Search Results for - Narrowed by: Computer networks -- Security measures. - R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures -- Guides, manuels, etc. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures$002b--$002bGuides$00252C$002bmanuels$00252C$002betc.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures$002b--$002bGuides$00252C$002bmanuels$00252C$002betc.$0026ps$003d300? 2024-06-14T11:00:09Z The art of hacking : self paced traning kit for cyber security professionals ent://SD_ILS/0/SD_ILS:2315658 2024-06-14T11:00:09Z 2024-06-14T11:00:09Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854632/?ar">https://learning.oreilly.com/videos/~/9780134854632/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134854632/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854632/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices ent://SD_ILS/0/SD_ILS:2311174 2024-06-14T11:00:09Z 2024-06-14T11:00:09Z by&#160;Steadman, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785283925/?ar">https://learning.oreilly.com/library/view/~/9781785283925/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785283925">https://learning.oreilly.com/library/view/~/9781785283925</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785283925/?ar">https://go.oreilly.com/library-access/library/view/-/9781785283925/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced penetration testing for highly-secured environments : employee the most advanced pentesting techniques and tools to build highly-secured systems and environments ent://SD_ILS/0/SD_ILS:2310257 2024-06-14T11:00:09Z 2024-06-14T11:00:09Z by&#160;Allen, Lee (Information security specialist), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784395810/?ar">https://learning.oreilly.com/library/view/~/9781784395810/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781784395810/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395810/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information assurance handbook : effective computer security and risk management strategies ent://SD_ILS/0/SD_ILS:2304875 2024-06-14T11:00:09Z 2024-06-14T11:00:09Z by&#160;Schou, Corey.<br/><a href="https://learning.oreilly.com/library/view/~/9780071821650">https://learning.oreilly.com/library/view/~/9780071821650</a> <a href="https://learning.oreilly.com/library/view/~/9780071821650/?ar">https://learning.oreilly.com/library/view/~/9780071821650/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar">https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar</a><br/>Format:&#160;Electronic Resources<br/> The antivirus hacker's handbook ent://SD_ILS/0/SD_ILS:2308160 2024-06-14T11:00:09Z 2024-06-14T11:00:09Z by&#160;Koret, Joxean, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119028758/?ar">https://learning.oreilly.com/library/view/~/9781119028758/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119028758/?ar">https://go.oreilly.com/library-access/library/view/-/9781119028758/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners ent://SD_ILS/0/SD_ILS:2300447 2024-06-14T11:00:09Z 2024-06-14T11:00:09Z by&#160;Andress, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166721/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166721/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124166721/?ar">https://learning.oreilly.com/library/view/~/9780124166721/?ar</a><br/>Format:&#160;Electronic Resources<br/> The computer incident response planning handbook : executable plans for protecting information at risk ent://SD_ILS/0/SD_ILS:2296325 2024-06-14T11:00:09Z 2024-06-14T11:00:09Z by&#160;McCarthy, N. K.<br/><a href="https://learning.oreilly.com/library/view/~/9780071790390/?ar">https://learning.oreilly.com/library/view/~/9780071790390/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071790390/?ar">https://go.oreilly.com/library-access/library/view/-/9780071790390/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071790390">https://learning.oreilly.com/library/view/~/9780071790390</a><br/>Format:&#160;Electronic Resources<br/> Handbook on securing cyber-physical critical infrastructure : foundation and challenges ent://SD_ILS/0/SD_ILS:2295661 2024-06-14T11:00:09Z 2024-06-14T11:00:09Z by&#160;Das, Sajal K.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124158153/?ar">https://go.oreilly.com/library-access/library/view/-/9780124158153/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124158153/?ar">https://learning.oreilly.com/library/view/~/9780124158153/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management ent://SD_ILS/0/SD_ILS:2296031 2024-06-14T11:00:09Z 2024-06-14T11:00:09Z by&#160;Nordstr&ouml;m, Kent.<br/><a href="https://learning.oreilly.com/library/view/~/9781849685368/?ar">https://learning.oreilly.com/library/view/~/9781849685368/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849685368/?ar">https://go.oreilly.com/library-access/library/view/-/9781849685368/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849685368">https://learning.oreilly.com/library/view/~/9781849685368</a><br/>Format:&#160;Electronic Resources<br/> Cyber warfare : techniques, tactics and tools for security practitioners ent://SD_ILS/0/SD_ILS:2292501 2024-06-14T11:00:09Z 2024-06-14T11:00:09Z by&#160;Andress, Jason.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496377/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496377/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496377/?ar">https://learning.oreilly.com/library/view/~/9781597496377/?ar</a><br/>Format:&#160;Electronic Resources<br/> GFI network security and PCI compliance power tools ent://SD_ILS/0/SD_ILS:2286159 2024-06-14T11:00:09Z 2024-06-14T11:00:09Z by&#160;Posey, Brien.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492850/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492850/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492850/?ar">https://learning.oreilly.com/library/view/~/9781597492850/?ar</a><br/>Format:&#160;Electronic Resources<br/> Syngress IT security project management handbook ent://SD_ILS/0/SD_ILS:2282299 2024-06-14T11:00:09Z 2024-06-14T11:00:09Z by&#160;Snedaker, Susan.<br/><a href="https://learning.oreilly.com/library/view/~/1597490768/?ar">https://learning.oreilly.com/library/view/~/1597490768/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1597490768/?ar">https://go.oreilly.com/library-access/library/view/-/1597490768/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1597490768">https://learning.oreilly.com/library/view/~/1597490768</a> <a href="https://www.sciencedirect.com/science/book/9781597490764">https://www.sciencedirect.com/science/book/9781597490764</a><br/>Format:&#160;Electronic Resources<br/> Cisco network security troubleshooting handbook ent://SD_ILS/0/SD_ILS:2282339 2024-06-14T11:00:09Z 2024-06-14T11:00:09Z by&#160;Hoda, Mynul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587051893/?ar">https://go.oreilly.com/library-access/library/view/-/1587051893/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587051893">https://learning.oreilly.com/library/view/~/1587051893</a> <a href="https://learning.oreilly.com/library/view/~/1587051893/?ar">https://learning.oreilly.com/library/view/~/1587051893/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Windows server 2003 ent://SD_ILS/0/SD_ILS:2282552 2024-06-14T11:00:09Z 2024-06-14T11:00:09Z by&#160;Danseglio, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/0596006853">https://learning.oreilly.com/library/view/~/0596006853</a> <a href="https://learning.oreilly.com/library/view/~/0596006853/?ar">https://learning.oreilly.com/library/view/~/0596006853/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596006853/?ar">https://go.oreilly.com/library-access/library/view/-/0596006853/?ar</a><br/>Format:&#160;Electronic Resources<br/> Scene of the cybercrime : computer forensics handbook ent://SD_ILS/0/SD_ILS:2280756 2024-06-14T11:00:09Z 2024-06-14T11:00:09Z by&#160;Shinder, Debra Littlejohn, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836654">https://learning.oreilly.com/library/view/~/9781931836654</a> <a href="https://learning.oreilly.com/library/view/~/9781931836654/?ar">https://learning.oreilly.com/library/view/~/9781931836654/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781931836654">https://www.sciencedirect.com/science/book/9781931836654</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836654/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836654/?ar</a><br/>Format:&#160;Electronic Resources<br/>