Search Results for - Narrowed by: Computer security. - O'Reilly for Higher Education (Firm), distributor.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dAUTHOR$002509Author$002509O$002527Reilly$002bfor$002bHigher$002bEducation$002b$002528Firm$002529$00252C$002bdistributor.$002509O$002527Reilly$002bfor$002bHigher$002bEducation$002b$002528Firm$002529$00252C$002bdistributor.$0026ps$003d300?
2024-05-24T03:15:02Z
Enterprise DevOps for Architects
ent://SD_ILS/0/SD_ILS:2330978
2024-05-24T03:15:02Z
2024-05-24T03:15:02Z
by Mulder, Jeroen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801812153">https://learning.oreilly.com/library/view/~/9781801812153</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812153/?ar">https://learning.oreilly.com/library/view/~/9781801812153/?ar</a><br/>Format: Electronic Resources<br/>
Getting Started with z/OS Data Set Encryption
ent://SD_ILS/0/SD_ILS:2331252
2024-05-24T03:15:02Z
2024-05-24T03:15:02Z
by White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format: Electronic Resources<br/>
Penetration Testing For Dummies
ent://SD_ILS/0/SD_ILS:2327218
2024-05-24T03:15:02Z
2024-05-24T03:15:02Z
by Shimonski, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119577485/?ar">https://learning.oreilly.com/library/view/~/9781119577485/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119577485/?ar">https://go.oreilly.com/library-access/library/view/-/9781119577485/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119577485">https://learning.oreilly.com/library/view/~/9781119577485</a><br/>Format: Electronic Resources<br/>
Mastering VMware NSX for vSphere
ent://SD_ILS/0/SD_ILS:2327302
2024-05-24T03:15:02Z
2024-05-24T03:15:02Z
by Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119513544">https://learning.oreilly.com/library/view/~/9781119513544</a>
<a href="https://learning.oreilly.com/library/view/~/9781119513544/?ar">https://learning.oreilly.com/library/view/~/9781119513544/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar">https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar</a><br/>Format: Electronic Resources<br/>
Security for Wireless Sensor Networks using Identity-Based Cryptography
ent://SD_ILS/0/SD_ILS:2327286
2024-05-24T03:15:02Z
2024-05-24T03:15:02Z
by Patil, Harsh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439869024">https://learning.oreilly.com/library/view/~/9781439869024</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar">https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439869024/?ar">https://learning.oreilly.com/library/view/~/9781439869024/?ar</a><br/>Format: Electronic Resources<br/>
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators
ent://SD_ILS/0/SD_ILS:2326866
2024-05-24T03:15:02Z
2024-05-24T03:15:02Z
by Long, Johnny, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080553979/?ar">https://go.oreilly.com/library-access/library/view/-/9780080553979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080553979/?ar">https://learning.oreilly.com/library/view/~/9780080553979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080553979">https://learning.oreilly.com/library/view/~/9780080553979</a><br/>Format: Electronic Resources<br/>
Biometrics for Network Security
ent://SD_ILS/0/SD_ILS:2326814
2024-05-24T03:15:02Z
2024-05-24T03:15:02Z
by Reid, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131015494">https://learning.oreilly.com/library/view/~/0131015494</a>
<a href="https://learning.oreilly.com/library/view/~/0131015494/?ar">https://learning.oreilly.com/library/view/~/0131015494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131015494/?ar">https://go.oreilly.com/library-access/library/view/-/0131015494/?ar</a><br/>Format: Electronic Resources<br/>
J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice
ent://SD_ILS/0/SD_ILS:2326839
2024-05-24T03:15:02Z
2024-05-24T03:15:02Z
by Kumar, Pankaj, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131402641/?ar">https://learning.oreilly.com/library/view/~/0131402641/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131402641">https://learning.oreilly.com/library/view/~/0131402641</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131402641/?ar">https://go.oreilly.com/library-access/library/view/-/0131402641/?ar</a><br/>Format: Electronic Resources<br/>
Security in Computing, Third Edition
ent://SD_ILS/0/SD_ILS:2326579
2024-05-24T03:15:02Z
2024-05-24T03:15:02Z
by Pfleeger, Charles, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0130355488/?ar">https://go.oreilly.com/library-access/library/view/-/0130355488/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0130355488/?ar">https://learning.oreilly.com/library/view/~/0130355488/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0130355488">https://learning.oreilly.com/library/view/~/0130355488</a><br/>Format: Electronic Resources<br/>