Search Results for - Narrowed by: Electronic videos. - Sécurité informatique.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Electronic$002bvideos.$002509Electronic$002bvideos.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300$0026isd$003dtrue?
2024-06-19T22:36:11Z
Generative malware outbreak detection
ent://SD_ILS/0/SD_ILS:2325158
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Park, Sean, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar">https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452/?ar">https://learning.oreilly.com/videos/~/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452">https://learning.oreilly.com/videos/~/0636920373452</a><br/>Format: Electronic Resources<br/>
Security principles for the working architect
ent://SD_ILS/0/SD_ILS:2322691
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Woods, Eoin, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338215/?ar">https://learning.oreilly.com/videos/~/0636920338215/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920338215">https://learning.oreilly.com/videos/~/0636920338215</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar</a><br/>Format: Electronic Resources<br/>
Web hacking : become a professional web pentester
ent://SD_ILS/0/SD_ILS:2319831
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format: Electronic Resources<br/>
The Complete Ethical Hacking Course
ent://SD_ILS/0/SD_ILS:2323185
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Enterprise Mobility and Security training
ent://SD_ILS/0/SD_ILS:2319556
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format: Electronic Resources<br/>
Threat and vulnerability assessment for enterprises
ent://SD_ILS/0/SD_ILS:2319277
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781838559205/?ar">https://learning.oreilly.com/videos/~/9781838559205/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar">https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar</a><br/>Format: Electronic Resources<br/>
The art of hacking (video collection)
ent://SD_ILS/0/SD_ILS:2319884
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar">https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780135767849/?ar">https://learning.oreilly.com/videos/~/9780135767849/?ar</a><br/>Format: Electronic Resources<br/>
Linux troubleshooting course with real life examples
ent://SD_ILS/0/SD_ILS:2323238
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format: Electronic Resources<br/>
How to build privacy and security into deep learning models
ent://SD_ILS/0/SD_ILS:2322791
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format: Electronic Resources<br/>
Hands-on cryptography with Java
ent://SD_ILS/0/SD_ILS:2319124
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Costlow, Erik, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar">https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838554972/?ar">https://learning.oreilly.com/videos/~/9781838554972/?ar</a><br/>Format: Electronic Resources<br/>
Kali Linux tutorial for beginners
ent://SD_ILS/0/SD_ILS:2317579
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Naja, Tarek, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar">https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789615173/?ar">https://learning.oreilly.com/videos/~/9781789615173/?ar</a><br/>Format: Electronic Resources<br/>
What is cybersecurity?
ent://SD_ILS/0/SD_ILS:2318722
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format: Electronic Resources<br/>
Risk management for cybersecurity and IT managers
ent://SD_ILS/0/SD_ILS:2316845
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Dion, Jason, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789531992/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531992/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789531992/?ar">https://learning.oreilly.com/videos/~/9781789531992/?ar</a><br/>Format: Electronic Resources<br/>
Cyber security : endpoint defense
ent://SD_ILS/0/SD_ILS:2316613
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Dewey, Gary, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788990981/?ar">https://learning.oreilly.com/videos/~/9781788990981/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar</a><br/>Format: Electronic Resources<br/>
Introduction to malware analysis for incident responders
ent://SD_ILS/0/SD_ILS:2316850
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530612/?ar">https://learning.oreilly.com/videos/~/9781789530612/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar</a><br/>Format: Electronic Resources<br/>
Learn ethical hacking from scratch
ent://SD_ILS/0/SD_ILS:2316923
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789340297/?ar">https://learning.oreilly.com/videos/~/9781789340297/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity attacks (Red Team activity)
ent://SD_ILS/0/SD_ILS:2315986
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Nesterenko, Sergii, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781788478878/?ar">https://learning.oreilly.com/videos/~/9781788478878/?ar</a><br/>Format: Electronic Resources<br/>
WiFi hacking : wireless penetration testing for beginners
ent://SD_ILS/0/SD_ILS:2316772
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530193/?ar">https://learning.oreilly.com/videos/~/9781789530193/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar</a><br/>Format: Electronic Resources<br/>
Advanced malware analysis
ent://SD_ILS/0/SD_ILS:2317857
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Njenga, Munir, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788627146/?ar">https://learning.oreilly.com/videos/~/9781788627146/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar</a><br/>Format: Electronic Resources<br/>
Ethical hacking masterclass
ent://SD_ILS/0/SD_ILS:2317748
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789530018/?ar">https://learning.oreilly.com/videos/~/9781789530018/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar</a><br/>Format: Electronic Resources<br/>
Fluent conference 2017, San Jose, CA.
ent://SD_ILS/0/SD_ILS:2313669
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Fluent (2017 : San Jose, California)<br/><a href="https://learning.oreilly.com/videos/~/9781491985298/?ar">https://learning.oreilly.com/videos/~/9781491985298/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491985298/?ar">https://go.oreilly.com/library-access/library/view/-/9781491985298/?ar</a><br/>Format: Electronic Resources<br/>
Spring Security LDAP integration and SAML extension
ent://SD_ILS/0/SD_ILS:2313943
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Mishra, Ankit, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781787285538/?ar">https://learning.oreilly.com/videos/~/9781787285538/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar">https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar</a><br/>Format: Electronic Resources<br/>
The security video collection.
ent://SD_ILS/0/SD_ILS:2311088
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Engelke, Charles, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491968581/?ar">https://go.oreilly.com/library-access/library/view/-/9781491968581/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491968581/?ar">https://learning.oreilly.com/videos/~/9781491968581/?ar</a><br/>Format: Electronic Resources<br/>
How to build an anomaly detection engine with Spark, Akka and Cassandra
ent://SD_ILS/0/SD_ILS:2310372
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Busa, Natalino, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491955253/?ar">https://go.oreilly.com/library-access/library/view/-/9781491955253/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491955253/?ar">https://learning.oreilly.com/videos/~/9781491955253/?ar</a><br/>Format: Electronic Resources<br/>
Getting started with cybersecurity science
ent://SD_ILS/0/SD_ILS:2308150
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Dykstra, Josiah, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491936528/?ar">https://go.oreilly.com/library-access/library/view/-/9781491936528/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491936528/?ar">https://learning.oreilly.com/videos/~/9781491936528/?ar</a><br/>Format: Electronic Resources<br/>
Securing cloud services
ent://SD_ILS/0/SD_ILS:2306121
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Miller, David, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar">https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771373340/?ar">https://learning.oreilly.com/videos/~/9781771373340/?ar</a><br/>Format: Electronic Resources<br/>
Salt at scale : lessons from LinkedIn
ent://SD_ILS/0/SD_ILS:2308216
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Sebenik, Craig, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491920893/?ar">https://learning.oreilly.com/videos/~/9781491920893/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar">https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar</a><br/>Format: Electronic Resources<br/>
Manually removing viruses and malware from Windows 7
ent://SD_ILS/0/SD_ILS:2296758
2024-06-19T22:36:11Z
2024-06-19T22:36:11Z
by Halsey, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar">https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781449338053/?ar">https://learning.oreilly.com/videos/~/9781449338053/?ar</a><br/>Format: Electronic Resources<br/>