Search Results for - Narrowed by: Computer networks -- Security measures. - Ordinateurs -- Acc&egrave;s -- Contr&ocirc;le. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Ordinateurs$002b--$002bAcc$0025C3$0025A8s$002b--$002bContr$0025C3$0025B4le.$002509Ordinateurs$002b--$002bAcc$0025C3$0025A8s$002b--$002bContr$0025C3$0025B4le.$0026ps$003d300$0026isd$003dtrue? 2024-06-16T07:23:03Z Becoming the hacker : the playbook for getting inside the mind of an attacker ent://SD_ILS/0/SD_ILS:2319129 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing ent://SD_ILS/0/SD_ILS:2319847 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network scanning cookbook : practical network security using Nmap and Nessus 7 ent://SD_ILS/0/SD_ILS:2317776 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus ent://SD_ILS/0/SD_ILS:2316700 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux tutorial for beginners ent://SD_ILS/0/SD_ILS:2317579 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Naja, Tarek, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar">https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789615173/?ar">https://learning.oreilly.com/videos/~/9781789615173/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux network scanning cookbook : take your penetration-testing skills to the next level ent://SD_ILS/0/SD_ILS:2313499 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:2314683 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a> <a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format:&#160;Electronic Resources<br/> Understanding intrusion detection systems : detecting attackers and incidents inside your hosts and networks ent://SD_ILS/0/SD_ILS:2311136 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Messier, Ric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491962701/?ar">https://learning.oreilly.com/videos/~/9781491962701/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491962701/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962701/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:2313484 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format:&#160;Electronic Resources<br/> Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments ent://SD_ILS/0/SD_ILS:2309216 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Richter, Andy, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045046/?ar">https://learning.oreilly.com/library/view/~/9780128045046/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128045046/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045046/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques ent://SD_ILS/0/SD_ILS:2310274 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Fadyushin, Vyacheslav, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785283154">https://learning.oreilly.com/library/view/~/9781785283154</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785283154/?ar">https://go.oreilly.com/library-access/library/view/-/9781785283154/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785283154/?ar">https://learning.oreilly.com/library/view/~/9781785283154/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it ent://SD_ILS/0/SD_ILS:2311529 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Cardwell, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar">https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785883491/?ar">https://learning.oreilly.com/library/view/~/9781785883491/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco bring your own device (BYOD) networking ent://SD_ILS/0/SD_ILS:2303678 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Redmon, Kevin.<br/><a href="https://learning.oreilly.com/videos/~/9780133835793/?ar">https://learning.oreilly.com/videos/~/9780133835793/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133835793/?ar">https://go.oreilly.com/library-access/library/view/-/9780133835793/?ar</a><br/>Format:&#160;Electronic Resources<br/> Identity and access management : business performance through connected intelligence ent://SD_ILS/0/SD_ILS:2301931 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Osmanoglu, T. Ertem.<br/><a href="https://learning.oreilly.com/library/view/~/9780124081406/?ar">https://learning.oreilly.com/library/view/~/9780124081406/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124081406">https://learning.oreilly.com/library/view/~/9780124081406</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar">https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:2301150 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Cherry, Denny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000113/?ar">https://learning.oreilly.com/library/view/~/9780128000113/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000113">https://learning.oreilly.com/library/view/~/9780128000113</a><br/>Format:&#160;Electronic Resources<br/> Intrusion detection networks : a key to collaborative security ent://SD_ILS/0/SD_ILS:2301112 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Fung, Carol, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466564121/?ar">https://learning.oreilly.com/library/view/~/9781466564121/?ar</a><br/>Format:&#160;Electronic Resources<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:2302234 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Pathan, Al-Sakib Khan, editor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482203523">https://learning.oreilly.com/library/view/~/9781482203523</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar">https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482203523/?ar">https://learning.oreilly.com/library/view/~/9781482203523/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux ent://SD_ILS/0/SD_ILS:2300350 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Muniz, Joseph.<br/><a href="https://learning.oreilly.com/library/view/~/9781782163169">https://learning.oreilly.com/library/view/~/9781782163169</a> <a href="https://learning.oreilly.com/library/view/~/9781782163169/?ar">https://learning.oreilly.com/library/view/~/9781782163169/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar">https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar</a><br/>Format:&#160;Electronic Resources<br/> AAA identity management security ent://SD_ILS/0/SD_ILS:2290533 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Santuka, Vivek.<br/><a href="https://learning.oreilly.com/library/view/~/9781587141560">https://learning.oreilly.com/library/view/~/9781587141560</a> <a href="https://learning.oreilly.com/library/view/~/9781587141560/?ar">https://learning.oreilly.com/library/view/~/9781587141560/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587141560/?ar">https://go.oreilly.com/library-access/library/view/-/9781587141560/?ar</a><br/>Format:&#160;Electronic Resources<br/> PKI uncovered ent://SD_ILS/0/SD_ILS:2291795 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Karamanian, Andre.<br/><a href="https://learning.oreilly.com/library/view/~/9781587059339/?ar">https://learning.oreilly.com/library/view/~/9781587059339/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587059339/?ar">https://go.oreilly.com/library-access/library/view/-/9781587059339/?ar</a><br/>Format:&#160;Electronic Resources<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:2313566 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Mj&oslash;lsnes, Stig F., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781466506510">https://learning.oreilly.com/library/view/~/9781466506510</a> <a href="https://learning.oreilly.com/library/view/~/9781466506510/?ar">https://learning.oreilly.com/library/view/~/9781466506510/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466506510/?ar">https://go.oreilly.com/library-access/library/view/-/9781466506510/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical intrusion analysis : prevention and detection for the twenty-first century ent://SD_ILS/0/SD_ILS:2286080 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Trost, Ryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591890/?ar">https://learning.oreilly.com/library/view/~/9780321591890/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar</a><br/>Format:&#160;Electronic Resources<br/> Designing an IAM framework with Oracle Identity and access management suite ent://SD_ILS/0/SD_ILS:2289729 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Scheidel, Jeff.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar">https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071741378/?ar">https://learning.oreilly.com/library/view/~/9780071741378/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071741378">https://learning.oreilly.com/library/view/~/9780071741378</a><br/>Format:&#160;Electronic Resources<br/> Integrated Security Systems Design : Concepts, Specifications, and Implementation. ent://SD_ILS/0/SD_ILS:2286958 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Norman, Thomas L.<br/><a href="https://learning.oreilly.com/library/view/~/9780750679091/?ar">https://learning.oreilly.com/library/view/~/9780750679091/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780750679091/?ar">https://go.oreilly.com/library-access/library/view/-/9780750679091/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco NAC appliance : enforcing host security with clean access ent://SD_ILS/0/SD_ILS:2283801 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Heary, Jamey.<br/><a href="https://learning.oreilly.com/library/view/~/9781587053061">https://learning.oreilly.com/library/view/~/9781587053061</a> <a href="https://learning.oreilly.com/library/view/~/9781587053061/?ar">https://learning.oreilly.com/library/view/~/9781587053061/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587053061/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053061/?ar</a><br/>Format:&#160;Electronic Resources<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:2289130 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Beale, Jay.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490993/?ar">https://learning.oreilly.com/library/view/~/9781597490993/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:2287682 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Bayles, Aaron W.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492133/?ar">https://learning.oreilly.com/library/view/~/9781597492133/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492133/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492133/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security tools ent://SD_ILS/0/SD_ILS:2282158 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Clarke, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/0596007949">https://learning.oreilly.com/library/view/~/0596007949</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596007949/?ar">https://go.oreilly.com/library-access/library/view/-/0596007949/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007949/?ar">https://learning.oreilly.com/library/view/~/0596007949/?ar</a><br/>Format:&#160;Electronic Resources<br/> Snort cookbook ent://SD_ILS/0/SD_ILS:2282585 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/0596007914">https://learning.oreilly.com/library/view/~/0596007914</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596007914/?ar">https://go.oreilly.com/library-access/library/view/-/0596007914/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007914/?ar">https://learning.oreilly.com/library/view/~/0596007914/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco Security Agent ent://SD_ILS/0/SD_ILS:2281812 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Sullivan, Chad.<br/><a href="https://learning.oreilly.com/library/view/~/1587052059">https://learning.oreilly.com/library/view/~/1587052059</a> <a href="https://learning.oreilly.com/library/view/~/1587052059/?ar">https://learning.oreilly.com/library/view/~/1587052059/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587052059/?ar">https://go.oreilly.com/library-access/library/view/-/1587052059/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing security with Snort and IDS tools ent://SD_ILS/0/SD_ILS:2291450 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Cox, Kerry.<br/><a href="https://learning.oreilly.com/library/view/~/0596006616">https://learning.oreilly.com/library/view/~/0596006616</a> <a href="https://learning.oreilly.com/library/view/~/0596006616/?ar">https://learning.oreilly.com/library/view/~/0596006616/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596006616/?ar">https://go.oreilly.com/library-access/library/view/-/0596006616/?ar</a><br/>Format:&#160;Electronic Resources<br/> Intrusion detection with Snort ent://SD_ILS/0/SD_ILS:2281704 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/157870281X">https://learning.oreilly.com/library/view/~/157870281X</a> <a href="https://learning.oreilly.com/library/view/~/157870281X/?ar">https://learning.oreilly.com/library/view/~/157870281X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/157870281X/?ar">https://go.oreilly.com/library-access/library/view/-/157870281X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building Internet Firewalls : Internet and Web security ent://SD_ILS/0/SD_ILS:2293287 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Zwicky, Elizabeth D.<br/><a href="https://learning.oreilly.com/library/view/~/1565928717">https://learning.oreilly.com/library/view/~/1565928717</a> <a href="https://learning.oreilly.com/library/view/~/1565928717/?ar">https://learning.oreilly.com/library/view/~/1565928717/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1565928717/?ar">https://go.oreilly.com/library-access/library/view/-/1565928717/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Modelling and Analysis of Security Protocols: the CSP Approach ent://SD_ILS/0/SD_ILS:2326682 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Ryan, P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201674718/?ar">https://go.oreilly.com/library-access/library/view/-/0201674718/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0201674718/?ar">https://learning.oreilly.com/library/view/~/0201674718/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0201674718">https://learning.oreilly.com/library/view/~/0201674718</a><br/>Format:&#160;Electronic Resources<br/> Web security &amp; commerce ent://SD_ILS/0/SD_ILS:2285681 2024-06-16T07:23:03Z 2024-06-16T07:23:03Z by&#160;Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/1565922697/?ar">https://learning.oreilly.com/library/view/~/1565922697/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1565922697">https://learning.oreilly.com/library/view/~/1565922697</a> <a href="https://go.oreilly.com/library-access/library/view/-/1565922697/?ar">https://go.oreilly.com/library-access/library/view/-/1565922697/?ar</a><br/>Format:&#160;Electronic Resources<br/>