Search Results for - Narrowed by: Computer networks -- Security measures. - Logiciels d'application -- Développement.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Logiciels$002bd$002527application$002b--$002bD$0025C3$0025A9veloppement.$002509Logiciels$002bd$002527application$002b--$002bD$0025C3$0025A9veloppement.$0026ps$003d300$0026isd$003dtrue?
2024-06-22T00:54:08Z
The Complete 2020 Ethereum and Solidity Developer Bootcamp
ent://SD_ILS/0/SD_ILS:2323478
2024-06-22T00:54:08Z
2024-06-22T00:54:08Z
by Wiesner, Thomas, author.<br/><a href="https://learning.oreilly.com/videos/~/9781800201019/?ar">https://learning.oreilly.com/videos/~/9781800201019/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar">https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781800201019">https://learning.oreilly.com/videos/~/9781800201019</a><br/>Format: Electronic Resources<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2322053
2024-06-22T00:54:08Z
2024-06-22T00:54:08Z
by Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format: Electronic Resources<br/>
Learning node embeddings in transaction networks
ent://SD_ILS/0/SD_ILS:2326362
2024-06-22T00:54:08Z
2024-06-22T00:54:08Z
by Barbour, Jesse, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/00000HQHJ2T3KE2A/?ar">https://go.oreilly.com/library-access/library/view/-/00000HQHJ2T3KE2A/?ar</a>
<a href="https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A/?ar">https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A/?ar</a>
<a href="https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A">https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A</a><br/>Format: Electronic Resources<br/>
Spring security : LiveLessons
ent://SD_ILS/0/SD_ILS:2318493
2024-06-22T00:54:08Z
2024-06-22T00:54:08Z
by Long, Josh, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar">https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780135415054/?ar">https://learning.oreilly.com/videos/~/9780135415054/?ar</a><br/>Format: Electronic Resources<br/>
Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data
ent://SD_ILS/0/SD_ILS:2319238
2024-06-22T00:54:08Z
2024-06-22T00:54:08Z
by Nickel, Jochen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789132304/?ar">https://learning.oreilly.com/library/view/~/9781789132304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar">https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar</a><br/>Format: Electronic Resources<br/>
How Lyft migrated to a service mesh with Envoy
ent://SD_ILS/0/SD_ILS:2323296
2024-06-22T00:54:08Z
2024-06-22T00:54:08Z
by Hochman, Daniel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338390/?ar">https://learning.oreilly.com/videos/~/0636920338390/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920338390">https://learning.oreilly.com/videos/~/0636920338390</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar</a><br/>Format: Electronic Resources<br/>
Pro Spring security : securing Spring Framework 5 and Boot 2-based Java applications
ent://SD_ILS/0/SD_ILS:2323072
2024-06-22T00:54:08Z
2024-06-22T00:54:08Z
by Scarioni, Carlo, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484250525/?ar">https://learning.oreilly.com/library/view/~/9781484250525/?ar</a><br/>Format: Electronic Resources<br/>
Securing microservice APIs : sustainable and scalable access control
ent://SD_ILS/0/SD_ILS:2318425
2024-06-22T00:54:08Z
2024-06-22T00:54:08Z
by McLarty, Matt, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492027140">https://learning.oreilly.com/library/view/~/9781492027140</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492027140/?ar">https://go.oreilly.com/library-access/library/view/-/9781492027140/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492027140/?ar">https://learning.oreilly.com/library/view/~/9781492027140/?ar</a><br/>Format: Electronic Resources<br/>
Web application firewalls : securing modern web applications
ent://SD_ILS/0/SD_ILS:2318497
2024-06-22T00:54:08Z
2024-06-22T00:54:08Z
by Russell, Chad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492032311">https://learning.oreilly.com/library/view/~/9781492032311</a>
<a href="https://learning.oreilly.com/library/view/~/9781492032311/?ar">https://learning.oreilly.com/library/view/~/9781492032311/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2316778
2024-06-22T00:54:08Z
2024-06-22T00:54:08Z
by Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format: Electronic Resources<br/>
Kubernetes security : operating Kubernetes clusters and applications safely
ent://SD_ILS/0/SD_ILS:2318519
2024-06-22T00:54:08Z
2024-06-22T00:54:08Z
by Rice, Liz, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492039075">https://learning.oreilly.com/library/view/~/9781492039075</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039075/?ar">https://learning.oreilly.com/library/view/~/9781492039075/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar</a><br/>Format: Electronic Resources<br/>
Mastering identity and access management with Microsoft Azure : start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments
ent://SD_ILS/0/SD_ILS:2311745
2024-06-22T00:54:08Z
2024-06-22T00:54:08Z
by Nickel, Jochen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889448/?ar">https://learning.oreilly.com/library/view/~/9781785889448/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889448">https://learning.oreilly.com/library/view/~/9781785889448</a><br/>Format: Electronic Resources<br/>
Secure your Node.js web application : keep attackers out and users happy
ent://SD_ILS/0/SD_ILS:2309949
2024-06-22T00:54:08Z
2024-06-22T00:54:08Z
by Düüna, Karl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar">https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680501780/?ar">https://learning.oreilly.com/library/view/~/9781680501780/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680501780">https://learning.oreilly.com/library/view/~/9781680501780</a><br/>Format: Electronic Resources<br/>
Pro Spring security
ent://SD_ILS/0/SD_ILS:2298698
2024-06-22T00:54:08Z
2024-06-22T00:54:08Z
by Scarioni, Carlo.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430248187/?ar">https://go.oreilly.com/library-access/library/view/-/9781430248187/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430248187/?ar">https://learning.oreilly.com/library/view/~/9781430248187/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430248187">https://learning.oreilly.com/library/view/~/9781430248187</a><br/>Format: Electronic Resources<br/>