Search Results for - Narrowed by: COMPUTERS -- Networking -- General. - S&eacute;curit&eacute; informatique. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bNetworking$002b--$002bGeneral.$002509COMPUTERS$002b--$002bNetworking$002b--$002bGeneral.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300$0026isd$003dtrue? 2024-09-25T02:31:48Z Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them ent://SD_ILS/0/SD_ILS:2332411 2024-09-25T02:31:48Z 2024-09-25T02:31:48Z by&#160;Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format:&#160;Electronic Resources<br/> Secure edge computing : applications, techniques and challenges. ent://SD_ILS/0/SD_ILS:2329288 2024-09-25T02:31:48Z 2024-09-25T02:31:48Z by&#160;Ahmed, Mohiuddin (Computer scientist), editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000427325/?ar">https://learning.oreilly.com/library/view/~/9781000427325/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781000427325">https://learning.oreilly.com/library/view/~/9781000427325</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar">https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar</a><br/>Format:&#160;Electronic Resources<br/> VCP6-NV official cert guide : (exam #2VO-641) ent://SD_ILS/0/SD_ILS:2311292 2024-09-25T02:31:48Z 2024-09-25T02:31:48Z by&#160;Sena Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134133713">https://learning.oreilly.com/library/view/~/9780134133713</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar">https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134133713/?ar">https://learning.oreilly.com/library/view/~/9780134133713/?ar</a><br/>Format:&#160;Electronic Resources<br/> VCP6-DCV official cert guide : (exam #2VO-621) ent://SD_ILS/0/SD_ILS:2310569 2024-09-25T02:31:48Z 2024-09-25T02:31:48Z by&#160;Davis, John A. (Software consultant), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134392974/?ar">https://learning.oreilly.com/library/view/~/9780134392974/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134392974/?ar">https://go.oreilly.com/library-access/library/view/-/9780134392974/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134392974">https://learning.oreilly.com/library/view/~/9780134392974</a><br/>Format:&#160;Electronic Resources<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:2302234 2024-09-25T02:31:48Z 2024-09-25T02:31:48Z by&#160;Pathan, Al-Sakib Khan, editor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482203523">https://learning.oreilly.com/library/view/~/9781482203523</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar">https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482203523/?ar">https://learning.oreilly.com/library/view/~/9781482203523/?ar</a><br/>Format:&#160;Electronic Resources<br/> The tangled Web : a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:2293949 2024-09-25T02:31:48Z 2024-09-25T02:31:48Z by&#160;Zalewski, Michal.<br/><a href="https://learning.oreilly.com/library/view/~/9781593273880">https://learning.oreilly.com/library/view/~/9781593273880</a> <a href="https://learning.oreilly.com/library/view/~/9781593273880/?ar">https://learning.oreilly.com/library/view/~/9781593273880/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar</a><br/>Format:&#160;Electronic Resources<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:2313566 2024-09-25T02:31:48Z 2024-09-25T02:31:48Z by&#160;Mj&oslash;lsnes, Stig F., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781466506510">https://learning.oreilly.com/library/view/~/9781466506510</a> <a href="https://learning.oreilly.com/library/view/~/9781466506510/?ar">https://learning.oreilly.com/library/view/~/9781466506510/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466506510/?ar">https://go.oreilly.com/library-access/library/view/-/9781466506510/?ar</a><br/>Format:&#160;Electronic Resources<br/>