Search Results for - Narrowed by: Electronic books. - Protocoles de réseaux d'ordinateurs. - Réseaux d'ordinateurs -- Sécurité -- Mesures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026qf$003dSUBJECT$002509Subject$002509Protocoles$002bde$002br$0025C3$0025A9seaux$002bd$002527ordinateurs.$002509Protocoles$002bde$002br$0025C3$0025A9seaux$002bd$002527ordinateurs.$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300?
2024-09-25T19:05:41Z
Netzwerkprotokolle hacken : Sicherheislücken verstehen, analysieren und schützen
ent://SD_ILS/0/SD_ILS:2317121
2024-09-25T19:05:41Z
2024-09-25T19:05:41Z
by Forshaw, James, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492068631/?ar">https://learning.oreilly.com/library/view/~/9781492068631/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492068631/?ar">https://go.oreilly.com/library-access/library/view/-/9781492068631/?ar</a><br/>Format: Electronic Resources<br/>
Cisco ISE for BYOD and secure unified access
ent://SD_ILS/0/SD_ILS:2313856
2024-09-25T19:05:41Z
2024-09-25T19:05:41Z
by Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134586656/?ar">https://learning.oreilly.com/library/view/~/9780134586656/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134586656/?ar">https://go.oreilly.com/library-access/library/view/-/9780134586656/?ar</a><br/>Format: Electronic Resources<br/>
Cisco Intelligent WAN (IWAN)
ent://SD_ILS/0/SD_ILS:2311998
2024-09-25T19:05:41Z
2024-09-25T19:05:41Z
by Edgeworth, Brad, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar">https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134423760/?ar">https://learning.oreilly.com/library/view/~/9780134423760/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134423760">https://learning.oreilly.com/library/view/~/9780134423760</a><br/>Format: Electronic Resources<br/>
Implementing NAP and NAC security technologies : the complete guide to network access control
ent://SD_ILS/0/SD_ILS:2284693
2024-09-25T19:05:41Z
2024-09-25T19:05:41Z
by Hoffman, Daniel (Daniel V.), 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470238387/?ar">https://learning.oreilly.com/library/view/~/9780470238387/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar">https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470238387">https://learning.oreilly.com/library/view/~/9780470238387</a><br/>Format: Electronic Resources<br/>
The Modelling and Analysis of Security Protocols: the CSP Approach
ent://SD_ILS/0/SD_ILS:2326682
2024-09-25T19:05:41Z
2024-09-25T19:05:41Z
by Ryan, P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201674718/?ar">https://go.oreilly.com/library-access/library/view/-/0201674718/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201674718/?ar">https://learning.oreilly.com/library/view/~/0201674718/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201674718">https://learning.oreilly.com/library/view/~/0201674718</a><br/>Format: Electronic Resources<br/>