Search Results for - Narrowed by: Computer networks -- Security measures. - COMPUTERS -- Information Technology.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bInformation$002bTechnology.$002509COMPUTERS$002b--$002bInformation$002bTechnology.$0026ps$003d300?2024-05-29T13:10:23ZMastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and dataent://SD_ILS/0/SD_ILS:23192382024-05-29T13:10:23Z2024-05-29T13:10:23Zby Nickel, Jochen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789132304/?ar">https://learning.oreilly.com/library/view/~/9781789132304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar">https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar</a><br/>Format: Electronic Resources<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:23195342024-05-29T13:10:23Z2024-05-29T13:10:23Zby Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a>
<a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format: Electronic Resources<br/>Practical Industrial Internet of Things security : a practitioner's guide to securing connected industriesent://SD_ILS/0/SD_ILS:23172852024-05-29T13:10:23Z2024-05-29T13:10:23Zby Bhattacharjee, Sravani, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788832687/?ar">https://learning.oreilly.com/library/view/~/9781788832687/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788832687">https://learning.oreilly.com/library/view/~/9781788832687</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar">https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar</a><br/>Format: Electronic Resources<br/>Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threatsent://SD_ILS/0/SD_ILS:23168332024-05-29T13:10:23Z2024-05-29T13:10:23Zby Crouthamel, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788626521/?ar">https://learning.oreilly.com/library/view/~/9781788626521/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar">https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar</a><br/>Format: Electronic Resources<br/>Securing the internet of thingsent://SD_ILS/0/SD_ILS:23123482024-05-29T13:10:23Z2024-05-29T13:10:23Zby Li, Shancang, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045053">https://learning.oreilly.com/library/view/~/9780128045053</a>
<a href="https://learning.oreilly.com/library/view/~/9780128045053/?ar">https://learning.oreilly.com/library/view/~/9780128045053/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar</a><br/>Format: Electronic Resources<br/>Network functions virtualization (NFV) with a touch of SDNent://SD_ILS/0/SD_ILS:23119832024-05-29T13:10:23Z2024-05-29T13:10:23Zby Chayapathi, Rajendra, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134464312">https://learning.oreilly.com/library/view/~/9780134464312</a>
<a href="https://learning.oreilly.com/library/view/~/9780134464312/?ar">https://learning.oreilly.com/library/view/~/9780134464312/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134464312/?ar">https://go.oreilly.com/library-access/library/view/-/9780134464312/?ar</a><br/>Format: Electronic Resources<br/>A study of black hole attack solutions : on AODV routing protocol in MANETent://SD_ILS/0/SD_ILS:23090382024-05-29T13:10:23Z2024-05-29T13:10:23Zby Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format: Electronic Resources<br/>Foundations of modern networking : SDN, NFV, QoE, IoT, and Cloudent://SD_ILS/0/SD_ILS:23088002024-05-29T13:10:23Z2024-05-29T13:10:23Zby Stallings, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134175478/?ar">https://learning.oreilly.com/library/view/~/9780134175478/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar">https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar</a><br/>Format: Electronic Resources<br/>Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniquesent://SD_ILS/0/SD_ILS:23068592024-05-29T13:10:23Z2024-05-29T13:10:23Zby Chauhan, Sudhanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128018675">https://learning.oreilly.com/library/view/~/9780128018675</a>
<a href="https://learning.oreilly.com/library/view/~/9780128018675/?ar">https://learning.oreilly.com/library/view/~/9780128018675/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128018675/?ar">https://go.oreilly.com/library-access/library/view/-/9780128018675/?ar</a><br/>Format: Electronic Resources<br/>Packet analysis with Wireshark : leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysisent://SD_ILS/0/SD_ILS:23093482024-05-29T13:10:23Z2024-05-29T13:10:23Zby Nath, Anish, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785887819/?ar">https://learning.oreilly.com/library/view/~/9781785887819/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785887819">https://learning.oreilly.com/library/view/~/9781785887819</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785887819/?ar">https://go.oreilly.com/library-access/library/view/-/9781785887819/?ar</a><br/>Format: Electronic Resources<br/>The basics of IT audit : Purposes, processes, and practical information.ent://SD_ILS/0/SD_ILS:23015012024-05-29T13:10:23Z2024-05-29T13:10:23Zby Gantz, Stephen D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596/?ar">https://learning.oreilly.com/library/view/~/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596">https://learning.oreilly.com/library/view/~/9780124171596</a><br/>Format: Electronic Resources<br/>Introduction to computer networks and cybersecurityent://SD_ILS/0/SD_ILS:23055782024-05-29T13:10:23Z2024-05-29T13:10:23Zby Wu, Chwan-Hwa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar">https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466572133/?ar">https://learning.oreilly.com/library/view/~/9781466572133/?ar</a><br/>Format: Electronic Resources<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:22934422024-05-29T13:10:23Z2024-05-29T13:10:23Zby Speed, Tyler Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar">https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439809839/?ar">https://learning.oreilly.com/library/view/~/9781439809839/?ar</a><br/>Format: Electronic Resources<br/>Unauthorised access : physical penetration testing for IT security teamsent://SD_ILS/0/SD_ILS:22884522024-05-29T13:10:23Z2024-05-29T13:10:23Zby Allsopp, Wil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar">https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470747612/?ar">https://learning.oreilly.com/library/view/~/9780470747612/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470747612">https://learning.oreilly.com/library/view/~/9780470747612</a><br/>Format: Electronic Resources<br/>IT compliance and controls : best practices for implementationent://SD_ILS/0/SD_ILS:22885332024-05-29T13:10:23Z2024-05-29T13:10:23Zby DeLuccia, James J., 1977-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470145012/?ar">https://go.oreilly.com/library-access/library/view/-/9780470145012/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470145012/?ar">https://learning.oreilly.com/library/view/~/9780470145012/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470145012">https://learning.oreilly.com/library/view/~/9780470145012</a><br/>Format: Electronic Resources<br/>