Search Results for - Narrowed by: Computer networks -- Security measures. - Safari, an O'Reilly Media Company. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dAUTHOR$002509Author$002509Safari$00252C$002ban$002bO$002527Reilly$002bMedia$002bCompany.$002509Safari$00252C$002ban$002bO$002527Reilly$002bMedia$002bCompany.$0026ps$003d300? 2024-05-23T22:33:52Z Getting started with IBM Hyper Protect Data Controller ent://SD_ILS/0/SD_ILS:2331451 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing Azure for Ethical Hackers ent://SD_ILS/0/SD_ILS:2331077 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Okeyode, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212932/?ar">https://learning.oreilly.com/library/view/~/9781839212932/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839212932">https://learning.oreilly.com/library/view/~/9781839212932</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Active Directory - Third Edition ent://SD_ILS/0/SD_ILS:2331105 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format:&#160;Electronic Resources<br/> CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide ent://SD_ILS/0/SD_ILS:2330975 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar">https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780136634829/?ar">https://learning.oreilly.com/library/view/~/9780136634829/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780136634829">https://learning.oreilly.com/library/view/~/9780136634829</a><br/>Format:&#160;Electronic Resources<br/> The Complete 2020 Ethereum and Solidity Developer Bootcamp ent://SD_ILS/0/SD_ILS:2323478 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Wiesner, Thomas, author.<br/><a href="https://learning.oreilly.com/videos/~/9781800201019/?ar">https://learning.oreilly.com/videos/~/9781800201019/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar">https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781800201019">https://learning.oreilly.com/videos/~/9781800201019</a><br/>Format:&#160;Electronic Resources<br/> Cyber Warfare - Truth, Tactics, and Strategies ent://SD_ILS/0/SD_ILS:2323667 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a> <a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM DS8000 Encryption for data at rest, Transparent Cloud Tiering, and Endpoint Security (DS8000 Release 9.0) ent://SD_ILS/0/SD_ILS:2323373 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Dufrasne, Bertrand, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738458427/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458427/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458427/?ar">https://learning.oreilly.com/library/view/~/9780738458427/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458427">https://learning.oreilly.com/library/view/~/9780738458427</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Security, 2nd Edition ent://SD_ILS/0/SD_ILS:2331101 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a> <a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Active Directory - Second Edition ent://SD_ILS/0/SD_ILS:2323979 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789800203/?ar">https://learning.oreilly.com/library/view/~/9781789800203/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar">https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789800203">https://learning.oreilly.com/library/view/~/9781789800203</a><br/>Format:&#160;Electronic Resources<br/> The Complete Ethical Hacking Course ent://SD_ILS/0/SD_ILS:2323185 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Take Control of 1Password, 4th Edition ent://SD_ILS/0/SD_ILS:2319474 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format:&#160;Electronic Resources<br/> Velocity Conference - London, UK 2018 ent://SD_ILS/0/SD_ILS:2321191 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;O'Reilly (Firm), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492025931/?ar">https://go.oreilly.com/library-access/library/view/-/9781492025931/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492025931">https://learning.oreilly.com/videos/~/9781492025931</a> <a href="https://learning.oreilly.com/videos/~/9781492025931/?ar">https://learning.oreilly.com/videos/~/9781492025931/?ar</a><br/>Format:&#160;Electronic Resources<br/> Distributed Networks ent://SD_ILS/0/SD_ILS:2319907 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Complete Guide to Cybersecurity Risks and Controls ent://SD_ILS/0/SD_ILS:2324524 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Kohnke, Anne, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar">https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781498740579/?ar">https://learning.oreilly.com/library/view/~/9781498740579/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781498740579">https://learning.oreilly.com/library/view/~/9781498740579</a><br/>Format:&#160;Electronic Resources<br/> Security in an IPv6 Environment ent://SD_ILS/0/SD_ILS:2323651 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Minoli, Daniel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420092301/?ar">https://learning.oreilly.com/library/view/~/9781420092301/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420092301">https://learning.oreilly.com/library/view/~/9781420092301</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420092301/?ar">https://go.oreilly.com/library-access/library/view/-/9781420092301/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Science and Technology of Counterterrorism ent://SD_ILS/0/SD_ILS:2319961 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Young, Carl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124200562">https://learning.oreilly.com/library/view/~/9780124200562</a> <a href="https://learning.oreilly.com/library/view/~/9780124200562/?ar">https://learning.oreilly.com/library/view/~/9780124200562/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated Security Systems Design, 2nd Edition ent://SD_ILS/0/SD_ILS:2320974 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Norman, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000229/?ar">https://learning.oreilly.com/library/view/~/9780128000229/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000229">https://learning.oreilly.com/library/view/~/9780128000229</a><br/>Format:&#160;Electronic Resources<br/> Anonymous Communication Networks ent://SD_ILS/0/SD_ILS:2327268 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Peng, Kun, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881606">https://learning.oreilly.com/library/view/~/9781439881606</a> <a href="https://learning.oreilly.com/library/view/~/9781439881606/?ar">https://learning.oreilly.com/library/view/~/9781439881606/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439881606/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881606/?ar</a><br/>Format:&#160;Electronic Resources<br/> Strategic Information Management, 3rd Edition ent://SD_ILS/0/SD_ILS:2319914 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format:&#160;Electronic Resources<br/> How to Cheat at Configuring Open Source Security Tools ent://SD_ILS/0/SD_ILS:2326863 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Gregg, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780080553566/?ar">https://learning.oreilly.com/library/view/~/9780080553566/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080553566">https://learning.oreilly.com/library/view/~/9780080553566</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080553566/?ar">https://go.oreilly.com/library-access/library/view/-/9780080553566/?ar</a><br/>Format:&#160;Electronic Resources<br/> Set Up Security and Integration with the DataPower XI50z for zEnterprise ent://SD_ILS/0/SD_ILS:2323901 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Credle, Rufus, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738436348/?ar">https://learning.oreilly.com/library/view/~/0738436348/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738436348">https://learning.oreilly.com/library/view/~/0738436348</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738436348/?ar">https://go.oreilly.com/library-access/library/view/-/0738436348/?ar</a><br/>Format:&#160;Electronic Resources<br/> Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators ent://SD_ILS/0/SD_ILS:2326866 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Long, Johnny, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080553979/?ar">https://go.oreilly.com/library-access/library/view/-/9780080553979/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080553979/?ar">https://learning.oreilly.com/library/view/~/9780080553979/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080553979">https://learning.oreilly.com/library/view/~/9780080553979</a><br/>Format:&#160;Electronic Resources<br/> Microsoft ent://SD_ILS/0/SD_ILS:2321069 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format:&#160;Electronic Resources<br/> Internet Denial of Service: Attack and Defense Mechanisms ent://SD_ILS/0/SD_ILS:2326795 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Mirkovic, Jelena, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131475738/?ar">https://learning.oreilly.com/library/view/~/0131475738/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131475738/?ar">https://go.oreilly.com/library-access/library/view/-/0131475738/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131475738">https://learning.oreilly.com/library/view/~/0131475738</a><br/>Format:&#160;Electronic Resources<br/> Biometrics for Network Security ent://SD_ILS/0/SD_ILS:2326814 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Reid, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131015494">https://learning.oreilly.com/library/view/~/0131015494</a> <a href="https://learning.oreilly.com/library/view/~/0131015494/?ar">https://learning.oreilly.com/library/view/~/0131015494/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131015494/?ar">https://go.oreilly.com/library-access/library/view/-/0131015494/?ar</a><br/>Format:&#160;Electronic Resources<br/> Firewalls and Internet Security : Repelling the Wily Hacker, Second Edition ent://SD_ILS/0/SD_ILS:2324785 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Cheswick, William, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/020163466X/?ar">https://go.oreilly.com/library-access/library/view/-/020163466X/?ar</a> <a href="https://learning.oreilly.com/library/view/~/020163466X/?ar">https://learning.oreilly.com/library/view/~/020163466X/?ar</a> <a href="https://learning.oreilly.com/library/view/~/020163466X">https://learning.oreilly.com/library/view/~/020163466X</a><br/>Format:&#160;Electronic Resources<br/> Secure Shell in the Enterprise ent://SD_ILS/0/SD_ILS:2326764 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Reid, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0131429000/?ar">https://go.oreilly.com/library-access/library/view/-/0131429000/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131429000/?ar">https://learning.oreilly.com/library/view/~/0131429000/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131429000">https://learning.oreilly.com/library/view/~/0131429000</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security Risks : the OCTAVESM Approach ent://SD_ILS/0/SD_ILS:2321582 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Alberts, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/0321118863/?ar">https://learning.oreilly.com/library/view/~/0321118863/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321118863/?ar">https://go.oreilly.com/library-access/library/view/-/0321118863/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321118863">https://learning.oreilly.com/library/view/~/0321118863</a><br/>Format:&#160;Electronic Resources<br/> Understanding PKI : Concepts, Standards, and Deployment Considerations, Second Edition ent://SD_ILS/0/SD_ILS:2321625 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Adams, Carlisle, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672323915/?ar">https://go.oreilly.com/library-access/library/view/-/0672323915/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672323915/?ar">https://learning.oreilly.com/library/view/~/0672323915/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672323915">https://learning.oreilly.com/library/view/~/0672323915</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Platforms: TCPA Technology in Context ent://SD_ILS/0/SD_ILS:2326640 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Pearson, Siani, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0130092207/?ar">https://go.oreilly.com/library-access/library/view/-/0130092207/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0130092207">https://learning.oreilly.com/library/view/~/0130092207</a> <a href="https://learning.oreilly.com/library/view/~/0130092207/?ar">https://learning.oreilly.com/library/view/~/0130092207/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Modelling and Analysis of Security Protocols: the CSP Approach ent://SD_ILS/0/SD_ILS:2326682 2024-05-23T22:33:52Z 2024-05-23T22:33:52Z by&#160;Ryan, P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201674718/?ar">https://go.oreilly.com/library-access/library/view/-/0201674718/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0201674718/?ar">https://learning.oreilly.com/library/view/~/0201674718/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0201674718">https://learning.oreilly.com/library/view/~/0201674718</a><br/>Format:&#160;Electronic Resources<br/>