Search Results for - Narrowed by: Computer networks -- Security measures. - Computer networks -- Security measures -- Software. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002b--$002bSoftware.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002b--$002bSoftware.$0026ps$003d300? 2024-05-27T12:29:22Z Mastering Palo Alto networks : build, configure and deploy network solutions for your infrastructure using features of PAN-OS ent://SD_ILS/0/SD_ILS:2333518 2024-05-27T12:29:22Z 2024-05-27T12:29:22Z by&#160;Piens, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803241418/?ar">https://go.oreilly.com/library-access/library/view/-/9781803241418/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803241418/?ar">https://learning.oreilly.com/library/view/~/9781803241418/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803241418">https://learning.oreilly.com/library/view/~/9781803241418</a><br/>Format:&#160;Electronic Resources<br/> Learn Wireshark : a definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark ent://SD_ILS/0/SD_ILS:2334004 2024-05-27T12:29:22Z 2024-05-27T12:29:22Z by&#160;Bock, Lisa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803231679/?ar">https://learning.oreilly.com/library/view/~/9781803231679/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803231679/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231679/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803231679">https://learning.oreilly.com/library/view/~/9781803231679</a><br/>Format:&#160;Electronic Resources<br/> Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade antivirus software ent://SD_ILS/0/SD_ILS:2329434 2024-05-27T12:29:22Z 2024-05-27T12:29:22Z by&#160;Yehoshua, Nir, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801079747/?ar">https://learning.oreilly.com/library/view/~/9781801079747/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar">https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801079747">https://learning.oreilly.com/library/view/~/9781801079747</a><br/>Format:&#160;Electronic Resources<br/> IBM Spectrum Protect Plus : practical guidance for deployment, configuration, and usage ent://SD_ILS/0/SD_ILS:2323017 2024-05-27T12:29:22Z 2024-05-27T12:29:22Z by&#160;Gaschler, Andre, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738458045/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458045/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458045/?ar">https://learning.oreilly.com/library/view/~/9780738458045/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn Wireshark : Confidently Navigate the Wireshark Interface and Solve Real-World Networking Problems. ent://SD_ILS/0/SD_ILS:2321701 2024-05-27T12:29:22Z 2024-05-27T12:29:22Z by&#160;Bock, Lisa.<br/><a href="https://learning.oreilly.com/library/view/~/9781789134506">https://learning.oreilly.com/library/view/~/9781789134506</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789134506/?ar">https://go.oreilly.com/library-access/library/view/-/9781789134506/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789134506/?ar">https://learning.oreilly.com/library/view/~/9781789134506/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering reverse engineering : re-engineer your ethical hacking skills ent://SD_ILS/0/SD_ILS:2319089 2024-05-27T12:29:22Z 2024-05-27T12:29:22Z by&#160;Wong, Reginald, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788838849/?ar">https://learning.oreilly.com/library/view/~/9781788838849/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar">https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar</a><br/>Format:&#160;Electronic Resources<br/> Zabbix : enterprise network montioring [sic] made easy : learn how to gather detailed statistics and data with this one-stop, comprehensive course along with hands-on recipes to get your infrasturcture up and running with Zabbix : a course in three modules. ent://SD_ILS/0/SD_ILS:2312746 2024-05-27T12:29:22Z 2024-05-27T12:29:22Z by&#160;Olups, Rihards, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787129047">https://learning.oreilly.com/library/view/~/9781787129047</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787129047/?ar">https://go.oreilly.com/library-access/library/view/-/9781787129047/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787129047/?ar">https://learning.oreilly.com/library/view/~/9781787129047/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning Puppet Security : secure your IT environments with the powerful secuity tools of Puppet ent://SD_ILS/0/SD_ILS:2306948 2024-05-27T12:29:22Z 2024-05-27T12:29:22Z by&#160;Slagle, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784397753/?ar">https://go.oreilly.com/library-access/library/view/-/9781784397753/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784397753">https://learning.oreilly.com/library/view/~/9781784397753</a> <a href="https://learning.oreilly.com/library/view/~/9781784397753/?ar">https://learning.oreilly.com/library/view/~/9781784397753/?ar</a><br/>Format:&#160;Electronic Resources<br/>