Search Results for - Narrowed by: Computer software -- Development. - Computer Security
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsoftware$002b--$002bDevelopment.$002509Computer$002bsoftware$002b--$002bDevelopment.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bSecurity$002509Computer$002bSecurity$0026ps$003d300?
2024-05-28T05:55:31Z
Intro to secure application deployment with Istio on Kubernetes.
ent://SD_ILS/0/SD_ILS:2332181
2024-05-28T05:55:31Z
2024-05-28T05:55:31Z
by Poddar, Neeraj, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202219">https://learning.oreilly.com/videos/~/10000MNHV202219</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202219/?ar">https://learning.oreilly.com/videos/~/10000MNHV202219/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar</a><br/>Format: Video recording<br/>
Threat modeling : designing for security
ent://SD_ILS/0/SD_ILS:2302626
2024-05-28T05:55:31Z
2024-05-28T05:55:31Z
by Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format: Electronic Resources<br/>
Official (ISC)2 guide to the CSSLP CBK
ent://SD_ILS/0/SD_ILS:2300303
2024-05-28T05:55:31Z
2024-05-28T05:55:31Z
by Paul, Mano.<br/><a href="https://learning.oreilly.com/library/view/~/9781466571273">https://learning.oreilly.com/library/view/~/9781466571273</a>
<a href="https://learning.oreilly.com/library/view/~/9781466571273/?ar">https://learning.oreilly.com/library/view/~/9781466571273/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar">https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar</a><br/>Format: Electronic Resources<br/>
Official (ISC)2 guide to the CSSLP
ent://SD_ILS/0/SD_ILS:2292921
2024-05-28T05:55:31Z
2024-05-28T05:55:31Z
by Paul, Mano.<br/><a href="https://learning.oreilly.com/library/view/~/9781439826058/?ar">https://learning.oreilly.com/library/view/~/9781439826058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439826058/?ar">https://go.oreilly.com/library-access/library/view/-/9781439826058/?ar</a><br/>Format: Electronic Resources<br/>
Secure and Resilient Software
ent://SD_ILS/0/SD_ILS:2323699
2024-05-28T05:55:31Z
2024-05-28T05:55:31Z
by Merkow, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439866221/?ar">https://learning.oreilly.com/library/view/~/9781439866221/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439866221/?ar">https://go.oreilly.com/library-access/library/view/-/9781439866221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439866221">https://learning.oreilly.com/library/view/~/9781439866221</a><br/>Format: Electronic Resources<br/>