Search Results for - Narrowed by: Computer networks -- Security measures. - Syst&egrave;mes d'exploitation (Ordinateurs) SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Syst$0025C3$0025A8mes$002bd$002527exploitation$002b$002528Ordinateurs$002529$002509Syst$0025C3$0025A8mes$002bd$002527exploitation$002b$002528Ordinateurs$002529$0026ps$003d300? 2024-06-07T17:43:33Z Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risks ent://SD_ILS/0/SD_ILS:2321954 2024-06-07T17:43:33Z 2024-06-07T17:43:33Z by&#160;Born, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789807608/?ar">https://learning.oreilly.com/library/view/~/9781789807608/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807608">https://learning.oreilly.com/library/view/~/9781789807608</a><br/>Format:&#160;Electronic Resources<br/> Linux security and hardening : the practical security guide ent://SD_ILS/0/SD_ILS:2317860 2024-06-07T17:43:33Z 2024-06-07T17:43:33Z by&#160;Cannon, Jason, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789612820/?ar">https://learning.oreilly.com/videos/~/9781789612820/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789612820/?ar">https://go.oreilly.com/library-access/library/view/-/9781789612820/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:2310018 2024-06-07T17:43:33Z 2024-06-07T17:43:33Z by&#160;Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar">https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128033357/?ar">https://learning.oreilly.com/library/view/~/9780128033357/?ar</a><br/>Format:&#160;Electronic Resources<br/> NX-OS configuration fundamentals ent://SD_ILS/0/SD_ILS:2305892 2024-06-07T17:43:33Z 2024-06-07T17:43:33Z by&#160;Fuller, Ron, 1972- on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134034249/?ar">https://learning.oreilly.com/videos/~/9780134034249/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134034249/?ar">https://go.oreilly.com/library-access/library/view/-/9780134034249/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:2309995 2024-06-07T17:43:33Z 2024-06-07T17:43:33Z by&#160;Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495806/?ar">https://learning.oreilly.com/library/view/~/9781597495806/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mac OS X security and mobility v10.6 ent://SD_ILS/0/SD_ILS:2288654 2024-06-07T17:43:33Z 2024-06-07T17:43:33Z by&#160;Kite, Robert.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321685698/?ar">https://go.oreilly.com/library-access/library/view/-/9780321685698/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321685698/?ar">https://learning.oreilly.com/library/view/~/9780321685698/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mac Security Bible. ent://SD_ILS/0/SD_ILS:2287722 2024-06-07T17:43:33Z 2024-06-07T17:43:33Z by&#160;Kissell, Joe.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar">https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470474198/?ar">https://learning.oreilly.com/library/view/~/9780470474198/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470474198">https://learning.oreilly.com/library/view/~/9780470474198</a><br/>Format:&#160;Electronic Resources<br/> Selecting the right NAP architecture. ent://SD_ILS/0/SD_ILS:2285817 2024-06-07T17:43:33Z 2024-06-07T17:43:33Z by&#160;Microsoft Corporation.<br/><a href="https://learning.oreilly.com/library/view/~/30000LTI00079">https://learning.oreilly.com/library/view/~/30000LTI00079</a> <a href="https://learning.oreilly.com/library/view/~/30000LTI00079/?ar">https://learning.oreilly.com/library/view/~/30000LTI00079/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/30000LTI00079/?ar">https://go.oreilly.com/library-access/library/view/-/30000LTI00079/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2008 Active Directory domain services. ent://SD_ILS/0/SD_ILS:2285826 2024-06-07T17:43:33Z 2024-06-07T17:43:33Z by&#160;Microsoft Corporation.<br/><a href="https://go.oreilly.com/library-access/library/view/-/30000LTI00073/?ar">https://go.oreilly.com/library-access/library/view/-/30000LTI00073/?ar</a> <a href="https://learning.oreilly.com/library/view/~/30000LTI00073/?ar">https://learning.oreilly.com/library/view/~/30000LTI00073/?ar</a> <a href="https://learning.oreilly.com/library/view/~/30000LTI00073">https://learning.oreilly.com/library/view/~/30000LTI00073</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Mac OS X Leopard security ent://SD_ILS/0/SD_ILS:2284628 2024-06-07T17:43:33Z 2024-06-07T17:43:33Z by&#160;Edge, Charles S., Jr.<br/><a href="https://learning.oreilly.com/library/view/~/9781590599891/?ar">https://learning.oreilly.com/library/view/~/9781590599891/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar">https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781590599891">https://learning.oreilly.com/library/view/~/9781590599891</a><br/>Format:&#160;Electronic Resources<br/> SELinux by example : using security enhanced Linux ent://SD_ILS/0/SD_ILS:2283000 2024-06-07T17:43:33Z 2024-06-07T17:43:33Z by&#160;Mayer, Frank, 1961-<br/><a href="https://learning.oreilly.com/library/view/~/0131963694/?ar">https://learning.oreilly.com/library/view/~/0131963694/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131963694/?ar">https://go.oreilly.com/library-access/library/view/-/0131963694/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at Windows system administration using command line scripts ent://SD_ILS/0/SD_ILS:2284108 2024-06-07T17:43:33Z 2024-06-07T17:43:33Z by&#160;Bhardwaj, Pawan K.<br/><a href="https://learning.oreilly.com/library/view/~/1597491055">https://learning.oreilly.com/library/view/~/1597491055</a> <a href="https://www.sciencedirect.com/science/book/9781597491051">https://www.sciencedirect.com/science/book/9781597491051</a> <a href="https://go.oreilly.com/library-access/library/view/-/1597491055/?ar">https://go.oreilly.com/library-access/library/view/-/1597491055/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1597491055/?ar">https://learning.oreilly.com/library/view/~/1597491055/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mac OS X security ent://SD_ILS/0/SD_ILS:2281166 2024-06-07T17:43:33Z 2024-06-07T17:43:33Z by&#160;Potter, Bruce.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735713480/?ar">https://go.oreilly.com/library-access/library/view/-/0735713480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735713480">https://learning.oreilly.com/library/view/~/0735713480</a> <a href="https://learning.oreilly.com/library/view/~/0735713480/?ar">https://learning.oreilly.com/library/view/~/0735713480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux security cookbook ent://SD_ILS/0/SD_ILS:2281262 2024-06-07T17:43:33Z 2024-06-07T17:43:33Z by&#160;Barrett, Daniel J.<br/><a href="https://learning.oreilly.com/library/view/~/0596003919/?ar">https://learning.oreilly.com/library/view/~/0596003919/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596003919/?ar">https://go.oreilly.com/library-access/library/view/-/0596003919/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596003919">https://learning.oreilly.com/library/view/~/0596003919</a><br/>Format:&#160;Electronic Resources<br/>