Search Results for - Narrowed by: Computer networks -- Security measures. - O'Reilly (Firm), publisher. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dAUTHOR$002509Author$002509O$002527Reilly$002b$002528Firm$002529$00252C$002bpublisher.$002509O$002527Reilly$002b$002528Firm$002529$00252C$002bpublisher.$0026ps$003d300? 2024-05-26T16:44:20Z Defensive cybersecurity fundamentals ent://SD_ILS/0/SD_ILS:2333379 2024-05-26T16:44:20Z 2024-05-26T16:44:20Z by&#160;Berlin, Amanda, author.<br/><a href="https://learning.oreilly.com/videos/~/0636920670896/?ar">https://learning.oreilly.com/videos/~/0636920670896/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920670896/?ar">https://go.oreilly.com/library-access/library/view/-/0636920670896/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920670896">https://learning.oreilly.com/videos/~/0636920670896</a><br/>Format:&#160;Video recording<br/> Hands-on threat modeling ent://SD_ILS/0/SD_ILS:2333383 2024-05-26T16:44:20Z 2024-05-26T16:44:20Z by&#160;Deleersnyder, Sebastien, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671268">https://learning.oreilly.com/videos/~/0636920671268</a> <a href="https://learning.oreilly.com/videos/~/0636920671268/?ar">https://learning.oreilly.com/videos/~/0636920671268/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar</a><br/>Format:&#160;Video recording<br/> Windows Network security fundamentals ent://SD_ILS/0/SD_ILS:2333384 2024-05-26T16:44:20Z 2024-05-26T16:44:20Z by&#160;Weadock, Glenn E., presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920671206">https://learning.oreilly.com/videos/~/0636920671206</a> <a href="https://learning.oreilly.com/videos/~/0636920671206/?ar">https://learning.oreilly.com/videos/~/0636920671206/?ar</a><br/>Format:&#160;Video recording<br/> Identity and access management fundamentals. ent://SD_ILS/0/SD_ILS:2335277 2024-05-26T16:44:20Z 2024-05-26T16:44:20Z by&#160;Kohli, Harpreet, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671145/?ar">https://learning.oreilly.com/videos/~/0636920671145/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920671145">https://learning.oreilly.com/videos/~/0636920671145</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar</a><br/>Format:&#160;Video recording<br/> O'Reilly Velocity Conference 2019, San Jose, California. ent://SD_ILS/0/SD_ILS:2322886 2024-05-26T16:44:20Z 2024-05-26T16:44:20Z by&#160;O'Reilly Velocity Conference (2019 : San Jose, Calif.) issuing body.<br/><a href="https://learning.oreilly.com/videos/~/9781492050582/?ar">https://learning.oreilly.com/videos/~/9781492050582/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492050582/?ar">https://go.oreilly.com/library-access/library/view/-/9781492050582/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical cloud security. ent://SD_ILS/0/SD_ILS:2334616 2024-05-26T16:44:20Z 2024-05-26T16:44:20Z by&#160;Dotson, Chris, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar">https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492060727">https://learning.oreilly.com/videos/~/9781492060727</a> <a href="https://learning.oreilly.com/videos/~/9781492060727/?ar">https://learning.oreilly.com/videos/~/9781492060727/?ar</a><br/>Format:&#160;Video recording<br/> Implementing Cisco network security, Part 2. ent://SD_ILS/0/SD_ILS:2334801 2024-05-26T16:44:20Z 2024-05-26T16:44:20Z by&#160;Pickard, John, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar">https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920303213">https://learning.oreilly.com/videos/~/0636920303213</a> <a href="https://learning.oreilly.com/videos/~/0636920303213/?ar">https://learning.oreilly.com/videos/~/0636920303213/?ar</a><br/>Format:&#160;Video recording<br/> How Lyft migrated to a service mesh with Envoy ent://SD_ILS/0/SD_ILS:2323296 2024-05-26T16:44:20Z 2024-05-26T16:44:20Z by&#160;Hochman, Daniel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338390/?ar">https://learning.oreilly.com/videos/~/0636920338390/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920338390">https://learning.oreilly.com/videos/~/0636920338390</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing microservices : protect sensitive data in transit and at rest. ent://SD_ILS/0/SD_ILS:2334787 2024-05-26T16:44:20Z 2024-05-26T16:44:20Z by&#160;Newman, Sam, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar">https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492038986/?ar">https://learning.oreilly.com/videos/~/9781492038986/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492038986">https://learning.oreilly.com/videos/~/9781492038986</a><br/>Format:&#160;Video recording<br/> Preparing and exploring security data for machine learning. ent://SD_ILS/0/SD_ILS:2334770 2024-05-26T16:44:20Z 2024-05-26T16:44:20Z by&#160;Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032335">https://learning.oreilly.com/videos/~/9781492032335</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492032335/?ar">https://learning.oreilly.com/videos/~/9781492032335/?ar</a><br/>Format:&#160;Video recording<br/> Supervised machine learning in security applications. ent://SD_ILS/0/SD_ILS:2334773 2024-05-26T16:44:20Z 2024-05-26T16:44:20Z by&#160;Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032410">https://learning.oreilly.com/videos/~/9781492032410</a> <a href="https://learning.oreilly.com/videos/~/9781492032410/?ar">https://learning.oreilly.com/videos/~/9781492032410/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar</a><br/>Format:&#160;Video recording<br/> Unsupervised machine learning in security applications. ent://SD_ILS/0/SD_ILS:2334784 2024-05-26T16:44:20Z 2024-05-26T16:44:20Z by&#160;Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032373">https://learning.oreilly.com/videos/~/9781492032373</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492032373/?ar">https://learning.oreilly.com/videos/~/9781492032373/?ar</a><br/>Format:&#160;Video recording<br/> Managing SSH clients and servers. ent://SD_ILS/0/SD_ILS:2334344 2024-05-26T16:44:20Z 2024-05-26T16:44:20Z by&#160;Wallen, Jack, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar">https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492031666">https://learning.oreilly.com/videos/~/9781492031666</a> <a href="https://learning.oreilly.com/videos/~/9781492031666/?ar">https://learning.oreilly.com/videos/~/9781492031666/?ar</a><br/>Format:&#160;Video recording<br/> Forensic analysis of computer memory. ent://SD_ILS/0/SD_ILS:2334797 2024-05-26T16:44:20Z 2024-05-26T16:44:20Z by&#160;Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029144">https://learning.oreilly.com/videos/~/9781492029144</a> <a href="https://learning.oreilly.com/videos/~/9781492029144/?ar">https://learning.oreilly.com/videos/~/9781492029144/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar</a><br/>Format:&#160;Video recording<br/> Capture and analysis of network-based evidence. ent://SD_ILS/0/SD_ILS:2334767 2024-05-26T16:44:20Z 2024-05-26T16:44:20Z by&#160;Messier, Ric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492029182">https://learning.oreilly.com/videos/~/9781492029182</a> <a href="https://learning.oreilly.com/videos/~/9781492029182/?ar">https://learning.oreilly.com/videos/~/9781492029182/?ar</a><br/>Format:&#160;Video recording<br/>