Search Results for - Narrowed by: Cloud computing -- Security measures. - Computer networks -- Security measures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Cloud$002bcomputing$002b--$002bSecurity$002bmeasures.$002509Cloud$002bcomputing$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue?
2024-09-23T16:23:17Z
Cloud security for dummies
ent://SD_ILS/0/SD_ILS:2332497
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a>
<a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security for dummies
ent://SD_ILS/0/SD_ILS:2332936
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Coombs, Ted, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar">https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9798765008096/?ar">https://learning.oreilly.com/library/view/~/9798765008096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9798765008096">https://learning.oreilly.com/library/view/~/9798765008096</a><br/>Format: Sound recording<br/>
Getting started with IBM Hyper Protect Data Controller
ent://SD_ILS/0/SD_ILS:2331451
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format: Electronic Resources<br/>
Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud
ent://SD_ILS/0/SD_ILS:2333792
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Berkouwer, Sander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar">https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242507/?ar">https://learning.oreilly.com/library/view/~/9781803242507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242507">https://learning.oreilly.com/library/view/~/9781803242507</a><br/>Format: Electronic Resources<br/>
How to hack like a ghost
ent://SD_ILS/0/SD_ILS:2326507
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format: Electronic Resources<br/>
Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud
ent://SD_ILS/0/SD_ILS:2326395
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Calles, Miguel A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002/?ar">https://learning.oreilly.com/library/view/~/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002">https://learning.oreilly.com/library/view/~/9781484261002</a><br/>Format: Electronic Resources<br/>
Cloud Computing Security, 2nd Edition
ent://SD_ILS/0/SD_ILS:2331101
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>
AWS SECURITY COOKBOOK;PRACTICAL SOLUTIONS FOR MANAGING SECURITY POLICIES, MONITORING, AUDITING, AND COMPLIANCE WITH AWS
ent://SD_ILS/0/SD_ILS:2323340
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by HEARTIN KANIKATHOTTU.<br/><a href="https://learning.oreilly.com/library/view/~/9781838826253">https://learning.oreilly.com/library/view/~/9781838826253</a>
<a href="https://learning.oreilly.com/library/view/~/9781838826253/?ar">https://learning.oreilly.com/library/view/~/9781838826253/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar">https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar</a><br/>Format: Electronic Resources<br/>
Practical cloud security : a guide for secure design and deployment
ent://SD_ILS/0/SD_ILS:2319005
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Dotson, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492037507">https://learning.oreilly.com/library/view/~/9781492037507</a>
<a href="https://learning.oreilly.com/library/view/~/9781492037507/?ar">https://learning.oreilly.com/library/view/~/9781492037507/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar</a><br/>Format: Electronic Resources<br/>
Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud
ent://SD_ILS/0/SD_ILS:2321488
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Berkouwer, Sander, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806984">https://learning.oreilly.com/library/view/~/9781789806984</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806984/?ar">https://learning.oreilly.com/library/view/~/9781789806984/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar</a><br/>Format: Electronic Resources<br/>
Practical cloud security.
ent://SD_ILS/0/SD_ILS:2334616
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Dotson, Chris, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar">https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727">https://learning.oreilly.com/videos/~/9781492060727</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727/?ar">https://learning.oreilly.com/videos/~/9781492060727/?ar</a><br/>Format: Video recording<br/>
Cloud security automation : get to grips with automating your cloud security on AWS and OpenStack
ent://SD_ILS/0/SD_ILS:2316344
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Priyam, Prashant, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627863/?ar">https://learning.oreilly.com/library/view/~/9781788627863/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar</a><br/>Format: Electronic Resources<br/>
The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical security
ent://SD_ILS/0/SD_ILS:2212845
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4981408">Click to View</a><br/>Format: Electronic Resources<br/>
Enterprise cloud security and governance : efficiently set data protection and privacy principles
ent://SD_ILS/0/SD_ILS:2315410
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Vora, Zeal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788299558/?ar">https://learning.oreilly.com/library/view/~/9781788299558/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788299558/?ar">https://go.oreilly.com/library-access/library/view/-/9781788299558/?ar</a><br/>Format: Electronic Resources<br/>
Cloud computing security : foundations and challenges
ent://SD_ILS/0/SD_ILS:2311524
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format: Electronic Resources<br/>
Securing the cloud : cloud computer security techniques and tactics
ent://SD_ILS/0/SD_ILS:2292491
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Winkler, J. R. (Joachim R.)<br/><a href="https://learning.oreilly.com/library/view/~/9781597495929">https://learning.oreilly.com/library/view/~/9781597495929</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495929/?ar">https://learning.oreilly.com/library/view/~/9781597495929/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar</a><br/>Format: Electronic Resources<br/>
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:2289149
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Lillard, Terrence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387/?ar">https://learning.oreilly.com/library/view/~/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387">https://learning.oreilly.com/library/view/~/9781597495387</a><br/>Format: Electronic Resources<br/>
Cloud security and privacy
ent://SD_ILS/0/SD_ILS:2287451
2024-09-23T16:23:17Z
2024-09-23T16:23:17Z
by Mather, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806453/?ar">https://learning.oreilly.com/library/view/~/9780596806453/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596806453">https://learning.oreilly.com/library/view/~/9780596806453</a><br/>Format: Electronic Resources<br/>