Search Results for - Narrowed by: Computer networks -- Security measures. - Application software -- Development.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Application$002bsoftware$002b--$002bDevelopment.$002509Application$002bsoftware$002b--$002bDevelopment.$0026ps$003d300?
2024-05-26T17:49:30Z
The Complete 2020 Ethereum and Solidity Developer Bootcamp
ent://SD_ILS/0/SD_ILS:2323478
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Wiesner, Thomas, author.<br/><a href="https://learning.oreilly.com/videos/~/9781800201019/?ar">https://learning.oreilly.com/videos/~/9781800201019/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar">https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781800201019">https://learning.oreilly.com/videos/~/9781800201019</a><br/>Format: Electronic Resources<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2322053
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format: Electronic Resources<br/>
Learning node embeddings in transaction networks
ent://SD_ILS/0/SD_ILS:2326362
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Barbour, Jesse, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/00000HQHJ2T3KE2A/?ar">https://go.oreilly.com/library-access/library/view/-/00000HQHJ2T3KE2A/?ar</a>
<a href="https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A/?ar">https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A/?ar</a>
<a href="https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A">https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A</a><br/>Format: Electronic Resources<br/>
Pro Spring security : securing Spring Framework 5 and Boot 2-based Java applications
ent://SD_ILS/0/SD_ILS:2323072
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Scarioni, Carlo, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484250525/?ar">https://learning.oreilly.com/library/view/~/9781484250525/?ar</a><br/>Format: Electronic Resources<br/>
Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data
ent://SD_ILS/0/SD_ILS:2319238
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Nickel, Jochen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789132304/?ar">https://learning.oreilly.com/library/view/~/9781789132304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar">https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar</a><br/>Format: Electronic Resources<br/>
How Lyft migrated to a service mesh with Envoy
ent://SD_ILS/0/SD_ILS:2323296
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Hochman, Daniel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338390/?ar">https://learning.oreilly.com/videos/~/0636920338390/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920338390">https://learning.oreilly.com/videos/~/0636920338390</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar</a><br/>Format: Electronic Resources<br/>
Spring security : LiveLessons
ent://SD_ILS/0/SD_ILS:2318493
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Long, Josh, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar">https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780135415054/?ar">https://learning.oreilly.com/videos/~/9780135415054/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2316778
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format: Electronic Resources<br/>
Kubernetes security : operating Kubernetes clusters and applications safely
ent://SD_ILS/0/SD_ILS:2318519
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Rice, Liz, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492039075">https://learning.oreilly.com/library/view/~/9781492039075</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039075/?ar">https://learning.oreilly.com/library/view/~/9781492039075/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar</a><br/>Format: Electronic Resources<br/>
Securing microservice APIs : sustainable and scalable access control
ent://SD_ILS/0/SD_ILS:2318425
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by McLarty, Matt, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492027140">https://learning.oreilly.com/library/view/~/9781492027140</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492027140/?ar">https://go.oreilly.com/library-access/library/view/-/9781492027140/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492027140/?ar">https://learning.oreilly.com/library/view/~/9781492027140/?ar</a><br/>Format: Electronic Resources<br/>
Securing microservices : protect sensitive data in transit and at rest.
ent://SD_ILS/0/SD_ILS:2334787
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Newman, Sam, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar">https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492038986/?ar">https://learning.oreilly.com/videos/~/9781492038986/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492038986">https://learning.oreilly.com/videos/~/9781492038986</a><br/>Format: Video recording<br/>
Web application firewalls : securing modern web applications
ent://SD_ILS/0/SD_ILS:2318497
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Russell, Chad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492032311">https://learning.oreilly.com/library/view/~/9781492032311</a>
<a href="https://learning.oreilly.com/library/view/~/9781492032311/?ar">https://learning.oreilly.com/library/view/~/9781492032311/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar</a><br/>Format: Electronic Resources<br/>
Mastering identity and access management with Microsoft Azure : start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments
ent://SD_ILS/0/SD_ILS:2311745
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Nickel, Jochen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889448/?ar">https://learning.oreilly.com/library/view/~/9781785889448/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889448">https://learning.oreilly.com/library/view/~/9781785889448</a><br/>Format: Electronic Resources<br/>
Secure your Node.js web application : keep attackers out and users happy
ent://SD_ILS/0/SD_ILS:2309949
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Düüna, Karl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar">https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680501780/?ar">https://learning.oreilly.com/library/view/~/9781680501780/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680501780">https://learning.oreilly.com/library/view/~/9781680501780</a><br/>Format: Electronic Resources<br/>
Learning Pentesting for Android.
ent://SD_ILS/0/SD_ILS:1268868
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Gupta, Aditya.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1644013">Click to View</a><br/>Format: Electronic Resources<br/>
Pro Spring security
ent://SD_ILS/0/SD_ILS:2298698
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Scarioni, Carlo.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430248187/?ar">https://go.oreilly.com/library-access/library/view/-/9781430248187/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430248187/?ar">https://learning.oreilly.com/library/view/~/9781430248187/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430248187">https://learning.oreilly.com/library/view/~/9781430248187</a><br/>Format: Electronic Resources<br/>
Spring Security 3.x cookbook
ent://SD_ILS/0/SD_ILS:2154923
2024-05-26T17:49:30Z
2024-05-26T17:49:30Z
by Mankale, Anjana.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1532014">Click to View</a><br/>Format: Electronic Resources<br/>