Search Results for - Narrowed by: Computer security. - Linux.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Linux.$002509Linux.$0026ps$003d300$0026isd$003dtrue?2024-06-20T01:04:38ZRed Hat OpenShift container platform for IBM zCXent://SD_ILS/0/SD_ILS:23349112024-06-20T01:04:38Z2024-06-20T01:04:38Zby Parziale, Lydia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460871/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460871/?ar">https://learning.oreilly.com/library/view/~/9780738460871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460871">https://learning.oreilly.com/library/view/~/9780738460871</a><br/>Format: Electronic Resources<br/>Building a Red Hat OpenShift environment on IBM Zent://SD_ILS/0/SD_ILS:23340932024-06-20T01:04:38Z2024-06-20T01:04:38Zby Parziale, Lydia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460741/?ar">https://learning.oreilly.com/library/view/~/9780738460741/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460741">https://learning.oreilly.com/library/view/~/9780738460741</a><br/>Format: Electronic Resources<br/>Mastering Linux Security and Hardening - Second Editionent://SD_ILS/0/SD_ILS:23241672024-06-20T01:04:38Z2024-06-20T01:04:38Zby Tevault, Donald A.<br/><a href="https://learning.oreilly.com/library/view/~/9781838981778/?ar">https://learning.oreilly.com/library/view/~/9781838981778/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar">https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838981778">https://learning.oreilly.com/library/view/~/9781838981778</a><br/>Format: Electronic Resources<br/>Temenos on IBM LinuxONE Best Practices Guideent://SD_ILS/0/SD_ILS:23234402024-06-20T01:04:38Z2024-06-20T01:04:38Zby Coble, Deana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458458">https://learning.oreilly.com/library/view/~/9780738458458</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458458/?ar">https://learning.oreilly.com/library/view/~/9780738458458/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar</a><br/>Format: Electronic Resources<br/>Getting started with Linux on Z Encryption for data at-restent://SD_ILS/0/SD_ILS:23219732024-06-20T01:04:38Z2024-06-20T01:04:38Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738457468/?ar">https://learning.oreilly.com/library/view/~/9780738457468/?ar</a><br/>Format: Electronic Resources<br/>Linux troubleshooting course with real life examplesent://SD_ILS/0/SD_ILS:23232382024-06-20T01:04:38Z2024-06-20T01:04:38Zby Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format: Electronic Resources<br/>Securing your cloud : IBM security for LinuxONEent://SD_ILS/0/SD_ILS:23215972024-06-20T01:04:38Z2024-06-20T01:04:38Zby Alves, Edi Lopes, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457949/?ar">https://learning.oreilly.com/library/view/~/9780738457949/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar</a><br/>Format: Electronic Resources<br/>Linux essentials for cybersecurity lab manualent://SD_ILS/0/SD_ILS:23175582024-06-20T01:04:38Z2024-06-20T01:04:38Zby Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format: Electronic Resources<br/>Practical Linux security cookbook : secure your Linux environment from modern-day attacks with practical recipesent://SD_ILS/0/SD_ILS:23175092024-06-20T01:04:38Z2024-06-20T01:04:38Zby Kalsi, Tajinder, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789138399/?ar">https://learning.oreilly.com/library/view/~/9781789138399/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789138399/?ar">https://go.oreilly.com/library-access/library/view/-/9781789138399/?ar</a><br/>Format: Electronic Resources<br/>Linux® hardening in hostile networks : server security from TLS to TORent://SD_ILS/0/SD_ILS:23141772024-06-20T01:04:38Z2024-06-20T01:04:38Zby Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format: Electronic Resources<br/>Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threatsent://SD_ILS/0/SD_ILS:23155282024-06-20T01:04:38Z2024-06-20T01:04:38Zby Tevault, Donald A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788620307/?ar">https://go.oreilly.com/library-access/library/view/-/9781788620307/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788620307/?ar">https://learning.oreilly.com/library/view/~/9781788620307/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788620307">https://learning.oreilly.com/library/view/~/9781788620307</a><br/>Format: Electronic Resources<br/>Red Hat Certificate of Expertise in server hardening - exam EX413 training : prepare to take the Red Hat EX413 exam and work towards your RHCA datacenter certificationent://SD_ILS/0/SD_ILS:23128262024-06-20T01:04:38Z2024-06-20T01:04:38Zby Rothwell, William, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491974483/?ar">https://go.oreilly.com/library-access/library/view/-/9781491974483/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491974483/?ar">https://learning.oreilly.com/videos/~/9781491974483/?ar</a><br/>Format: Electronic Resources<br/>Linux server security : hack and defendent://SD_ILS/0/SD_ILS:20601022024-06-20T01:04:38Z2024-06-20T01:04:38Zby Binnie, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4519259">Click to View</a><br/>Format: Electronic Resources<br/>Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipesent://SD_ILS/0/SD_ILS:22717742024-06-20T01:04:38Z2024-06-20T01:04:38Zby Kalsi, Tajinder, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4659132">Click to View</a><br/>Format: Electronic Resources<br/>Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipesent://SD_ILS/0/SD_ILS:23105852024-06-20T01:04:38Z2024-06-20T01:04:38Zby Kalsi, Tajinder, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785286421/?ar">https://learning.oreilly.com/library/view/~/9781785286421/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785286421/?ar">https://go.oreilly.com/library-access/library/view/-/9781785286421/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785286421">https://learning.oreilly.com/library/view/~/9781785286421</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:23023882024-06-20T01:04:38Z2024-06-20T01:04:38Zby Malin, Cameron H.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494700/?ar">https://learning.oreilly.com/library/view/~/9781597494700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar</a><br/>Format: Electronic Resources<br/>Security for Linux on System zent://SD_ILS/0/SD_ILS:23018722024-06-20T01:04:38Z2024-06-20T01:04:38Zby Parziale, Lydia.<br/><a href="https://learning.oreilly.com/library/view/~/0738437549/?ar">https://learning.oreilly.com/library/view/~/0738437549/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738437549/?ar">https://go.oreilly.com/library-access/library/view/-/0738437549/?ar</a><br/>Format: Electronic Resources<br/>BackTrack 4 : assuring security by penetration testingent://SD_ILS/0/SD_ILS:22938712024-06-20T01:04:38Z2024-06-20T01:04:38Zby Ali, Shakeel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar">https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849513944/?ar">https://learning.oreilly.com/library/view/~/9781849513944/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849513944">https://learning.oreilly.com/library/view/~/9781849513944</a><br/>Format: Electronic Resources<br/>Linux annoyances for geeksent://SD_ILS/0/SD_ILS:22821662024-06-20T01:04:38Z2024-06-20T01:04:38Zby Jang, Michael H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008015/?ar">https://go.oreilly.com/library-access/library/view/-/0596008015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008015/?ar">https://learning.oreilly.com/library/view/~/0596008015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008015">https://learning.oreilly.com/library/view/~/0596008015</a><br/>Format: Electronic Resources<br/>Designing and implementing Linux firewalls and QoS using Netfilter, Iproute2, NAT, and L7-Filter : learn how to secure your system and implement QoS using real-world scenarios for networks of all sizesent://SD_ILS/0/SD_ILS:22863522024-06-20T01:04:38Z2024-06-20T01:04:38Zby Gheorghe, Lucian.<br/><a href="https://learning.oreilly.com/library/view/~/9781904811657/?ar">https://learning.oreilly.com/library/view/~/9781904811657/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781904811657/?ar">https://go.oreilly.com/library-access/library/view/-/9781904811657/?ar</a><br/>Format: Electronic Resources<br/>SELINUX : NSA's open source security enhanced Linuxent://SD_ILS/0/SD_ILS:22889312024-06-20T01:04:38Z2024-06-20T01:04:38Zby McCarty, Bill, 1953-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596007167/?ar">https://go.oreilly.com/library-access/library/view/-/0596007167/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007167">https://learning.oreilly.com/library/view/~/0596007167</a>
<a href="https://learning.oreilly.com/library/view/~/0596007167/?ar">https://learning.oreilly.com/library/view/~/0596007167/?ar</a><br/>Format: Electronic Resources<br/>Linux server securityent://SD_ILS/0/SD_ILS:22815962024-06-20T01:04:38Z2024-06-20T01:04:38Zby Bauer, Michael D.<br/><a href="https://learning.oreilly.com/library/view/~/0596006705">https://learning.oreilly.com/library/view/~/0596006705</a>
<a href="https://learning.oreilly.com/library/view/~/0596006705/?ar">https://learning.oreilly.com/library/view/~/0596006705/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006705/?ar">https://go.oreilly.com/library-access/library/view/-/0596006705/?ar</a><br/>Format: Electronic Resources<br/>Linux on IBM eServer zSeries and S/390 : Best Security Practices.ent://SD_ILS/0/SD_ILS:13102262024-06-20T01:04:38Z2024-06-20T01:04:38Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306835">Click to View</a><br/>Format: Electronic Resources<br/>Linux on IBM eserver zSeries and S/390 best security practicesent://SD_ILS/0/SD_ILS:23043142024-06-20T01:04:38Z2024-06-20T01:04:38Zby Geiselhart, Gregory.<br/><a href="https://learning.oreilly.com/library/view/~/0738497665/?ar">https://learning.oreilly.com/library/view/~/0738497665/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738497665/?ar">https://go.oreilly.com/library-access/library/view/-/0738497665/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738497665">https://learning.oreilly.com/library/view/~/0738497665</a><br/>Format: Electronic Resources<br/>Hacking Linux exposedent://SD_ILS/0/SD_ILS:476802024-06-20T01:04:38Z2024-06-20T01:04:38Zby Hatch, Brian.<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003269974.html">http://www.loc.gov/catdir/bios/mh042/2003269974.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/mh031/2003269974.html">http://www.loc.gov/catdir/description/mh031/2003269974.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/mh031/2003269974.html">http://www.loc.gov/catdir/toc/mh031/2003269974.html</a><br/>Format: Books<br/>Hacking Linux exposedent://SD_ILS/0/SD_ILS:159452024-06-20T01:04:38Z2024-06-20T01:04:38Zby Hatch, Brian.<br/>Format: Books<br/>Linux Security.ent://SD_ILS/0/SD_ILS:13044582024-06-20T01:04:38Z2024-06-20T01:04:38Zby Siddiqui, Shadab.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135705">Click to View</a><br/>Format: Electronic Resources<br/>Hack proofing Linux a guide to open source securityent://SD_ILS/0/SD_ILS:656652024-06-20T01:04:38Z2024-06-20T01:04:38Zby Stanger, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994343">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Hack Proofing Linux : A Guide to Open Source Security.ent://SD_ILS/0/SD_ILS:11920412024-06-20T01:04:38Z2024-06-20T01:04:38Zby Stanger, James.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294152">Click to View</a><br/>Format: Electronic Resources<br/>Maximum Linux security : a hacker's guide to protecting your Linux server and workstationent://SD_ILS/0/SD_ILS:22811372024-06-20T01:04:38Z2024-06-20T01:04:38Z<a href="https://learning.oreilly.com/library/view/~/0672316706/?ar">https://learning.oreilly.com/library/view/~/0672316706/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672316706/?ar">https://go.oreilly.com/library-access/library/view/-/0672316706/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672316706">https://learning.oreilly.com/library/view/~/0672316706</a><br/>Format: Electronic Resources<br/>