Search Results for - Narrowed by: Computer networks -- Security measures. - Ordinateurs -- Accès -- Contrôle.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Ordinateurs$002b--$002bAcc$0025C3$0025A8s$002b--$002bContr$0025C3$0025B4le.$002509Ordinateurs$002b--$002bAcc$0025C3$0025A8s$002b--$002bContr$0025C3$0025B4le.$0026ps$003d300$0026isd$003dtrue?
2024-06-16T07:23:03Z
Becoming the hacker : the playbook for getting inside the mind of an attacker
ent://SD_ILS/0/SD_ILS:2319129
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Electronic Resources<br/>
Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing
ent://SD_ILS/0/SD_ILS:2319847
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format: Electronic Resources<br/>
Network scanning cookbook : practical network security using Nmap and Nessus 7
ent://SD_ILS/0/SD_ILS:2317776
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format: Electronic Resources<br/>
Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus
ent://SD_ILS/0/SD_ILS:2316700
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format: Electronic Resources<br/>
Kali Linux tutorial for beginners
ent://SD_ILS/0/SD_ILS:2317579
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Naja, Tarek, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar">https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789615173/?ar">https://learning.oreilly.com/videos/~/9781789615173/?ar</a><br/>Format: Electronic Resources<br/>
Kali Linux network scanning cookbook : take your penetration-testing skills to the next level
ent://SD_ILS/0/SD_ILS:2313499
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format: Electronic Resources<br/>
Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions
ent://SD_ILS/0/SD_ILS:2314683
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a>
<a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format: Electronic Resources<br/>
Understanding intrusion detection systems : detecting attackers and incidents inside your hosts and networks
ent://SD_ILS/0/SD_ILS:2311136
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Messier, Ric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491962701/?ar">https://learning.oreilly.com/videos/~/9781491962701/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491962701/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962701/?ar</a><br/>Format: Electronic Resources<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:2313484
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format: Electronic Resources<br/>
Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments
ent://SD_ILS/0/SD_ILS:2309216
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Richter, Andy, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045046/?ar">https://learning.oreilly.com/library/view/~/9780128045046/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128045046/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045046/?ar</a><br/>Format: Electronic Resources<br/>
Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques
ent://SD_ILS/0/SD_ILS:2310274
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Fadyushin, Vyacheslav, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785283154">https://learning.oreilly.com/library/view/~/9781785283154</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785283154/?ar">https://go.oreilly.com/library-access/library/view/-/9781785283154/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785283154/?ar">https://learning.oreilly.com/library/view/~/9781785283154/?ar</a><br/>Format: Electronic Resources<br/>
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
ent://SD_ILS/0/SD_ILS:2311529
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Cardwell, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar">https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785883491/?ar">https://learning.oreilly.com/library/view/~/9781785883491/?ar</a><br/>Format: Electronic Resources<br/>
Cisco bring your own device (BYOD) networking
ent://SD_ILS/0/SD_ILS:2303678
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Redmon, Kevin.<br/><a href="https://learning.oreilly.com/videos/~/9780133835793/?ar">https://learning.oreilly.com/videos/~/9780133835793/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133835793/?ar">https://go.oreilly.com/library-access/library/view/-/9780133835793/?ar</a><br/>Format: Electronic Resources<br/>
Identity and access management : business performance through connected intelligence
ent://SD_ILS/0/SD_ILS:2301931
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Osmanoglu, T. Ertem.<br/><a href="https://learning.oreilly.com/library/view/~/9780124081406/?ar">https://learning.oreilly.com/library/view/~/9780124081406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124081406">https://learning.oreilly.com/library/view/~/9780124081406</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar">https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar</a><br/>Format: Electronic Resources<br/>
The basics of digital privacy : simple tools to protect your personal information and your identity online
ent://SD_ILS/0/SD_ILS:2301150
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Cherry, Denny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113/?ar">https://learning.oreilly.com/library/view/~/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113">https://learning.oreilly.com/library/view/~/9780128000113</a><br/>Format: Electronic Resources<br/>
Intrusion detection networks : a key to collaborative security
ent://SD_ILS/0/SD_ILS:2301112
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Fung, Carol, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564121/?ar">https://learning.oreilly.com/library/view/~/9781466564121/?ar</a><br/>Format: Electronic Resources<br/>
The state of the art in intrusion prevention and detection
ent://SD_ILS/0/SD_ILS:2302234
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Pathan, Al-Sakib Khan, editor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482203523">https://learning.oreilly.com/library/view/~/9781482203523</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar">https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482203523/?ar">https://learning.oreilly.com/library/view/~/9781482203523/?ar</a><br/>Format: Electronic Resources<br/>
Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux
ent://SD_ILS/0/SD_ILS:2300350
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Muniz, Joseph.<br/><a href="https://learning.oreilly.com/library/view/~/9781782163169">https://learning.oreilly.com/library/view/~/9781782163169</a>
<a href="https://learning.oreilly.com/library/view/~/9781782163169/?ar">https://learning.oreilly.com/library/view/~/9781782163169/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar">https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar</a><br/>Format: Electronic Resources<br/>
AAA identity management security
ent://SD_ILS/0/SD_ILS:2290533
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Santuka, Vivek.<br/><a href="https://learning.oreilly.com/library/view/~/9781587141560">https://learning.oreilly.com/library/view/~/9781587141560</a>
<a href="https://learning.oreilly.com/library/view/~/9781587141560/?ar">https://learning.oreilly.com/library/view/~/9781587141560/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587141560/?ar">https://go.oreilly.com/library-access/library/view/-/9781587141560/?ar</a><br/>Format: Electronic Resources<br/>
PKI uncovered
ent://SD_ILS/0/SD_ILS:2291795
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Karamanian, Andre.<br/><a href="https://learning.oreilly.com/library/view/~/9781587059339/?ar">https://learning.oreilly.com/library/view/~/9781587059339/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587059339/?ar">https://go.oreilly.com/library-access/library/view/-/9781587059339/?ar</a><br/>Format: Electronic Resources<br/>
A multidisciplinary introduction to information security
ent://SD_ILS/0/SD_ILS:2313566
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Mjølsnes, Stig F., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781466506510">https://learning.oreilly.com/library/view/~/9781466506510</a>
<a href="https://learning.oreilly.com/library/view/~/9781466506510/?ar">https://learning.oreilly.com/library/view/~/9781466506510/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466506510/?ar">https://go.oreilly.com/library-access/library/view/-/9781466506510/?ar</a><br/>Format: Electronic Resources<br/>
Practical intrusion analysis : prevention and detection for the twenty-first century
ent://SD_ILS/0/SD_ILS:2286080
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Trost, Ryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591890/?ar">https://learning.oreilly.com/library/view/~/9780321591890/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar</a><br/>Format: Electronic Resources<br/>
Designing an IAM framework with Oracle Identity and access management suite
ent://SD_ILS/0/SD_ILS:2289729
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Scheidel, Jeff.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar">https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071741378/?ar">https://learning.oreilly.com/library/view/~/9780071741378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071741378">https://learning.oreilly.com/library/view/~/9780071741378</a><br/>Format: Electronic Resources<br/>
Integrated Security Systems Design : Concepts, Specifications, and Implementation.
ent://SD_ILS/0/SD_ILS:2286958
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Norman, Thomas L.<br/><a href="https://learning.oreilly.com/library/view/~/9780750679091/?ar">https://learning.oreilly.com/library/view/~/9780750679091/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750679091/?ar">https://go.oreilly.com/library-access/library/view/-/9780750679091/?ar</a><br/>Format: Electronic Resources<br/>
Cisco NAC appliance : enforcing host security with clean access
ent://SD_ILS/0/SD_ILS:2283801
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Heary, Jamey.<br/><a href="https://learning.oreilly.com/library/view/~/9781587053061">https://learning.oreilly.com/library/view/~/9781587053061</a>
<a href="https://learning.oreilly.com/library/view/~/9781587053061/?ar">https://learning.oreilly.com/library/view/~/9781587053061/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587053061/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053061/?ar</a><br/>Format: Electronic Resources<br/>
Snort : IDS and IPS toolkit
ent://SD_ILS/0/SD_ILS:2289130
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Beale, Jay.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490993/?ar">https://learning.oreilly.com/library/view/~/9781597490993/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Electronic Resources<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:2287682
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Bayles, Aaron W.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492133/?ar">https://learning.oreilly.com/library/view/~/9781597492133/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492133/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492133/?ar</a><br/>Format: Electronic Resources<br/>
Network security tools
ent://SD_ILS/0/SD_ILS:2282158
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Clarke, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/0596007949">https://learning.oreilly.com/library/view/~/0596007949</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596007949/?ar">https://go.oreilly.com/library-access/library/view/-/0596007949/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007949/?ar">https://learning.oreilly.com/library/view/~/0596007949/?ar</a><br/>Format: Electronic Resources<br/>
Snort cookbook
ent://SD_ILS/0/SD_ILS:2282585
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/0596007914">https://learning.oreilly.com/library/view/~/0596007914</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596007914/?ar">https://go.oreilly.com/library-access/library/view/-/0596007914/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007914/?ar">https://learning.oreilly.com/library/view/~/0596007914/?ar</a><br/>Format: Electronic Resources<br/>
Cisco Security Agent
ent://SD_ILS/0/SD_ILS:2281812
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Sullivan, Chad.<br/><a href="https://learning.oreilly.com/library/view/~/1587052059">https://learning.oreilly.com/library/view/~/1587052059</a>
<a href="https://learning.oreilly.com/library/view/~/1587052059/?ar">https://learning.oreilly.com/library/view/~/1587052059/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587052059/?ar">https://go.oreilly.com/library-access/library/view/-/1587052059/?ar</a><br/>Format: Electronic Resources<br/>
Managing security with Snort and IDS tools
ent://SD_ILS/0/SD_ILS:2291450
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Cox, Kerry.<br/><a href="https://learning.oreilly.com/library/view/~/0596006616">https://learning.oreilly.com/library/view/~/0596006616</a>
<a href="https://learning.oreilly.com/library/view/~/0596006616/?ar">https://learning.oreilly.com/library/view/~/0596006616/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006616/?ar">https://go.oreilly.com/library-access/library/view/-/0596006616/?ar</a><br/>Format: Electronic Resources<br/>
Intrusion detection with Snort
ent://SD_ILS/0/SD_ILS:2281704
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/157870281X">https://learning.oreilly.com/library/view/~/157870281X</a>
<a href="https://learning.oreilly.com/library/view/~/157870281X/?ar">https://learning.oreilly.com/library/view/~/157870281X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/157870281X/?ar">https://go.oreilly.com/library-access/library/view/-/157870281X/?ar</a><br/>Format: Electronic Resources<br/>
Building Internet Firewalls : Internet and Web security
ent://SD_ILS/0/SD_ILS:2293287
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Zwicky, Elizabeth D.<br/><a href="https://learning.oreilly.com/library/view/~/1565928717">https://learning.oreilly.com/library/view/~/1565928717</a>
<a href="https://learning.oreilly.com/library/view/~/1565928717/?ar">https://learning.oreilly.com/library/view/~/1565928717/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1565928717/?ar">https://go.oreilly.com/library-access/library/view/-/1565928717/?ar</a><br/>Format: Electronic Resources<br/>
The Modelling and Analysis of Security Protocols: the CSP Approach
ent://SD_ILS/0/SD_ILS:2326682
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Ryan, P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201674718/?ar">https://go.oreilly.com/library-access/library/view/-/0201674718/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201674718/?ar">https://learning.oreilly.com/library/view/~/0201674718/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201674718">https://learning.oreilly.com/library/view/~/0201674718</a><br/>Format: Electronic Resources<br/>
Web security & commerce
ent://SD_ILS/0/SD_ILS:2285681
2024-06-16T07:23:03Z
2024-06-16T07:23:03Z
by Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/1565922697/?ar">https://learning.oreilly.com/library/view/~/1565922697/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1565922697">https://learning.oreilly.com/library/view/~/1565922697</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1565922697/?ar">https://go.oreilly.com/library-access/library/view/-/1565922697/?ar</a><br/>Format: Electronic Resources<br/>