Search Results for - Narrowed by: Computer security. - Guides et manuels.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Guides$002bet$002bmanuels.$002509Guides$002bet$002bmanuels.$0026ps$003d300?
2024-05-27T13:16:24Z
The art of hacking : self paced traning kit for cyber security professionals
ent://SD_ILS/0/SD_ILS:2315658
2024-05-27T13:16:24Z
2024-05-27T13:16:24Z
by Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854632/?ar">https://learning.oreilly.com/videos/~/9780134854632/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134854632/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854632/?ar</a><br/>Format: Electronic Resources<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:2316898
2024-05-27T13:16:24Z
2024-05-27T13:16:24Z
by Harper, Allen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260108422/?ar">https://learning.oreilly.com/library/view/~/9781260108422/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260108422/?ar">https://go.oreilly.com/library-access/library/view/-/9781260108422/?ar</a><br/>Format: Electronic Resources<br/>
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
ent://SD_ILS/0/SD_ILS:2315032
2024-05-27T13:16:24Z
2024-05-27T13:16:24Z
by Wallace, Michael, 1960- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814438770/?ar">https://learning.oreilly.com/library/view/~/9780814438770/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar">https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar</a><br/>Format: Electronic Resources<br/>
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
ent://SD_ILS/0/SD_ILS:2311609
2024-05-27T13:16:24Z
2024-05-27T13:16:24Z
by Griffor, Edward R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128038383/?ar">https://learning.oreilly.com/library/view/~/9780128038383/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar">https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128038383">https://learning.oreilly.com/library/view/~/9780128038383</a><br/>Format: Electronic Resources<br/>
Information Security Management Handbook, Volume 6, 6th Edition
ent://SD_ILS/0/SD_ILS:2323397
2024-05-27T13:16:24Z
2024-05-27T13:16:24Z
by Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a>
<a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format: Electronic Resources<br/>
The antivirus hacker's handbook
ent://SD_ILS/0/SD_ILS:2308160
2024-05-27T13:16:24Z
2024-05-27T13:16:24Z
by Koret, Joxean, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119028758/?ar">https://learning.oreilly.com/library/view/~/9781119028758/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119028758/?ar">https://go.oreilly.com/library-access/library/view/-/9781119028758/?ar</a><br/>Format: Electronic Resources<br/>
The security consultant's handbook
ent://SD_ILS/0/SD_ILS:2309072
2024-05-27T13:16:24Z
2024-05-27T13:16:24Z
by Bingley, Richard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287500">https://learning.oreilly.com/library/view/~/9781849287500</a>
<a href="https://learning.oreilly.com/library/view/~/9781849287500/?ar">https://learning.oreilly.com/library/view/~/9781849287500/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar</a><br/>Format: Electronic Resources<br/>
The InfoSec handbook : an introduction to information security
ent://SD_ILS/0/SD_ILS:2304393
2024-05-27T13:16:24Z
2024-05-27T13:16:24Z
by Rao, Umesh Hodeghatta, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263838">https://learning.oreilly.com/library/view/~/9781430263838</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430263838/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263838/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430263838/?ar">https://learning.oreilly.com/library/view/~/9781430263838/?ar</a><br/>Format: Electronic Resources<br/>
Thor's Microsoft security bible : a collection of practical security techniques
ent://SD_ILS/0/SD_ILS:2291971
2024-05-27T13:16:24Z
2024-05-27T13:16:24Z
by Mullen, Timothy M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495738/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495738/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495738/?ar">https://learning.oreilly.com/library/view/~/9781597495738/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495738">https://learning.oreilly.com/library/view/~/9781597495738</a><br/>Format: Electronic Resources<br/>