https://learning.oreilly.com/library/view/~/9780071772495">https://learning.oreilly.com/library/view/~/9780071772495</a>
<a href="https://learning.oreilly.com/library/view/~/9780071772495/?ar">https://learning.oreilly.com/library/view/~/9780071772495/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar">https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar</a><br/>Format: Electronic Resources<br/>
Kerberos : Single Sign-on in gemischten Linux/Windows-Umgebungen.
ent://SD_ILS/0/SD_ILS:2295135
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Pröhl, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9781457170393/?ar">https://learning.oreilly.com/library/view/~/9781457170393/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457170393/?ar">https://go.oreilly.com/library-access/library/view/-/9781457170393/?ar</a><br/>Format: Electronic Resources<br/>
The tangled Web : a guide to securing modern Web applications
ent://SD_ILS/0/SD_ILS:2293949
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Zalewski, Michal.<br/><a href="https://learning.oreilly.com/library/view/~/9781593273880">https://learning.oreilly.com/library/view/~/9781593273880</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273880/?ar">https://learning.oreilly.com/library/view/~/9781593273880/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar</a><br/>Format: Electronic Resources<br/>
The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
ent://SD_ILS/0/SD_ILS:2296625
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Winterfeld, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047372/?ar">https://learning.oreilly.com/library/view/~/9780124047372/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124047372">https://learning.oreilly.com/library/view/~/9780124047372</a><br/>Format: Electronic Resources<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:2294655
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Easttom, Chuck.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar">https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132828284/?ar">https://learning.oreilly.com/library/view/~/9780132828284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132828284">https://learning.oreilly.com/library/view/~/9780132828284</a><br/>Format: Electronic Resources<br/>
Penetration testing : protecting networks and systems
ent://SD_ILS/0/SD_ILS:2295898
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Henry, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283731">https://learning.oreilly.com/library/view/~/9781849283731</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283731/?ar">https://learning.oreilly.com/library/view/~/9781849283731/?ar</a><br/>Format: Electronic Resources<br/>
Client-side attacks and defense
ent://SD_ILS/0/SD_ILS:2298518
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Shimonski, Robert.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495905/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495905/?ar">https://learning.oreilly.com/library/view/~/9781597495905/?ar</a><br/>Format: Electronic Resources<br/>
PCI compliance : understand and implement effective PCI data security standard compliance, third edition
ent://SD_ILS/0/SD_ILS:2298067
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Williams, Branden R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499484/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499484/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499484/?ar">https://learning.oreilly.com/library/view/~/9781597499484/?ar</a><br/>Format: Electronic Resources<br/>
Asset protection through security awareness
ent://SD_ILS/0/SD_ILS:2293442
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Speed, Tyler Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar">https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439809839/?ar">https://learning.oreilly.com/library/view/~/9781439809839/?ar</a><br/>Format: Electronic Resources<br/>
125 sposobów na bezpieczeństwo sieci
ent://SD_ILS/0/SD_ILS:2299439
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176357/?ar">https://learning.oreilly.com/library/view/~/9781457176357/?ar</a><br/>Format: Electronic Resources<br/>
Enterprise Single Sign-On design guide : using IBM Security Access Manager for Enterprise Single Sign-On 8.2
ent://SD_ILS/0/SD_ILS:2302060
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738437034/?ar">https://go.oreilly.com/library-access/library/view/-/0738437034/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738437034/?ar">https://learning.oreilly.com/library/view/~/0738437034/?ar</a><br/>Format: Electronic Resources<br/>
Network Attacks and Defenses : a Hands-on Approach
ent://SD_ILS/0/SD_ILS:2313475
2024-09-24T07:08:32Z
2024-09-24T07:08:32Z
by Trabelsi, Zouheir, author<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466517974/?ar">https://go.oreilly.com/library-access/library/view/-/9781466517974/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466517974/?ar">https://learning.oreilly.com/library/view/~/9781466517974/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466517974">https://learning.oreilly.com/library/view/~/9781466517974</a><br/>Format: Electronic Resources<br/>