Search Results for - Narrowed by: Computer security. - Logiciels d'application -- D&eacute;veloppement. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Logiciels$002bd$002527application$002b--$002bD$0025C3$0025A9veloppement.$002509Logiciels$002bd$002527application$002b--$002bD$0025C3$0025A9veloppement.$0026ps$003d300? 2024-05-23T11:33:41Z Designing secure software : a guide for developers ent://SD_ILS/0/SD_ILS:2329594 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Kohnfelder, Loren, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129804/?ar">https://learning.oreilly.com/library/view/~/9781098129804/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129804">https://learning.oreilly.com/library/view/~/9781098129804</a><br/>Format:&#160;Electronic Resources<br/> The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more ent://SD_ILS/0/SD_ILS:2332630 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format:&#160;Electronic Resources<br/> Alice and Bob learn application security. ent://SD_ILS/0/SD_ILS:2325958 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Janca, Tanya.<br/><a href="https://learning.oreilly.com/library/view/~/9781119687351">https://learning.oreilly.com/library/view/~/9781119687351</a> <a href="https://learning.oreilly.com/library/view/~/9781119687351/?ar">https://learning.oreilly.com/library/view/~/9781119687351/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar">https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2322053 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on Spring security 5.1.1 ent://SD_ILS/0/SD_ILS:2319110 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Lelek, Tomasz, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789802931/?ar">https://learning.oreilly.com/videos/~/9781789802931/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789802931/?ar">https://go.oreilly.com/library-access/library/view/-/9781789802931/?ar</a><br/>Format:&#160;Electronic Resources<br/> Apache Kafka series : Kafka security (SSL SASL Kerberos ACL) ent://SD_ILS/0/SD_ILS:2316736 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Maarek, St&eacute;phane, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar">https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789342420/?ar">https://learning.oreilly.com/videos/~/9781789342420/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on Spring Security 5 for Reactive applications : learn effective ways to secure your applications with Spring and Spring WebFlux ent://SD_ILS/0/SD_ILS:2317237 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;John, Tomcy, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788995979/?ar">https://learning.oreilly.com/library/view/~/9781788995979/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788995979/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995979/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2316778 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format:&#160;Electronic Resources<br/> Fluent conference 2017, San Jose, CA. ent://SD_ILS/0/SD_ILS:2313669 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Fluent (2017 : San Jose, California)<br/><a href="https://learning.oreilly.com/videos/~/9781491985298/?ar">https://learning.oreilly.com/videos/~/9781491985298/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491985298/?ar">https://go.oreilly.com/library-access/library/view/-/9781491985298/?ar</a><br/>Format:&#160;Electronic Resources<br/> Oracle Application Express administration : for DBAs and Developers ent://SD_ILS/0/SD_ILS:2311753 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Mignault, Francis, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484219584/?ar">https://learning.oreilly.com/library/view/~/9781484219584/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484219584/?ar">https://go.oreilly.com/library-access/library/view/-/9781484219584/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484219584">https://learning.oreilly.com/library/view/~/9781484219584</a><br/>Format:&#160;Electronic Resources<br/> Fluent 2016 : San Francisco, California video compilation ent://SD_ILS/0/SD_ILS:2310254 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Fluent. ( 2016 : San Francisco, California)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491944585/?ar">https://go.oreilly.com/library-access/library/view/-/9781491944585/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491944585/?ar">https://learning.oreilly.com/videos/~/9781491944585/?ar</a><br/>Format:&#160;Electronic Resources<br/> Fluent conference 2015 : complete video compilation ent://SD_ILS/0/SD_ILS:2307530 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Fluent. San Francisco, April 20-25<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491927786/?ar">https://go.oreilly.com/library-access/library/view/-/9781491927786/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491927786/?ar">https://learning.oreilly.com/videos/~/9781491927786/?ar</a><br/>Format:&#160;Electronic Resources<br/> Bulletproof Android : practical advice for building secure apps ent://SD_ILS/0/SD_ILS:2305298 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Nolan, Godfrey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780133995121/?ar">https://learning.oreilly.com/library/view/~/9780133995121/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133995121">https://learning.oreilly.com/library/view/~/9780133995121</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133995121/?ar">https://go.oreilly.com/library-access/library/view/-/9780133995121/?ar</a><br/>Format:&#160;Electronic Resources<br/> Łamanie i zabezpieczanie aplikacji w systemie iOS ent://SD_ILS/0/SD_ILS:2297986 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Zdziarski, Jonathan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781457177057/?ar">https://learning.oreilly.com/library/view/~/9781457177057/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457177057/?ar">https://go.oreilly.com/library-access/library/view/-/9781457177057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457177057">https://learning.oreilly.com/library/view/~/9781457177057</a><br/>Format:&#160;Electronic Resources<br/> Hacking and securing iOS applications ent://SD_ILS/0/SD_ILS:2293464 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Zdziarski, Jonathan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781449325213/?ar">https://learning.oreilly.com/library/view/~/9781449325213/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781449325213/?ar">https://go.oreilly.com/library-access/library/view/-/9781449325213/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781449325213">https://learning.oreilly.com/library/view/~/9781449325213</a><br/>Format:&#160;Electronic Resources<br/> Web application obfuscation : '-/WAFs.evasion.filters//alert (/obfuscation/)-' ent://SD_ILS/0/SD_ILS:2290508 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Heiderich, Mario.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496049/?ar">https://learning.oreilly.com/library/view/~/9781597496049/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496049/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496049/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure and Resilient Software ent://SD_ILS/0/SD_ILS:2323699 2024-05-23T11:33:41Z 2024-05-23T11:33:41Z by&#160;Merkow, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439866221/?ar">https://learning.oreilly.com/library/view/~/9781439866221/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439866221/?ar">https://go.oreilly.com/library-access/library/view/-/9781439866221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439866221">https://learning.oreilly.com/library/view/~/9781439866221</a><br/>Format:&#160;Electronic Resources<br/>