Search Results for - Narrowed by: Computer networks -- Security measures. - Nonfiction films.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Nonfiction$002bfilms.$002509Nonfiction$002bfilms.$0026ps$003d300$0026isd$003dtrue?
2024-06-21T14:45:26Z
Exam MS-100 Microsoft 365 identity and services.
ent://SD_ILS/0/SD_ILS:2335515
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Costello, Dan, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137648689/?ar">https://learning.oreilly.com/videos/~/9780137648689/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137648689">https://learning.oreilly.com/videos/~/9780137648689</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137648689/?ar">https://go.oreilly.com/library-access/library/view/-/9780137648689/?ar</a><br/>Format: Video recording<br/>
Defensive cybersecurity fundamentals
ent://SD_ILS/0/SD_ILS:2333379
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Berlin, Amanda, author.<br/><a href="https://learning.oreilly.com/videos/~/0636920670896/?ar">https://learning.oreilly.com/videos/~/0636920670896/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920670896/?ar">https://go.oreilly.com/library-access/library/view/-/0636920670896/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920670896">https://learning.oreilly.com/videos/~/0636920670896</a><br/>Format: Video recording<br/>
Hands-on threat modeling
ent://SD_ILS/0/SD_ILS:2333383
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Deleersnyder, Sebastien, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671268">https://learning.oreilly.com/videos/~/0636920671268</a>
<a href="https://learning.oreilly.com/videos/~/0636920671268/?ar">https://learning.oreilly.com/videos/~/0636920671268/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar</a><br/>Format: Video recording<br/>
Windows Network security fundamentals
ent://SD_ILS/0/SD_ILS:2333384
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Weadock, Glenn E., presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206">https://learning.oreilly.com/videos/~/0636920671206</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206/?ar">https://learning.oreilly.com/videos/~/0636920671206/?ar</a><br/>Format: Video recording<br/>
Cybersecurity pevention and detection (Video collection).
ent://SD_ILS/0/SD_ILS:2332252
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137929351">https://learning.oreilly.com/videos/~/9780137929351</a>
<a href="https://learning.oreilly.com/videos/~/9780137929351/?ar">https://learning.oreilly.com/videos/~/9780137929351/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137929351/?ar">https://go.oreilly.com/library-access/library/view/-/9780137929351/?ar</a><br/>Format: Video recording<br/>
The complete cybersecurity bootcamp
ent://SD_ILS/0/SD_ILS:2333407
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137949397">https://learning.oreilly.com/videos/~/9780137949397</a>
<a href="https://learning.oreilly.com/videos/~/9780137949397/?ar">https://learning.oreilly.com/videos/~/9780137949397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar">https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar</a><br/>Format: Video recording<br/>
Offensive hacking unfolded. Become a pro Pentester.
ent://SD_ILS/0/SD_ILS:2334688
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Yadav, Avinash, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar">https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781804615294/?ar">https://learning.oreilly.com/videos/~/9781804615294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781804615294">https://learning.oreilly.com/videos/~/9781804615294</a><br/>Format: Video recording<br/>
Web hacker's toolbox : tools used by successful hackers.
ent://SD_ILS/0/SD_ILS:2335459
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Czagan, Dawid, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837632831/?ar">https://learning.oreilly.com/videos/~/9781837632831/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837632831">https://learning.oreilly.com/videos/~/9781837632831</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar</a><br/>Format: Video recording<br/>
Identity and access management fundamentals.
ent://SD_ILS/0/SD_ILS:2335277
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Kohli, Harpreet, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671145/?ar">https://learning.oreilly.com/videos/~/0636920671145/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920671145">https://learning.oreilly.com/videos/~/0636920671145</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar</a><br/>Format: Video recording<br/>
Web hacking expert : full-stack exploitation mastery.
ent://SD_ILS/0/SD_ILS:2335278
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Czagan, Dawid, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717">https://learning.oreilly.com/videos/~/9781837639717</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717/?ar">https://learning.oreilly.com/videos/~/9781837639717/?ar</a><br/>Format: Video recording<br/>
Threat modeling with Owasp Threat Dragon & risk rating a vulnerability.
ent://SD_ILS/0/SD_ILS:2332599
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Fisher, Derek, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202248/?ar">https://learning.oreilly.com/videos/~/10000MNHV202248/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202248">https://learning.oreilly.com/videos/~/10000MNHV202248</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar</a><br/>Format: Video recording<br/>
Finding your cyber security path.
ent://SD_ILS/0/SD_ILS:2332701
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Miller, Alyssa, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202258">https://learning.oreilly.com/videos/~/10000MNHV202258</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202258/?ar">https://learning.oreilly.com/videos/~/10000MNHV202258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar</a><br/>Format: Video recording<br/>
SC-300 : Microsoft Identity and Access Administrator.
ent://SD_ILS/0/SD_ILS:2331717
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Nednur, Anand Rao, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803238043/?ar">https://learning.oreilly.com/videos/~/9781803238043/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803238043">https://learning.oreilly.com/videos/~/9781803238043</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803238043/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238043/?ar</a><br/>Format: Video recording<br/>
Single sign-on and passwordless authentication : an overview.
ent://SD_ILS/0/SD_ILS:2333558
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Ovcharov, Andrey, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202294">https://learning.oreilly.com/videos/~/10000MNHV202294</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202294/?ar">https://learning.oreilly.com/videos/~/10000MNHV202294/?ar</a><br/>Format: Video recording<br/>
Practical cyber hacking skills for beginners.
ent://SD_ILS/0/SD_ILS:2335514
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar">https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181">https://learning.oreilly.com/videos/~/9781837636181</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181/?ar">https://learning.oreilly.com/videos/~/9781837636181/?ar</a><br/>Format: Video recording<br/>
Secure operations and protections
ent://SD_ILS/0/SD_ILS:2332092
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format: Video recording<br/>
Digital forensics for pentesters : hands-on learning.
ent://SD_ILS/0/SD_ILS:2331969
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Krahenbill, Cliff, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803231969">https://learning.oreilly.com/videos/~/9781803231969</a>
<a href="https://learning.oreilly.com/videos/~/9781803231969/?ar">https://learning.oreilly.com/videos/~/9781803231969/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar</a><br/>Format: Video recording<br/>
Certified ethical hacker v11
ent://SD_ILS/0/SD_ILS:2333423
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Bushmiller, Dean, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780996619158/?ar">https://learning.oreilly.com/videos/~/9780996619158/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780996619158">https://learning.oreilly.com/videos/~/9780996619158</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780996619158/?ar">https://go.oreilly.com/library-access/library/view/-/9780996619158/?ar</a><br/>Format: Video recording<br/>
Secrets management with Terraform
ent://SD_ILS/0/SD_ILS:2331925
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Winkler, Scott, author, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202178">https://learning.oreilly.com/videos/~/10000MNLV202178</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202178/?ar">https://learning.oreilly.com/videos/~/10000MNLV202178/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202178/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202178/?ar</a><br/>Format: Video recording<br/>
Securing microservices with Istio Service Mesh
ent://SD_ILS/0/SD_ILS:2331950
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Siriwardena, Prabath, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202172">https://learning.oreilly.com/videos/~/10000MNLV202172</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202172/?ar">https://learning.oreilly.com/videos/~/10000MNLV202172/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar</a><br/>Format: Video recording<br/>
Qi ye shen tou ce shi he chi xu jian kong.
ent://SD_ILS/0/SD_ILS:2332289
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format: Video recording<br/>
Practical cloud security.
ent://SD_ILS/0/SD_ILS:2334616
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Dotson, Chris, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar">https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727">https://learning.oreilly.com/videos/~/9781492060727</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727/?ar">https://learning.oreilly.com/videos/~/9781492060727/?ar</a><br/>Format: Video recording<br/>
Implementing Cisco network security, Part 2.
ent://SD_ILS/0/SD_ILS:2334801
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Pickard, John, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar">https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920303213">https://learning.oreilly.com/videos/~/0636920303213</a>
<a href="https://learning.oreilly.com/videos/~/0636920303213/?ar">https://learning.oreilly.com/videos/~/0636920303213/?ar</a><br/>Format: Video recording<br/>
Hei ke wang luo ying yong : wang luo qin ru ying yong.
ent://SD_ILS/0/SD_ILS:2332288
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a>
<a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format: Video recording<br/>
Preparing and exploring security data for machine learning.
ent://SD_ILS/0/SD_ILS:2334770
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032335">https://learning.oreilly.com/videos/~/9781492032335</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492032335/?ar">https://learning.oreilly.com/videos/~/9781492032335/?ar</a><br/>Format: Video recording<br/>
Supervised machine learning in security applications.
ent://SD_ILS/0/SD_ILS:2334773
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032410">https://learning.oreilly.com/videos/~/9781492032410</a>
<a href="https://learning.oreilly.com/videos/~/9781492032410/?ar">https://learning.oreilly.com/videos/~/9781492032410/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar</a><br/>Format: Video recording<br/>
Unsupervised machine learning in security applications.
ent://SD_ILS/0/SD_ILS:2334784
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032373">https://learning.oreilly.com/videos/~/9781492032373</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492032373/?ar">https://learning.oreilly.com/videos/~/9781492032373/?ar</a><br/>Format: Video recording<br/>
Securing microservices : protect sensitive data in transit and at rest.
ent://SD_ILS/0/SD_ILS:2334787
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Newman, Sam, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar">https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492038986/?ar">https://learning.oreilly.com/videos/~/9781492038986/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492038986">https://learning.oreilly.com/videos/~/9781492038986</a><br/>Format: Video recording<br/>
Managing SSH clients and servers.
ent://SD_ILS/0/SD_ILS:2334344
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Wallen, Jack, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar">https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492031666">https://learning.oreilly.com/videos/~/9781492031666</a>
<a href="https://learning.oreilly.com/videos/~/9781492031666/?ar">https://learning.oreilly.com/videos/~/9781492031666/?ar</a><br/>Format: Video recording<br/>
Forensic analysis of computer memory.
ent://SD_ILS/0/SD_ILS:2334797
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029144">https://learning.oreilly.com/videos/~/9781492029144</a>
<a href="https://learning.oreilly.com/videos/~/9781492029144/?ar">https://learning.oreilly.com/videos/~/9781492029144/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar</a><br/>Format: Video recording<br/>
Capture and analysis of network-based evidence.
ent://SD_ILS/0/SD_ILS:2334767
2024-06-21T14:45:26Z
2024-06-21T14:45:26Z
by Messier, Ric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492029182">https://learning.oreilly.com/videos/~/9781492029182</a>
<a href="https://learning.oreilly.com/videos/~/9781492029182/?ar">https://learning.oreilly.com/videos/~/9781492029182/?ar</a><br/>Format: Video recording<br/>