Search Results for - Narrowed by: Computer security. - Linux. - Syst&egrave;mes virtuels (Informatique) SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Linux.$002509Linux.$0026qf$003dSUBJECT$002509Subject$002509Syst$0025C3$0025A8mes$002bvirtuels$002b$002528Informatique$002529$002509Syst$0025C3$0025A8mes$002bvirtuels$002b$002528Informatique$002529$0026ps$003d300? 2024-09-22T03:56:41Z Temenos on IBM LinuxONE Best Practices Guide ent://SD_ILS/0/SD_ILS:2323440 2024-09-22T03:56:41Z 2024-09-22T03:56:41Z by&#160;Coble, Deana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458458">https://learning.oreilly.com/library/view/~/9780738458458</a> <a href="https://learning.oreilly.com/library/view/~/9780738458458/?ar">https://learning.oreilly.com/library/view/~/9780738458458/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing your cloud : IBM security for LinuxONE ent://SD_ILS/0/SD_ILS:2321597 2024-09-22T03:56:41Z 2024-09-22T03:56:41Z by&#160;Alves, Edi Lopes, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457949/?ar">https://learning.oreilly.com/library/view/~/9780738457949/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar</a><br/>Format:&#160;Electronic Resources<br/>