Search Results for - Narrowed by: Computer security. - operating systems.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509operating$002bsystems.$002509operating$002bsystems.$0026ps$003d300?2024-06-05T03:18:07ZGetting Started with z/OS Data Set Encryptionent://SD_ILS/0/SD_ILS:23312522024-06-05T03:18:07Z2024-06-05T03:18:07Zby White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format: Electronic Resources<br/>Linux basics for hackers : getting started with networking, scripting, and security in Kalient://SD_ILS/0/SD_ILS:23185542024-06-05T03:18:07Z2024-06-05T03:18:07Zby OccupyTheWeb, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492069485/?ar">https://learning.oreilly.com/library/view/~/9781492069485/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492069485">https://learning.oreilly.com/library/view/~/9781492069485</a><br/>Format: Electronic Resources<br/>Getting started with Linux on Z Encryption for data at-restent://SD_ILS/0/SD_ILS:23219732024-06-05T03:18:07Z2024-06-05T03:18:07Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738457468/?ar">https://learning.oreilly.com/library/view/~/9780738457468/?ar</a><br/>Format: Electronic Resources<br/>Getting started with z/OS data set encryptionent://SD_ILS/0/SD_ILS:23169372024-06-05T03:18:07Z2024-06-05T03:18:07Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738456874/?ar">https://learning.oreilly.com/library/view/~/9780738456874/?ar</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:23100182024-06-05T03:18:07Z2024-06-05T03:18:07Zby Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar">https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128033357/?ar">https://learning.oreilly.com/library/view/~/9780128033357/?ar</a><br/>Format: Electronic Resources<br/>Windows 8.1 administration pocket consultant : storage, security, & Networkingent://SD_ILS/0/SD_ILS:23023022024-06-05T03:18:07Z2024-06-05T03:18:07Zby Stanek, William R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735685536/?ar">https://go.oreilly.com/library-access/library/view/-/9780735685536/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735685536/?ar">https://learning.oreilly.com/library/view/~/9780735685536/?ar</a><br/>Format: Electronic Resources<br/>Mastering Windows Server 2012 R2ent://SD_ILS/0/SD_ILS:23011522024-06-05T03:18:07Z2024-06-05T03:18:07Zby Minasi, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar">https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118289426/?ar">https://learning.oreilly.com/library/view/~/9781118289426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118289426">https://learning.oreilly.com/library/view/~/9781118289426</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:22988182024-06-05T03:18:07Z2024-06-05T03:18:07Zby Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9781118331743/?ar">https://learning.oreilly.com/library/view/~/9781118331743/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118331743/?ar">https://go.oreilly.com/library-access/library/view/-/9781118331743/?ar</a><br/>Format: Electronic Resources<br/>Windows Server 2012 security from end to edge and beyond : architecting, designing, planning, and deploying Windows Server 2012 security solutionsent://SD_ILS/0/SD_ILS:22996622024-06-05T03:18:07Z2024-06-05T03:18:07Zby Shinder, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499804">https://learning.oreilly.com/library/view/~/9781597499804</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499804/?ar">https://learning.oreilly.com/library/view/~/9781597499804/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499804/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499804/?ar</a><br/>Format: Electronic Resources<br/>The hacker's guide to OS X : exploiting OS X from the root-upent://SD_ILS/0/SD_ILS:22985312024-06-05T03:18:07Z2024-06-05T03:18:07Zby Bathurst, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499507">https://learning.oreilly.com/library/view/~/9781597499507</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499507/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499507/?ar">https://learning.oreilly.com/library/view/~/9781597499507/?ar</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:23099952024-06-05T03:18:07Z2024-06-05T03:18:07Zby Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495806/?ar">https://learning.oreilly.com/library/view/~/9781597495806/?ar</a><br/>Format: Electronic Resources<br/>IBM z/OS mainframe security and audit management using the IBM Security zSecure Suiteent://SD_ILS/0/SD_ILS:23019392024-06-05T03:18:07Z2024-06-05T03:18:07Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738435880/?ar">https://learning.oreilly.com/library/view/~/0738435880/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738435880/?ar">https://go.oreilly.com/library-access/library/view/-/0738435880/?ar</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:22888912024-06-05T03:18:07Z2024-06-05T03:18:07Zby Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470581858/?ar">https://learning.oreilly.com/library/view/~/9780470581858/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470769805/?ar">https://learning.oreilly.com/library/view/~/9780470769805/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar">https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar">https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470769805">https://learning.oreilly.com/library/view/~/9780470769805</a><br/>Format: Electronic Resources<br/>Mac OS X security and mobility v10.6ent://SD_ILS/0/SD_ILS:22886542024-06-05T03:18:07Z2024-06-05T03:18:07Zby Kite, Robert.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321685698/?ar">https://go.oreilly.com/library-access/library/view/-/9780321685698/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321685698/?ar">https://learning.oreilly.com/library/view/~/9780321685698/?ar</a><br/>Format: Electronic Resources<br/>Mac Security Bible.ent://SD_ILS/0/SD_ILS:22877222024-06-05T03:18:07Z2024-06-05T03:18:07Zby Kissell, Joe.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar">https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198/?ar">https://learning.oreilly.com/library/view/~/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198">https://learning.oreilly.com/library/view/~/9780470474198</a><br/>Format: Electronic Resources<br/>Foundations of Mac OS X Leopard securityent://SD_ILS/0/SD_ILS:22846282024-06-05T03:18:07Z2024-06-05T03:18:07Zby Edge, Charles S., Jr.<br/><a href="https://learning.oreilly.com/library/view/~/9781590599891/?ar">https://learning.oreilly.com/library/view/~/9781590599891/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar">https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781590599891">https://learning.oreilly.com/library/view/~/9781590599891</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and troubleshootingent://SD_ILS/0/SD_ILS:22887632024-06-05T03:18:07Z2024-06-05T03:18:07Zby Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470275894/?ar">https://learning.oreilly.com/library/view/~/9780470275894/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar">https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar</a><br/>Format: Electronic Resources<br/>Encryption facility for z/OS version 1.10ent://SD_ILS/0/SD_ILS:23351072024-06-05T03:18:07Z2024-06-05T03:18:07Zby Kappeler, Patrick, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738489557/?ar">https://go.oreilly.com/library-access/library/view/-/0738489557/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738489557">https://learning.oreilly.com/library/view/~/0738489557</a>
<a href="https://learning.oreilly.com/library/view/~/0738489557/?ar">https://learning.oreilly.com/library/view/~/0738489557/?ar</a><br/>Format: Electronic Resources<br/>How to cheat at Windows system administration using command line scriptsent://SD_ILS/0/SD_ILS:22841082024-06-05T03:18:07Z2024-06-05T03:18:07Zby Bhardwaj, Pawan K.<br/><a href="https://learning.oreilly.com/library/view/~/1597491055">https://learning.oreilly.com/library/view/~/1597491055</a>
<a href="https://www.sciencedirect.com/science/book/9781597491051">https://www.sciencedirect.com/science/book/9781597491051</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1597491055/?ar">https://go.oreilly.com/library-access/library/view/-/1597491055/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1597491055/?ar">https://learning.oreilly.com/library/view/~/1597491055/?ar</a><br/>Format: Electronic Resources<br/>Linux annoyances for geeksent://SD_ILS/0/SD_ILS:22821662024-06-05T03:18:07Z2024-06-05T03:18:07Zby Jang, Michael H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008015/?ar">https://go.oreilly.com/library-access/library/view/-/0596008015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008015/?ar">https://learning.oreilly.com/library/view/~/0596008015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008015">https://learning.oreilly.com/library/view/~/0596008015</a><br/>Format: Electronic Resources<br/>Mastering FreeBSD and OpenBSD securityent://SD_ILS/0/SD_ILS:22893272024-06-05T03:18:07Z2024-06-05T03:18:07Zby Korff, Yanek.<br/><a href="https://learning.oreilly.com/library/view/~/0596006268">https://learning.oreilly.com/library/view/~/0596006268</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006268/?ar">https://go.oreilly.com/library-access/library/view/-/0596006268/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006268/?ar">https://learning.oreilly.com/library/view/~/0596006268/?ar</a><br/>Format: Electronic Resources<br/>Windows Server 2003 security : a technical referenceent://SD_ILS/0/SD_ILS:22818102024-06-05T03:18:07Z2024-06-05T03:18:07Zby Bragg, Roberta.<br/><a href="https://learning.oreilly.com/library/view/~/0321305019/?ar">https://learning.oreilly.com/library/view/~/0321305019/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321305019">https://learning.oreilly.com/library/view/~/0321305019</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321305019/?ar">https://go.oreilly.com/library-access/library/view/-/0321305019/?ar</a><br/>Format: Electronic Resources<br/>Practical UNIX and Internet securityent://SD_ILS/0/SD_ILS:22812562024-06-05T03:18:07Z2024-06-05T03:18:07Zby Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596003234">https://learning.oreilly.com/library/view/~/0596003234</a>
<a href="https://learning.oreilly.com/library/view/~/0596003234/?ar">https://learning.oreilly.com/library/view/~/0596003234/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596003234/?ar">https://go.oreilly.com/library-access/library/view/-/0596003234/?ar</a><br/>Format: Electronic Resources<br/>Mac OS X securityent://SD_ILS/0/SD_ILS:22811662024-06-05T03:18:07Z2024-06-05T03:18:07Zby Potter, Bruce.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735713480/?ar">https://go.oreilly.com/library-access/library/view/-/0735713480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735713480">https://learning.oreilly.com/library/view/~/0735713480</a>
<a href="https://learning.oreilly.com/library/view/~/0735713480/?ar">https://learning.oreilly.com/library/view/~/0735713480/?ar</a><br/>Format: Electronic Resources<br/>Maximum Linux security : a hacker's guide to protecting your Linux server and workstationent://SD_ILS/0/SD_ILS:22811372024-06-05T03:18:07Z2024-06-05T03:18:07Z<a href="https://learning.oreilly.com/library/view/~/0672316706/?ar">https://learning.oreilly.com/library/view/~/0672316706/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672316706/?ar">https://go.oreilly.com/library-access/library/view/-/0672316706/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672316706">https://learning.oreilly.com/library/view/~/0672316706</a><br/>Format: Electronic Resources<br/>