Search Results for - Narrowed by: 2020 - Computer networks -- Security measures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092020$0025092020$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue?
2024-06-23T04:02:50Z
Computer security and encryption : an introduction
ent://SD_ILS/0/SD_ILS:2237660
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Chauhan, S. R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6404902">Click to View</a><br/>Format: Electronic Resources<br/>
Artificial intelligence, cybersecurity and cyber defense
ent://SD_ILS/0/SD_ILS:2274878
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Ventre, Daniel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6384365">Click to View</a><br/>Format: Electronic Resources<br/>
Design and analysis of security protocol for communication
ent://SD_ILS/0/SD_ILS:2274166
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Goyal, Dinesh, 1976- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6040173">Click to View</a><br/>Format: Electronic Resources<br/>
Hands on hacking
ent://SD_ILS/0/SD_ILS:2274699
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Hickey, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6301556">Click to View</a><br/>Format: Electronic Resources<br/>
Computer network security
ent://SD_ILS/0/SD_ILS:2274211
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Sadiqui, Ali, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6123268">Click to View</a><br/>Format: Electronic Resources<br/>
Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
ent://SD_ILS/0/SD_ILS:2268639
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Rubinoff, Shira, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6020320">Click to View</a><br/>Format: Electronic Resources<br/>
Rational cybersecurity for business : the security leaders' guide to business alignment
ent://SD_ILS/0/SD_ILS:2325488
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Blum, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781484259528">https://learning.oreilly.com/library/view/~/9781484259528</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259528/?ar">https://learning.oreilly.com/library/view/~/9781484259528/?ar</a><br/>Format: Electronic Resources<br/>
Practical vulnerability management : a strategic approach to managing cyber risk
ent://SD_ILS/0/SD_ILS:2325867
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Magnusson, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125707/?ar">https://learning.oreilly.com/library/view/~/9781098125707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125707">https://learning.oreilly.com/library/view/~/9781098125707</a><br/>Format: Electronic Resources<br/>
Incident response primer : how to keep from getting pwned too hard
ent://SD_ILS/0/SD_ILS:2323316
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format: Electronic Resources<br/>
Data breaches : crisis and opportunity
ent://SD_ILS/0/SD_ILS:2322222
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format: Electronic Resources<br/>
Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
ent://SD_ILS/0/SD_ILS:2324802
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format: Electronic Resources<br/>
Cyber Warfare - Truth, Tactics, and Strategies
ent://SD_ILS/0/SD_ILS:2323667
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format: Electronic Resources<br/>
IT auditing : using controls to protect information assets
ent://SD_ILS/0/SD_ILS:2322126
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Kegerreis, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260453232/?ar">https://learning.oreilly.com/library/view/~/9781260453232/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar">https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar</a><br/>Format: Electronic Resources<br/>
The Complete 2020 Ethereum and Solidity Developer Bootcamp
ent://SD_ILS/0/SD_ILS:2323478
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Wiesner, Thomas, author.<br/><a href="https://learning.oreilly.com/videos/~/9781800201019/?ar">https://learning.oreilly.com/videos/~/9781800201019/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar">https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781800201019">https://learning.oreilly.com/videos/~/9781800201019</a><br/>Format: Electronic Resources<br/>
Web application security : exploitation and countermeasures for modern web applications
ent://SD_ILS/0/SD_ILS:2323527
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Hoffman, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492053101/?ar">https://learning.oreilly.com/library/view/~/9781492053101/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492053101/?ar">https://go.oreilly.com/library-access/library/view/-/9781492053101/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492053101">https://learning.oreilly.com/library/view/~/9781492053101</a><br/>Format: Electronic Resources<br/>
Computer Network Security
ent://SD_ILS/0/SD_ILS:2323627
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Sadiqui, Ali, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar">https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786305275">https://learning.oreilly.com/library/view/~/9781786305275</a>
<a href="https://learning.oreilly.com/library/view/~/9781786305275/?ar">https://learning.oreilly.com/library/view/~/9781786305275/?ar</a><br/>Format: Electronic Resources<br/>
Privileged attack vectors : building effective cyber-defense strategies to protect organizations
ent://SD_ILS/0/SD_ILS:2324664
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146/?ar">https://learning.oreilly.com/library/view/~/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146">https://learning.oreilly.com/library/view/~/9781484259146</a><br/>Format: Electronic Resources<br/>
Cybersecurity for dummies
ent://SD_ILS/0/SD_ILS:2322839
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560326/?ar">https://learning.oreilly.com/library/view/~/9781119560326/?ar</a><br/>Format: Electronic Resources<br/>
IBM DS8000 Encryption for data at rest, Transparent Cloud Tiering, and Endpoint Security (DS8000 Release 9.0)
ent://SD_ILS/0/SD_ILS:2323373
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Dufrasne, Bertrand, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738458427/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458427/?ar">https://learning.oreilly.com/library/view/~/9780738458427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458427">https://learning.oreilly.com/library/view/~/9780738458427</a><br/>Format: Electronic Resources<br/>
Designing a HIPAA-compliant security operations center : a guide to detecting and responding to healthcare breaches and events
ent://SD_ILS/0/SD_ILS:2323333
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Thompson, Eric C.<br/><a href="https://learning.oreilly.com/library/view/~/9781484256084">https://learning.oreilly.com/library/view/~/9781484256084</a>
<a href="https://learning.oreilly.com/library/view/~/9781484256084/?ar">https://learning.oreilly.com/library/view/~/9781484256084/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar</a><br/>Format: Electronic Resources<br/>
Web security for developers
ent://SD_ILS/0/SD_ILS:2324422
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by McDonald, Malcolm (Computer programmer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122683/?ar">https://learning.oreilly.com/library/view/~/9781098122683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122683">https://learning.oreilly.com/library/view/~/9781098122683</a><br/>Format: Electronic Resources<br/>
Hacking : der umfassende Praxis-Guide: inkl. Prüfungsvorbereitung zum CEHv10
ent://SD_ILS/0/SD_ILS:2325946
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Amberg, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206/?ar">https://learning.oreilly.com/library/view/~/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206">https://learning.oreilly.com/library/view/~/9783958452206</a><br/>Format: Electronic Resources<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2322053
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format: Electronic Resources<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:2322826
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781119560265">https://learning.oreilly.com/library/view/~/9781119560265</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560265/?ar">https://learning.oreilly.com/library/view/~/9781119560265/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar</a><br/>Format: Electronic Resources<br/>
AWS SECURITY COOKBOOK;PRACTICAL SOLUTIONS FOR MANAGING SECURITY POLICIES, MONITORING, AUDITING, AND COMPLIANCE WITH AWS
ent://SD_ILS/0/SD_ILS:2323340
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by HEARTIN KANIKATHOTTU.<br/><a href="https://learning.oreilly.com/library/view/~/9781838826253">https://learning.oreilly.com/library/view/~/9781838826253</a>
<a href="https://learning.oreilly.com/library/view/~/9781838826253/?ar">https://learning.oreilly.com/library/view/~/9781838826253/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar">https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar</a><br/>Format: Electronic Resources<br/>
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership
ent://SD_ILS/0/SD_ILS:2323589
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format: Electronic Resources<br/>
Container security : fundamental technology concepts that protect containerized applications
ent://SD_ILS/0/SD_ILS:2323879
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Rice, Liz, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056690/?ar">https://learning.oreilly.com/library/view/~/9781492056690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492056690/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056690/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492056690">https://learning.oreilly.com/library/view/~/9781492056690</a><br/>Format: Electronic Resources<br/>
Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud
ent://SD_ILS/0/SD_ILS:2326395
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Calles, Miguel A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002/?ar">https://learning.oreilly.com/library/view/~/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002">https://learning.oreilly.com/library/view/~/9781484261002</a><br/>Format: Electronic Resources<br/>
Secrets management with Terraform
ent://SD_ILS/0/SD_ILS:2331925
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Winkler, Scott, author, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202178">https://learning.oreilly.com/videos/~/10000MNLV202178</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202178/?ar">https://learning.oreilly.com/videos/~/10000MNLV202178/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202178/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202178/?ar</a><br/>Format: Video recording<br/>
Security operations in practice
ent://SD_ILS/0/SD_ILS:2333929
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175089/?ar">https://learning.oreilly.com/library/view/~/9781780175089/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175089">https://learning.oreilly.com/library/view/~/9781780175089</a><br/>Format: Electronic Resources<br/>
Learning node embeddings in transaction networks
ent://SD_ILS/0/SD_ILS:2326362
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Barbour, Jesse, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/00000HQHJ2T3KE2A/?ar">https://go.oreilly.com/library-access/library/view/-/00000HQHJ2T3KE2A/?ar</a>
<a href="https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A/?ar">https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A/?ar</a>
<a href="https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A">https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A</a><br/>Format: Electronic Resources<br/>
Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.
ent://SD_ILS/0/SD_ILS:2326028
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Mukherjee, Aditya.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789806298/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806298/?ar">https://learning.oreilly.com/library/view/~/9781789806298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806298">https://learning.oreilly.com/library/view/~/9781789806298</a><br/>Format: Electronic Resources<br/>
Cloud Computing Security, 2nd Edition
ent://SD_ILS/0/SD_ILS:2331101
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>
Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu
ent://SD_ILS/0/SD_ILS:2332657
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format: Electronic Resources<br/>
Securing microservices with Istio Service Mesh
ent://SD_ILS/0/SD_ILS:2331950
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Siriwardena, Prabath, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202172">https://learning.oreilly.com/videos/~/10000MNLV202172</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202172/?ar">https://learning.oreilly.com/videos/~/10000MNLV202172/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar</a><br/>Format: Video recording<br/>
Cybersecurity attacks - red team strategies : a practical guide to building a penetration testing program having homefield advantage
ent://SD_ILS/0/SD_ILS:2351005
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Rehberger, Johann, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6155204">Click to View</a><br/>Format: Electronic Resources<br/>
Cybersecurity fundamentals : a real-world perspective
ent://SD_ILS/0/SD_ILS:2356265
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Thakur, Kutub, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6186711">Click to View</a><br/>Format: Electronic Resources<br/>
Intelligent network management and control : intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio
ent://SD_ILS/0/SD_ILS:2358096
2024-06-23T04:02:50Z
2024-06-23T04:02:50Z
by Benmammar, Badr, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6522998">Click to View</a><br/>Format: Electronic Resources<br/>