Search Results for - Narrowed by: Infonuagique -- S&eacute;curit&eacute; -- Mesures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Infonuagique$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509Infonuagique$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300? 2024-06-21T20:48:32Z Azure cloud security for absolute beginners : enabling cloud infrastructure security with multi-level security options ent://SD_ILS/0/SD_ILS:2331034 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Herath, Pushpa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484278604/?ar">https://go.oreilly.com/library-access/library/view/-/9781484278604/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484278604">https://learning.oreilly.com/library/view/~/9781484278604</a> <a href="https://learning.oreilly.com/library/view/~/9781484278604/?ar">https://learning.oreilly.com/library/view/~/9781484278604/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security handbook : find out how to effectively secure cloud environments using AWS, Azure, and GCP ent://SD_ILS/0/SD_ILS:2332481 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Estrin, Eyal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800569195">https://learning.oreilly.com/library/view/~/9781800569195</a> <a href="https://learning.oreilly.com/library/view/~/9781800569195/?ar">https://learning.oreilly.com/library/view/~/9781800569195/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar">https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar</a><br/>Format:&#160;Electronic Resources<br/> Trust in computer systems and the cloud ent://SD_ILS/0/SD_ILS:2330850 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Bursell, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119692324/?ar">https://learning.oreilly.com/library/view/~/9781119692324/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar">https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119692324">https://learning.oreilly.com/library/view/~/9781119692324</a><br/>Format:&#160;Electronic Resources<br/> Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacks ent://SD_ILS/0/SD_ILS:2329941 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Peiris, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119804062/?ar">https://learning.oreilly.com/library/view/~/9781119804062/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar">https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119804062">https://learning.oreilly.com/library/view/~/9781119804062</a><br/>Format:&#160;Electronic Resources<br/> Digital Transformation and Modernization with IBM API Connect : a Practical Guide to Developing, Deploying, and Managing High-Performance and Secure Hybrid-cloud APIs. ent://SD_ILS/0/SD_ILS:2331497 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Kataoka, Bryon.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070799">https://learning.oreilly.com/library/view/~/9781801070799</a> <a href="https://learning.oreilly.com/library/view/~/9781801070799/?ar">https://learning.oreilly.com/library/view/~/9781801070799/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801070799/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070799/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Sentinel in action ent://SD_ILS/0/SD_ILS:2331748 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Diver, Richard, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801815536/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815536/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801815536/?ar">https://learning.oreilly.com/library/view/~/9781801815536/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801815536">https://learning.oreilly.com/library/view/~/9781801815536</a><br/>Format:&#160;Electronic Resources<br/> Cloud native security cookbook : recipes for a secure cloud. ent://SD_ILS/0/SD_ILS:2332684 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Armitage, Josh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098106294">https://learning.oreilly.com/library/view/~/9781098106294</a> <a href="https://learning.oreilly.com/library/view/~/9781098106294/?ar">https://learning.oreilly.com/library/view/~/9781098106294/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098106294/?ar">https://go.oreilly.com/library-access/library/view/-/9781098106294/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with IBM Hyper Protect Data Controller ent://SD_ILS/0/SD_ILS:2331451 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security for dummies ent://SD_ILS/0/SD_ILS:2332497 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a> <a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud defense strategies with Azure Sentinel : hands-on threat hunting in cloud logs and services ent://SD_ILS/0/SD_ILS:2330199 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484271322/?ar">https://learning.oreilly.com/library/view/~/9781484271322/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484271322/?ar">https://go.oreilly.com/library-access/library/view/-/9781484271322/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484271322">https://learning.oreilly.com/library/view/~/9781484271322</a><br/>Format:&#160;Electronic Resources<br/> Cyber security on Azure : an it professional's guide to Microsoft Azure security ent://SD_ILS/0/SD_ILS:2327167 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484265314/?ar">https://learning.oreilly.com/library/view/~/9781484265314/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484265314">https://learning.oreilly.com/library/view/~/9781484265314</a><br/>Format:&#160;Electronic Resources<br/> How to hack like a ghost ent://SD_ILS/0/SD_ILS:2326507 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a> <a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format:&#160;Electronic Resources<br/> Zscaler cloud security essentials discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler ent://SD_ILS/0/SD_ILS:2328900 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Devarasetty, Ravi, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800567986/?ar">https://learning.oreilly.com/library/view/~/9781800567986/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800567986">https://learning.oreilly.com/library/view/~/9781800567986</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800567986/?ar">https://go.oreilly.com/library-access/library/view/-/9781800567986/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud Native Security ent://SD_ILS/0/SD_ILS:2329170 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Binnie, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9781119782230">https://learning.oreilly.com/library/view/~/9781119782230</a> <a href="https://learning.oreilly.com/library/view/~/9781119782230/?ar">https://learning.oreilly.com/library/view/~/9781119782230/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119782230/?ar">https://go.oreilly.com/library-access/library/view/-/9781119782230/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure Sentinel : Planning and implementing Microsoft s cloud-native SIEM solution ent://SD_ILS/0/SD_ILS:2323404 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780136485506/?ar">https://go.oreilly.com/library-access/library/view/-/9780136485506/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780136485506/?ar">https://learning.oreilly.com/library/view/~/9780136485506/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780136485506">https://learning.oreilly.com/library/view/~/9780136485506</a><br/>Format:&#160;Electronic Resources<br/> Building a Future-Proof Cloud Infrastructure : a Unified Architecture for Network, Security, and Storage Services ent://SD_ILS/0/SD_ILS:2323429 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Gai, Silvano, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780136624226">https://learning.oreilly.com/library/view/~/9780136624226</a> <a href="https://learning.oreilly.com/library/view/~/9780136624226/?ar">https://learning.oreilly.com/library/view/~/9780136624226/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780136624226/?ar">https://go.oreilly.com/library-access/library/view/-/9780136624226/?ar</a><br/>Format:&#160;Electronic Resources<br/> AWS SECURITY COOKBOOK;PRACTICAL SOLUTIONS FOR MANAGING SECURITY POLICIES, MONITORING, AUDITING, AND COMPLIANCE WITH AWS ent://SD_ILS/0/SD_ILS:2323340 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;HEARTIN KANIKATHOTTU.<br/><a href="https://learning.oreilly.com/library/view/~/9781838826253">https://learning.oreilly.com/library/view/~/9781838826253</a> <a href="https://learning.oreilly.com/library/view/~/9781838826253/?ar">https://learning.oreilly.com/library/view/~/9781838826253/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar">https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar</a><br/>Format:&#160;Electronic Resources<br/> Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud ent://SD_ILS/0/SD_ILS:2326395 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Calles, Miguel A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484261002/?ar">https://learning.oreilly.com/library/view/~/9781484261002/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484261002">https://learning.oreilly.com/library/view/~/9781484261002</a><br/>Format:&#160;Electronic Resources<br/> SECURING CLOUD SERVICES;A PRAGMATIC APPROACH, SECOND EDITION. ent://SD_ILS/0/SD_ILS:2328081 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;LEE NEWCOMBE.<br/><a href="https://learning.oreilly.com/library/view/~/9781787782075">https://learning.oreilly.com/library/view/~/9781787782075</a> <a href="https://learning.oreilly.com/library/view/~/9781787782075/?ar">https://learning.oreilly.com/library/view/~/9781787782075/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar">https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Security, 2nd Edition ent://SD_ILS/0/SD_ILS:2331101 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a> <a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format:&#160;Electronic Resources<br/> Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud ent://SD_ILS/0/SD_ILS:2321488 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Berkouwer, Sander, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806984">https://learning.oreilly.com/library/view/~/9781789806984</a> <a href="https://learning.oreilly.com/library/view/~/9781789806984/?ar">https://learning.oreilly.com/library/view/~/9781789806984/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber-Vigilance and Digital Trust ent://SD_ILS/0/SD_ILS:2324869 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Tounsi, Wiem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786304483">https://learning.oreilly.com/library/view/~/9781786304483</a> <a href="https://learning.oreilly.com/library/view/~/9781786304483/?ar">https://learning.oreilly.com/library/view/~/9781786304483/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar</a><br/>Format:&#160;Electronic Resources<br/> Load balancing in Microsoft Azure : practical solutions with NGINX and Microsoft Azure ent://SD_ILS/0/SD_ILS:2321436 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Nugara, Arlan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492053934/?ar">https://go.oreilly.com/library-access/library/view/-/9781492053934/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492053934/?ar">https://learning.oreilly.com/library/view/~/9781492053934/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492053934">https://learning.oreilly.com/library/view/~/9781492053934</a><br/>Format:&#160;Electronic Resources<br/> Security designs for the cloud, IoT, and social networking ent://SD_ILS/0/SD_ILS:2321882 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Le, Dac-Nhuong, 1983- editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119592266">https://learning.oreilly.com/library/view/~/9781119592266</a> <a href="https://learning.oreilly.com/library/view/~/9781119592266/?ar">https://learning.oreilly.com/library/view/~/9781119592266/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119592266/?ar">https://go.oreilly.com/library-access/library/view/-/9781119592266/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security, privacy and digital forensics in the cloud ent://SD_ILS/0/SD_ILS:2318042 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Chen, Lei, 1978 July 28- editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119053286/?ar">https://learning.oreilly.com/library/view/~/9781119053286/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119053286/?ar">https://go.oreilly.com/library-access/library/view/-/9781119053286/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119053286">https://learning.oreilly.com/library/view/~/9781119053286</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography in .NET and Azure Key Vault : a Practical Guide to Encryption in .NET and .NET Core ent://SD_ILS/0/SD_ILS:2318697 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Haunts, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243756/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243756/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243756/?ar">https://learning.oreilly.com/library/view/~/9781484243756/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243756">https://learning.oreilly.com/library/view/~/9781484243756</a><br/>Format:&#160;Electronic Resources<br/> Practical cloud security : a guide for secure design and deployment ent://SD_ILS/0/SD_ILS:2319005 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Dotson, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492037507">https://learning.oreilly.com/library/view/~/9781492037507</a> <a href="https://learning.oreilly.com/library/view/~/9781492037507/?ar">https://learning.oreilly.com/library/view/~/9781492037507/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security with Go : explore the power of Golang to secure host, web, and cloud services ent://SD_ILS/0/SD_ILS:2315759 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Leon, John Daniel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627917/?ar">https://learning.oreilly.com/library/view/~/9781788627917/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627917/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627917/?ar</a><br/>Format:&#160;Electronic Resources<br/> PfSense 2.x cookbook : manage and maintain your network using pfSense ent://SD_ILS/0/SD_ILS:2318811 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Zientara, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806427">https://learning.oreilly.com/library/view/~/9781789806427</a> <a href="https://learning.oreilly.com/library/view/~/9781789806427/?ar">https://learning.oreilly.com/library/view/~/9781789806427/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789806427/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806427/?ar</a><br/>Format:&#160;Electronic Resources<br/> Pentesting Azure applications : the definitive guide to testing and securing deployments ent://SD_ILS/0/SD_ILS:2317413 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Burrough, Matt, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492069416/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069416/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492069416/?ar">https://learning.oreilly.com/library/view/~/9781492069416/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492069416">https://learning.oreilly.com/library/view/~/9781492069416</a><br/>Format:&#160;Electronic Resources<br/> AWS : security best practices on AWS : learn to secure your data, servers, and applications with AWS ent://SD_ILS/0/SD_ILS:2316108 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Anthony, Albert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789134513/?ar">https://learning.oreilly.com/library/view/~/9781789134513/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789134513">https://learning.oreilly.com/library/view/~/9781789134513</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789134513/?ar">https://go.oreilly.com/library-access/library/view/-/9781789134513/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security automation : get to grips with automating your cloud security on AWS and OpenStack ent://SD_ILS/0/SD_ILS:2316344 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Priyam, Prashant, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627863/?ar">https://learning.oreilly.com/library/view/~/9781788627863/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise cloud security and governance : efficiently set data protection and privacy principles ent://SD_ILS/0/SD_ILS:2315410 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Vora, Zeal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788299558/?ar">https://learning.oreilly.com/library/view/~/9781788299558/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788299558/?ar">https://go.oreilly.com/library-access/library/view/-/9781788299558/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud computing security : foundations and challenges ent://SD_ILS/0/SD_ILS:2311524 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security guidelines for IBM power systems ent://SD_ILS/0/SD_ILS:2310148 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Aslan, Turgut, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738441429/?ar">https://learning.oreilly.com/library/view/~/9780738441429/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738441429/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441429/?ar</a><br/>Format:&#160;Electronic Resources<br/> CSA guide to cloud computing : implementing cloud privacy and security ent://SD_ILS/0/SD_ILS:2304776 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Samani, Raj, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar">https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124201255/?ar">https://learning.oreilly.com/library/view/~/9780124201255/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124201255">https://learning.oreilly.com/library/view/~/9780124201255</a><br/>Format:&#160;Electronic Resources<br/> The cloud security ecosystem : technical, legal, business and management issues ent://SD_ILS/0/SD_ILS:2307649 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Ko, Ryan, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar">https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128017807/?ar">https://learning.oreilly.com/library/view/~/9780128017807/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security guidelines for IBM power systems ent://SD_ILS/0/SD_ILS:2306678 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;B&uuml;cker, Axel, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738440353/?ar">https://learning.oreilly.com/library/view/~/0738440353/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738440353/?ar">https://go.oreilly.com/library-access/library/view/-/0738440353/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738440353">https://learning.oreilly.com/library/view/~/0738440353</a><br/>Format:&#160;Electronic Resources<br/> Data protection and the cloud : are the risks too great? ent://SD_ILS/0/SD_ILS:2308847 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Ticher, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287135/?ar">https://learning.oreilly.com/library/view/~/9781849287135/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud storage security : a practical guide ent://SD_ILS/0/SD_ILS:2307935 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Wheeler, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029312/?ar">https://learning.oreilly.com/library/view/~/9780128029312/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building the infrastructure for cloud security : a solutions view ent://SD_ILS/0/SD_ILS:2302820 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Yeluri, Raghu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430261452">https://learning.oreilly.com/library/view/~/9781430261452</a> <a href="https://learning.oreilly.com/library/view/~/9781430261452/?ar">https://learning.oreilly.com/library/view/~/9781430261452/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430261452/?ar">https://go.oreilly.com/library-access/library/view/-/9781430261452/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing security and compliance in cloud or virtualized data centers ent://SD_ILS/0/SD_ILS:2302884 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;B&uuml;cker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738437670/?ar">https://go.oreilly.com/library-access/library/view/-/0738437670/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738437670/?ar">https://learning.oreilly.com/library/view/~/0738437670/?ar</a><br/>Format:&#160;Electronic Resources<br/> Developing and Securing the Cloud. ent://SD_ILS/0/SD_ILS:2300493 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Thuraisingham, Bhavani.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439862919/?ar">https://go.oreilly.com/library-access/library/view/-/9781439862919/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439862919/?ar">https://learning.oreilly.com/library/view/~/9781439862919/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439862919">https://learning.oreilly.com/library/view/~/9781439862919</a><br/>Format:&#160;Electronic Resources<br/> Auditing cloud computing : a security and privacy guide ent://SD_ILS/0/SD_ILS:2292255 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format:&#160;Electronic Resources<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:2292491 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Winkler, J. R. (Joachim R.)<br/><a href="https://learning.oreilly.com/library/view/~/9781597495929">https://learning.oreilly.com/library/view/~/9781597495929</a> <a href="https://learning.oreilly.com/library/view/~/9781597495929/?ar">https://learning.oreilly.com/library/view/~/9781597495929/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud Security and Governance : Who's on your cloud?. ent://SD_ILS/0/SD_ILS:2290671 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Blount, Sumner.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280983">https://learning.oreilly.com/library/view/~/9781849280983</a> <a href="https://learning.oreilly.com/library/view/~/9781849280983/?ar">https://learning.oreilly.com/library/view/~/9781849280983/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security : a comprehensive guide to secure cloud computing ent://SD_ILS/0/SD_ILS:2289708 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Krutz, Ronald L., 1938-<br/><a href="https://learning.oreilly.com/library/view/~/9780470589878/?ar">https://learning.oreilly.com/library/view/~/9780470589878/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar">https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470589878">https://learning.oreilly.com/library/view/~/9780470589878</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:2289149 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Lillard, Terrence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495387/?ar">https://learning.oreilly.com/library/view/~/9781597495387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495387">https://learning.oreilly.com/library/view/~/9781597495387</a><br/>Format:&#160;Electronic Resources<br/> Cloud security and privacy ent://SD_ILS/0/SD_ILS:2287451 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Mather, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806453/?ar">https://learning.oreilly.com/library/view/~/9780596806453/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596806453">https://learning.oreilly.com/library/view/~/9780596806453</a><br/>Format:&#160;Electronic Resources<br/> VMware vSphere and virtual infrastructure security : securing the virtual environment ent://SD_ILS/0/SD_ILS:2288049 2024-06-21T20:48:32Z 2024-06-21T20:48:32Z by&#160;Haletky, Edward.<br/><a href="https://learning.oreilly.com/library/view/~/9780136083214/?ar">https://learning.oreilly.com/library/view/~/9780136083214/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780136083214/?ar">https://go.oreilly.com/library-access/library/view/-/9780136083214/?ar</a><br/>Format:&#160;Electronic Resources<br/>