Search Results for - Narrowed by: Computer security. - Web services.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Web$002bservices.$002509Web$002bservices.$0026ps$003d300$0026isd$003dtrue?2024-06-19T22:28:52ZAWS security : compliance and observability setup and AWS account bootstrap walkthrough.ent://SD_ILS/0/SD_ILS:23342412024-06-19T22:28:52Z2024-06-19T22:28:52Zby Kascic, Eric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNCS2022141/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNCS2022141/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNCS2022141/?ar">https://learning.oreilly.com/videos/~/10000MNCS2022141/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNCS2022141">https://learning.oreilly.com/videos/~/10000MNCS2022141</a><br/>Format: Video recording<br/>Implementing NetScaler VPX : implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platformsent://SD_ILS/0/SD_ILS:22713612024-06-19T22:28:52Z2024-06-19T22:28:52Zby Sandbu, Marius, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191154">Click to View</a><br/>Format: Electronic Resources<br/>Cloud Management and Security.ent://SD_ILS/0/SD_ILS:12725982024-06-19T22:28:52Z2024-06-19T22:28:52Zby Abbadi, Imad M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1701403">Click to View</a><br/>Format: Electronic Resources<br/>Cloud management and securityent://SD_ILS/0/SD_ILS:23032822024-06-19T22:28:52Z2024-06-19T22:28:52Zby Abbadi, Imad M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118817094/?ar">https://learning.oreilly.com/library/view/~/9781118817094/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118817094/?ar">https://go.oreilly.com/library-access/library/view/-/9781118817094/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118817094">https://learning.oreilly.com/library/view/~/9781118817094</a><br/>Format: Electronic Resources<br/>Web services research for emerging applications discoveries and trendsent://SD_ILS/0/SD_ILS:22621232024-06-19T22:28:52Z2024-06-19T22:28:52Zby Zhang, Liang-Jie.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-684-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-684-1</a><br/>Format: Electronic Resources<br/>Securing Web services practical usage of standards and specificationsent://SD_ILS/0/SD_ILS:22618822024-06-19T22:28:52Z2024-06-19T22:28:52Zby Periorellis, Panos.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6</a><br/>Format: Electronic Resources<br/>SOA securityent://SD_ILS/0/SD_ILS:22849362024-06-19T22:28:52Z2024-06-19T22:28:52Zby Kanneganti, Ramarao.<br/><a href="https://learning.oreilly.com/library/view/~/9781932394689">https://learning.oreilly.com/library/view/~/9781932394689</a>
<a href="https://learning.oreilly.com/library/view/~/9781932394689/?ar">https://learning.oreilly.com/library/view/~/9781932394689/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar">https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar</a><br/>Format: Electronic Resources<br/>Understanding Windows CardSpace : an introduction to the concepts and challenges of digital identitiesent://SD_ILS/0/SD_ILS:22844022024-06-19T22:28:52Z2024-06-19T22:28:52Zby Bertocci, Vittorio.<br/><a href="https://learning.oreilly.com/library/view/~/9780321496843/?ar">https://learning.oreilly.com/library/view/~/9780321496843/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar">https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar</a><br/>Format: Electronic Resources<br/>Web services security and e-businessent://SD_ILS/0/SD_ILS:22620452024-06-19T22:28:52Z2024-06-19T22:28:52Zby Radhamani, G., 1968-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1</a><br/>Format: Electronic Resources<br/>J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practiceent://SD_ILS/0/SD_ILS:23268392024-06-19T22:28:52Z2024-06-19T22:28:52Zby Kumar, Pankaj, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131402641/?ar">https://learning.oreilly.com/library/view/~/0131402641/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131402641">https://learning.oreilly.com/library/view/~/0131402641</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131402641/?ar">https://go.oreilly.com/library-access/library/view/-/0131402641/?ar</a><br/>Format: Electronic Resources<br/>