Search Results for - Narrowed by: 2016 - Electronic books. - Réseaux d'ordinateurs -- Sécurité -- Mesures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092016$0025092016$0026qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300?2024-09-27T09:04:02ZPeople-centric security : transforming your enterprise security cultureent://SD_ILS/0/SD_ILS:23095172024-09-27T09:04:02Z2024-09-27T09:04:02Zby Hayden, Lance, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071846790/?ar">https://learning.oreilly.com/library/view/~/9780071846790/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar">https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar</a><br/>Format: Electronic Resources<br/>Network security with NetFlow and IPFIX : big data analytics for information securityent://SD_ILS/0/SD_ILS:23084012024-09-27T09:04:02Z2024-09-27T09:04:02Zby Santos, Omar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134033549/?ar">https://go.oreilly.com/library-access/library/view/-/9780134033549/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134033549/?ar">https://learning.oreilly.com/library/view/~/9780134033549/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134033549">https://learning.oreilly.com/library/view/~/9780134033549</a><br/>Format: Electronic Resources<br/>Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect itent://SD_ILS/0/SD_ILS:23115292024-09-27T09:04:02Z2024-09-27T09:04:02Zby Cardwell, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar">https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785883491/?ar">https://learning.oreilly.com/library/view/~/9781785883491/?ar</a><br/>Format: Electronic Resources<br/>Mastering identity and access management with Microsoft Azure : start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environmentsent://SD_ILS/0/SD_ILS:23117452024-09-27T09:04:02Z2024-09-27T09:04:02Zby Nickel, Jochen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889448/?ar">https://learning.oreilly.com/library/view/~/9781785889448/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889448">https://learning.oreilly.com/library/view/~/9781785889448</a><br/>Format: Electronic Resources<br/>Python : penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modulesent://SD_ILS/0/SD_ILS:23118492024-09-27T09:04:02Z2024-09-27T09:04:02Zby Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787128187">https://learning.oreilly.com/library/view/~/9781787128187</a>
<a href="https://learning.oreilly.com/library/view/~/9781787128187/?ar">https://learning.oreilly.com/library/view/~/9781787128187/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar">https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar</a><br/>Format: Electronic Resources<br/>Are your bits flipped? : overcoming tech misconceptionsent://SD_ILS/0/SD_ILS:23105992024-09-27T09:04:02Z2024-09-27T09:04:02Zby Kissell, Joe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar">https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492017172/?ar">https://learning.oreilly.com/library/view/~/9781492017172/?ar</a><br/>Format: Electronic Resources<br/>A study of black hole attack solutions : on AODV routing protocol in MANETent://SD_ILS/0/SD_ILS:23090382024-09-27T09:04:02Z2024-09-27T09:04:02Zby Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format: Electronic Resources<br/>Foundations of modern networking : SDN, NFV, QoE, IoT, and Cloudent://SD_ILS/0/SD_ILS:23088002024-09-27T09:04:02Z2024-09-27T09:04:02Zby Stallings, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134175478/?ar">https://learning.oreilly.com/library/view/~/9780134175478/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar">https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar</a><br/>Format: Electronic Resources<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:23109912024-09-27T09:04:02Z2024-09-27T09:04:02Zby Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format: Electronic Resources<br/>DevOpsSec : securing software through continuous deliveryent://SD_ILS/0/SD_ILS:23111962024-09-27T09:04:02Z2024-09-27T09:04:02Zby Bird, Jim, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491971413/?ar">https://go.oreilly.com/library-access/library/view/-/9781491971413/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491971413/?ar">https://learning.oreilly.com/library/view/~/9781491971413/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491971413">https://learning.oreilly.com/library/view/~/9781491971413</a><br/>Format: Electronic Resources<br/>Essential cybersecurity science : build, test, and evaluate secure systemsent://SD_ILS/0/SD_ILS:23091932024-09-27T09:04:02Z2024-09-27T09:04:02Zby Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format: Electronic Resources<br/>Thinking security : stopping next year's hackersent://SD_ILS/0/SD_ILS:23089322024-09-27T09:04:02Z2024-09-27T09:04:02Zby Bellovin, Steven M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar">https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134278223">https://learning.oreilly.com/library/view/~/9780134278223</a>
<a href="https://learning.oreilly.com/library/view/~/9780134278223/?ar">https://learning.oreilly.com/library/view/~/9780134278223/?ar</a><br/>Format: Electronic Resources<br/>Secure your Node.js web application : keep attackers out and users happyent://SD_ILS/0/SD_ILS:23099492024-09-27T09:04:02Z2024-09-27T09:04:02Zby Düüna, Karl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar">https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680501780/?ar">https://learning.oreilly.com/library/view/~/9781680501780/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680501780">https://learning.oreilly.com/library/view/~/9781680501780</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linuxent://SD_ILS/0/SD_ILS:23100362024-09-27T09:04:02Z2024-09-27T09:04:02Zby Sak, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785285561">https://learning.oreilly.com/library/view/~/9781785285561</a>
<a href="https://learning.oreilly.com/library/view/~/9781785285561/?ar">https://learning.oreilly.com/library/view/~/9781785285561/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar">https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar</a><br/>Format: Electronic Resources<br/>Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deploymentsent://SD_ILS/0/SD_ILS:23092162024-09-27T09:04:02Z2024-09-27T09:04:02Zby Richter, Andy, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045046/?ar">https://learning.oreilly.com/library/view/~/9780128045046/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128045046/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045046/?ar</a><br/>Format: Electronic Resources<br/>Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniquesent://SD_ILS/0/SD_ILS:23102742024-09-27T09:04:02Z2024-09-27T09:04:02Zby Fadyushin, Vyacheslav, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785283154">https://learning.oreilly.com/library/view/~/9781785283154</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785283154/?ar">https://go.oreilly.com/library-access/library/view/-/9781785283154/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785283154/?ar">https://learning.oreilly.com/library/view/~/9781785283154/?ar</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:23092962024-09-27T09:04:02Z2024-09-27T09:04:02Zby Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format: Electronic Resources<br/>Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldent://SD_ILS/0/SD_ILS:23110272024-09-27T09:04:02Z2024-09-27T09:04:02Zby Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785889639">https://learning.oreilly.com/library/view/~/9781785889639</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889639/?ar">https://learning.oreilly.com/library/view/~/9781785889639/?ar</a><br/>Format: Electronic Resources<br/>Implementing DirectAccess with Windows Server 2016ent://SD_ILS/0/SD_ILS:23117672024-09-27T09:04:02Z2024-09-27T09:04:02Zby Hicks, Richard M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484220597/?ar">https://learning.oreilly.com/library/view/~/9781484220597/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484220597/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220597/?ar</a><br/>Format: Electronic Resources<br/>Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacksent://SD_ILS/0/SD_ILS:23101212024-09-27T09:04:02Z2024-09-27T09:04:02Zby Datt, Samir, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar">https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905/?ar">https://learning.oreilly.com/library/view/~/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905">https://learning.oreilly.com/library/view/~/9781782174905</a><br/>Format: Electronic Resources<br/>Mastering modern web penetration testing : master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!ent://SD_ILS/0/SD_ILS:23118962024-09-27T09:04:02Z2024-09-27T09:04:02Zby Prasad, Prakhar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar">https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785284588">https://learning.oreilly.com/library/view/~/9781785284588</a>
<a href="https://learning.oreilly.com/library/view/~/9781785284588/?ar">https://learning.oreilly.com/library/view/~/9781785284588/?ar</a><br/>Format: Electronic Resources<br/>z/OS PKI Services : quick set-up for multiple CAsent://SD_ILS/0/SD_ILS:23124322024-09-27T09:04:02Z2024-09-27T09:04:02Zby Winnard, Keith, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738443054/?ar">https://learning.oreilly.com/library/view/~/0738443054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738443054/?ar">https://go.oreilly.com/library-access/library/view/-/0738443054/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738443054">https://learning.oreilly.com/library/view/~/0738443054</a><br/>Format: Electronic Resources<br/>The second economy : the race for trust, treasure and time in the cybersecurity warent://SD_ILS/0/SD_ILS:23125522024-09-27T09:04:02Z2024-09-27T09:04:02Zby Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format: Electronic Resources<br/>Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0ent://SD_ILS/0/SD_ILS:23113162024-09-27T09:04:02Z2024-09-27T09:04:02Zby Olups, Rihards, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782161288/?ar">https://learning.oreilly.com/library/view/~/9781782161288/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782161288/?ar">https://go.oreilly.com/library-access/library/view/-/9781782161288/?ar</a><br/>Format: Electronic Resources<br/>SELinux System Administration : ward off traditional security permissions and effectively secure your Linuxs systems with SELinuxent://SD_ILS/0/SD_ILS:23124102024-09-27T09:04:02Z2024-09-27T09:04:02Zby Vermeulen, Sven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787126954/?ar">https://go.oreilly.com/library-access/library/view/-/9781787126954/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787126954">https://learning.oreilly.com/library/view/~/9781787126954</a>
<a href="https://learning.oreilly.com/library/view/~/9781787126954/?ar">https://learning.oreilly.com/library/view/~/9781787126954/?ar</a><br/>Format: Electronic Resources<br/>Google hacking for penetration testersent://SD_ILS/0/SD_ILS:23092932024-09-27T09:04:02Z2024-09-27T09:04:02Zby Long, Johnny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029824/?ar">https://learning.oreilly.com/library/view/~/9780128029824/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar</a><br/>Format: Electronic Resources<br/>Practical Windows forensics : leverage the power of digital forensics for Windows systemsent://SD_ILS/0/SD_ILS:23110212024-09-27T09:04:02Z2024-09-27T09:04:02Zby Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format: Electronic Resources<br/>Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsent://SD_ILS/0/SD_ILS:23110222024-09-27T09:04:02Z2024-09-27T09:04:02Zby Rehim, Rejah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar">https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785280696/?ar">https://learning.oreilly.com/library/view/~/9781785280696/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785280696">https://learning.oreilly.com/library/view/~/9781785280696</a><br/>Format: Electronic Resources<br/>Wireless communications security : solutions for the internet of thingsent://SD_ILS/0/SD_ILS:23116242024-09-27T09:04:02Z2024-09-27T09:04:02Zby Penttinen, Jyrki T. J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119084396/?ar">https://learning.oreilly.com/library/view/~/9781119084396/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar">https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar</a><br/>Format: Electronic Resources<br/>Malware diffusion models for modern complex networks : theory and applicationsent://SD_ILS/0/SD_ILS:23138692024-09-27T09:04:02Z2024-09-27T09:04:02Zby Karyotis, Vasileios, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027165/?ar">https://learning.oreilly.com/library/view/~/9780128027165/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing : a complete pentesting guide facilitating smooth backtracking for working hackers : a course in three modules.ent://SD_ILS/0/SD_ILS:23126192024-09-27T09:04:02Z2024-09-27T09:04:02Zby Velu, Vijay Kumar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287839/?ar">https://learning.oreilly.com/library/view/~/9781787287839/?ar</a><br/>Format: Electronic Resources<br/>The Complete Guide to Cybersecurity Risks and Controlsent://SD_ILS/0/SD_ILS:23245242024-09-27T09:04:02Z2024-09-27T09:04:02Zby Kohnke, Anne, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar">https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579/?ar">https://learning.oreilly.com/library/view/~/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579">https://learning.oreilly.com/library/view/~/9781498740579</a><br/>Format: Electronic Resources<br/>Advances in Network Managementent://SD_ILS/0/SD_ILS:23136392024-09-27T09:04:02Z2024-09-27T09:04:02Zby Ding, Jianguo, author<br/><a href="https://learning.oreilly.com/library/view/~/9781420064551">https://learning.oreilly.com/library/view/~/9781420064551</a>
<a href="https://learning.oreilly.com/library/view/~/9781420064551/?ar">https://learning.oreilly.com/library/view/~/9781420064551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420064551/?ar">https://go.oreilly.com/library-access/library/view/-/9781420064551/?ar</a><br/>Format: Electronic Resources<br/>Cracking security misconceptions : untangling common myths about modern information securityent://SD_ILS/0/SD_ILS:23167042024-09-27T09:04:02Z2024-09-27T09:04:02Zby Peterson, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042747">https://learning.oreilly.com/library/view/~/9781492042747</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042747/?ar">https://learning.oreilly.com/library/view/~/9781492042747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar</a><br/>Format: Electronic Resources<br/>Information theft prevention : theory and practiceent://SD_ILS/0/SD_ILS:23155502024-09-27T09:04:02Z2024-09-27T09:04:02Zby Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format: Electronic Resources<br/>The platform transformation : how IoT will change IT, and whenent://SD_ILS/0/SD_ILS:23166612024-09-27T09:04:02Z2024-09-27T09:04:02Zby Perry, Matthew J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042792/?ar">https://learning.oreilly.com/library/view/~/9781492042792/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042792">https://learning.oreilly.com/library/view/~/9781492042792</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042792/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042792/?ar</a><br/>Format: Electronic Resources<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:23144162024-09-27T09:04:02Z2024-09-27T09:04:02Zby Bose, S., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789332579125/?ar">https://learning.oreilly.com/library/view/~/9789332579125/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar">https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9789332579125">https://learning.oreilly.com/library/view/~/9789332579125</a><br/>Format: Electronic Resources<br/>