Search Results for - Narrowed by: COMPUTERS -- Machine Theory. - Computer networks -- Security measures. - Electronic books.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bMachine$002bTheory.$002509COMPUTERS$002b--$002bMachine$002bTheory.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026ps$003d300?2024-06-20T08:48:27ZMastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and dataent://SD_ILS/0/SD_ILS:23192382024-06-20T08:48:27Z2024-06-20T08:48:27Zby Nickel, Jochen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789132304/?ar">https://learning.oreilly.com/library/view/~/9781789132304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar">https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar</a><br/>Format: Electronic Resources<br/>Network functions virtualization (NFV) with a touch of SDNent://SD_ILS/0/SD_ILS:23119832024-06-20T08:48:27Z2024-06-20T08:48:27Zby Chayapathi, Rajendra, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134464312">https://learning.oreilly.com/library/view/~/9780134464312</a>
<a href="https://learning.oreilly.com/library/view/~/9780134464312/?ar">https://learning.oreilly.com/library/view/~/9780134464312/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134464312/?ar">https://go.oreilly.com/library-access/library/view/-/9780134464312/?ar</a><br/>Format: Electronic Resources<br/>A study of black hole attack solutions : on AODV routing protocol in MANETent://SD_ILS/0/SD_ILS:23090382024-06-20T08:48:27Z2024-06-20T08:48:27Zby Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format: Electronic Resources<br/>Foundations of modern networking : SDN, NFV, QoE, IoT, and Cloudent://SD_ILS/0/SD_ILS:23088002024-06-20T08:48:27Z2024-06-20T08:48:27Zby Stallings, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134175478/?ar">https://learning.oreilly.com/library/view/~/9780134175478/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar">https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar</a><br/>Format: Electronic Resources<br/>Packet analysis with Wireshark : leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysisent://SD_ILS/0/SD_ILS:23093482024-06-20T08:48:27Z2024-06-20T08:48:27Zby Nath, Anish, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785887819/?ar">https://learning.oreilly.com/library/view/~/9781785887819/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785887819">https://learning.oreilly.com/library/view/~/9781785887819</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785887819/?ar">https://go.oreilly.com/library-access/library/view/-/9781785887819/?ar</a><br/>Format: Electronic Resources<br/>