Search Results for - Narrowed by: Infonuagique -- Sécurité -- Mesures. - Sécurité informatique.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Infonuagique$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509Infonuagique$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300$0026isd$003dtrue?
2024-06-24T00:00:40Z
Cloud security handbook : find out how to effectively secure cloud environments using AWS, Azure, and GCP
ent://SD_ILS/0/SD_ILS:2332481
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Estrin, Eyal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800569195">https://learning.oreilly.com/library/view/~/9781800569195</a>
<a href="https://learning.oreilly.com/library/view/~/9781800569195/?ar">https://learning.oreilly.com/library/view/~/9781800569195/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar">https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar</a><br/>Format: Electronic Resources<br/>
Trust in computer systems and the cloud
ent://SD_ILS/0/SD_ILS:2330850
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Bursell, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119692324/?ar">https://learning.oreilly.com/library/view/~/9781119692324/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar">https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119692324">https://learning.oreilly.com/library/view/~/9781119692324</a><br/>Format: Electronic Resources<br/>
Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacks
ent://SD_ILS/0/SD_ILS:2329941
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Peiris, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119804062/?ar">https://learning.oreilly.com/library/view/~/9781119804062/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar">https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119804062">https://learning.oreilly.com/library/view/~/9781119804062</a><br/>Format: Electronic Resources<br/>
Getting started with IBM Hyper Protect Data Controller
ent://SD_ILS/0/SD_ILS:2331451
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security for dummies
ent://SD_ILS/0/SD_ILS:2332497
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a>
<a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format: Electronic Resources<br/>
Cyber security on Azure : an it professional's guide to Microsoft Azure security
ent://SD_ILS/0/SD_ILS:2327167
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484265314/?ar">https://learning.oreilly.com/library/view/~/9781484265314/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265314">https://learning.oreilly.com/library/view/~/9781484265314</a><br/>Format: Electronic Resources<br/>
SECURING CLOUD SERVICES;A PRAGMATIC APPROACH, SECOND EDITION.
ent://SD_ILS/0/SD_ILS:2328081
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by LEE NEWCOMBE.<br/><a href="https://learning.oreilly.com/library/view/~/9781787782075">https://learning.oreilly.com/library/view/~/9781787782075</a>
<a href="https://learning.oreilly.com/library/view/~/9781787782075/?ar">https://learning.oreilly.com/library/view/~/9781787782075/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar">https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar</a><br/>Format: Electronic Resources<br/>
Cloud Computing Security, 2nd Edition
ent://SD_ILS/0/SD_ILS:2331101
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>
Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud
ent://SD_ILS/0/SD_ILS:2321488
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Berkouwer, Sander, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806984">https://learning.oreilly.com/library/view/~/9781789806984</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806984/?ar">https://learning.oreilly.com/library/view/~/9781789806984/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar</a><br/>Format: Electronic Resources<br/>
Cyber-Vigilance and Digital Trust
ent://SD_ILS/0/SD_ILS:2324869
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Tounsi, Wiem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786304483">https://learning.oreilly.com/library/view/~/9781786304483</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304483/?ar">https://learning.oreilly.com/library/view/~/9781786304483/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar</a><br/>Format: Electronic Resources<br/>
Cloud computing security : foundations and challenges
ent://SD_ILS/0/SD_ILS:2311524
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format: Electronic Resources<br/>
CSA guide to cloud computing : implementing cloud privacy and security
ent://SD_ILS/0/SD_ILS:2304776
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Samani, Raj, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar">https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124201255/?ar">https://learning.oreilly.com/library/view/~/9780124201255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124201255">https://learning.oreilly.com/library/view/~/9780124201255</a><br/>Format: Electronic Resources<br/>
Data protection and the cloud : are the risks too great?
ent://SD_ILS/0/SD_ILS:2308847
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Ticher, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287135/?ar">https://learning.oreilly.com/library/view/~/9781849287135/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar</a><br/>Format: Electronic Resources<br/>
Securing the cloud : cloud computer security techniques and tactics
ent://SD_ILS/0/SD_ILS:2292491
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Winkler, J. R. (Joachim R.)<br/><a href="https://learning.oreilly.com/library/view/~/9781597495929">https://learning.oreilly.com/library/view/~/9781597495929</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495929/?ar">https://learning.oreilly.com/library/view/~/9781597495929/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar</a><br/>Format: Electronic Resources<br/>
Cloud Security and Governance : Who's on your cloud?.
ent://SD_ILS/0/SD_ILS:2290671
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Blount, Sumner.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280983">https://learning.oreilly.com/library/view/~/9781849280983</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280983/?ar">https://learning.oreilly.com/library/view/~/9781849280983/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security : a comprehensive guide to secure cloud computing
ent://SD_ILS/0/SD_ILS:2289708
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Krutz, Ronald L., 1938-<br/><a href="https://learning.oreilly.com/library/view/~/9780470589878/?ar">https://learning.oreilly.com/library/view/~/9780470589878/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar">https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470589878">https://learning.oreilly.com/library/view/~/9780470589878</a><br/>Format: Electronic Resources<br/>
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:2289149
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Lillard, Terrence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387/?ar">https://learning.oreilly.com/library/view/~/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387">https://learning.oreilly.com/library/view/~/9781597495387</a><br/>Format: Electronic Resources<br/>
Cloud security and privacy
ent://SD_ILS/0/SD_ILS:2287451
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Mather, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806453/?ar">https://learning.oreilly.com/library/view/~/9780596806453/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596806453">https://learning.oreilly.com/library/view/~/9780596806453</a><br/>Format: Electronic Resources<br/>
VMware vSphere and virtual infrastructure security : securing the virtual environment
ent://SD_ILS/0/SD_ILS:2288049
2024-06-24T00:00:40Z
2024-06-24T00:00:40Z
by Haletky, Edward.<br/><a href="https://learning.oreilly.com/library/view/~/9780136083214/?ar">https://learning.oreilly.com/library/view/~/9780136083214/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780136083214/?ar">https://go.oreilly.com/library-access/library/view/-/9780136083214/?ar</a><br/>Format: Electronic Resources<br/>