Search Results for - Narrowed by: Electronic videos. - S&eacute;curit&eacute; informatique. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Electronic$002bvideos.$002509Electronic$002bvideos.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300$0026isd$003dtrue? 2024-06-19T22:36:11Z Generative malware outbreak detection ent://SD_ILS/0/SD_ILS:2325158 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Park, Sean, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar">https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920373452/?ar">https://learning.oreilly.com/videos/~/0636920373452/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920373452">https://learning.oreilly.com/videos/~/0636920373452</a><br/>Format:&#160;Electronic Resources<br/> Security principles for the working architect ent://SD_ILS/0/SD_ILS:2322691 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Woods, Eoin, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338215/?ar">https://learning.oreilly.com/videos/~/0636920338215/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920338215">https://learning.oreilly.com/videos/~/0636920338215</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web hacking : become a professional web pentester ent://SD_ILS/0/SD_ILS:2319831 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Complete Ethical Hacking Course ent://SD_ILS/0/SD_ILS:2323185 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Enterprise Mobility and Security training ent://SD_ILS/0/SD_ILS:2319556 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat and vulnerability assessment for enterprises ent://SD_ILS/0/SD_ILS:2319277 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781838559205/?ar">https://learning.oreilly.com/videos/~/9781838559205/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar">https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of hacking (video collection) ent://SD_ILS/0/SD_ILS:2319884 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar">https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780135767849/?ar">https://learning.oreilly.com/videos/~/9780135767849/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux troubleshooting course with real life examples ent://SD_ILS/0/SD_ILS:2323238 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to build privacy and security into deep learning models ent://SD_ILS/0/SD_ILS:2322791 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format:&#160;Electronic Resources<br/> Hands-on cryptography with Java ent://SD_ILS/0/SD_ILS:2319124 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Costlow, Erik, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar">https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781838554972/?ar">https://learning.oreilly.com/videos/~/9781838554972/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux tutorial for beginners ent://SD_ILS/0/SD_ILS:2317579 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Naja, Tarek, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar">https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789615173/?ar">https://learning.oreilly.com/videos/~/9781789615173/?ar</a><br/>Format:&#160;Electronic Resources<br/> What is cybersecurity? ent://SD_ILS/0/SD_ILS:2318722 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format:&#160;Electronic Resources<br/> Risk management for cybersecurity and IT managers ent://SD_ILS/0/SD_ILS:2316845 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789531992/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531992/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789531992/?ar">https://learning.oreilly.com/videos/~/9781789531992/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : endpoint defense ent://SD_ILS/0/SD_ILS:2316613 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Dewey, Gary, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788990981/?ar">https://learning.oreilly.com/videos/~/9781788990981/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to malware analysis for incident responders ent://SD_ILS/0/SD_ILS:2316850 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530612/?ar">https://learning.oreilly.com/videos/~/9781789530612/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn ethical hacking from scratch ent://SD_ILS/0/SD_ILS:2316923 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789340297/?ar">https://learning.oreilly.com/videos/~/9781789340297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity attacks (Red Team activity) ent://SD_ILS/0/SD_ILS:2315986 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Nesterenko, Sergii, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781788478878/?ar">https://learning.oreilly.com/videos/~/9781788478878/?ar</a><br/>Format:&#160;Electronic Resources<br/> WiFi hacking : wireless penetration testing for beginners ent://SD_ILS/0/SD_ILS:2316772 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530193/?ar">https://learning.oreilly.com/videos/~/9781789530193/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced malware analysis ent://SD_ILS/0/SD_ILS:2317857 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Njenga, Munir, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788627146/?ar">https://learning.oreilly.com/videos/~/9781788627146/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking masterclass ent://SD_ILS/0/SD_ILS:2317748 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789530018/?ar">https://learning.oreilly.com/videos/~/9781789530018/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar</a><br/>Format:&#160;Electronic Resources<br/> Fluent conference 2017, San Jose, CA. ent://SD_ILS/0/SD_ILS:2313669 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Fluent (2017 : San Jose, California)<br/><a href="https://learning.oreilly.com/videos/~/9781491985298/?ar">https://learning.oreilly.com/videos/~/9781491985298/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491985298/?ar">https://go.oreilly.com/library-access/library/view/-/9781491985298/?ar</a><br/>Format:&#160;Electronic Resources<br/> Spring Security LDAP integration and SAML extension ent://SD_ILS/0/SD_ILS:2313943 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Mishra, Ankit, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781787285538/?ar">https://learning.oreilly.com/videos/~/9781787285538/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar">https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar</a><br/>Format:&#160;Electronic Resources<br/> The security video collection. ent://SD_ILS/0/SD_ILS:2311088 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Engelke, Charles, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491968581/?ar">https://go.oreilly.com/library-access/library/view/-/9781491968581/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491968581/?ar">https://learning.oreilly.com/videos/~/9781491968581/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to build an anomaly detection engine with Spark, Akka and Cassandra ent://SD_ILS/0/SD_ILS:2310372 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Busa, Natalino, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491955253/?ar">https://go.oreilly.com/library-access/library/view/-/9781491955253/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491955253/?ar">https://learning.oreilly.com/videos/~/9781491955253/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with cybersecurity science ent://SD_ILS/0/SD_ILS:2308150 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Dykstra, Josiah, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491936528/?ar">https://go.oreilly.com/library-access/library/view/-/9781491936528/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491936528/?ar">https://learning.oreilly.com/videos/~/9781491936528/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing cloud services ent://SD_ILS/0/SD_ILS:2306121 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Miller, David, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar">https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771373340/?ar">https://learning.oreilly.com/videos/~/9781771373340/?ar</a><br/>Format:&#160;Electronic Resources<br/> Salt at scale : lessons from LinkedIn ent://SD_ILS/0/SD_ILS:2308216 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Sebenik, Craig, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491920893/?ar">https://learning.oreilly.com/videos/~/9781491920893/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar">https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar</a><br/>Format:&#160;Electronic Resources<br/> Manually removing viruses and malware from Windows 7 ent://SD_ILS/0/SD_ILS:2296758 2024-06-19T22:36:11Z 2024-06-19T22:36:11Z by&#160;Halsey, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar">https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781449338053/?ar">https://learning.oreilly.com/videos/~/9781449338053/?ar</a><br/>Format:&#160;Electronic Resources<br/>