Search Results for - Narrowed by: Computer networks -- Security measures. - Application software -- Development. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Application$002bsoftware$002b--$002bDevelopment.$002509Application$002bsoftware$002b--$002bDevelopment.$0026ps$003d300? 2024-05-26T17:49:30Z The Complete 2020 Ethereum and Solidity Developer Bootcamp ent://SD_ILS/0/SD_ILS:2323478 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;Wiesner, Thomas, author.<br/><a href="https://learning.oreilly.com/videos/~/9781800201019/?ar">https://learning.oreilly.com/videos/~/9781800201019/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar">https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781800201019">https://learning.oreilly.com/videos/~/9781800201019</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2322053 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning node embeddings in transaction networks ent://SD_ILS/0/SD_ILS:2326362 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;Barbour, Jesse, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/00000HQHJ2T3KE2A/?ar">https://go.oreilly.com/library-access/library/view/-/00000HQHJ2T3KE2A/?ar</a> <a href="https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A/?ar">https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A/?ar</a> <a href="https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A">https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A</a><br/>Format:&#160;Electronic Resources<br/> Pro Spring security : securing Spring Framework 5 and Boot 2-based Java applications ent://SD_ILS/0/SD_ILS:2323072 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;Scarioni, Carlo, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484250525/?ar">https://learning.oreilly.com/library/view/~/9781484250525/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data ent://SD_ILS/0/SD_ILS:2319238 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;Nickel, Jochen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789132304/?ar">https://learning.oreilly.com/library/view/~/9781789132304/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar">https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar</a><br/>Format:&#160;Electronic Resources<br/> How Lyft migrated to a service mesh with Envoy ent://SD_ILS/0/SD_ILS:2323296 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;Hochman, Daniel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338390/?ar">https://learning.oreilly.com/videos/~/0636920338390/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920338390">https://learning.oreilly.com/videos/~/0636920338390</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar</a><br/>Format:&#160;Electronic Resources<br/> Spring security : LiveLessons ent://SD_ILS/0/SD_ILS:2318493 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;Long, Josh, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar">https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780135415054/?ar">https://learning.oreilly.com/videos/~/9780135415054/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2316778 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kubernetes security : operating Kubernetes clusters and applications safely ent://SD_ILS/0/SD_ILS:2318519 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;Rice, Liz, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492039075">https://learning.oreilly.com/library/view/~/9781492039075</a> <a href="https://learning.oreilly.com/library/view/~/9781492039075/?ar">https://learning.oreilly.com/library/view/~/9781492039075/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing microservice APIs : sustainable and scalable access control ent://SD_ILS/0/SD_ILS:2318425 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;McLarty, Matt, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492027140">https://learning.oreilly.com/library/view/~/9781492027140</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492027140/?ar">https://go.oreilly.com/library-access/library/view/-/9781492027140/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492027140/?ar">https://learning.oreilly.com/library/view/~/9781492027140/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing microservices : protect sensitive data in transit and at rest. ent://SD_ILS/0/SD_ILS:2334787 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;Newman, Sam, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar">https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492038986/?ar">https://learning.oreilly.com/videos/~/9781492038986/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492038986">https://learning.oreilly.com/videos/~/9781492038986</a><br/>Format:&#160;Video recording<br/> Web application firewalls : securing modern web applications ent://SD_ILS/0/SD_ILS:2318497 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;Russell, Chad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492032311">https://learning.oreilly.com/library/view/~/9781492032311</a> <a href="https://learning.oreilly.com/library/view/~/9781492032311/?ar">https://learning.oreilly.com/library/view/~/9781492032311/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering identity and access management with Microsoft Azure : start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments ent://SD_ILS/0/SD_ILS:2311745 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;Nickel, Jochen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785889448/?ar">https://learning.oreilly.com/library/view/~/9781785889448/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785889448">https://learning.oreilly.com/library/view/~/9781785889448</a><br/>Format:&#160;Electronic Resources<br/> Secure your Node.js web application : keep attackers out and users happy ent://SD_ILS/0/SD_ILS:2309949 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;D&uuml;&uuml;na, Karl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar">https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781680501780/?ar">https://learning.oreilly.com/library/view/~/9781680501780/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781680501780">https://learning.oreilly.com/library/view/~/9781680501780</a><br/>Format:&#160;Electronic Resources<br/> Learning Pentesting for Android. ent://SD_ILS/0/SD_ILS:1268868 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;Gupta, Aditya.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1644013">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Pro Spring security ent://SD_ILS/0/SD_ILS:2298698 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;Scarioni, Carlo.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430248187/?ar">https://go.oreilly.com/library-access/library/view/-/9781430248187/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430248187/?ar">https://learning.oreilly.com/library/view/~/9781430248187/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430248187">https://learning.oreilly.com/library/view/~/9781430248187</a><br/>Format:&#160;Electronic Resources<br/> Spring Security 3.x cookbook ent://SD_ILS/0/SD_ILS:2154923 2024-05-26T17:49:30Z 2024-05-26T17:49:30Z by&#160;Mankale, Anjana.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1532014">Click to View</a><br/>Format:&#160;Electronic Resources<br/>