Search Results for - Narrowed by: Computer networks -- Security measures. - Safari, an O'Reilly Media Company.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dAUTHOR$002509Author$002509Safari$00252C$002ban$002bO$002527Reilly$002bMedia$002bCompany.$002509Safari$00252C$002ban$002bO$002527Reilly$002bMedia$002bCompany.$0026ps$003d300?
2024-05-23T22:33:52Z
Getting started with IBM Hyper Protect Data Controller
ent://SD_ILS/0/SD_ILS:2331451
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format: Electronic Resources<br/>
Penetration Testing Azure for Ethical Hackers
ent://SD_ILS/0/SD_ILS:2331077
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Okeyode, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212932/?ar">https://learning.oreilly.com/library/view/~/9781839212932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212932">https://learning.oreilly.com/library/view/~/9781839212932</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar</a><br/>Format: Electronic Resources<br/>
Mastering Active Directory - Third Edition
ent://SD_ILS/0/SD_ILS:2331105
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format: Electronic Resources<br/>
CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide
ent://SD_ILS/0/SD_ILS:2330975
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar">https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780136634829/?ar">https://learning.oreilly.com/library/view/~/9780136634829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780136634829">https://learning.oreilly.com/library/view/~/9780136634829</a><br/>Format: Electronic Resources<br/>
The Complete 2020 Ethereum and Solidity Developer Bootcamp
ent://SD_ILS/0/SD_ILS:2323478
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Wiesner, Thomas, author.<br/><a href="https://learning.oreilly.com/videos/~/9781800201019/?ar">https://learning.oreilly.com/videos/~/9781800201019/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar">https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781800201019">https://learning.oreilly.com/videos/~/9781800201019</a><br/>Format: Electronic Resources<br/>
Cyber Warfare - Truth, Tactics, and Strategies
ent://SD_ILS/0/SD_ILS:2323667
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format: Electronic Resources<br/>
IBM DS8000 Encryption for data at rest, Transparent Cloud Tiering, and Endpoint Security (DS8000 Release 9.0)
ent://SD_ILS/0/SD_ILS:2323373
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Dufrasne, Bertrand, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738458427/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458427/?ar">https://learning.oreilly.com/library/view/~/9780738458427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458427">https://learning.oreilly.com/library/view/~/9780738458427</a><br/>Format: Electronic Resources<br/>
Cloud Computing Security, 2nd Edition
ent://SD_ILS/0/SD_ILS:2331101
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>
Mastering Active Directory - Second Edition
ent://SD_ILS/0/SD_ILS:2323979
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789800203/?ar">https://learning.oreilly.com/library/view/~/9781789800203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar">https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789800203">https://learning.oreilly.com/library/view/~/9781789800203</a><br/>Format: Electronic Resources<br/>
The Complete Ethical Hacking Course
ent://SD_ILS/0/SD_ILS:2323185
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format: Electronic Resources<br/>
Take Control of 1Password, 4th Edition
ent://SD_ILS/0/SD_ILS:2319474
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format: Electronic Resources<br/>
Velocity Conference - London, UK 2018
ent://SD_ILS/0/SD_ILS:2321191
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by O'Reilly (Firm), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492025931/?ar">https://go.oreilly.com/library-access/library/view/-/9781492025931/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492025931">https://learning.oreilly.com/videos/~/9781492025931</a>
<a href="https://learning.oreilly.com/videos/~/9781492025931/?ar">https://learning.oreilly.com/videos/~/9781492025931/?ar</a><br/>Format: Electronic Resources<br/>
Distributed Networks
ent://SD_ILS/0/SD_ILS:2319907
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format: Electronic Resources<br/>
The Complete Guide to Cybersecurity Risks and Controls
ent://SD_ILS/0/SD_ILS:2324524
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Kohnke, Anne, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar">https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579/?ar">https://learning.oreilly.com/library/view/~/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579">https://learning.oreilly.com/library/view/~/9781498740579</a><br/>Format: Electronic Resources<br/>
Security in an IPv6 Environment
ent://SD_ILS/0/SD_ILS:2323651
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Minoli, Daniel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420092301/?ar">https://learning.oreilly.com/library/view/~/9781420092301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420092301">https://learning.oreilly.com/library/view/~/9781420092301</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420092301/?ar">https://go.oreilly.com/library-access/library/view/-/9781420092301/?ar</a><br/>Format: Electronic Resources<br/>
The Science and Technology of Counterterrorism
ent://SD_ILS/0/SD_ILS:2319961
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Young, Carl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562">https://learning.oreilly.com/library/view/~/9780124200562</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562/?ar">https://learning.oreilly.com/library/view/~/9780124200562/?ar</a><br/>Format: Electronic Resources<br/>
Integrated Security Systems Design, 2nd Edition
ent://SD_ILS/0/SD_ILS:2320974
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Norman, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000229/?ar">https://learning.oreilly.com/library/view/~/9780128000229/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000229">https://learning.oreilly.com/library/view/~/9780128000229</a><br/>Format: Electronic Resources<br/>
Anonymous Communication Networks
ent://SD_ILS/0/SD_ILS:2327268
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Peng, Kun, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881606">https://learning.oreilly.com/library/view/~/9781439881606</a>
<a href="https://learning.oreilly.com/library/view/~/9781439881606/?ar">https://learning.oreilly.com/library/view/~/9781439881606/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439881606/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881606/?ar</a><br/>Format: Electronic Resources<br/>
Strategic Information Management, 3rd Edition
ent://SD_ILS/0/SD_ILS:2319914
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format: Electronic Resources<br/>
How to Cheat at Configuring Open Source Security Tools
ent://SD_ILS/0/SD_ILS:2326863
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Gregg, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780080553566/?ar">https://learning.oreilly.com/library/view/~/9780080553566/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080553566">https://learning.oreilly.com/library/view/~/9780080553566</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080553566/?ar">https://go.oreilly.com/library-access/library/view/-/9780080553566/?ar</a><br/>Format: Electronic Resources<br/>
Set Up Security and Integration with the DataPower XI50z for zEnterprise
ent://SD_ILS/0/SD_ILS:2323901
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Credle, Rufus, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738436348/?ar">https://learning.oreilly.com/library/view/~/0738436348/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738436348">https://learning.oreilly.com/library/view/~/0738436348</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738436348/?ar">https://go.oreilly.com/library-access/library/view/-/0738436348/?ar</a><br/>Format: Electronic Resources<br/>
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators
ent://SD_ILS/0/SD_ILS:2326866
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Long, Johnny, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080553979/?ar">https://go.oreilly.com/library-access/library/view/-/9780080553979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080553979/?ar">https://learning.oreilly.com/library/view/~/9780080553979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080553979">https://learning.oreilly.com/library/view/~/9780080553979</a><br/>Format: Electronic Resources<br/>
Microsoft
ent://SD_ILS/0/SD_ILS:2321069
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format: Electronic Resources<br/>
Internet Denial of Service: Attack and Defense Mechanisms
ent://SD_ILS/0/SD_ILS:2326795
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Mirkovic, Jelena, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131475738/?ar">https://learning.oreilly.com/library/view/~/0131475738/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131475738/?ar">https://go.oreilly.com/library-access/library/view/-/0131475738/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131475738">https://learning.oreilly.com/library/view/~/0131475738</a><br/>Format: Electronic Resources<br/>
Biometrics for Network Security
ent://SD_ILS/0/SD_ILS:2326814
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Reid, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131015494">https://learning.oreilly.com/library/view/~/0131015494</a>
<a href="https://learning.oreilly.com/library/view/~/0131015494/?ar">https://learning.oreilly.com/library/view/~/0131015494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131015494/?ar">https://go.oreilly.com/library-access/library/view/-/0131015494/?ar</a><br/>Format: Electronic Resources<br/>
Firewalls and Internet Security : Repelling the Wily Hacker, Second Edition
ent://SD_ILS/0/SD_ILS:2324785
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Cheswick, William, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/020163466X/?ar">https://go.oreilly.com/library-access/library/view/-/020163466X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/020163466X/?ar">https://learning.oreilly.com/library/view/~/020163466X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/020163466X">https://learning.oreilly.com/library/view/~/020163466X</a><br/>Format: Electronic Resources<br/>
Secure Shell in the Enterprise
ent://SD_ILS/0/SD_ILS:2326764
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Reid, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0131429000/?ar">https://go.oreilly.com/library-access/library/view/-/0131429000/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131429000/?ar">https://learning.oreilly.com/library/view/~/0131429000/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131429000">https://learning.oreilly.com/library/view/~/0131429000</a><br/>Format: Electronic Resources<br/>
Managing Information Security Risks : the OCTAVESM Approach
ent://SD_ILS/0/SD_ILS:2321582
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Alberts, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/0321118863/?ar">https://learning.oreilly.com/library/view/~/0321118863/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321118863/?ar">https://go.oreilly.com/library-access/library/view/-/0321118863/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321118863">https://learning.oreilly.com/library/view/~/0321118863</a><br/>Format: Electronic Resources<br/>
Understanding PKI : Concepts, Standards, and Deployment Considerations, Second Edition
ent://SD_ILS/0/SD_ILS:2321625
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Adams, Carlisle, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672323915/?ar">https://go.oreilly.com/library-access/library/view/-/0672323915/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672323915/?ar">https://learning.oreilly.com/library/view/~/0672323915/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672323915">https://learning.oreilly.com/library/view/~/0672323915</a><br/>Format: Electronic Resources<br/>
Trusted Computing Platforms: TCPA Technology in Context
ent://SD_ILS/0/SD_ILS:2326640
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Pearson, Siani, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0130092207/?ar">https://go.oreilly.com/library-access/library/view/-/0130092207/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0130092207">https://learning.oreilly.com/library/view/~/0130092207</a>
<a href="https://learning.oreilly.com/library/view/~/0130092207/?ar">https://learning.oreilly.com/library/view/~/0130092207/?ar</a><br/>Format: Electronic Resources<br/>
The Modelling and Analysis of Security Protocols: the CSP Approach
ent://SD_ILS/0/SD_ILS:2326682
2024-05-23T22:33:52Z
2024-05-23T22:33:52Z
by Ryan, P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201674718/?ar">https://go.oreilly.com/library-access/library/view/-/0201674718/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201674718/?ar">https://learning.oreilly.com/library/view/~/0201674718/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201674718">https://learning.oreilly.com/library/view/~/0201674718</a><br/>Format: Electronic Resources<br/>