Search Results for - Narrowed by: Computer Science. - R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bScience.$002509Computer$002bScience.$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300? 2024-06-01T22:20:23Z Privileged attack vectors : building effective cyber-defense strategies to protect organizations ent://SD_ILS/0/SD_ILS:2314870 2024-06-01T22:20:23Z 2024-06-01T22:20:23Z by&#160;Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent training : take your security awareness program to the next level ent://SD_ILS/0/SD_ILS:2313452 2024-06-01T22:20:23Z 2024-06-01T22:20:23Z by&#160;Schroeder, Jordan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484228357/?ar">https://learning.oreilly.com/library/view/~/9781484228357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484228357">https://learning.oreilly.com/library/view/~/9781484228357</a><br/>Format:&#160;Electronic Resources<br/> CCNP security VPN 642-647 official cert guide ent://SD_ILS/0/SD_ILS:2291830 2024-06-01T22:20:23Z 2024-06-01T22:20:23Z by&#160;Hooper, Howard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132372046/?ar">https://go.oreilly.com/library-access/library/view/-/9780132372046/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132372046/?ar">https://learning.oreilly.com/library/view/~/9780132372046/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:2294655 2024-06-01T22:20:23Z 2024-06-01T22:20:23Z by&#160;Easttom, Chuck.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar">https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132828284/?ar">https://learning.oreilly.com/library/view/~/9780132828284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132828284">https://learning.oreilly.com/library/view/~/9780132828284</a><br/>Format:&#160;Electronic Resources<br/> AAA identity management security ent://SD_ILS/0/SD_ILS:2290533 2024-06-01T22:20:23Z 2024-06-01T22:20:23Z by&#160;Santuka, Vivek.<br/><a href="https://learning.oreilly.com/library/view/~/9781587141560">https://learning.oreilly.com/library/view/~/9781587141560</a> <a href="https://learning.oreilly.com/library/view/~/9781587141560/?ar">https://learning.oreilly.com/library/view/~/9781587141560/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587141560/?ar">https://go.oreilly.com/library-access/library/view/-/9781587141560/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Unified Access Gateway 2010 ent://SD_ILS/0/SD_ILS:2290710 2024-06-01T22:20:23Z 2024-06-01T22:20:23Z by&#160;Diogenes, Yuri.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735656758/?ar">https://learning.oreilly.com/library/view/~/9780735656758/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Protection 2010 for Exchange Server ent://SD_ILS/0/SD_ILS:2290701 2024-06-01T22:20:23Z 2024-06-01T22:20:23Z by&#160;Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656734/?ar">https://learning.oreilly.com/library/view/~/9780735656734/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Threat Management Gateway 2010 ent://SD_ILS/0/SD_ILS:2290730 2024-06-01T22:20:23Z 2024-06-01T22:20:23Z by&#160;Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656741/?ar">https://learning.oreilly.com/library/view/~/9780735656741/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering System Center Data Protection Manager 2007 ent://SD_ILS/0/SD_ILS:2284542 2024-06-01T22:20:23Z 2024-06-01T22:20:23Z by&#160;Ganger, Devin L.<br/><a href="https://learning.oreilly.com/library/view/~/9780470181522/?ar">https://learning.oreilly.com/library/view/~/9780470181522/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar">https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470181522">https://learning.oreilly.com/library/view/~/9780470181522</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Mac OS X Leopard security ent://SD_ILS/0/SD_ILS:2284628 2024-06-01T22:20:23Z 2024-06-01T22:20:23Z by&#160;Edge, Charles S., Jr.<br/><a href="https://learning.oreilly.com/library/view/~/9781590599891/?ar">https://learning.oreilly.com/library/view/~/9781590599891/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar">https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781590599891">https://learning.oreilly.com/library/view/~/9781590599891</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2282490 2024-06-01T22:20:23Z 2024-06-01T22:20:23Z by&#160;Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hunting security bugs ent://SD_ILS/0/SD_ILS:2282720 2024-06-01T22:20:23Z 2024-06-01T22:20:23Z by&#160;Gallagher, Tom.<br/><a href="https://learning.oreilly.com/library/view/~/073562187X">https://learning.oreilly.com/library/view/~/073562187X</a> <a href="https://learning.oreilly.com/library/view/~/073562187X/?ar">https://learning.oreilly.com/library/view/~/073562187X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/073562187X/?ar">https://go.oreilly.com/library-access/library/view/-/073562187X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft windows security resource kit ent://SD_ILS/0/SD_ILS:2282820 2024-06-01T22:20:23Z 2024-06-01T22:20:23Z by&#160;Smith, Ben, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780735621749">https://learning.oreilly.com/library/view/~/9780735621749</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar">https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735621749/?ar">https://learning.oreilly.com/library/view/~/9780735621749/?ar</a><br/>Format:&#160;Electronic Resources<br/>