Search Results for - Narrowed by: Computer networks -- Security measures. - Computer networks -- Security measures -- Software.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002b--$002bSoftware.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002b--$002bSoftware.$0026ps$003d300?2024-05-27T12:29:22ZMastering Palo Alto networks : build, configure and deploy network solutions for your infrastructure using features of PAN-OSent://SD_ILS/0/SD_ILS:23335182024-05-27T12:29:22Z2024-05-27T12:29:22Zby Piens, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803241418/?ar">https://go.oreilly.com/library-access/library/view/-/9781803241418/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803241418/?ar">https://learning.oreilly.com/library/view/~/9781803241418/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803241418">https://learning.oreilly.com/library/view/~/9781803241418</a><br/>Format: Electronic Resources<br/>Learn Wireshark : a definitive guide to expertly analyzing protocols and troubleshooting networks using Wiresharkent://SD_ILS/0/SD_ILS:23340042024-05-27T12:29:22Z2024-05-27T12:29:22Zby Bock, Lisa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803231679/?ar">https://learning.oreilly.com/library/view/~/9781803231679/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803231679/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803231679">https://learning.oreilly.com/library/view/~/9781803231679</a><br/>Format: Electronic Resources<br/>Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade antivirus softwareent://SD_ILS/0/SD_ILS:23294342024-05-27T12:29:22Z2024-05-27T12:29:22Zby Yehoshua, Nir, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801079747/?ar">https://learning.oreilly.com/library/view/~/9781801079747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar">https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801079747">https://learning.oreilly.com/library/view/~/9781801079747</a><br/>Format: Electronic Resources<br/>IBM Spectrum Protect Plus : practical guidance for deployment, configuration, and usageent://SD_ILS/0/SD_ILS:23230172024-05-27T12:29:22Z2024-05-27T12:29:22Zby Gaschler, Andre, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738458045/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458045/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458045/?ar">https://learning.oreilly.com/library/view/~/9780738458045/?ar</a><br/>Format: Electronic Resources<br/>Learn Wireshark : Confidently Navigate the Wireshark Interface and Solve Real-World Networking Problems.ent://SD_ILS/0/SD_ILS:23217012024-05-27T12:29:22Z2024-05-27T12:29:22Zby Bock, Lisa.<br/><a href="https://learning.oreilly.com/library/view/~/9781789134506">https://learning.oreilly.com/library/view/~/9781789134506</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789134506/?ar">https://go.oreilly.com/library-access/library/view/-/9781789134506/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789134506/?ar">https://learning.oreilly.com/library/view/~/9781789134506/?ar</a><br/>Format: Electronic Resources<br/>Mastering reverse engineering : re-engineer your ethical hacking skillsent://SD_ILS/0/SD_ILS:23190892024-05-27T12:29:22Z2024-05-27T12:29:22Zby Wong, Reginald, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788838849/?ar">https://learning.oreilly.com/library/view/~/9781788838849/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar">https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar</a><br/>Format: Electronic Resources<br/>Zabbix : enterprise network montioring [sic] made easy : learn how to gather detailed statistics and data with this one-stop, comprehensive course along with hands-on recipes to get your infrasturcture up and running with Zabbix : a course in three modules.ent://SD_ILS/0/SD_ILS:23127462024-05-27T12:29:22Z2024-05-27T12:29:22Zby Olups, Rihards, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787129047">https://learning.oreilly.com/library/view/~/9781787129047</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787129047/?ar">https://go.oreilly.com/library-access/library/view/-/9781787129047/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787129047/?ar">https://learning.oreilly.com/library/view/~/9781787129047/?ar</a><br/>Format: Electronic Resources<br/>Learning Puppet Security : secure your IT environments with the powerful secuity tools of Puppetent://SD_ILS/0/SD_ILS:23069482024-05-27T12:29:22Z2024-05-27T12:29:22Zby Slagle, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784397753/?ar">https://go.oreilly.com/library-access/library/view/-/9781784397753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784397753">https://learning.oreilly.com/library/view/~/9781784397753</a>
<a href="https://learning.oreilly.com/library/view/~/9781784397753/?ar">https://learning.oreilly.com/library/view/~/9781784397753/?ar</a><br/>Format: Electronic Resources<br/>