Search Results for - Narrowed by: Computer networks -- Security measures. - 2021 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092021$0025092021$0026ps$003d300? 2024-06-07T13:26:23Z Cyberjutsu : cybersecurity for the modern ninja ent://SD_ILS/0/SD_ILS:2326541 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a> <a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format:&#160;Electronic Resources<br/> How cybersecurity really works : a hands-on guide for total beginners ent://SD_ILS/0/SD_ILS:2328036 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Grubb, Sam (Cyber security consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098128999/?ar">https://learning.oreilly.com/library/view/~/9781098128999/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098128999">https://learning.oreilly.com/library/view/~/9781098128999</a><br/>Format:&#160;Electronic Resources<br/> Certified ethical hacker v11 ent://SD_ILS/0/SD_ILS:2333423 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Bushmiller, Dean, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780996619158/?ar">https://learning.oreilly.com/videos/~/9780996619158/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780996619158">https://learning.oreilly.com/videos/~/9780996619158</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780996619158/?ar">https://go.oreilly.com/library-access/library/view/-/9780996619158/?ar</a><br/>Format:&#160;Video recording<br/> Digital forensics for pentesters : hands-on learning. ent://SD_ILS/0/SD_ILS:2331969 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Krahenbill, Cliff, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803231969">https://learning.oreilly.com/videos/~/9781803231969</a> <a href="https://learning.oreilly.com/videos/~/9781803231969/?ar">https://learning.oreilly.com/videos/~/9781803231969/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar</a><br/>Format:&#160;Video recording<br/> Artificial Intelligence, Cybersecurity and Cyber Defence ent://SD_ILS/0/SD_ILS:2328358 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a> <a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide ent://SD_ILS/0/SD_ILS:2330975 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar">https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780136634829/?ar">https://learning.oreilly.com/library/view/~/9780136634829/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780136634829">https://learning.oreilly.com/library/view/~/9780136634829</a><br/>Format:&#160;Electronic Resources<br/> Google xi tong jia gou jie mi : gou jian an quan ke kao de xi tong = Building secure and reliable systems ent://SD_ILS/0/SD_ILS:2332928 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Adkins, Heather, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar">https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9787115569257/?ar">https://learning.oreilly.com/library/view/~/9787115569257/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9787115569257">https://learning.oreilly.com/library/view/~/9787115569257</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing Azure for Ethical Hackers ent://SD_ILS/0/SD_ILS:2331077 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Okeyode, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212932/?ar">https://learning.oreilly.com/library/view/~/9781839212932/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839212932">https://learning.oreilly.com/library/view/~/9781839212932</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar</a><br/>Format:&#160;Electronic Resources<br/> 8 steps to better security : a simple cyber resilience guide for business ent://SD_ILS/0/SD_ILS:2330835 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Crawley, Kim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119811237/?ar">https://learning.oreilly.com/library/view/~/9781119811237/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119811237">https://learning.oreilly.com/library/view/~/9781119811237</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar">https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar</a><br/>Format:&#160;Electronic Resources<br/> Zero Trust security : an enterprise guide ent://SD_ILS/0/SD_ILS:2328396 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Garbis, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484267028">https://learning.oreilly.com/library/view/~/9781484267028</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484267028/?ar">https://go.oreilly.com/library-access/library/view/-/9781484267028/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484267028/?ar">https://learning.oreilly.com/library/view/~/9781484267028/?ar</a><br/>Format:&#160;Electronic Resources<br/> Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade antivirus software ent://SD_ILS/0/SD_ILS:2329434 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Yehoshua, Nir, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801079747/?ar">https://learning.oreilly.com/library/view/~/9781801079747/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar">https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801079747">https://learning.oreilly.com/library/view/~/9781801079747</a><br/>Format:&#160;Electronic Resources<br/> Pentesting Industrial Control Systems : an Ethical Hacker's Guide to Analyzing, Compromising, Mitigating, and Securing Industrial Processes. ent://SD_ILS/0/SD_ILS:2330864 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Smith, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800202382/?ar">https://learning.oreilly.com/library/view/~/9781800202382/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800202382">https://learning.oreilly.com/library/view/~/9781800202382</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling a practical guide for developing teams ent://SD_ILS/0/SD_ILS:2331156 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Tarandach, Izar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056546/?ar">https://learning.oreilly.com/library/view/~/9781492056546/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492056546">https://learning.oreilly.com/library/view/~/9781492056546</a><br/>Format:&#160;Electronic Resources<br/> Secure operations and protections ent://SD_ILS/0/SD_ILS:2332092 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format:&#160;Video recording<br/> Multi-site network and security services with NSX-T : implement network security, stateful services, and operations ent://SD_ILS/0/SD_ILS:2328881 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Hoogendoorn, Iwan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484270837/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270837/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484270837/?ar">https://learning.oreilly.com/library/view/~/9781484270837/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484270837">https://learning.oreilly.com/library/view/~/9781484270837</a><br/>Format:&#160;Electronic Resources<br/> How to hack like a ghost ent://SD_ILS/0/SD_ILS:2326507 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a> <a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format:&#160;Electronic Resources<br/> Comptia security+ certification practice exams, (Exam SY0-601). ent://SD_ILS/0/SD_ILS:2327137 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Lachance, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781260467987/?ar">https://learning.oreilly.com/library/view/~/9781260467987/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar">https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781260467987">https://learning.oreilly.com/library/view/~/9781260467987</a><br/>Format:&#160;Electronic Resources<br/> CEH v11 certified ethical hacker study guide ent://SD_ILS/0/SD_ILS:2329776 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119800286/?ar">https://learning.oreilly.com/library/view/~/9781119800286/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar">https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119800286">https://learning.oreilly.com/library/view/~/9781119800286</a><br/>Format:&#160;Electronic Resources<br/> Aan quan fang yu ru men shou ce = Defensive security handbook ent://SD_ILS/0/SD_ILS:2333648 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Brotherston, Lee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9787115577955/?ar">https://learning.oreilly.com/library/view/~/9787115577955/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9787115577955/?ar">https://go.oreilly.com/library-access/library/view/-/9787115577955/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9787115577955">https://learning.oreilly.com/library/view/~/9787115577955</a><br/>Format:&#160;Electronic Resources<br/> Mastering Active Directory - Third Edition ent://SD_ILS/0/SD_ILS:2331105 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of Information Security and Assurance ent://SD_ILS/0/SD_ILS:2341722 2024-06-07T13:26:23Z 2024-06-07T13:26:23Z by&#160;Clarke, Nathan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6870870">Click to View</a><br/>Format:&#160;Electronic Resources<br/>