Search Results for - Narrowed by: 2015 - Computer security. - Réseaux d'ordinateurs -- Sécurité -- Mesures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092015$0025092015$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300?2024-06-20T00:12:47ZEssential cybersecurity science : build, test, and evaluate secure systemsent://SD_ILS/0/SD_ILS:23091932024-06-20T00:12:47Z2024-06-20T00:12:47Zby Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format: Electronic Resources<br/>Beyond cybersecurity : protecting your digital businessent://SD_ILS/0/SD_ILS:23069342024-06-20T00:12:47Z2024-06-20T00:12:47Zby Kaplan, James M., 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119026846">https://learning.oreilly.com/library/view/~/9781119026846</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar">https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119026846/?ar">https://learning.oreilly.com/library/view/~/9781119026846/?ar</a><br/>Format: Electronic Resources<br/>Secrets and lies : digital security in a networked worldent://SD_ILS/0/SD_ILS:23087532024-06-20T00:12:47Z2024-06-20T00:12:47Zby Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119092438">https://learning.oreilly.com/library/view/~/9781119092438</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar">https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119092438/?ar">https://learning.oreilly.com/library/view/~/9781119092438/?ar</a><br/>Format: Electronic Resources<br/>The security consultant's handbookent://SD_ILS/0/SD_ILS:23090722024-06-20T00:12:47Z2024-06-20T00:12:47Zby Bingley, Richard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287500">https://learning.oreilly.com/library/view/~/9781849287500</a>
<a href="https://learning.oreilly.com/library/view/~/9781849287500/?ar">https://learning.oreilly.com/library/view/~/9781849287500/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar</a><br/>Format: Electronic Resources<br/>A practical guide to computer forensics investigationsent://SD_ILS/0/SD_ILS:23056322024-06-20T00:12:47Z2024-06-20T00:12:47Zby Hayes, Darren R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780132756174/?ar">https://learning.oreilly.com/library/view/~/9780132756174/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar">https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar</a><br/>Format: Electronic Resources<br/>Microsoft security fundamentals LiveLessonsent://SD_ILS/0/SD_ILS:23057252024-06-20T00:12:47Z2024-06-20T00:12:47Zby Lieberman, Ed, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780133949445/?ar">https://learning.oreilly.com/videos/~/9780133949445/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar">https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar</a><br/>Format: Electronic Resources<br/>Getting started with Windows Server Security : develop and implement a secure Microsoft infrastructure platform using native and built-in toolsent://SD_ILS/0/SD_ILS:23066812024-06-20T00:12:47Z2024-06-20T00:12:47Zby Sivarajan, Santhosh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784398729/?ar">https://learning.oreilly.com/library/view/~/9781784398729/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781784398729/?ar">https://go.oreilly.com/library-access/library/view/-/9781784398729/?ar</a><br/>Format: Electronic Resources<br/>A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of securityent://SD_ILS/0/SD_ILS:23069642024-06-20T00:12:47Z2024-06-20T00:12:47Zby Arthur, Will, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265849/?ar">https://learning.oreilly.com/library/view/~/9781430265849/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar</a><br/>Format: Electronic Resources<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:23046822024-06-20T00:12:47Z2024-06-20T00:12:47Zby Hexmoor, Henry, 1960- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008911/?ar">https://learning.oreilly.com/library/view/~/9780128008911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008911">https://learning.oreilly.com/library/view/~/9780128008911</a><br/>Format: Electronic Resources<br/>The security data lake : leveraging big data technologies to build a common data repository for securityent://SD_ILS/0/SD_ILS:23183502024-06-20T00:12:47Z2024-06-20T00:12:47Zby Marty, Raffael, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491927748/?ar">https://learning.oreilly.com/library/view/~/9781491927748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar">https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar</a><br/>Format: Electronic Resources<br/>Opportunities and challenges in the IoT : a conversation with Tim O'Reilly and Cory Doctorowent://SD_ILS/0/SD_ILS:23183842024-06-20T00:12:47Z2024-06-20T00:12:47Zby O'Reilly, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492048220/?ar">https://learning.oreilly.com/library/view/~/9781492048220/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492048220">https://learning.oreilly.com/library/view/~/9781492048220</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar">https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar</a><br/>Format: Electronic Resources<br/>Agile security : an introduction for developersent://SD_ILS/0/SD_ILS:23163802024-06-20T00:12:47Z2024-06-20T00:12:47Zby Brunton-Spall, Michael, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492037699/?ar">https://learning.oreilly.com/videos/~/9781492037699/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492037699/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037699/?ar</a><br/>Format: Electronic Resources<br/>How to attack and defend your websiteent://SD_ILS/0/SD_ILS:23059342024-06-20T00:12:47Z2024-06-20T00:12:47Zby Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027325/?ar">https://learning.oreilly.com/library/view/~/9780128027325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027325">https://learning.oreilly.com/library/view/~/9780128027325</a><br/>Format: Electronic Resources<br/>Cyber operations : building, defending, and attacking modern computer networksent://SD_ILS/0/SD_ILS:23086782024-06-20T00:12:47Z2024-06-20T00:12:47Zby O'Leary, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484204573">https://learning.oreilly.com/library/view/~/9781484204573</a>
<a href="https://learning.oreilly.com/library/view/~/9781484204573/?ar">https://learning.oreilly.com/library/view/~/9781484204573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar">https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar</a><br/>Format: Electronic Resources<br/>Risk centric threat modeling : process for attack simulation and threat analysisent://SD_ILS/0/SD_ILS:23087922024-06-20T00:12:47Z2024-06-20T00:12:47Zby Uceda Vélez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format: Electronic Resources<br/>Enterprise software security : a confluence of disciplinesent://SD_ILS/0/SD_ILS:23052972024-06-20T00:12:47Z2024-06-20T00:12:47Zby Van Wyk, Kenneth R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780321604378/?ar">https://learning.oreilly.com/library/view/~/9780321604378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321604378">https://learning.oreilly.com/library/view/~/9780321604378</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar">https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar</a><br/>Format: Electronic Resources<br/>Securing Windows networks : from system security basics to monitoring and auditingent://SD_ILS/0/SD_ILS:23085612024-06-20T00:12:47Z2024-06-20T00:12:47Zby Long, Mark, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar">https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771374903/?ar">https://learning.oreilly.com/videos/~/9781771374903/?ar</a><br/>Format: Electronic Resources<br/>Web application security is a stack : how to CYA (cover your apps) completelyent://SD_ILS/0/SD_ILS:23088452024-06-20T00:12:47Z2024-06-20T00:12:47Zby MacVittie, Lori A., 1969- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287050/?ar">https://learning.oreilly.com/library/view/~/9781849287050/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar</a><br/>Format: Electronic Resources<br/>Once more unto the breach : managing information security in an uncertain worldent://SD_ILS/0/SD_ILS:23088462024-06-20T00:12:47Z2024-06-20T00:12:47Zby Simmons, Andrea C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849287098/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287098/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849287098/?ar">https://learning.oreilly.com/library/view/~/9781849287098/?ar</a><br/>Format: Electronic Resources<br/>Application security in the ISO 27001:2013 environmentent://SD_ILS/0/SD_ILS:23090732024-06-20T00:12:47Z2024-06-20T00:12:47Zby Vasudevan, Vinod, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287692/?ar">https://learning.oreilly.com/library/view/~/9781849287692/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar</a><br/>Format: Electronic Resources<br/>Anomaly detection for monitoring : a statistical approach to time series anomaly detectionent://SD_ILS/0/SD_ILS:23169072024-06-20T00:12:47Z2024-06-20T00:12:47Zby Jinka, Preetam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042341">https://learning.oreilly.com/library/view/~/9781492042341</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042341/?ar">https://learning.oreilly.com/library/view/~/9781492042341/?ar</a><br/>Format: Electronic Resources<br/>