Search Results for - Narrowed by: Computer networks -- Security measures. - Réseaux d'ordinateurs -- Sécurité -- Mesures. - Sites Web -- Sécurité -- Mesures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dSUBJECT$002509Subject$002509Sites$002bWeb$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509Sites$002bWeb$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300?2024-06-22T17:53:32ZBug bounty hunting for web security : find and exploit vulnerabilities in web sites and applicationsent://SD_ILS/0/SD_ILS:23230372024-06-22T17:53:32Z2024-06-22T17:53:32Zby Sinha, Sanjib, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484253915/?ar">https://learning.oreilly.com/library/view/~/9781484253915/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484253915/?ar">https://go.oreilly.com/library-access/library/view/-/9781484253915/?ar</a><br/>Format: Electronic Resources<br/>Protecting your web applications : solutions and strategies to combat cybersecurity threatsent://SD_ILS/0/SD_ILS:23211662024-06-22T17:53:32Z2024-06-22T17:53:32Zby Sloper, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492052791">https://learning.oreilly.com/library/view/~/9781492052791</a>
<a href="https://learning.oreilly.com/library/view/~/9781492052791/?ar">https://learning.oreilly.com/library/view/~/9781492052791/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar</a><br/>Format: Electronic Resources<br/>Hacking web performance : moving beyond the basics of web performance optimizationent://SD_ILS/0/SD_ILS:23169022024-06-22T17:53:32Z2024-06-22T17:53:32Zby Firtman, Maximiliano R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039426/?ar">https://learning.oreilly.com/library/view/~/9781492039426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039426">https://learning.oreilly.com/library/view/~/9781492039426</a><br/>Format: Electronic Resources<br/>Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linuxent://SD_ILS/0/SD_ILS:23159982024-06-22T17:53:32Z2024-06-22T17:53:32Zby Najera-Gutierrez, Gilberto, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar">https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788623377/?ar">https://learning.oreilly.com/library/view/~/9781788623377/?ar</a><br/>Format: Electronic Resources<br/>How to attack and defend your websiteent://SD_ILS/0/SD_ILS:23059342024-06-22T17:53:32Z2024-06-22T17:53:32Zby Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027325/?ar">https://learning.oreilly.com/library/view/~/9780128027325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027325">https://learning.oreilly.com/library/view/~/9780128027325</a><br/>Format: Electronic Resources<br/>RESTful Java web services security : secure your RESTful applications against common vulnerabilitiesent://SD_ILS/0/SD_ILS:23040942024-06-22T17:53:32Z2024-06-22T17:53:32Zby Enríquez, René.<br/><a href="https://learning.oreilly.com/library/view/~/9781783980109/?ar">https://learning.oreilly.com/library/view/~/9781783980109/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783980109/?ar">https://go.oreilly.com/library-access/library/view/-/9781783980109/?ar</a><br/>Format: Electronic Resources<br/>The basics of web hacking : tools and techniques to attack the webent://SD_ILS/0/SD_ILS:23000582024-06-22T17:53:32Z2024-06-22T17:53:32Zby Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format: Electronic Resources<br/>Hacking exposed : web applications : web application security secrets and solutionsent://SD_ILS/0/SD_ILS:22902732024-06-22T17:53:32Z2024-06-22T17:53:32Zby Scambray, Joel.<br/><a href="https://learning.oreilly.com/library/view/~/9780071740647/?ar">https://learning.oreilly.com/library/view/~/9780071740647/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar">https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar</a><br/>Format: Electronic Resources<br/>CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:22916612024-06-22T17:53:32Z2024-06-22T17:53:32Zby Canavan, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar">https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216/?ar">https://learning.oreilly.com/library/view/~/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216">https://learning.oreilly.com/library/view/~/9780470916216</a><br/>Format: Electronic Resources<br/>Seven deadliest web application attacksent://SD_ILS/0/SD_ILS:22895522024-06-22T17:53:32Z2024-06-22T17:53:32Zby Shema, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495431/?ar">https://learning.oreilly.com/library/view/~/9781597495431/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar</a><br/>Format: Electronic Resources<br/>Botnets the killer web appent://SD_ILS/0/SD_ILS:3401602024-06-22T17:53:32Z2024-06-22T17:53:32Zby Schiller, Craig A.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406</a><br/>Format: Electronic Resources<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:22828732024-06-22T17:53:32Z2024-06-22T17:53:32Zby Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597490610">https://learning.oreilly.com/library/view/~/9781597490610</a>
<a href="https://www.sciencedirect.com/science/book/9781597490610">https://www.sciencedirect.com/science/book/9781597490610</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490610/?ar">https://learning.oreilly.com/library/view/~/9781597490610/?ar</a><br/>Format: Electronic Resources<br/>Botnets : the killer web appent://SD_ILS/0/SD_ILS:22835652024-06-22T17:53:32Z2024-06-22T17:53:32Zby Schiller, Craig A.<br/><a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491358/?ar">https://learning.oreilly.com/library/view/~/9781597491358/?ar</a><br/>Format: Electronic Resources<br/>Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryptionent://SD_ILS/0/SD_ILS:22816702024-06-22T17:53:32Z2024-06-22T17:53:32Zby Rosenberg, Jonathan B., 1956-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672326515/?ar">https://go.oreilly.com/library-access/library/view/-/0672326515/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672326515/?ar">https://learning.oreilly.com/library/view/~/0672326515/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672326515">https://learning.oreilly.com/library/view/~/0672326515</a><br/>Format: Electronic Resources<br/>Web security, privacy and commerceent://SD_ILS/0/SD_ILS:22810882024-06-22T17:53:32Z2024-06-22T17:53:32Zby Garfinkel, Simson.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596000456/?ar">https://go.oreilly.com/library-access/library/view/-/0596000456/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596000456">https://learning.oreilly.com/library/view/~/0596000456</a>
<a href="https://learning.oreilly.com/library/view/~/0596000456/?ar">https://learning.oreilly.com/library/view/~/0596000456/?ar</a><br/>Format: Electronic Resources<br/>Web security & commerceent://SD_ILS/0/SD_ILS:22856812024-06-22T17:53:32Z2024-06-22T17:53:32Zby Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/1565922697/?ar">https://learning.oreilly.com/library/view/~/1565922697/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1565922697">https://learning.oreilly.com/library/view/~/1565922697</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1565922697/?ar">https://go.oreilly.com/library-access/library/view/-/1565922697/?ar</a><br/>Format: Electronic Resources<br/>