Search Results for - Narrowed by: Computer networks. - Sécurité informatique.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks.$002509Computer$002bnetworks.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300$0026isd$003dtrue?
2024-06-20T23:35:26Z
Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory.
ent://SD_ILS/0/SD_ILS:2331787
2024-06-20T23:35:26Z
2024-06-20T23:35:26Z
by Ostrovskaya, Svetlana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070331">https://learning.oreilly.com/library/view/~/9781801070331</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070331/?ar">https://learning.oreilly.com/library/view/~/9781801070331/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar</a><br/>Format: Electronic Resources<br/>
Real-world cryptography
ent://SD_ILS/0/SD_ILS:2332808
2024-06-20T23:35:26Z
2024-06-20T23:35:26Z
by Wong, David (Cryptography engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617296710AU">https://learning.oreilly.com/library/view/~/9781617296710AU</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710AU/?ar">https://learning.oreilly.com/library/view/~/9781617296710AU/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar</a><br/>Format: Sound recording<br/>
Real-world cryptography
ent://SD_ILS/0/SD_ILS:2330383
2024-06-20T23:35:26Z
2024-06-20T23:35:26Z
by Wong, David (Cryptography engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710">https://learning.oreilly.com/library/view/~/9781617296710</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710/?ar">https://learning.oreilly.com/library/view/~/9781617296710/?ar</a><br/>Format: Electronic Resources<br/>
Real-world cryptography
ent://SD_ILS/0/SD_ILS:2332150
2024-06-20T23:35:26Z
2024-06-20T23:35:26Z
by Wong, David, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781617296710VE">https://learning.oreilly.com/videos/~/9781617296710VE</a>
<a href="https://learning.oreilly.com/videos/~/9781617296710VE/?ar">https://learning.oreilly.com/videos/~/9781617296710VE/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar</a><br/>Format: Video recording<br/>
Securing AI.
ent://SD_ILS/0/SD_ILS:2332134
2024-06-20T23:35:26Z
2024-06-20T23:35:26Z
by Manjengwa, Shingai, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar">https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920672319/?ar">https://learning.oreilly.com/videos/~/0636920672319/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920672319">https://learning.oreilly.com/videos/~/0636920672319</a><br/>Format: Video recording<br/>
CompTIA Security+ SY0-601 Certification Guide - Second Edition
ent://SD_ILS/0/SD_ILS:2327971
2024-06-20T23:35:26Z
2024-06-20T23:35:26Z
by Neil, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781800564244">https://learning.oreilly.com/library/view/~/9781800564244</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar">https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800564244/?ar">https://learning.oreilly.com/library/view/~/9781800564244/?ar</a><br/>Format: Electronic Resources<br/>
Demystifying Internet of Things security : successful IoT device/edge and platform security deployment
ent://SD_ILS/0/SD_ILS:2321696
2024-06-20T23:35:26Z
2024-06-20T23:35:26Z
by Cheruvu, Sunil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484228968/?ar">https://learning.oreilly.com/library/view/~/9781484228968/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228968">https://learning.oreilly.com/library/view/~/9781484228968</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484228968/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228968/?ar</a><br/>Format: Electronic Resources<br/>
Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware
ent://SD_ILS/0/SD_ILS:2325847
2024-06-20T23:35:26Z
2024-06-20T23:35:26Z
by Mohanta, Abhijit.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261934">https://learning.oreilly.com/library/view/~/9781484261934</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261934/?ar">https://learning.oreilly.com/library/view/~/9781484261934/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar</a><br/>Format: Electronic Resources<br/>
Zabbix 4 network monitoring : monitor the performance of your network devices and applications using the all-new Zabbix 4.0
ent://SD_ILS/0/SD_ILS:2319010
2024-06-20T23:35:26Z
2024-06-20T23:35:26Z
by Uytterhoeven, Patrik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340266/?ar">https://learning.oreilly.com/library/view/~/9781789340266/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar</a><br/>Format: Electronic Resources<br/>
System administration ethics : ten commandments for security and compliance in a modern cyber world
ent://SD_ILS/0/SD_ILS:2322866
2024-06-20T23:35:26Z
2024-06-20T23:35:26Z
by Ljubuncic, Igor, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249888/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249888/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484249888/?ar">https://learning.oreilly.com/library/view/~/9781484249888/?ar</a><br/>Format: Electronic Resources<br/>
Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0
ent://SD_ILS/0/SD_ILS:2311316
2024-06-20T23:35:26Z
2024-06-20T23:35:26Z
by Olups, Rihards, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782161288/?ar">https://learning.oreilly.com/library/view/~/9781782161288/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782161288/?ar">https://go.oreilly.com/library-access/library/view/-/9781782161288/?ar</a><br/>Format: Electronic Resources<br/>
Mastering Windows Server 2012 R2
ent://SD_ILS/0/SD_ILS:2301152
2024-06-20T23:35:26Z
2024-06-20T23:35:26Z
by Minasi, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar">https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118289426/?ar">https://learning.oreilly.com/library/view/~/9781118289426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118289426">https://learning.oreilly.com/library/view/~/9781118289426</a><br/>Format: Electronic Resources<br/>
Enhanced networking on IBM z/VSE
ent://SD_ILS/0/SD_ILS:2302413
2024-06-20T23:35:26Z
2024-06-20T23:35:26Z
by Schmidbauer, Joerg.<br/><a href="https://learning.oreilly.com/library/view/~/0738439088/?ar">https://learning.oreilly.com/library/view/~/0738439088/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738439088/?ar">https://go.oreilly.com/library-access/library/view/-/0738439088/?ar</a><br/>Format: Electronic Resources<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:2288720
2024-06-20T23:35:26Z
2024-06-20T23:35:26Z
by Haines, Brad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417/?ar">https://learning.oreilly.com/library/view/~/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417">https://learning.oreilly.com/library/view/~/9781597495417</a><br/>Format: Electronic Resources<br/>
Securing Windows server 2008 : prevent attacks from outside and inside your organization.
ent://SD_ILS/0/SD_ILS:2285141
2024-06-20T23:35:26Z
2024-06-20T23:35:26Z
<a href="https://learning.oreilly.com/library/view/~/9781597492805">https://learning.oreilly.com/library/view/~/9781597492805</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492805/?ar">https://learning.oreilly.com/library/view/~/9781597492805/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar</a><br/>Format: Electronic Resources<br/>