Search Results for - Narrowed by: Computer networks -- Security measures. - Technologie de l'information -- Gestion. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Technologie$002bde$002bl$002527information$002b--$002bGestion.$002509Technologie$002bde$002bl$002527information$002b--$002bGestion.$0026ps$003d300? 2024-05-25T10:22:20Z Shifting left for application security : bridging the divide between DevOps and security with the right security tools ent://SD_ILS/0/SD_ILS:2332575 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a> <a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:2322126 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Kegerreis, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260453232/?ar">https://learning.oreilly.com/library/view/~/9781260453232/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar">https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data analytics for IT networks : developing innovative use cases ent://SD_ILS/0/SD_ILS:2317559 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format:&#160;Electronic Resources<br/> Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud ent://SD_ILS/0/SD_ILS:2321488 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Berkouwer, Sander, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806984">https://learning.oreilly.com/library/view/~/9781789806984</a> <a href="https://learning.oreilly.com/library/view/~/9781789806984/?ar">https://learning.oreilly.com/library/view/~/9781789806984/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat and vulnerability assessment for enterprises ent://SD_ILS/0/SD_ILS:2319277 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781838559205/?ar">https://learning.oreilly.com/videos/~/9781838559205/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar">https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux troubleshooting course with real life examples ent://SD_ILS/0/SD_ILS:2323238 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format:&#160;Electronic Resources<br/> Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments ent://SD_ILS/0/SD_ILS:2322055 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format:&#160;Electronic Resources<br/> How Lyft migrated to a service mesh with Envoy ent://SD_ILS/0/SD_ILS:2323296 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Hochman, Daniel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338390/?ar">https://learning.oreilly.com/videos/~/0636920338390/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920338390">https://learning.oreilly.com/videos/~/0636920338390</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar</a><br/>Format:&#160;Electronic Resources<br/> Monitoring anti-patterns ent://SD_ILS/0/SD_ILS:2315680 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Julian, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492036791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492036791/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492036791/?ar">https://learning.oreilly.com/library/view/~/9781492036791/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492036791">https://learning.oreilly.com/library/view/~/9781492036791</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:2316874 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Moschovitis, Christos J. P.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781469098753/?ar">https://go.oreilly.com/library-access/library/view/-/9781469098753/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781469098753/?ar">https://learning.oreilly.com/library/view/~/9781469098753/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781469098753">https://learning.oreilly.com/library/view/~/9781469098753</a><br/>Format:&#160;Sound recording<br/> Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOps ent://SD_ILS/0/SD_ILS:2317298 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Hsu, Tony, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788995504/?ar">https://learning.oreilly.com/library/view/~/9781788995504/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995504">https://learning.oreilly.com/library/view/~/9781788995504</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:2316100 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Moschovitis, Christos J. P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119429517/?ar">https://go.oreilly.com/library-access/library/view/-/9781119429517/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119429517/?ar">https://learning.oreilly.com/library/view/~/9781119429517/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119429517">https://learning.oreilly.com/library/view/~/9781119429517</a><br/>Format:&#160;Electronic Resources<br/> Practical monitoring : effective strategies for the real world ent://SD_ILS/0/SD_ILS:2314748 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Julian, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491957349/?ar">https://go.oreilly.com/library-access/library/view/-/9781491957349/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491957349/?ar">https://learning.oreilly.com/library/view/~/9781491957349/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building a modern security program : adapting security for DevOps and cloud ent://SD_ILS/0/SD_ILS:2317166 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Lackey, Zane, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492044680/?ar">https://learning.oreilly.com/library/view/~/9781492044680/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492044680">https://learning.oreilly.com/library/view/~/9781492044680</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492044680/?ar">https://go.oreilly.com/library-access/library/view/-/9781492044680/?ar</a><br/>Format:&#160;Electronic Resources<br/> Modernizing cybersecurity operations with machine intelligence : advanced threat detection, hunting, and analysis ent://SD_ILS/0/SD_ILS:2318456 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Guerra, Peter, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar">https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492035992/?ar">https://learning.oreilly.com/library/view/~/9781492035992/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492035992">https://learning.oreilly.com/library/view/~/9781492035992</a><br/>Format:&#160;Electronic Resources<br/> Ansible quick start guide : Control and monitor infrastructures of any size, physical or virtual ent://SD_ILS/0/SD_ILS:2317798 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Alibi, Mohamed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789532937">https://learning.oreilly.com/library/view/~/9781789532937</a> <a href="https://learning.oreilly.com/library/view/~/9781789532937/?ar">https://learning.oreilly.com/library/view/~/9781789532937/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789532937/?ar">https://go.oreilly.com/library-access/library/view/-/9781789532937/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security handbook : develop a threat model and incident response strategy to build a strong information security framework ent://SD_ILS/0/SD_ILS:2315319 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Death, Darren, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788478830">https://learning.oreilly.com/library/view/~/9781788478830</a> <a href="https://learning.oreilly.com/library/view/~/9781788478830/?ar">https://learning.oreilly.com/library/view/~/9781788478830/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788478830/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478830/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security automation with Ansible 2 : leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis ent://SD_ILS/0/SD_ILS:2315483 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Akula, Madhu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788394512">https://learning.oreilly.com/library/view/~/9781788394512</a> <a href="https://learning.oreilly.com/library/view/~/9781788394512/?ar">https://learning.oreilly.com/library/view/~/9781788394512/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788394512/?ar">https://go.oreilly.com/library-access/library/view/-/9781788394512/?ar</a><br/>Format:&#160;Electronic Resources<br/> Testing practitioner handbook : gain insights into the latest technology and business trends within testing domains ent://SD_ILS/0/SD_ILS:2313029 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Rajani, Renu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788299541/?ar">https://learning.oreilly.com/library/view/~/9781788299541/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar">https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advances in Network Management ent://SD_ILS/0/SD_ILS:2313639 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Ding, Jianguo, author<br/><a href="https://learning.oreilly.com/library/view/~/9781420064551">https://learning.oreilly.com/library/view/~/9781420064551</a> <a href="https://learning.oreilly.com/library/view/~/9781420064551/?ar">https://learning.oreilly.com/library/view/~/9781420064551/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420064551/?ar">https://go.oreilly.com/library-access/library/view/-/9781420064551/?ar</a><br/>Format:&#160;Electronic Resources<br/> DevOpsSec : securing software through continuous delivery ent://SD_ILS/0/SD_ILS:2311196 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Bird, Jim, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491971413/?ar">https://go.oreilly.com/library-access/library/view/-/9781491971413/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491971413/?ar">https://learning.oreilly.com/library/view/~/9781491971413/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491971413">https://learning.oreilly.com/library/view/~/9781491971413</a><br/>Format:&#160;Electronic Resources<br/> Managing Trust in Cyberspace. ent://SD_ILS/0/SD_ILS:2302307 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Thampi, Sabu M.<br/><a href="https://learning.oreilly.com/library/view/~/9781466568457/?ar">https://learning.oreilly.com/library/view/~/9781466568457/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466568457/?ar">https://go.oreilly.com/library-access/library/view/-/9781466568457/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466568457">https://learning.oreilly.com/library/view/~/9781466568457</a><br/>Format:&#160;Electronic Resources<br/> Security program and policies : principles and practices ent://SD_ILS/0/SD_ILS:2302981 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Greene, Sari Stern, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133481181/?ar">https://go.oreilly.com/library-access/library/view/-/9780133481181/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133481181/?ar">https://learning.oreilly.com/library/view/~/9780133481181/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133481181">https://learning.oreilly.com/library/view/~/9780133481181</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2008 Active Directory domain services. ent://SD_ILS/0/SD_ILS:2285826 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Microsoft Corporation.<br/><a href="https://go.oreilly.com/library-access/library/view/-/30000LTI00073/?ar">https://go.oreilly.com/library-access/library/view/-/30000LTI00073/?ar</a> <a href="https://learning.oreilly.com/library/view/~/30000LTI00073/?ar">https://learning.oreilly.com/library/view/~/30000LTI00073/?ar</a> <a href="https://learning.oreilly.com/library/view/~/30000LTI00073">https://learning.oreilly.com/library/view/~/30000LTI00073</a><br/>Format:&#160;Electronic Resources<br/> IT compliance and controls : best practices for implementation ent://SD_ILS/0/SD_ILS:2288533 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;DeLuccia, James J., 1977-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470145012/?ar">https://go.oreilly.com/library-access/library/view/-/9780470145012/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470145012/?ar">https://learning.oreilly.com/library/view/~/9780470145012/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470145012">https://learning.oreilly.com/library/view/~/9780470145012</a><br/>Format:&#160;Electronic Resources<br/> Selecting the right NAP architecture. ent://SD_ILS/0/SD_ILS:2285817 2024-05-25T10:22:20Z 2024-05-25T10:22:20Z by&#160;Microsoft Corporation.<br/><a href="https://learning.oreilly.com/library/view/~/30000LTI00079">https://learning.oreilly.com/library/view/~/30000LTI00079</a> <a href="https://learning.oreilly.com/library/view/~/30000LTI00079/?ar">https://learning.oreilly.com/library/view/~/30000LTI00079/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/30000LTI00079/?ar">https://go.oreilly.com/library-access/library/view/-/30000LTI00079/?ar</a><br/>Format:&#160;Electronic Resources<br/>