Search Results for - Narrowed by: COMPUTERS -- Data Processing. - R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bData$002bProcessing.$002509COMPUTERS$002b--$002bData$002bProcessing.$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300? 2024-05-26T15:39:49Z Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data ent://SD_ILS/0/SD_ILS:2319238 2024-05-26T15:39:49Z 2024-05-26T15:39:49Z by&#160;Nickel, Jochen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789132304/?ar">https://learning.oreilly.com/library/view/~/9781789132304/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar">https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Industrial Internet of Things security : a practitioner's guide to securing connected industries ent://SD_ILS/0/SD_ILS:2317285 2024-05-26T15:39:49Z 2024-05-26T15:39:49Z by&#160;Bhattacharjee, Sravani, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788832687/?ar">https://learning.oreilly.com/library/view/~/9781788832687/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788832687">https://learning.oreilly.com/library/view/~/9781788832687</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar">https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threats ent://SD_ILS/0/SD_ILS:2316833 2024-05-26T15:39:49Z 2024-05-26T15:39:49Z by&#160;Crouthamel, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788626521/?ar">https://learning.oreilly.com/library/view/~/9781788626521/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar">https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:2312348 2024-05-26T15:39:49Z 2024-05-26T15:39:49Z by&#160;Li, Shancang, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045053">https://learning.oreilly.com/library/view/~/9780128045053</a> <a href="https://learning.oreilly.com/library/view/~/9780128045053/?ar">https://learning.oreilly.com/library/view/~/9780128045053/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network functions virtualization (NFV) with a touch of SDN ent://SD_ILS/0/SD_ILS:2311983 2024-05-26T15:39:49Z 2024-05-26T15:39:49Z by&#160;Chayapathi, Rajendra, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134464312">https://learning.oreilly.com/library/view/~/9780134464312</a> <a href="https://learning.oreilly.com/library/view/~/9780134464312/?ar">https://learning.oreilly.com/library/view/~/9780134464312/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134464312/?ar">https://go.oreilly.com/library-access/library/view/-/9780134464312/?ar</a><br/>Format:&#160;Electronic Resources<br/> Foundations of modern networking : SDN, NFV, QoE, IoT, and Cloud ent://SD_ILS/0/SD_ILS:2308800 2024-05-26T15:39:49Z 2024-05-26T15:39:49Z by&#160;Stallings, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134175478/?ar">https://learning.oreilly.com/library/view/~/9780134175478/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar">https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar</a><br/>Format:&#160;Electronic Resources<br/> A study of black hole attack solutions : on AODV routing protocol in MANET ent://SD_ILS/0/SD_ILS:2309038 2024-05-26T15:39:49Z 2024-05-26T15:39:49Z by&#160;Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques ent://SD_ILS/0/SD_ILS:2306859 2024-05-26T15:39:49Z 2024-05-26T15:39:49Z by&#160;Chauhan, Sudhanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128018675">https://learning.oreilly.com/library/view/~/9780128018675</a> <a href="https://learning.oreilly.com/library/view/~/9780128018675/?ar">https://learning.oreilly.com/library/view/~/9780128018675/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128018675/?ar">https://go.oreilly.com/library-access/library/view/-/9780128018675/?ar</a><br/>Format:&#160;Electronic Resources<br/> Packet analysis with Wireshark : leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis ent://SD_ILS/0/SD_ILS:2309348 2024-05-26T15:39:49Z 2024-05-26T15:39:49Z by&#160;Nath, Anish, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785887819/?ar">https://learning.oreilly.com/library/view/~/9781785887819/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785887819">https://learning.oreilly.com/library/view/~/9781785887819</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785887819/?ar">https://go.oreilly.com/library-access/library/view/-/9781785887819/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of IT audit : Purposes, processes, and practical information. ent://SD_ILS/0/SD_ILS:2301501 2024-05-26T15:39:49Z 2024-05-26T15:39:49Z by&#160;Gantz, Stephen D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124171596/?ar">https://learning.oreilly.com/library/view/~/9780124171596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124171596">https://learning.oreilly.com/library/view/~/9780124171596</a><br/>Format:&#160;Electronic Resources<br/> Unauthorised access : physical penetration testing for IT security teams ent://SD_ILS/0/SD_ILS:2288452 2024-05-26T15:39:49Z 2024-05-26T15:39:49Z by&#160;Allsopp, Wil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar">https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470747612/?ar">https://learning.oreilly.com/library/view/~/9780470747612/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470747612">https://learning.oreilly.com/library/view/~/9780470747612</a><br/>Format:&#160;Electronic Resources<br/> IT compliance and controls : best practices for implementation ent://SD_ILS/0/SD_ILS:2288533 2024-05-26T15:39:49Z 2024-05-26T15:39:49Z by&#160;DeLuccia, James J., 1977-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470145012/?ar">https://go.oreilly.com/library-access/library/view/-/9780470145012/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470145012/?ar">https://learning.oreilly.com/library/view/~/9780470145012/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470145012">https://learning.oreilly.com/library/view/~/9780470145012</a><br/>Format:&#160;Electronic Resources<br/>