Search Results for - Narrowed by: Computer networks -- Security measures. - R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures. - Sites Web -- S&eacute;curit&eacute; -- Mesures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dSUBJECT$002509Subject$002509Sites$002bWeb$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509Sites$002bWeb$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300? 2024-06-22T17:53:32Z Bug bounty hunting for web security : find and exploit vulnerabilities in web sites and applications ent://SD_ILS/0/SD_ILS:2323037 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Sinha, Sanjib, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484253915/?ar">https://learning.oreilly.com/library/view/~/9781484253915/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484253915/?ar">https://go.oreilly.com/library-access/library/view/-/9781484253915/?ar</a><br/>Format:&#160;Electronic Resources<br/> Protecting your web applications : solutions and strategies to combat cybersecurity threats ent://SD_ILS/0/SD_ILS:2321166 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Sloper, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492052791">https://learning.oreilly.com/library/view/~/9781492052791</a> <a href="https://learning.oreilly.com/library/view/~/9781492052791/?ar">https://learning.oreilly.com/library/view/~/9781492052791/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking web performance : moving beyond the basics of web performance optimization ent://SD_ILS/0/SD_ILS:2316902 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Firtman, Maximiliano R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492039426/?ar">https://learning.oreilly.com/library/view/~/9781492039426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492039426">https://learning.oreilly.com/library/view/~/9781492039426</a><br/>Format:&#160;Electronic Resources<br/> Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linux ent://SD_ILS/0/SD_ILS:2315998 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Najera-Gutierrez, Gilberto, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar">https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788623377/?ar">https://learning.oreilly.com/library/view/~/9781788623377/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to attack and defend your website ent://SD_ILS/0/SD_ILS:2305934 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128027325/?ar">https://learning.oreilly.com/library/view/~/9780128027325/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128027325">https://learning.oreilly.com/library/view/~/9780128027325</a><br/>Format:&#160;Electronic Resources<br/> RESTful Java web services security : secure your RESTful applications against common vulnerabilities ent://SD_ILS/0/SD_ILS:2304094 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Enr&iacute;quez, Ren&eacute;.<br/><a href="https://learning.oreilly.com/library/view/~/9781783980109/?ar">https://learning.oreilly.com/library/view/~/9781783980109/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783980109/?ar">https://go.oreilly.com/library-access/library/view/-/9781783980109/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of web hacking : tools and techniques to attack the web ent://SD_ILS/0/SD_ILS:2300058 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed : web applications : web application security secrets and solutions ent://SD_ILS/0/SD_ILS:2290273 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Scambray, Joel.<br/><a href="https://learning.oreilly.com/library/view/~/9780071740647/?ar">https://learning.oreilly.com/library/view/~/9780071740647/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar">https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar</a><br/>Format:&#160;Electronic Resources<br/> CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:2291661 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Canavan, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar">https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470916216/?ar">https://learning.oreilly.com/library/view/~/9780470916216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470916216">https://learning.oreilly.com/library/view/~/9780470916216</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:2289552 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Shema, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495431/?ar">https://learning.oreilly.com/library/view/~/9781597495431/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar</a><br/>Format:&#160;Electronic Resources<br/> Botnets the killer web app ent://SD_ILS/0/SD_ILS:340160 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Schiller, Craig A.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406</a><br/>Format:&#160;Electronic Resources<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:2282873 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597490610">https://learning.oreilly.com/library/view/~/9781597490610</a> <a href="https://www.sciencedirect.com/science/book/9781597490610">https://www.sciencedirect.com/science/book/9781597490610</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490610/?ar">https://learning.oreilly.com/library/view/~/9781597490610/?ar</a><br/>Format:&#160;Electronic Resources<br/> Botnets : the killer web app ent://SD_ILS/0/SD_ILS:2283565 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Schiller, Craig A.<br/><a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491358/?ar">https://learning.oreilly.com/library/view/~/9781597491358/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption ent://SD_ILS/0/SD_ILS:2281670 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Rosenberg, Jonathan B., 1956-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672326515/?ar">https://go.oreilly.com/library-access/library/view/-/0672326515/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672326515/?ar">https://learning.oreilly.com/library/view/~/0672326515/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672326515">https://learning.oreilly.com/library/view/~/0672326515</a><br/>Format:&#160;Electronic Resources<br/> Web security, privacy and commerce ent://SD_ILS/0/SD_ILS:2281088 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Garfinkel, Simson.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596000456/?ar">https://go.oreilly.com/library-access/library/view/-/0596000456/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596000456">https://learning.oreilly.com/library/view/~/0596000456</a> <a href="https://learning.oreilly.com/library/view/~/0596000456/?ar">https://learning.oreilly.com/library/view/~/0596000456/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web security &amp; commerce ent://SD_ILS/0/SD_ILS:2285681 2024-06-22T17:53:32Z 2024-06-22T17:53:32Z by&#160;Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/1565922697/?ar">https://learning.oreilly.com/library/view/~/1565922697/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1565922697">https://learning.oreilly.com/library/view/~/1565922697</a> <a href="https://go.oreilly.com/library-access/library/view/-/1565922697/?ar">https://go.oreilly.com/library-access/library/view/-/1565922697/?ar</a><br/>Format:&#160;Electronic Resources<br/>