Search Results for - Narrowed by: Computer networks -- Security measures. - Logiciels libres.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Logiciels$002blibres.$002509Logiciels$002blibres.$0026ps$003d300$0026isd$003dtrue?
2024-09-24T05:44:23Z
Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risks
ent://SD_ILS/0/SD_ILS:2321954
2024-09-24T05:44:23Z
2024-09-24T05:44:23Z
by Born, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789807608/?ar">https://learning.oreilly.com/library/view/~/9781789807608/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807608">https://learning.oreilly.com/library/view/~/9781789807608</a><br/>Format: Electronic Resources<br/>
Open source intelligence methods and tools : a practical guide to online intelligence
ent://SD_ILS/0/SD_ILS:2316916
2024-09-24T05:44:23Z
2024-09-24T05:44:23Z
by Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232132">https://learning.oreilly.com/library/view/~/9781484232132</a>
<a href="https://learning.oreilly.com/library/view/~/9781484232132/?ar">https://learning.oreilly.com/library/view/~/9781484232132/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar</a><br/>Format: Electronic Resources<br/>
Kubernetes security : operating Kubernetes clusters and applications safely
ent://SD_ILS/0/SD_ILS:2318519
2024-09-24T05:44:23Z
2024-09-24T05:44:23Z
by Rice, Liz, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492039075">https://learning.oreilly.com/library/view/~/9781492039075</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039075/?ar">https://learning.oreilly.com/library/view/~/9781492039075/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar</a><br/>Format: Electronic Resources<br/>
CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
ent://SD_ILS/0/SD_ILS:2291661
2024-09-24T05:44:23Z
2024-09-24T05:44:23Z
by Canavan, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar">https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216/?ar">https://learning.oreilly.com/library/view/~/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216">https://learning.oreilly.com/library/view/~/9780470916216</a><br/>Format: Electronic Resources<br/>
Nessus, Snort, & Ethereal power tools : customizing open source security applications
ent://SD_ILS/0/SD_ILS:2281994
2024-09-24T05:44:23Z
2024-09-24T05:44:23Z
by Archibald, Neil.<br/><a href="https://www.sciencedirect.com/science/book/9781597490207">https://www.sciencedirect.com/science/book/9781597490207</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490207">https://learning.oreilly.com/library/view/~/9781597490207</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490207/?ar">https://learning.oreilly.com/library/view/~/9781597490207/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar</a><br/>Format: Electronic Resources<br/>