Search Results for - Narrowed by: Computer security. - Syst&egrave;mes d'exploitation (Ordinateurs) SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Syst$0025C3$0025A8mes$002bd$002527exploitation$002b$002528Ordinateurs$002529$002509Syst$0025C3$0025A8mes$002bd$002527exploitation$002b$002528Ordinateurs$002529$0026ps$003d300? 2024-05-30T14:30:32Z Getting Started with z/OS Data Set Encryption ent://SD_ILS/0/SD_ILS:2331252 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a> <a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with Linux on Z Encryption for data at-rest ent://SD_ILS/0/SD_ILS:2321973 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738457468/?ar">https://learning.oreilly.com/library/view/~/9780738457468/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux basics for hackers : getting started with networking, scripting, and security in Kali ent://SD_ILS/0/SD_ILS:2318554 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;OccupyTheWeb, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492069485/?ar">https://learning.oreilly.com/library/view/~/9781492069485/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492069485">https://learning.oreilly.com/library/view/~/9781492069485</a><br/>Format:&#160;Electronic Resources<br/> Getting started with z/OS data set encryption ent://SD_ILS/0/SD_ILS:2316937 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738456874/?ar">https://learning.oreilly.com/library/view/~/9780738456874/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:2310018 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar">https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128033357/?ar">https://learning.oreilly.com/library/view/~/9780128033357/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows 8.1 administration pocket consultant : storage, security, &amp; Networking ent://SD_ILS/0/SD_ILS:2302302 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Stanek, William R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735685536/?ar">https://go.oreilly.com/library-access/library/view/-/9780735685536/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735685536/?ar">https://learning.oreilly.com/library/view/~/9780735685536/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Windows Server 2012 R2 ent://SD_ILS/0/SD_ILS:2301152 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Minasi, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar">https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118289426/?ar">https://learning.oreilly.com/library/view/~/9781118289426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118289426">https://learning.oreilly.com/library/view/~/9781118289426</a><br/>Format:&#160;Electronic Resources<br/> The hacker's guide to OS X : exploiting OS X from the root-up ent://SD_ILS/0/SD_ILS:2298531 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Bathurst, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499507">https://learning.oreilly.com/library/view/~/9781597499507</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499507/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499507/?ar">https://learning.oreilly.com/library/view/~/9781597499507/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2012 security from end to edge and beyond : architecting, designing, planning, and deploying Windows Server 2012 security solutions ent://SD_ILS/0/SD_ILS:2299662 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Shinder, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499804">https://learning.oreilly.com/library/view/~/9781597499804</a> <a href="https://learning.oreilly.com/library/view/~/9781597499804/?ar">https://learning.oreilly.com/library/view/~/9781597499804/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499804/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499804/?ar</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:2298818 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9781118331743/?ar">https://learning.oreilly.com/library/view/~/9781118331743/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118331743/?ar">https://go.oreilly.com/library-access/library/view/-/9781118331743/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:2309995 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495806/?ar">https://learning.oreilly.com/library/view/~/9781597495806/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM z/OS mainframe security and audit management using the IBM Security zSecure Suite ent://SD_ILS/0/SD_ILS:2301939 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;B&uuml;cker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738435880/?ar">https://learning.oreilly.com/library/view/~/0738435880/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738435880/?ar">https://go.oreilly.com/library-access/library/view/-/0738435880/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mac Security Bible. ent://SD_ILS/0/SD_ILS:2287722 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Kissell, Joe.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar">https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470474198/?ar">https://learning.oreilly.com/library/view/~/9780470474198/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470474198">https://learning.oreilly.com/library/view/~/9780470474198</a><br/>Format:&#160;Electronic Resources<br/> Mac OS X security and mobility v10.6 ent://SD_ILS/0/SD_ILS:2288654 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Kite, Robert.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321685698/?ar">https://go.oreilly.com/library-access/library/view/-/9780321685698/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321685698/?ar">https://learning.oreilly.com/library/view/~/9780321685698/?ar</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:2288891 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470581858/?ar">https://learning.oreilly.com/library/view/~/9780470581858/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470769805/?ar">https://learning.oreilly.com/library/view/~/9780470769805/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar">https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar">https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470769805">https://learning.oreilly.com/library/view/~/9780470769805</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Mac OS X Leopard security ent://SD_ILS/0/SD_ILS:2284628 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Edge, Charles S., Jr.<br/><a href="https://learning.oreilly.com/library/view/~/9781590599891/?ar">https://learning.oreilly.com/library/view/~/9781590599891/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar">https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781590599891">https://learning.oreilly.com/library/view/~/9781590599891</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and troubleshooting ent://SD_ILS/0/SD_ILS:2288763 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470275894/?ar">https://learning.oreilly.com/library/view/~/9780470275894/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar">https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar</a><br/>Format:&#160;Electronic Resources<br/> Encryption facility for z/OS version 1.10 ent://SD_ILS/0/SD_ILS:2335107 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Kappeler, Patrick, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738489557/?ar">https://go.oreilly.com/library-access/library/view/-/0738489557/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738489557">https://learning.oreilly.com/library/view/~/0738489557</a> <a href="https://learning.oreilly.com/library/view/~/0738489557/?ar">https://learning.oreilly.com/library/view/~/0738489557/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux annoyances for geeks ent://SD_ILS/0/SD_ILS:2282166 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Jang, Michael H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008015/?ar">https://go.oreilly.com/library-access/library/view/-/0596008015/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008015/?ar">https://learning.oreilly.com/library/view/~/0596008015/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008015">https://learning.oreilly.com/library/view/~/0596008015</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at Windows system administration using command line scripts ent://SD_ILS/0/SD_ILS:2284108 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Bhardwaj, Pawan K.<br/><a href="https://learning.oreilly.com/library/view/~/1597491055">https://learning.oreilly.com/library/view/~/1597491055</a> <a href="https://www.sciencedirect.com/science/book/9781597491051">https://www.sciencedirect.com/science/book/9781597491051</a> <a href="https://go.oreilly.com/library-access/library/view/-/1597491055/?ar">https://go.oreilly.com/library-access/library/view/-/1597491055/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1597491055/?ar">https://learning.oreilly.com/library/view/~/1597491055/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2003 security : a technical reference ent://SD_ILS/0/SD_ILS:2281810 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Bragg, Roberta.<br/><a href="https://learning.oreilly.com/library/view/~/0321305019/?ar">https://learning.oreilly.com/library/view/~/0321305019/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321305019">https://learning.oreilly.com/library/view/~/0321305019</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321305019/?ar">https://go.oreilly.com/library-access/library/view/-/0321305019/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering FreeBSD and OpenBSD security ent://SD_ILS/0/SD_ILS:2289327 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Korff, Yanek.<br/><a href="https://learning.oreilly.com/library/view/~/0596006268">https://learning.oreilly.com/library/view/~/0596006268</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596006268/?ar">https://go.oreilly.com/library-access/library/view/-/0596006268/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596006268/?ar">https://learning.oreilly.com/library/view/~/0596006268/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mac OS X security ent://SD_ILS/0/SD_ILS:2281166 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Potter, Bruce.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735713480/?ar">https://go.oreilly.com/library-access/library/view/-/0735713480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735713480">https://learning.oreilly.com/library/view/~/0735713480</a> <a href="https://learning.oreilly.com/library/view/~/0735713480/?ar">https://learning.oreilly.com/library/view/~/0735713480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical UNIX and Internet security ent://SD_ILS/0/SD_ILS:2281256 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z by&#160;Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596003234">https://learning.oreilly.com/library/view/~/0596003234</a> <a href="https://learning.oreilly.com/library/view/~/0596003234/?ar">https://learning.oreilly.com/library/view/~/0596003234/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596003234/?ar">https://go.oreilly.com/library-access/library/view/-/0596003234/?ar</a><br/>Format:&#160;Electronic Resources<br/> Maximum Linux security : a hacker's guide to protecting your Linux server and workstation ent://SD_ILS/0/SD_ILS:2281137 2024-05-30T14:30:32Z 2024-05-30T14:30:32Z <a href="https://learning.oreilly.com/library/view/~/0672316706/?ar">https://learning.oreilly.com/library/view/~/0672316706/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0672316706/?ar">https://go.oreilly.com/library-access/library/view/-/0672316706/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672316706">https://learning.oreilly.com/library/view/~/0672316706</a><br/>Format:&#160;Electronic Resources<br/>