Search Results for - Narrowed by: Computer networks -- Security measures. - 2021
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092021$0025092021$0026ps$003d300?
2024-06-07T13:26:23Z
Cyberjutsu : cybersecurity for the modern ninja
ent://SD_ILS/0/SD_ILS:2326541
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format: Electronic Resources<br/>
How cybersecurity really works : a hands-on guide for total beginners
ent://SD_ILS/0/SD_ILS:2328036
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Grubb, Sam (Cyber security consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999/?ar">https://learning.oreilly.com/library/view/~/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999">https://learning.oreilly.com/library/view/~/9781098128999</a><br/>Format: Electronic Resources<br/>
Certified ethical hacker v11
ent://SD_ILS/0/SD_ILS:2333423
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Bushmiller, Dean, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780996619158/?ar">https://learning.oreilly.com/videos/~/9780996619158/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780996619158">https://learning.oreilly.com/videos/~/9780996619158</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780996619158/?ar">https://go.oreilly.com/library-access/library/view/-/9780996619158/?ar</a><br/>Format: Video recording<br/>
Digital forensics for pentesters : hands-on learning.
ent://SD_ILS/0/SD_ILS:2331969
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Krahenbill, Cliff, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803231969">https://learning.oreilly.com/videos/~/9781803231969</a>
<a href="https://learning.oreilly.com/videos/~/9781803231969/?ar">https://learning.oreilly.com/videos/~/9781803231969/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar</a><br/>Format: Video recording<br/>
Artificial Intelligence, Cybersecurity and Cyber Defence
ent://SD_ILS/0/SD_ILS:2328358
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format: Electronic Resources<br/>
CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide
ent://SD_ILS/0/SD_ILS:2330975
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar">https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780136634829/?ar">https://learning.oreilly.com/library/view/~/9780136634829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780136634829">https://learning.oreilly.com/library/view/~/9780136634829</a><br/>Format: Electronic Resources<br/>
Google xi tong jia gou jie mi : gou jian an quan ke kao de xi tong = Building secure and reliable systems
ent://SD_ILS/0/SD_ILS:2332928
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Adkins, Heather, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar">https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9787115569257/?ar">https://learning.oreilly.com/library/view/~/9787115569257/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9787115569257">https://learning.oreilly.com/library/view/~/9787115569257</a><br/>Format: Electronic Resources<br/>
Penetration Testing Azure for Ethical Hackers
ent://SD_ILS/0/SD_ILS:2331077
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Okeyode, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212932/?ar">https://learning.oreilly.com/library/view/~/9781839212932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212932">https://learning.oreilly.com/library/view/~/9781839212932</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar</a><br/>Format: Electronic Resources<br/>
8 steps to better security : a simple cyber resilience guide for business
ent://SD_ILS/0/SD_ILS:2330835
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Crawley, Kim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119811237/?ar">https://learning.oreilly.com/library/view/~/9781119811237/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119811237">https://learning.oreilly.com/library/view/~/9781119811237</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar">https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar</a><br/>Format: Electronic Resources<br/>
Zero Trust security : an enterprise guide
ent://SD_ILS/0/SD_ILS:2328396
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Garbis, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484267028">https://learning.oreilly.com/library/view/~/9781484267028</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484267028/?ar">https://go.oreilly.com/library-access/library/view/-/9781484267028/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484267028/?ar">https://learning.oreilly.com/library/view/~/9781484267028/?ar</a><br/>Format: Electronic Resources<br/>
Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade antivirus software
ent://SD_ILS/0/SD_ILS:2329434
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Yehoshua, Nir, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801079747/?ar">https://learning.oreilly.com/library/view/~/9781801079747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar">https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801079747">https://learning.oreilly.com/library/view/~/9781801079747</a><br/>Format: Electronic Resources<br/>
Pentesting Industrial Control Systems : an Ethical Hacker's Guide to Analyzing, Compromising, Mitigating, and Securing Industrial Processes.
ent://SD_ILS/0/SD_ILS:2330864
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Smith, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202382/?ar">https://learning.oreilly.com/library/view/~/9781800202382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202382">https://learning.oreilly.com/library/view/~/9781800202382</a><br/>Format: Electronic Resources<br/>
Threat modeling a practical guide for developing teams
ent://SD_ILS/0/SD_ILS:2331156
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Tarandach, Izar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056546/?ar">https://learning.oreilly.com/library/view/~/9781492056546/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492056546">https://learning.oreilly.com/library/view/~/9781492056546</a><br/>Format: Electronic Resources<br/>
Secure operations and protections
ent://SD_ILS/0/SD_ILS:2332092
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format: Video recording<br/>
Multi-site network and security services with NSX-T : implement network security, stateful services, and operations
ent://SD_ILS/0/SD_ILS:2328881
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Hoogendoorn, Iwan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484270837/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270837/?ar">https://learning.oreilly.com/library/view/~/9781484270837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270837">https://learning.oreilly.com/library/view/~/9781484270837</a><br/>Format: Electronic Resources<br/>
How to hack like a ghost
ent://SD_ILS/0/SD_ILS:2326507
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format: Electronic Resources<br/>
Comptia security+ certification practice exams, (Exam SY0-601).
ent://SD_ILS/0/SD_ILS:2327137
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Lachance, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781260467987/?ar">https://learning.oreilly.com/library/view/~/9781260467987/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar">https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260467987">https://learning.oreilly.com/library/view/~/9781260467987</a><br/>Format: Electronic Resources<br/>
CEH v11 certified ethical hacker study guide
ent://SD_ILS/0/SD_ILS:2329776
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119800286/?ar">https://learning.oreilly.com/library/view/~/9781119800286/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar">https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119800286">https://learning.oreilly.com/library/view/~/9781119800286</a><br/>Format: Electronic Resources<br/>
Aan quan fang yu ru men shou ce = Defensive security handbook
ent://SD_ILS/0/SD_ILS:2333648
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Brotherston, Lee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9787115577955/?ar">https://learning.oreilly.com/library/view/~/9787115577955/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9787115577955/?ar">https://go.oreilly.com/library-access/library/view/-/9787115577955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9787115577955">https://learning.oreilly.com/library/view/~/9787115577955</a><br/>Format: Electronic Resources<br/>
Mastering Active Directory - Third Edition
ent://SD_ILS/0/SD_ILS:2331105
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format: Electronic Resources<br/>
Human Aspects of Information Security and Assurance
ent://SD_ILS/0/SD_ILS:2341722
2024-06-07T13:26:23Z
2024-06-07T13:26:23Z
by Clarke, Nathan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6870870">Click to View</a><br/>Format: Electronic Resources<br/>