Search Results for - Narrowed by: 2020 - Sécurité informatique.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092020$0025092020$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300$0026isd$003dtrue?
2024-09-27T00:07:23Z
Mastering Windows security and hardening : secure and protect your Windows environment from intruders, malware attacks, and other cyber threats.
ent://SD_ILS/0/SD_ILS:2325966
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Dunkerley, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216411">https://learning.oreilly.com/library/view/~/9781839216411</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216411/?ar">https://learning.oreilly.com/library/view/~/9781839216411/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2322053
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format: Electronic Resources<br/>
Temenos on IBM LinuxONE Best Practices Guide
ent://SD_ILS/0/SD_ILS:2323440
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Coble, Deana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458458">https://learning.oreilly.com/library/view/~/9780738458458</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458458/?ar">https://learning.oreilly.com/library/view/~/9780738458458/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar</a><br/>Format: Electronic Resources<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:2322826
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781119560265">https://learning.oreilly.com/library/view/~/9781119560265</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560265/?ar">https://learning.oreilly.com/library/view/~/9781119560265/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar</a><br/>Format: Electronic Resources<br/>
Security engineering 101 : when good design and security work together
ent://SD_ILS/0/SD_ILS:2324433
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Everette, Wendy Knox, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920342960/?ar">https://go.oreilly.com/library-access/library/view/-/0636920342960/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920342960/?ar">https://learning.oreilly.com/videos/~/0636920342960/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920342960">https://learning.oreilly.com/videos/~/0636920342960</a><br/>Format: Electronic Resources<br/>
Hacking : der umfassende Praxis-Guide: inkl. Prüfungsvorbereitung zum CEHv10
ent://SD_ILS/0/SD_ILS:2325946
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Amberg, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206/?ar">https://learning.oreilly.com/library/view/~/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206">https://learning.oreilly.com/library/view/~/9783958452206</a><br/>Format: Electronic Resources<br/>
Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity
ent://SD_ILS/0/SD_ILS:2325451
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Carey, Marcus J. (Cybersecurity professional)<br/><a href="https://learning.oreilly.com/library/view/~/9781119643418">https://learning.oreilly.com/library/view/~/9781119643418</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643418/?ar">https://learning.oreilly.com/library/view/~/9781119643418/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar</a><br/>Format: Electronic Resources<br/>
Data breaches : crisis and opportunity
ent://SD_ILS/0/SD_ILS:2322222
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format: Electronic Resources<br/>
Demystifying Internet of Things security : successful IoT device/edge and platform security deployment
ent://SD_ILS/0/SD_ILS:2321696
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Cheruvu, Sunil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484228968/?ar">https://learning.oreilly.com/library/view/~/9781484228968/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228968">https://learning.oreilly.com/library/view/~/9781484228968</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484228968/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228968/?ar</a><br/>Format: Electronic Resources<br/>
Incident response primer : how to keep from getting pwned too hard
ent://SD_ILS/0/SD_ILS:2323316
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format: Electronic Resources<br/>
IT auditing : using controls to protect information assets
ent://SD_ILS/0/SD_ILS:2322126
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Kegerreis, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260453232/?ar">https://learning.oreilly.com/library/view/~/9781260453232/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar">https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar</a><br/>Format: Electronic Resources<br/>
Identity attack vectors : implementing an effective identity and access management solution
ent://SD_ILS/0/SD_ILS:2322737
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484251652/?ar">https://learning.oreilly.com/library/view/~/9781484251652/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484251652">https://learning.oreilly.com/library/view/~/9781484251652</a><br/>Format: Electronic Resources<br/>
Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
ent://SD_ILS/0/SD_ILS:2324802
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format: Electronic Resources<br/>
Build Your Own Cybersecurity Testing Lab : Low-cost Solutions for Testing in Virtual and Cloud-based Environments
ent://SD_ILS/0/SD_ILS:2323438
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260458329">https://learning.oreilly.com/library/view/~/9781260458329</a>
<a href="https://learning.oreilly.com/library/view/~/9781260458329/?ar">https://learning.oreilly.com/library/view/~/9781260458329/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar">https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar</a><br/>Format: Electronic Resources<br/>
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership
ent://SD_ILS/0/SD_ILS:2323589
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format: Electronic Resources<br/>
PCI DSS : an integrated data security standard guide
ent://SD_ILS/0/SD_ILS:2324386
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Seaman, Jim.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258088">https://learning.oreilly.com/library/view/~/9781484258088</a>
<a href="https://learning.oreilly.com/library/view/~/9781484258088/?ar">https://learning.oreilly.com/library/view/~/9781484258088/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar</a><br/>Format: Electronic Resources<br/>
Designing a HIPAA-compliant security operations center : a guide to detecting and responding to healthcare breaches and events
ent://SD_ILS/0/SD_ILS:2323333
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Thompson, Eric C.<br/><a href="https://learning.oreilly.com/library/view/~/9781484256084">https://learning.oreilly.com/library/view/~/9781484256084</a>
<a href="https://learning.oreilly.com/library/view/~/9781484256084/?ar">https://learning.oreilly.com/library/view/~/9781484256084/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar</a><br/>Format: Electronic Resources<br/>
Protecting Data Privacy Beyond the Trusted System of Record
ent://SD_ILS/0/SD_ILS:2323918
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format: Electronic Resources<br/>
Cyber Warfare - Truth, Tactics, and Strategies
ent://SD_ILS/0/SD_ILS:2323667
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity for space : protecting the final frontier
ent://SD_ILS/0/SD_ILS:2323781
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Oakley, Jacob G.<br/><a href="https://learning.oreilly.com/library/view/~/9781484257326/?ar">https://learning.oreilly.com/library/view/~/9781484257326/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484257326/?ar">https://go.oreilly.com/library-access/library/view/-/9781484257326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484257326">https://learning.oreilly.com/library/view/~/9781484257326</a><br/>Format: Electronic Resources<br/>
Mastering Linux Security and Hardening - Second Edition
ent://SD_ILS/0/SD_ILS:2324167
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Tevault, Donald A.<br/><a href="https://learning.oreilly.com/library/view/~/9781838981778/?ar">https://learning.oreilly.com/library/view/~/9781838981778/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar">https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838981778">https://learning.oreilly.com/library/view/~/9781838981778</a><br/>Format: Electronic Resources<br/>
DevSecOps for .NET core : securing modern software applications
ent://SD_ILS/0/SD_ILS:2324612
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Zeeshan, Afzaal Ahmad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258507/?ar">https://learning.oreilly.com/library/view/~/9781484258507/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484258507">https://learning.oreilly.com/library/view/~/9781484258507</a><br/>Format: Electronic Resources<br/>
Building secure firmware : armoring the foundation of the platform
ent://SD_ILS/0/SD_ILS:2326020
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Yao, Jiewen.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261064">https://learning.oreilly.com/library/view/~/9781484261064</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261064/?ar">https://learning.oreilly.com/library/view/~/9781484261064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar</a><br/>Format: Electronic Resources<br/>
IBM Security Key Lifecycle Manager
ent://SD_ILS/0/SD_ILS:2323982
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Chen, An, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458786/?ar">https://learning.oreilly.com/library/view/~/9780738458786/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458786">https://learning.oreilly.com/library/view/~/9780738458786</a><br/>Format: Electronic Resources<br/>
SECURING CLOUD SERVICES;A PRAGMATIC APPROACH, SECOND EDITION.
ent://SD_ILS/0/SD_ILS:2328081
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by LEE NEWCOMBE.<br/><a href="https://learning.oreilly.com/library/view/~/9781787782075">https://learning.oreilly.com/library/view/~/9781787782075</a>
<a href="https://learning.oreilly.com/library/view/~/9781787782075/?ar">https://learning.oreilly.com/library/view/~/9781787782075/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar">https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar</a><br/>Format: Electronic Resources<br/>
Learn Kubernetes security : securely orchestrate, scale, and manage your microservices in Kubernetes deployments
ent://SD_ILS/0/SD_ILS:2325970
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Huang, Kaizhe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216503">https://learning.oreilly.com/library/view/~/9781839216503</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839216503/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216503/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216503/?ar">https://learning.oreilly.com/library/view/~/9781839216503/?ar</a><br/>Format: Electronic Resources<br/>
Exposed : how revealing your data and eliminating privacy increases trust and liberates humanity
ent://SD_ILS/0/SD_ILS:2326413
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a>
<a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format: Electronic Resources<br/>
PoC GTFO. Volume III
ent://SD_ILS/0/SD_ILS:2327149
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Laphroaig, Manul.<br/><a href="https://learning.oreilly.com/library/view/~/9781098125691/?ar">https://learning.oreilly.com/library/view/~/9781098125691/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125691">https://learning.oreilly.com/library/view/~/9781098125691</a><br/>Format: Electronic Resources<br/>
Rational cybersecurity for business : the security leaders' guide to business alignment
ent://SD_ILS/0/SD_ILS:2325488
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Blum, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781484259528">https://learning.oreilly.com/library/view/~/9781484259528</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259528/?ar">https://learning.oreilly.com/library/view/~/9781484259528/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity threats, malware trends, and strategies : mitigate exploits, malware, phishing, and other social engineering attacks
ent://SD_ILS/0/SD_ILS:2324609
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Rains, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800206014/?ar">https://learning.oreilly.com/library/view/~/9781800206014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800206014">https://learning.oreilly.com/library/view/~/9781800206014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar">https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar</a><br/>Format: Electronic Resources<br/>
Generative malware outbreak detection
ent://SD_ILS/0/SD_ILS:2325158
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Park, Sean, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar">https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452/?ar">https://learning.oreilly.com/videos/~/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452">https://learning.oreilly.com/videos/~/0636920373452</a><br/>Format: Electronic Resources<br/>
Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware
ent://SD_ILS/0/SD_ILS:2325847
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Mohanta, Abhijit.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261934">https://learning.oreilly.com/library/view/~/9781484261934</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261934/?ar">https://learning.oreilly.com/library/view/~/9781484261934/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar</a><br/>Format: Electronic Resources<br/>
Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies
ent://SD_ILS/0/SD_ILS:2325773
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Parker, Carey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261897">https://learning.oreilly.com/library/view/~/9781484261897</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261897/?ar">https://learning.oreilly.com/library/view/~/9781484261897/?ar</a><br/>Format: Electronic Resources<br/>
Hands on hacking
ent://SD_ILS/0/SD_ILS:2325452
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format: Electronic Resources<br/>
Mastering VMware NSX for vSphere
ent://SD_ILS/0/SD_ILS:2327302
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119513544">https://learning.oreilly.com/library/view/~/9781119513544</a>
<a href="https://learning.oreilly.com/library/view/~/9781119513544/?ar">https://learning.oreilly.com/library/view/~/9781119513544/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar">https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity for dummies
ent://SD_ILS/0/SD_ILS:2322839
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560326/?ar">https://learning.oreilly.com/library/view/~/9781119560326/?ar</a><br/>Format: Electronic Resources<br/>
JSON web tokens and alternatives.
ent://SD_ILS/0/SD_ILS:2332693
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Madden, Neil, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202163/?ar">https://learning.oreilly.com/videos/~/10000MNLV202163/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202163">https://learning.oreilly.com/videos/~/10000MNLV202163</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar</a><br/>Format: Video recording<br/>
CompTIA Security+ SY0-601 Certification Guide - Second Edition
ent://SD_ILS/0/SD_ILS:2327971
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Neil, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781800564244">https://learning.oreilly.com/library/view/~/9781800564244</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar">https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800564244/?ar">https://learning.oreilly.com/library/view/~/9781800564244/?ar</a><br/>Format: Electronic Resources<br/>
Cloud Computing Security, 2nd Edition
ent://SD_ILS/0/SD_ILS:2331101
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>
Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu
ent://SD_ILS/0/SD_ILS:2332657
2024-09-27T00:07:23Z
2024-09-27T00:07:23Z
by Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format: Electronic Resources<br/>