Search Results for - Narrowed by: Computer networks -- Security measures. - Technologie de l'information -- Gestion.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Technologie$002bde$002bl$002527information$002b--$002bGestion.$002509Technologie$002bde$002bl$002527information$002b--$002bGestion.$0026ps$003d300$0026isd$003dtrue?2024-09-23T04:50:33ZShifting left for application security : bridging the divide between DevOps and security with the right security toolsent://SD_ILS/0/SD_ILS:23325752024-09-23T04:50:33Z2024-09-23T04:50:33Zby Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format: Electronic Resources<br/>IT auditing : using controls to protect information assetsent://SD_ILS/0/SD_ILS:23221262024-09-23T04:50:33Z2024-09-23T04:50:33Zby Kegerreis, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260453232/?ar">https://learning.oreilly.com/library/view/~/9781260453232/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar">https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar</a><br/>Format: Electronic Resources<br/>Data analytics for IT networks : developing innovative use casesent://SD_ILS/0/SD_ILS:23175592024-09-23T04:50:33Z2024-09-23T04:50:33Zby Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format: Electronic Resources<br/>How Lyft migrated to a service mesh with Envoyent://SD_ILS/0/SD_ILS:23232962024-09-23T04:50:33Z2024-09-23T04:50:33Zby Hochman, Daniel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338390/?ar">https://learning.oreilly.com/videos/~/0636920338390/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920338390">https://learning.oreilly.com/videos/~/0636920338390</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar</a><br/>Format: Electronic Resources<br/>Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environmentsent://SD_ILS/0/SD_ILS:23220552024-09-23T04:50:33Z2024-09-23T04:50:33Zby Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format: Electronic Resources<br/>Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloudent://SD_ILS/0/SD_ILS:23214882024-09-23T04:50:33Z2024-09-23T04:50:33Zby Berkouwer, Sander, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806984">https://learning.oreilly.com/library/view/~/9781789806984</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806984/?ar">https://learning.oreilly.com/library/view/~/9781789806984/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar</a><br/>Format: Electronic Resources<br/>Linux troubleshooting course with real life examplesent://SD_ILS/0/SD_ILS:23232382024-09-23T04:50:33Z2024-09-23T04:50:33Zby Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format: Electronic Resources<br/>Threat and vulnerability assessment for enterprisesent://SD_ILS/0/SD_ILS:23192772024-09-23T04:50:33Z2024-09-23T04:50:33Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781838559205/?ar">https://learning.oreilly.com/videos/~/9781838559205/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar">https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar</a><br/>Format: Electronic Resources<br/>Building a modern security program : adapting security for DevOps and cloudent://SD_ILS/0/SD_ILS:23171662024-09-23T04:50:33Z2024-09-23T04:50:33Zby Lackey, Zane, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492044680/?ar">https://learning.oreilly.com/library/view/~/9781492044680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492044680">https://learning.oreilly.com/library/view/~/9781492044680</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492044680/?ar">https://go.oreilly.com/library-access/library/view/-/9781492044680/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity program development for business : the essential planning guideent://SD_ILS/0/SD_ILS:23168742024-09-23T04:50:33Z2024-09-23T04:50:33Zby Moschovitis, Christos J. P.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781469098753/?ar">https://go.oreilly.com/library-access/library/view/-/9781469098753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469098753/?ar">https://learning.oreilly.com/library/view/~/9781469098753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469098753">https://learning.oreilly.com/library/view/~/9781469098753</a><br/>Format: Sound recording<br/>Ansible quick start guide : Control and monitor infrastructures of any size, physical or virtualent://SD_ILS/0/SD_ILS:23177982024-09-23T04:50:33Z2024-09-23T04:50:33Zby Alibi, Mohamed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789532937">https://learning.oreilly.com/library/view/~/9781789532937</a>
<a href="https://learning.oreilly.com/library/view/~/9781789532937/?ar">https://learning.oreilly.com/library/view/~/9781789532937/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789532937/?ar">https://go.oreilly.com/library-access/library/view/-/9781789532937/?ar</a><br/>Format: Electronic Resources<br/>Modernizing cybersecurity operations with machine intelligence : advanced threat detection, hunting, and analysisent://SD_ILS/0/SD_ILS:23184562024-09-23T04:50:33Z2024-09-23T04:50:33Zby Guerra, Peter, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar">https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492035992/?ar">https://learning.oreilly.com/library/view/~/9781492035992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492035992">https://learning.oreilly.com/library/view/~/9781492035992</a><br/>Format: Electronic Resources<br/>Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOpsent://SD_ILS/0/SD_ILS:23172982024-09-23T04:50:33Z2024-09-23T04:50:33Zby Hsu, Tony, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788995504/?ar">https://learning.oreilly.com/library/view/~/9781788995504/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995504">https://learning.oreilly.com/library/view/~/9781788995504</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity program development for business : the essential planning guideent://SD_ILS/0/SD_ILS:23161002024-09-23T04:50:33Z2024-09-23T04:50:33Zby Moschovitis, Christos J. P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119429517/?ar">https://go.oreilly.com/library-access/library/view/-/9781119429517/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119429517/?ar">https://learning.oreilly.com/library/view/~/9781119429517/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119429517">https://learning.oreilly.com/library/view/~/9781119429517</a><br/>Format: Electronic Resources<br/>Practical monitoring : effective strategies for the real worldent://SD_ILS/0/SD_ILS:23147482024-09-23T04:50:33Z2024-09-23T04:50:33Zby Julian, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491957349/?ar">https://go.oreilly.com/library-access/library/view/-/9781491957349/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491957349/?ar">https://learning.oreilly.com/library/view/~/9781491957349/?ar</a><br/>Format: Electronic Resources<br/>Monitoring anti-patternsent://SD_ILS/0/SD_ILS:23156802024-09-23T04:50:33Z2024-09-23T04:50:33Zby Julian, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492036791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492036791/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492036791/?ar">https://learning.oreilly.com/library/view/~/9781492036791/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492036791">https://learning.oreilly.com/library/view/~/9781492036791</a><br/>Format: Electronic Resources<br/>Information security handbook : develop a threat model and incident response strategy to build a strong information security frameworkent://SD_ILS/0/SD_ILS:23153192024-09-23T04:50:33Z2024-09-23T04:50:33Zby Death, Darren, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788478830">https://learning.oreilly.com/library/view/~/9781788478830</a>
<a href="https://learning.oreilly.com/library/view/~/9781788478830/?ar">https://learning.oreilly.com/library/view/~/9781788478830/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788478830/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478830/?ar</a><br/>Format: Electronic Resources<br/>Security automation with Ansible 2 : leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysisent://SD_ILS/0/SD_ILS:23154832024-09-23T04:50:33Z2024-09-23T04:50:33Zby Akula, Madhu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788394512">https://learning.oreilly.com/library/view/~/9781788394512</a>
<a href="https://learning.oreilly.com/library/view/~/9781788394512/?ar">https://learning.oreilly.com/library/view/~/9781788394512/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788394512/?ar">https://go.oreilly.com/library-access/library/view/-/9781788394512/?ar</a><br/>Format: Electronic Resources<br/>Testing practitioner handbook : gain insights into the latest technology and business trends within testing domainsent://SD_ILS/0/SD_ILS:23130292024-09-23T04:50:33Z2024-09-23T04:50:33Zby Rajani, Renu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788299541/?ar">https://learning.oreilly.com/library/view/~/9781788299541/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar">https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar</a><br/>Format: Electronic Resources<br/>Advances in Network Managementent://SD_ILS/0/SD_ILS:23136392024-09-23T04:50:33Z2024-09-23T04:50:33Zby Ding, Jianguo, author<br/><a href="https://learning.oreilly.com/library/view/~/9781420064551">https://learning.oreilly.com/library/view/~/9781420064551</a>
<a href="https://learning.oreilly.com/library/view/~/9781420064551/?ar">https://learning.oreilly.com/library/view/~/9781420064551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420064551/?ar">https://go.oreilly.com/library-access/library/view/-/9781420064551/?ar</a><br/>Format: Electronic Resources<br/>DevOpsSec : securing software through continuous deliveryent://SD_ILS/0/SD_ILS:23111962024-09-23T04:50:33Z2024-09-23T04:50:33Zby Bird, Jim, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491971413/?ar">https://go.oreilly.com/library-access/library/view/-/9781491971413/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491971413/?ar">https://learning.oreilly.com/library/view/~/9781491971413/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491971413">https://learning.oreilly.com/library/view/~/9781491971413</a><br/>Format: Electronic Resources<br/>Managing Trust in Cyberspace.ent://SD_ILS/0/SD_ILS:23023072024-09-23T04:50:33Z2024-09-23T04:50:33Zby Thampi, Sabu M.<br/><a href="https://learning.oreilly.com/library/view/~/9781466568457/?ar">https://learning.oreilly.com/library/view/~/9781466568457/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466568457/?ar">https://go.oreilly.com/library-access/library/view/-/9781466568457/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466568457">https://learning.oreilly.com/library/view/~/9781466568457</a><br/>Format: Electronic Resources<br/>Security program and policies : principles and practicesent://SD_ILS/0/SD_ILS:23029812024-09-23T04:50:33Z2024-09-23T04:50:33Zby Greene, Sari Stern, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133481181/?ar">https://go.oreilly.com/library-access/library/view/-/9780133481181/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133481181/?ar">https://learning.oreilly.com/library/view/~/9780133481181/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133481181">https://learning.oreilly.com/library/view/~/9780133481181</a><br/>Format: Electronic Resources<br/>Selecting the right NAP architecture.ent://SD_ILS/0/SD_ILS:22858172024-09-23T04:50:33Z2024-09-23T04:50:33Zby Microsoft Corporation.<br/><a href="https://learning.oreilly.com/library/view/~/30000LTI00079">https://learning.oreilly.com/library/view/~/30000LTI00079</a>
<a href="https://learning.oreilly.com/library/view/~/30000LTI00079/?ar">https://learning.oreilly.com/library/view/~/30000LTI00079/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/30000LTI00079/?ar">https://go.oreilly.com/library-access/library/view/-/30000LTI00079/?ar</a><br/>Format: Electronic Resources<br/>Windows Server 2008 Active Directory domain services.ent://SD_ILS/0/SD_ILS:22858262024-09-23T04:50:33Z2024-09-23T04:50:33Zby Microsoft Corporation.<br/><a href="https://go.oreilly.com/library-access/library/view/-/30000LTI00073/?ar">https://go.oreilly.com/library-access/library/view/-/30000LTI00073/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/30000LTI00073/?ar">https://learning.oreilly.com/library/view/~/30000LTI00073/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/30000LTI00073">https://learning.oreilly.com/library/view/~/30000LTI00073</a><br/>Format: Electronic Resources<br/>IT compliance and controls : best practices for implementationent://SD_ILS/0/SD_ILS:22885332024-09-23T04:50:33Z2024-09-23T04:50:33Zby DeLuccia, James J., 1977-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470145012/?ar">https://go.oreilly.com/library-access/library/view/-/9780470145012/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470145012/?ar">https://learning.oreilly.com/library/view/~/9780470145012/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470145012">https://learning.oreilly.com/library/view/~/9780470145012</a><br/>Format: Electronic Resources<br/>