Search Results for - Narrowed by: Infonuagique -- Sécurité -- Mesures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Infonuagique$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509Infonuagique$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300?
2024-06-21T20:48:32Z
Azure cloud security for absolute beginners : enabling cloud infrastructure security with multi-level security options
ent://SD_ILS/0/SD_ILS:2331034
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Herath, Pushpa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484278604/?ar">https://go.oreilly.com/library-access/library/view/-/9781484278604/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484278604">https://learning.oreilly.com/library/view/~/9781484278604</a>
<a href="https://learning.oreilly.com/library/view/~/9781484278604/?ar">https://learning.oreilly.com/library/view/~/9781484278604/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security handbook : find out how to effectively secure cloud environments using AWS, Azure, and GCP
ent://SD_ILS/0/SD_ILS:2332481
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Estrin, Eyal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800569195">https://learning.oreilly.com/library/view/~/9781800569195</a>
<a href="https://learning.oreilly.com/library/view/~/9781800569195/?ar">https://learning.oreilly.com/library/view/~/9781800569195/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar">https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar</a><br/>Format: Electronic Resources<br/>
Trust in computer systems and the cloud
ent://SD_ILS/0/SD_ILS:2330850
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Bursell, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119692324/?ar">https://learning.oreilly.com/library/view/~/9781119692324/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar">https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119692324">https://learning.oreilly.com/library/view/~/9781119692324</a><br/>Format: Electronic Resources<br/>
Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacks
ent://SD_ILS/0/SD_ILS:2329941
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Peiris, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119804062/?ar">https://learning.oreilly.com/library/view/~/9781119804062/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar">https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119804062">https://learning.oreilly.com/library/view/~/9781119804062</a><br/>Format: Electronic Resources<br/>
Digital Transformation and Modernization with IBM API Connect : a Practical Guide to Developing, Deploying, and Managing High-Performance and Secure Hybrid-cloud APIs.
ent://SD_ILS/0/SD_ILS:2331497
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Kataoka, Bryon.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070799">https://learning.oreilly.com/library/view/~/9781801070799</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070799/?ar">https://learning.oreilly.com/library/view/~/9781801070799/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801070799/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070799/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Sentinel in action
ent://SD_ILS/0/SD_ILS:2331748
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Diver, Richard, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801815536/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815536/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815536/?ar">https://learning.oreilly.com/library/view/~/9781801815536/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815536">https://learning.oreilly.com/library/view/~/9781801815536</a><br/>Format: Electronic Resources<br/>
Cloud native security cookbook : recipes for a secure cloud.
ent://SD_ILS/0/SD_ILS:2332684
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Armitage, Josh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098106294">https://learning.oreilly.com/library/view/~/9781098106294</a>
<a href="https://learning.oreilly.com/library/view/~/9781098106294/?ar">https://learning.oreilly.com/library/view/~/9781098106294/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098106294/?ar">https://go.oreilly.com/library-access/library/view/-/9781098106294/?ar</a><br/>Format: Electronic Resources<br/>
Getting started with IBM Hyper Protect Data Controller
ent://SD_ILS/0/SD_ILS:2331451
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security for dummies
ent://SD_ILS/0/SD_ILS:2332497
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a>
<a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format: Electronic Resources<br/>
Cloud defense strategies with Azure Sentinel : hands-on threat hunting in cloud logs and services
ent://SD_ILS/0/SD_ILS:2330199
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484271322/?ar">https://learning.oreilly.com/library/view/~/9781484271322/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484271322/?ar">https://go.oreilly.com/library-access/library/view/-/9781484271322/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484271322">https://learning.oreilly.com/library/view/~/9781484271322</a><br/>Format: Electronic Resources<br/>
Cyber security on Azure : an it professional's guide to Microsoft Azure security
ent://SD_ILS/0/SD_ILS:2327167
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484265314/?ar">https://learning.oreilly.com/library/view/~/9781484265314/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265314">https://learning.oreilly.com/library/view/~/9781484265314</a><br/>Format: Electronic Resources<br/>
How to hack like a ghost
ent://SD_ILS/0/SD_ILS:2326507
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format: Electronic Resources<br/>
Zscaler cloud security essentials discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler
ent://SD_ILS/0/SD_ILS:2328900
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Devarasetty, Ravi, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800567986/?ar">https://learning.oreilly.com/library/view/~/9781800567986/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800567986">https://learning.oreilly.com/library/view/~/9781800567986</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800567986/?ar">https://go.oreilly.com/library-access/library/view/-/9781800567986/?ar</a><br/>Format: Electronic Resources<br/>
Cloud Native Security
ent://SD_ILS/0/SD_ILS:2329170
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Binnie, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9781119782230">https://learning.oreilly.com/library/view/~/9781119782230</a>
<a href="https://learning.oreilly.com/library/view/~/9781119782230/?ar">https://learning.oreilly.com/library/view/~/9781119782230/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119782230/?ar">https://go.oreilly.com/library-access/library/view/-/9781119782230/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Azure Sentinel : Planning and implementing Microsoft s cloud-native SIEM solution
ent://SD_ILS/0/SD_ILS:2323404
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780136485506/?ar">https://go.oreilly.com/library-access/library/view/-/9780136485506/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780136485506/?ar">https://learning.oreilly.com/library/view/~/9780136485506/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780136485506">https://learning.oreilly.com/library/view/~/9780136485506</a><br/>Format: Electronic Resources<br/>
Building a Future-Proof Cloud Infrastructure : a Unified Architecture for Network, Security, and Storage Services
ent://SD_ILS/0/SD_ILS:2323429
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Gai, Silvano, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780136624226">https://learning.oreilly.com/library/view/~/9780136624226</a>
<a href="https://learning.oreilly.com/library/view/~/9780136624226/?ar">https://learning.oreilly.com/library/view/~/9780136624226/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780136624226/?ar">https://go.oreilly.com/library-access/library/view/-/9780136624226/?ar</a><br/>Format: Electronic Resources<br/>
AWS SECURITY COOKBOOK;PRACTICAL SOLUTIONS FOR MANAGING SECURITY POLICIES, MONITORING, AUDITING, AND COMPLIANCE WITH AWS
ent://SD_ILS/0/SD_ILS:2323340
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by HEARTIN KANIKATHOTTU.<br/><a href="https://learning.oreilly.com/library/view/~/9781838826253">https://learning.oreilly.com/library/view/~/9781838826253</a>
<a href="https://learning.oreilly.com/library/view/~/9781838826253/?ar">https://learning.oreilly.com/library/view/~/9781838826253/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar">https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar</a><br/>Format: Electronic Resources<br/>
Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud
ent://SD_ILS/0/SD_ILS:2326395
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Calles, Miguel A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002/?ar">https://learning.oreilly.com/library/view/~/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002">https://learning.oreilly.com/library/view/~/9781484261002</a><br/>Format: Electronic Resources<br/>
SECURING CLOUD SERVICES;A PRAGMATIC APPROACH, SECOND EDITION.
ent://SD_ILS/0/SD_ILS:2328081
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by LEE NEWCOMBE.<br/><a href="https://learning.oreilly.com/library/view/~/9781787782075">https://learning.oreilly.com/library/view/~/9781787782075</a>
<a href="https://learning.oreilly.com/library/view/~/9781787782075/?ar">https://learning.oreilly.com/library/view/~/9781787782075/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar">https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar</a><br/>Format: Electronic Resources<br/>
Cloud Computing Security, 2nd Edition
ent://SD_ILS/0/SD_ILS:2331101
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>
Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud
ent://SD_ILS/0/SD_ILS:2321488
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Berkouwer, Sander, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806984">https://learning.oreilly.com/library/view/~/9781789806984</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806984/?ar">https://learning.oreilly.com/library/view/~/9781789806984/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar</a><br/>Format: Electronic Resources<br/>
Cyber-Vigilance and Digital Trust
ent://SD_ILS/0/SD_ILS:2324869
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Tounsi, Wiem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786304483">https://learning.oreilly.com/library/view/~/9781786304483</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304483/?ar">https://learning.oreilly.com/library/view/~/9781786304483/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar</a><br/>Format: Electronic Resources<br/>
Load balancing in Microsoft Azure : practical solutions with NGINX and Microsoft Azure
ent://SD_ILS/0/SD_ILS:2321436
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Nugara, Arlan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492053934/?ar">https://go.oreilly.com/library-access/library/view/-/9781492053934/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492053934/?ar">https://learning.oreilly.com/library/view/~/9781492053934/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492053934">https://learning.oreilly.com/library/view/~/9781492053934</a><br/>Format: Electronic Resources<br/>
Security designs for the cloud, IoT, and social networking
ent://SD_ILS/0/SD_ILS:2321882
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Le, Dac-Nhuong, 1983- editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119592266">https://learning.oreilly.com/library/view/~/9781119592266</a>
<a href="https://learning.oreilly.com/library/view/~/9781119592266/?ar">https://learning.oreilly.com/library/view/~/9781119592266/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119592266/?ar">https://go.oreilly.com/library-access/library/view/-/9781119592266/?ar</a><br/>Format: Electronic Resources<br/>
Security, privacy and digital forensics in the cloud
ent://SD_ILS/0/SD_ILS:2318042
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Chen, Lei, 1978 July 28- editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119053286/?ar">https://learning.oreilly.com/library/view/~/9781119053286/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119053286/?ar">https://go.oreilly.com/library-access/library/view/-/9781119053286/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119053286">https://learning.oreilly.com/library/view/~/9781119053286</a><br/>Format: Electronic Resources<br/>
Applied Cryptography in .NET and Azure Key Vault : a Practical Guide to Encryption in .NET and .NET Core
ent://SD_ILS/0/SD_ILS:2318697
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Haunts, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243756/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243756/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243756/?ar">https://learning.oreilly.com/library/view/~/9781484243756/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243756">https://learning.oreilly.com/library/view/~/9781484243756</a><br/>Format: Electronic Resources<br/>
Practical cloud security : a guide for secure design and deployment
ent://SD_ILS/0/SD_ILS:2319005
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Dotson, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492037507">https://learning.oreilly.com/library/view/~/9781492037507</a>
<a href="https://learning.oreilly.com/library/view/~/9781492037507/?ar">https://learning.oreilly.com/library/view/~/9781492037507/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar</a><br/>Format: Electronic Resources<br/>
Security with Go : explore the power of Golang to secure host, web, and cloud services
ent://SD_ILS/0/SD_ILS:2315759
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Leon, John Daniel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627917/?ar">https://learning.oreilly.com/library/view/~/9781788627917/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627917/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627917/?ar</a><br/>Format: Electronic Resources<br/>
PfSense 2.x cookbook : manage and maintain your network using pfSense
ent://SD_ILS/0/SD_ILS:2318811
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Zientara, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806427">https://learning.oreilly.com/library/view/~/9781789806427</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806427/?ar">https://learning.oreilly.com/library/view/~/9781789806427/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789806427/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806427/?ar</a><br/>Format: Electronic Resources<br/>
Pentesting Azure applications : the definitive guide to testing and securing deployments
ent://SD_ILS/0/SD_ILS:2317413
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Burrough, Matt, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492069416/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069416/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492069416/?ar">https://learning.oreilly.com/library/view/~/9781492069416/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492069416">https://learning.oreilly.com/library/view/~/9781492069416</a><br/>Format: Electronic Resources<br/>
AWS : security best practices on AWS : learn to secure your data, servers, and applications with AWS
ent://SD_ILS/0/SD_ILS:2316108
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Anthony, Albert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789134513/?ar">https://learning.oreilly.com/library/view/~/9781789134513/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789134513">https://learning.oreilly.com/library/view/~/9781789134513</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789134513/?ar">https://go.oreilly.com/library-access/library/view/-/9781789134513/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security automation : get to grips with automating your cloud security on AWS and OpenStack
ent://SD_ILS/0/SD_ILS:2316344
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Priyam, Prashant, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627863/?ar">https://learning.oreilly.com/library/view/~/9781788627863/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar</a><br/>Format: Electronic Resources<br/>
Enterprise cloud security and governance : efficiently set data protection and privacy principles
ent://SD_ILS/0/SD_ILS:2315410
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Vora, Zeal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788299558/?ar">https://learning.oreilly.com/library/view/~/9781788299558/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788299558/?ar">https://go.oreilly.com/library-access/library/view/-/9781788299558/?ar</a><br/>Format: Electronic Resources<br/>
Cloud computing security : foundations and challenges
ent://SD_ILS/0/SD_ILS:2311524
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security guidelines for IBM power systems
ent://SD_ILS/0/SD_ILS:2310148
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Aslan, Turgut, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738441429/?ar">https://learning.oreilly.com/library/view/~/9780738441429/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738441429/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441429/?ar</a><br/>Format: Electronic Resources<br/>
CSA guide to cloud computing : implementing cloud privacy and security
ent://SD_ILS/0/SD_ILS:2304776
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Samani, Raj, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar">https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124201255/?ar">https://learning.oreilly.com/library/view/~/9780124201255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124201255">https://learning.oreilly.com/library/view/~/9780124201255</a><br/>Format: Electronic Resources<br/>
The cloud security ecosystem : technical, legal, business and management issues
ent://SD_ILS/0/SD_ILS:2307649
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Ko, Ryan, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar">https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128017807/?ar">https://learning.oreilly.com/library/view/~/9780128017807/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security guidelines for IBM power systems
ent://SD_ILS/0/SD_ILS:2306678
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Bücker, Axel, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738440353/?ar">https://learning.oreilly.com/library/view/~/0738440353/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738440353/?ar">https://go.oreilly.com/library-access/library/view/-/0738440353/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738440353">https://learning.oreilly.com/library/view/~/0738440353</a><br/>Format: Electronic Resources<br/>
Data protection and the cloud : are the risks too great?
ent://SD_ILS/0/SD_ILS:2308847
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Ticher, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287135/?ar">https://learning.oreilly.com/library/view/~/9781849287135/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar</a><br/>Format: Electronic Resources<br/>
Cloud storage security : a practical guide
ent://SD_ILS/0/SD_ILS:2307935
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Wheeler, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029312/?ar">https://learning.oreilly.com/library/view/~/9780128029312/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar</a><br/>Format: Electronic Resources<br/>
Building the infrastructure for cloud security : a solutions view
ent://SD_ILS/0/SD_ILS:2302820
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Yeluri, Raghu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430261452">https://learning.oreilly.com/library/view/~/9781430261452</a>
<a href="https://learning.oreilly.com/library/view/~/9781430261452/?ar">https://learning.oreilly.com/library/view/~/9781430261452/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430261452/?ar">https://go.oreilly.com/library-access/library/view/-/9781430261452/?ar</a><br/>Format: Electronic Resources<br/>
Managing security and compliance in cloud or virtualized data centers
ent://SD_ILS/0/SD_ILS:2302884
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738437670/?ar">https://go.oreilly.com/library-access/library/view/-/0738437670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738437670/?ar">https://learning.oreilly.com/library/view/~/0738437670/?ar</a><br/>Format: Electronic Resources<br/>
Developing and Securing the Cloud.
ent://SD_ILS/0/SD_ILS:2300493
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Thuraisingham, Bhavani.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439862919/?ar">https://go.oreilly.com/library-access/library/view/-/9781439862919/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439862919/?ar">https://learning.oreilly.com/library/view/~/9781439862919/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439862919">https://learning.oreilly.com/library/view/~/9781439862919</a><br/>Format: Electronic Resources<br/>
Auditing cloud computing : a security and privacy guide
ent://SD_ILS/0/SD_ILS:2292255
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format: Electronic Resources<br/>
Securing the cloud : cloud computer security techniques and tactics
ent://SD_ILS/0/SD_ILS:2292491
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Winkler, J. R. (Joachim R.)<br/><a href="https://learning.oreilly.com/library/view/~/9781597495929">https://learning.oreilly.com/library/view/~/9781597495929</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495929/?ar">https://learning.oreilly.com/library/view/~/9781597495929/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar</a><br/>Format: Electronic Resources<br/>
Cloud Security and Governance : Who's on your cloud?.
ent://SD_ILS/0/SD_ILS:2290671
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Blount, Sumner.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280983">https://learning.oreilly.com/library/view/~/9781849280983</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280983/?ar">https://learning.oreilly.com/library/view/~/9781849280983/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security : a comprehensive guide to secure cloud computing
ent://SD_ILS/0/SD_ILS:2289708
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Krutz, Ronald L., 1938-<br/><a href="https://learning.oreilly.com/library/view/~/9780470589878/?ar">https://learning.oreilly.com/library/view/~/9780470589878/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar">https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470589878">https://learning.oreilly.com/library/view/~/9780470589878</a><br/>Format: Electronic Resources<br/>
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:2289149
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Lillard, Terrence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387/?ar">https://learning.oreilly.com/library/view/~/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387">https://learning.oreilly.com/library/view/~/9781597495387</a><br/>Format: Electronic Resources<br/>
Cloud security and privacy
ent://SD_ILS/0/SD_ILS:2287451
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Mather, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806453/?ar">https://learning.oreilly.com/library/view/~/9780596806453/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596806453">https://learning.oreilly.com/library/view/~/9780596806453</a><br/>Format: Electronic Resources<br/>
VMware vSphere and virtual infrastructure security : securing the virtual environment
ent://SD_ILS/0/SD_ILS:2288049
2024-06-21T20:48:32Z
2024-06-21T20:48:32Z
by Haletky, Edward.<br/><a href="https://learning.oreilly.com/library/view/~/9780136083214/?ar">https://learning.oreilly.com/library/view/~/9780136083214/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780136083214/?ar">https://go.oreilly.com/library-access/library/view/-/9780136083214/?ar</a><br/>Format: Electronic Resources<br/>