Search Results for - Narrowed by: Computer security. - Linux. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Linux.$002509Linux.$0026ps$003d300? 2024-06-13T22:15:59Z Building a Red Hat OpenShift environment on IBM Z ent://SD_ILS/0/SD_ILS:2334093 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Parziale, Lydia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460741/?ar">https://learning.oreilly.com/library/view/~/9780738460741/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460741">https://learning.oreilly.com/library/view/~/9780738460741</a><br/>Format:&#160;Electronic Resources<br/> Red Hat OpenShift container platform for IBM zCX ent://SD_ILS/0/SD_ILS:2334911 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Parziale, Lydia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460871/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460871/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460871/?ar">https://learning.oreilly.com/library/view/~/9780738460871/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460871">https://learning.oreilly.com/library/view/~/9780738460871</a><br/>Format:&#160;Electronic Resources<br/> Mastering Linux Security and Hardening - Second Edition ent://SD_ILS/0/SD_ILS:2324167 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Tevault, Donald A.<br/><a href="https://learning.oreilly.com/library/view/~/9781838981778/?ar">https://learning.oreilly.com/library/view/~/9781838981778/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar">https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838981778">https://learning.oreilly.com/library/view/~/9781838981778</a><br/>Format:&#160;Electronic Resources<br/> Temenos on IBM LinuxONE Best Practices Guide ent://SD_ILS/0/SD_ILS:2323440 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Coble, Deana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458458">https://learning.oreilly.com/library/view/~/9780738458458</a> <a href="https://learning.oreilly.com/library/view/~/9780738458458/?ar">https://learning.oreilly.com/library/view/~/9780738458458/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing your cloud : IBM security for LinuxONE ent://SD_ILS/0/SD_ILS:2321597 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Alves, Edi Lopes, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457949/?ar">https://learning.oreilly.com/library/view/~/9780738457949/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with Linux on Z Encryption for data at-rest ent://SD_ILS/0/SD_ILS:2321973 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738457468/?ar">https://learning.oreilly.com/library/view/~/9780738457468/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux essentials for cybersecurity lab manual ent://SD_ILS/0/SD_ILS:2317558 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux troubleshooting course with real life examples ent://SD_ILS/0/SD_ILS:2323238 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Linux security cookbook : secure your Linux environment from modern-day attacks with practical recipes ent://SD_ILS/0/SD_ILS:2317509 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Kalsi, Tajinder, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789138399/?ar">https://learning.oreilly.com/library/view/~/9781789138399/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789138399/?ar">https://go.oreilly.com/library-access/library/view/-/9781789138399/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats ent://SD_ILS/0/SD_ILS:2315528 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Tevault, Donald A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788620307/?ar">https://go.oreilly.com/library-access/library/view/-/9781788620307/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788620307/?ar">https://learning.oreilly.com/library/view/~/9781788620307/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788620307">https://learning.oreilly.com/library/view/~/9781788620307</a><br/>Format:&#160;Electronic Resources<br/> Linux&reg; hardening in hostile networks : server security from TLS to TOR ent://SD_ILS/0/SD_ILS:2314177 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format:&#160;Electronic Resources<br/> Red Hat Certificate of Expertise in server hardening - exam EX413 training : prepare to take the Red Hat EX413 exam and work towards your RHCA datacenter certification ent://SD_ILS/0/SD_ILS:2312826 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Rothwell, William, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491974483/?ar">https://go.oreilly.com/library-access/library/view/-/9781491974483/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491974483/?ar">https://learning.oreilly.com/videos/~/9781491974483/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux server security : hack and defend ent://SD_ILS/0/SD_ILS:2060102 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Binnie, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4519259">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes ent://SD_ILS/0/SD_ILS:2310585 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Kalsi, Tajinder, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785286421/?ar">https://learning.oreilly.com/library/view/~/9781785286421/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785286421/?ar">https://go.oreilly.com/library-access/library/view/-/9781785286421/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785286421">https://learning.oreilly.com/library/view/~/9781785286421</a><br/>Format:&#160;Electronic Resources<br/> Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes ent://SD_ILS/0/SD_ILS:2271774 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Kalsi, Tajinder, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4659132">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Linux systems ent://SD_ILS/0/SD_ILS:2302388 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Malin, Cameron H.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494700/?ar">https://learning.oreilly.com/library/view/~/9781597494700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security for Linux on System z ent://SD_ILS/0/SD_ILS:2301872 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Parziale, Lydia.<br/><a href="https://learning.oreilly.com/library/view/~/0738437549/?ar">https://learning.oreilly.com/library/view/~/0738437549/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738437549/?ar">https://go.oreilly.com/library-access/library/view/-/0738437549/?ar</a><br/>Format:&#160;Electronic Resources<br/> BackTrack 4 : assuring security by penetration testing ent://SD_ILS/0/SD_ILS:2293871 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Ali, Shakeel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar">https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849513944/?ar">https://learning.oreilly.com/library/view/~/9781849513944/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849513944">https://learning.oreilly.com/library/view/~/9781849513944</a><br/>Format:&#160;Electronic Resources<br/> Designing and implementing Linux firewalls and QoS using Netfilter, Iproute2, NAT, and L7-Filter : learn how to secure your system and implement QoS using real-world scenarios for networks of all sizes ent://SD_ILS/0/SD_ILS:2286352 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Gheorghe, Lucian.<br/><a href="https://learning.oreilly.com/library/view/~/9781904811657/?ar">https://learning.oreilly.com/library/view/~/9781904811657/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781904811657/?ar">https://go.oreilly.com/library-access/library/view/-/9781904811657/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux annoyances for geeks ent://SD_ILS/0/SD_ILS:2282166 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Jang, Michael H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008015/?ar">https://go.oreilly.com/library-access/library/view/-/0596008015/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008015/?ar">https://learning.oreilly.com/library/view/~/0596008015/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008015">https://learning.oreilly.com/library/view/~/0596008015</a><br/>Format:&#160;Electronic Resources<br/> Linux server security ent://SD_ILS/0/SD_ILS:2281596 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Bauer, Michael D.<br/><a href="https://learning.oreilly.com/library/view/~/0596006705">https://learning.oreilly.com/library/view/~/0596006705</a> <a href="https://learning.oreilly.com/library/view/~/0596006705/?ar">https://learning.oreilly.com/library/view/~/0596006705/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596006705/?ar">https://go.oreilly.com/library-access/library/view/-/0596006705/?ar</a><br/>Format:&#160;Electronic Resources<br/> SELINUX : NSA's open source security enhanced Linux ent://SD_ILS/0/SD_ILS:2288931 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;McCarty, Bill, 1953-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596007167/?ar">https://go.oreilly.com/library-access/library/view/-/0596007167/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007167">https://learning.oreilly.com/library/view/~/0596007167</a> <a href="https://learning.oreilly.com/library/view/~/0596007167/?ar">https://learning.oreilly.com/library/view/~/0596007167/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux on IBM eserver zSeries and S/390 best security practices ent://SD_ILS/0/SD_ILS:2304314 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Geiselhart, Gregory.<br/><a href="https://learning.oreilly.com/library/view/~/0738497665/?ar">https://learning.oreilly.com/library/view/~/0738497665/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738497665/?ar">https://go.oreilly.com/library-access/library/view/-/0738497665/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738497665">https://learning.oreilly.com/library/view/~/0738497665</a><br/>Format:&#160;Electronic Resources<br/> Linux on IBM eServer zSeries and S/390 : Best Security Practices. ent://SD_ILS/0/SD_ILS:1310226 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306835">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking Linux exposed ent://SD_ILS/0/SD_ILS:47680 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Hatch, Brian.<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003269974.html">http://www.loc.gov/catdir/bios/mh042/2003269974.html</a> Publisher description <a href="http://www.loc.gov/catdir/description/mh031/2003269974.html">http://www.loc.gov/catdir/description/mh031/2003269974.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/mh031/2003269974.html">http://www.loc.gov/catdir/toc/mh031/2003269974.html</a><br/>Format:&#160;Books<br/> Hacking Linux exposed ent://SD_ILS/0/SD_ILS:15945 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Hatch, Brian.<br/>Format:&#160;Books<br/> Linux Security. ent://SD_ILS/0/SD_ILS:1304458 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Siddiqui, Shadab.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135705">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing Linux : A Guide to Open Source Security. ent://SD_ILS/0/SD_ILS:1192041 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Stanger, James.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294152">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Linux a guide to open source security ent://SD_ILS/0/SD_ILS:65665 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z by&#160;Stanger, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994343">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Maximum Linux security : a hacker's guide to protecting your Linux server and workstation ent://SD_ILS/0/SD_ILS:2281137 2024-06-13T22:15:59Z 2024-06-13T22:15:59Z <a href="https://learning.oreilly.com/library/view/~/0672316706/?ar">https://learning.oreilly.com/library/view/~/0672316706/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0672316706/?ar">https://go.oreilly.com/library-access/library/view/-/0672316706/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672316706">https://learning.oreilly.com/library/view/~/0672316706</a><br/>Format:&#160;Electronic Resources<br/>