Search Results for - Narrowed by: Computer security. - Safari, an O'Reilly Media Company. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dAUTHOR$002509Author$002509Safari$00252C$002ban$002bO$002527Reilly$002bMedia$002bCompany.$002509Safari$00252C$002ban$002bO$002527Reilly$002bMedia$002bCompany.$0026ps$003d300? 2024-05-28T13:18:56Z Getting started with IBM Hyper Protect Data Controller ent://SD_ILS/0/SD_ILS:2331451 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format:&#160;Electronic Resources<br/> Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environment ent://SD_ILS/0/SD_ILS:2330315 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800202092/?ar">https://learning.oreilly.com/library/view/~/9781800202092/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800202092">https://learning.oreilly.com/library/view/~/9781800202092</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with z/OS Data Set Encryption ent://SD_ILS/0/SD_ILS:2331252 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a> <a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise DevOps for Architects ent://SD_ILS/0/SD_ILS:2330978 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Mulder, Jeroen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801812153">https://learning.oreilly.com/library/view/~/9781801812153</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812153/?ar">https://learning.oreilly.com/library/view/~/9781801812153/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Security, 2nd Edition ent://SD_ILS/0/SD_ILS:2331101 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a> <a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber Warfare - Truth, Tactics, and Strategies ent://SD_ILS/0/SD_ILS:2323667 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a> <a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format:&#160;Electronic Resources<br/> Protecting Data Privacy Beyond the Trusted System of Record ent://SD_ILS/0/SD_ILS:2323918 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a> <a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format:&#160;Electronic Resources<br/> Build Your Own Cybersecurity Testing Lab : Low-cost Solutions for Testing in Virtual and Cloud-based Environments ent://SD_ILS/0/SD_ILS:2323438 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260458329">https://learning.oreilly.com/library/view/~/9781260458329</a> <a href="https://learning.oreilly.com/library/view/~/9781260458329/?ar">https://learning.oreilly.com/library/view/~/9781260458329/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar">https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar</a><br/>Format:&#160;Electronic Resources<br/> Temenos on IBM LinuxONE Best Practices Guide ent://SD_ILS/0/SD_ILS:2323440 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Coble, Deana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458458">https://learning.oreilly.com/library/view/~/9780738458458</a> <a href="https://learning.oreilly.com/library/view/~/9780738458458/?ar">https://learning.oreilly.com/library/view/~/9780738458458/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM Security Key Lifecycle Manager ent://SD_ILS/0/SD_ILS:2323982 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Chen, An, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458786/?ar">https://learning.oreilly.com/library/view/~/9780738458786/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458786">https://learning.oreilly.com/library/view/~/9780738458786</a><br/>Format:&#160;Electronic Resources<br/> Mastering VMware NSX for vSphere ent://SD_ILS/0/SD_ILS:2327302 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119513544">https://learning.oreilly.com/library/view/~/9781119513544</a> <a href="https://learning.oreilly.com/library/view/~/9781119513544/?ar">https://learning.oreilly.com/library/view/~/9781119513544/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar">https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing For Dummies ent://SD_ILS/0/SD_ILS:2327218 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Shimonski, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119577485/?ar">https://learning.oreilly.com/library/view/~/9781119577485/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119577485/?ar">https://go.oreilly.com/library-access/library/view/-/9781119577485/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119577485">https://learning.oreilly.com/library/view/~/9781119577485</a><br/>Format:&#160;Electronic Resources<br/> The Complete Ethical Hacking Course ent://SD_ILS/0/SD_ILS:2323185 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber-Vigilance and Digital Trust ent://SD_ILS/0/SD_ILS:2324869 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Tounsi, Wiem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786304483">https://learning.oreilly.com/library/view/~/9781786304483</a> <a href="https://learning.oreilly.com/library/view/~/9781786304483/?ar">https://learning.oreilly.com/library/view/~/9781786304483/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with Ghidra ent://SD_ILS/0/SD_ILS:2322605 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar">https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098115265/?ar">https://learning.oreilly.com/library/view/~/9781098115265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098115265">https://learning.oreilly.com/library/view/~/9781098115265</a><br/>Format:&#160;Electronic Resources<br/> Securing DevOps ent://SD_ILS/0/SD_ILS:2319465 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Vehent, Julien, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar">https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617294136">https://learning.oreilly.com/library/view/~/9781617294136</a> <a href="https://learning.oreilly.com/library/view/~/9781617294136/?ar">https://learning.oreilly.com/library/view/~/9781617294136/?ar</a><br/>Format:&#160;Electronic Resources<br/> The CISO Handbook ent://SD_ILS/0/SD_ILS:2323677 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Gentile, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031379">https://learning.oreilly.com/library/view/~/9781420031379</a> <a href="https://learning.oreilly.com/library/view/~/9781420031379/?ar">https://learning.oreilly.com/library/view/~/9781420031379/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer Security Literacy ent://SD_ILS/0/SD_ILS:2323426 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Jacobson, Douglas, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856192/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856192/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439856192/?ar">https://learning.oreilly.com/library/view/~/9781439856192/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439856192">https://learning.oreilly.com/library/view/~/9781439856192</a><br/>Format:&#160;Electronic Resources<br/> The Complete Guide to Cybersecurity Risks and Controls ent://SD_ILS/0/SD_ILS:2324524 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Kohnke, Anne, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar">https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781498740579/?ar">https://learning.oreilly.com/library/view/~/9781498740579/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781498740579">https://learning.oreilly.com/library/view/~/9781498740579</a><br/>Format:&#160;Electronic Resources<br/> Information Security Management Handbook, Volume 6, 6th Edition ent://SD_ILS/0/SD_ILS:2323397 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a> <a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security for Wireless Sensor Networks using Identity-Based Cryptography ent://SD_ILS/0/SD_ILS:2327286 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Patil, Harsh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439869024">https://learning.oreilly.com/library/view/~/9781439869024</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar">https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439869024/?ar">https://learning.oreilly.com/library/view/~/9781439869024/?ar</a><br/>Format:&#160;Electronic Resources<br/> Set Up Security and Integration with the DataPower XI50z for zEnterprise ent://SD_ILS/0/SD_ILS:2323901 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Credle, Rufus, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738436348/?ar">https://learning.oreilly.com/library/view/~/0738436348/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738436348">https://learning.oreilly.com/library/view/~/0738436348</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738436348/?ar">https://go.oreilly.com/library-access/library/view/-/0738436348/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure and Resilient Software ent://SD_ILS/0/SD_ILS:2323699 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Merkow, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439866221/?ar">https://learning.oreilly.com/library/view/~/9781439866221/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439866221/?ar">https://go.oreilly.com/library-access/library/view/-/9781439866221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439866221">https://learning.oreilly.com/library/view/~/9781439866221</a><br/>Format:&#160;Electronic Resources<br/> Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators ent://SD_ILS/0/SD_ILS:2326866 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Long, Johnny, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080553979/?ar">https://go.oreilly.com/library-access/library/view/-/9780080553979/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080553979/?ar">https://learning.oreilly.com/library/view/~/9780080553979/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080553979">https://learning.oreilly.com/library/view/~/9780080553979</a><br/>Format:&#160;Electronic Resources<br/> Biometrics for Network Security ent://SD_ILS/0/SD_ILS:2326814 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Reid, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131015494">https://learning.oreilly.com/library/view/~/0131015494</a> <a href="https://learning.oreilly.com/library/view/~/0131015494/?ar">https://learning.oreilly.com/library/view/~/0131015494/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131015494/?ar">https://go.oreilly.com/library-access/library/view/-/0131015494/?ar</a><br/>Format:&#160;Electronic Resources<br/> J2EE&trade; Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice ent://SD_ILS/0/SD_ILS:2326839 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Kumar, Pankaj, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131402641/?ar">https://learning.oreilly.com/library/view/~/0131402641/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131402641">https://learning.oreilly.com/library/view/~/0131402641</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131402641/?ar">https://go.oreilly.com/library-access/library/view/-/0131402641/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing, Third Edition ent://SD_ILS/0/SD_ILS:2326579 2024-05-28T13:18:56Z 2024-05-28T13:18:56Z by&#160;Pfleeger, Charles, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0130355488/?ar">https://go.oreilly.com/library-access/library/view/-/0130355488/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0130355488/?ar">https://learning.oreilly.com/library/view/~/0130355488/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0130355488">https://learning.oreilly.com/library/view/~/0130355488</a><br/>Format:&#160;Electronic Resources<br/>