Search Results for - Narrowed by: Computer security. - Web services. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Web$002bservices.$002509Web$002bservices.$0026ps$003d300$0026isd$003dtrue? 2024-06-19T22:28:52Z AWS security : compliance and observability setup and AWS account bootstrap walkthrough. ent://SD_ILS/0/SD_ILS:2334241 2024-06-19T22:28:52Z 2024-06-19T22:28:52Z by&#160;Kascic, Eric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNCS2022141/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNCS2022141/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNCS2022141/?ar">https://learning.oreilly.com/videos/~/10000MNCS2022141/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNCS2022141">https://learning.oreilly.com/videos/~/10000MNCS2022141</a><br/>Format:&#160;Video recording<br/> Implementing NetScaler VPX : implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms ent://SD_ILS/0/SD_ILS:2271361 2024-06-19T22:28:52Z 2024-06-19T22:28:52Z by&#160;Sandbu, Marius, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191154">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cloud Management and Security. ent://SD_ILS/0/SD_ILS:1272598 2024-06-19T22:28:52Z 2024-06-19T22:28:52Z by&#160;Abbadi, Imad M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1701403">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cloud management and security ent://SD_ILS/0/SD_ILS:2303282 2024-06-19T22:28:52Z 2024-06-19T22:28:52Z by&#160;Abbadi, Imad M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118817094/?ar">https://learning.oreilly.com/library/view/~/9781118817094/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118817094/?ar">https://go.oreilly.com/library-access/library/view/-/9781118817094/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118817094">https://learning.oreilly.com/library/view/~/9781118817094</a><br/>Format:&#160;Electronic Resources<br/> Web services research for emerging applications discoveries and trends ent://SD_ILS/0/SD_ILS:2262123 2024-06-19T22:28:52Z 2024-06-19T22:28:52Z by&#160;Zhang, Liang-Jie.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-684-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-684-1</a><br/>Format:&#160;Electronic Resources<br/> Securing Web services practical usage of standards and specifications ent://SD_ILS/0/SD_ILS:2261882 2024-06-19T22:28:52Z 2024-06-19T22:28:52Z by&#160;Periorellis, Panos.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6</a><br/>Format:&#160;Electronic Resources<br/> SOA security ent://SD_ILS/0/SD_ILS:2284936 2024-06-19T22:28:52Z 2024-06-19T22:28:52Z by&#160;Kanneganti, Ramarao.<br/><a href="https://learning.oreilly.com/library/view/~/9781932394689">https://learning.oreilly.com/library/view/~/9781932394689</a> <a href="https://learning.oreilly.com/library/view/~/9781932394689/?ar">https://learning.oreilly.com/library/view/~/9781932394689/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar">https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar</a><br/>Format:&#160;Electronic Resources<br/> Understanding Windows CardSpace : an introduction to the concepts and challenges of digital identities ent://SD_ILS/0/SD_ILS:2284402 2024-06-19T22:28:52Z 2024-06-19T22:28:52Z by&#160;Bertocci, Vittorio.<br/><a href="https://learning.oreilly.com/library/view/~/9780321496843/?ar">https://learning.oreilly.com/library/view/~/9780321496843/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar">https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web services security and e-business ent://SD_ILS/0/SD_ILS:2262045 2024-06-19T22:28:52Z 2024-06-19T22:28:52Z by&#160;Radhamani, G., 1968-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1</a><br/>Format:&#160;Electronic Resources<br/> J2EE&trade; Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice ent://SD_ILS/0/SD_ILS:2326839 2024-06-19T22:28:52Z 2024-06-19T22:28:52Z by&#160;Kumar, Pankaj, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131402641/?ar">https://learning.oreilly.com/library/view/~/0131402641/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131402641">https://learning.oreilly.com/library/view/~/0131402641</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131402641/?ar">https://go.oreilly.com/library-access/library/view/-/0131402641/?ar</a><br/>Format:&#160;Electronic Resources<br/>