Search Results for - Narrowed by: Computer networks -- Security measures. - Systèmes d'exploitation (Ordinateurs)
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Syst$0025C3$0025A8mes$002bd$002527exploitation$002b$002528Ordinateurs$002529$002509Syst$0025C3$0025A8mes$002bd$002527exploitation$002b$002528Ordinateurs$002529$0026ps$003d300$0026isd$003dtrue?
2024-09-26T08:00:23Z
Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risks
ent://SD_ILS/0/SD_ILS:2321954
2024-09-26T08:00:23Z
2024-09-26T08:00:23Z
by Born, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789807608/?ar">https://learning.oreilly.com/library/view/~/9781789807608/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807608">https://learning.oreilly.com/library/view/~/9781789807608</a><br/>Format: Electronic Resources<br/>
Linux security and hardening : the practical security guide
ent://SD_ILS/0/SD_ILS:2317860
2024-09-26T08:00:23Z
2024-09-26T08:00:23Z
by Cannon, Jason, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789612820/?ar">https://learning.oreilly.com/videos/~/9781789612820/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789612820/?ar">https://go.oreilly.com/library-access/library/view/-/9781789612820/?ar</a><br/>Format: Electronic Resources<br/>
Windows registry forensics : advanced digital forensic analysis of the Windows registry
ent://SD_ILS/0/SD_ILS:2310018
2024-09-26T08:00:23Z
2024-09-26T08:00:23Z
by Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar">https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128033357/?ar">https://learning.oreilly.com/library/view/~/9780128033357/?ar</a><br/>Format: Electronic Resources<br/>
NX-OS configuration fundamentals
ent://SD_ILS/0/SD_ILS:2305892
2024-09-26T08:00:23Z
2024-09-26T08:00:23Z
by Fuller, Ron, 1972- on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134034249/?ar">https://learning.oreilly.com/videos/~/9780134034249/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134034249/?ar">https://go.oreilly.com/library-access/library/view/-/9780134034249/?ar</a><br/>Format: Electronic Resources<br/>
Windows registry forensics : advanced digital forensic analysis of the Windows registry
ent://SD_ILS/0/SD_ILS:2309995
2024-09-26T08:00:23Z
2024-09-26T08:00:23Z
by Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495806/?ar">https://learning.oreilly.com/library/view/~/9781597495806/?ar</a><br/>Format: Electronic Resources<br/>
Mac Security Bible.
ent://SD_ILS/0/SD_ILS:2287722
2024-09-26T08:00:23Z
2024-09-26T08:00:23Z
by Kissell, Joe.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar">https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198/?ar">https://learning.oreilly.com/library/view/~/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198">https://learning.oreilly.com/library/view/~/9780470474198</a><br/>Format: Electronic Resources<br/>
Mac OS X security and mobility v10.6
ent://SD_ILS/0/SD_ILS:2288654
2024-09-26T08:00:23Z
2024-09-26T08:00:23Z
by Kite, Robert.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321685698/?ar">https://go.oreilly.com/library-access/library/view/-/9780321685698/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321685698/?ar">https://learning.oreilly.com/library/view/~/9780321685698/?ar</a><br/>Format: Electronic Resources<br/>
Foundations of Mac OS X Leopard security
ent://SD_ILS/0/SD_ILS:2284628
2024-09-26T08:00:23Z
2024-09-26T08:00:23Z
by Edge, Charles S., Jr.<br/><a href="https://learning.oreilly.com/library/view/~/9781590599891/?ar">https://learning.oreilly.com/library/view/~/9781590599891/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar">https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781590599891">https://learning.oreilly.com/library/view/~/9781590599891</a><br/>Format: Electronic Resources<br/>
Selecting the right NAP architecture.
ent://SD_ILS/0/SD_ILS:2285817
2024-09-26T08:00:23Z
2024-09-26T08:00:23Z
by Microsoft Corporation.<br/><a href="https://learning.oreilly.com/library/view/~/30000LTI00079">https://learning.oreilly.com/library/view/~/30000LTI00079</a>
<a href="https://learning.oreilly.com/library/view/~/30000LTI00079/?ar">https://learning.oreilly.com/library/view/~/30000LTI00079/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/30000LTI00079/?ar">https://go.oreilly.com/library-access/library/view/-/30000LTI00079/?ar</a><br/>Format: Electronic Resources<br/>
Windows Server 2008 Active Directory domain services.
ent://SD_ILS/0/SD_ILS:2285826
2024-09-26T08:00:23Z
2024-09-26T08:00:23Z
by Microsoft Corporation.<br/><a href="https://go.oreilly.com/library-access/library/view/-/30000LTI00073/?ar">https://go.oreilly.com/library-access/library/view/-/30000LTI00073/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/30000LTI00073/?ar">https://learning.oreilly.com/library/view/~/30000LTI00073/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/30000LTI00073">https://learning.oreilly.com/library/view/~/30000LTI00073</a><br/>Format: Electronic Resources<br/>
SELinux by example : using security enhanced Linux
ent://SD_ILS/0/SD_ILS:2283000
2024-09-26T08:00:23Z
2024-09-26T08:00:23Z
by Mayer, Frank, 1961-<br/><a href="https://learning.oreilly.com/library/view/~/0131963694/?ar">https://learning.oreilly.com/library/view/~/0131963694/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131963694/?ar">https://go.oreilly.com/library-access/library/view/-/0131963694/?ar</a><br/>Format: Electronic Resources<br/>
How to cheat at Windows system administration using command line scripts
ent://SD_ILS/0/SD_ILS:2284108
2024-09-26T08:00:23Z
2024-09-26T08:00:23Z
by Bhardwaj, Pawan K.<br/><a href="https://learning.oreilly.com/library/view/~/1597491055">https://learning.oreilly.com/library/view/~/1597491055</a>
<a href="https://www.sciencedirect.com/science/book/9781597491051">https://www.sciencedirect.com/science/book/9781597491051</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1597491055/?ar">https://go.oreilly.com/library-access/library/view/-/1597491055/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1597491055/?ar">https://learning.oreilly.com/library/view/~/1597491055/?ar</a><br/>Format: Electronic Resources<br/>
Mac OS X security
ent://SD_ILS/0/SD_ILS:2281166
2024-09-26T08:00:23Z
2024-09-26T08:00:23Z
by Potter, Bruce.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735713480/?ar">https://go.oreilly.com/library-access/library/view/-/0735713480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735713480">https://learning.oreilly.com/library/view/~/0735713480</a>
<a href="https://learning.oreilly.com/library/view/~/0735713480/?ar">https://learning.oreilly.com/library/view/~/0735713480/?ar</a><br/>Format: Electronic Resources<br/>
Linux security cookbook
ent://SD_ILS/0/SD_ILS:2281262
2024-09-26T08:00:23Z
2024-09-26T08:00:23Z
by Barrett, Daniel J.<br/><a href="https://learning.oreilly.com/library/view/~/0596003919/?ar">https://learning.oreilly.com/library/view/~/0596003919/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596003919/?ar">https://go.oreilly.com/library-access/library/view/-/0596003919/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596003919">https://learning.oreilly.com/library/view/~/0596003919</a><br/>Format: Electronic Resources<br/>