Search Results for - Narrowed by: Instructional films. - Computer Security SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Instructional$002bfilms.$002509Instructional$002bfilms.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bSecurity$002509Computer$002bSecurity$0026ps$003d300? 2024-06-05T04:38:33Z System and privacy data protection. ent://SD_ILS/0/SD_ILS:2331777 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a> <a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format:&#160;Video recording<br/> Threat Intelligence and threat hunting ent://SD_ILS/0/SD_ILS:2331779 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137896301/?ar">https://learning.oreilly.com/videos/~/9780137896301/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar">https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137896301">https://learning.oreilly.com/videos/~/9780137896301</a><br/>Format:&#160;Video recording<br/> Learn man in the middle attacks from scratch. ent://SD_ILS/0/SD_ILS:2332269 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar">https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803243245/?ar">https://learning.oreilly.com/videos/~/9781803243245/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803243245">https://learning.oreilly.com/videos/~/9781803243245</a><br/>Format:&#160;Video recording<br/> Finding your cyber security path. ent://SD_ILS/0/SD_ILS:2332701 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Miller, Alyssa, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202258">https://learning.oreilly.com/videos/~/10000MNHV202258</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202258/?ar">https://learning.oreilly.com/videos/~/10000MNHV202258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar</a><br/>Format:&#160;Video recording<br/> Threat modeling with Owasp Threat Dragon &amp; risk rating a vulnerability. ent://SD_ILS/0/SD_ILS:2332599 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Fisher, Derek, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202248/?ar">https://learning.oreilly.com/videos/~/10000MNHV202248/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202248">https://learning.oreilly.com/videos/~/10000MNHV202248</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar</a><br/>Format:&#160;Video recording<br/> Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linux ent://SD_ILS/0/SD_ILS:2332265 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar">https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803239750/?ar">https://learning.oreilly.com/videos/~/9781803239750/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803239750">https://learning.oreilly.com/videos/~/9781803239750</a><br/>Format:&#160;Video recording<br/> Making sense of application security. ent://SD_ILS/0/SD_ILS:2332363 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Saikali, Adib, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202229">https://learning.oreilly.com/videos/~/10000MNHV202229</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202229/?ar">https://learning.oreilly.com/videos/~/10000MNHV202229/?ar</a><br/>Format:&#160;Video recording<br/> Case study : how Tools &amp; Solutions survived a ransomware attack. ent://SD_ILS/0/SD_ILS:2332364 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Majumdar, Partha, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar">https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0636920673859">https://learning.oreilly.com/library/view/~/0636920673859</a> <a href="https://learning.oreilly.com/library/view/~/0636920673859/?ar">https://learning.oreilly.com/library/view/~/0636920673859/?ar</a><br/>Format:&#160;Video recording<br/> Ransomware ent://SD_ILS/0/SD_ILS:2332705 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Messdaghi, Chlo&eacute;, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar">https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920702641/?ar">https://learning.oreilly.com/videos/~/0636920702641/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920702641">https://learning.oreilly.com/videos/~/0636920702641</a><br/>Format:&#160;Video recording<br/> Certified ethical hacker (CEH) complete video course ent://SD_ILS/0/SD_ILS:2332146 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar">https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137446797/?ar">https://learning.oreilly.com/videos/~/9780137446797/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137446797">https://learning.oreilly.com/videos/~/9780137446797</a><br/>Format:&#160;Video recording<br/> Real-world cryptography ent://SD_ILS/0/SD_ILS:2332150 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Wong, David, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781617296710VE">https://learning.oreilly.com/videos/~/9781617296710VE</a> <a href="https://learning.oreilly.com/videos/~/9781617296710VE/?ar">https://learning.oreilly.com/videos/~/9781617296710VE/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar</a><br/>Format:&#160;Video recording<br/> Securing AI. ent://SD_ILS/0/SD_ILS:2332134 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Manjengwa, Shingai, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar">https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920672319/?ar">https://learning.oreilly.com/videos/~/0636920672319/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920672319">https://learning.oreilly.com/videos/~/0636920672319</a><br/>Format:&#160;Video recording<br/> Intro to secure application deployment with Istio on Kubernetes. ent://SD_ILS/0/SD_ILS:2332181 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Poddar, Neeraj, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202219">https://learning.oreilly.com/videos/~/10000MNHV202219</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202219/?ar">https://learning.oreilly.com/videos/~/10000MNHV202219/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar</a><br/>Format:&#160;Video recording<br/> JSON web tokens and alternatives. ent://SD_ILS/0/SD_ILS:2332693 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Madden, Neil, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202163/?ar">https://learning.oreilly.com/videos/~/10000MNLV202163/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202163">https://learning.oreilly.com/videos/~/10000MNLV202163</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar</a><br/>Format:&#160;Video recording<br/> Qi ye shen tou ce shi he chi xu jian kong. ent://SD_ILS/0/SD_ILS:2332289 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a> <a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a> <a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format:&#160;Video recording<br/> Oracle cloud user security : providing for separation of duties and appropriate access by job function. ent://SD_ILS/0/SD_ILS:2322966 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Malcher, Michelle, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar">https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781484255643/?ar">https://learning.oreilly.com/videos/~/9781484255643/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781484255643">https://learning.oreilly.com/videos/~/9781484255643</a><br/>Format:&#160;Electronic Resources<br/> Hei ke wang luo ying yong : wang luo qin ru ying yong. ent://SD_ILS/0/SD_ILS:2332288 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a> <a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format:&#160;Video recording<br/> An quan shen tou ce shi. ent://SD_ILS/0/SD_ILS:2332437 2024-06-05T04:38:33Z 2024-06-05T04:38:33Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882021010401/?ar">https://learning.oreilly.com/videos/~/8882021010401/?ar</a> <a href="https://learning.oreilly.com/videos/~/8882021010401">https://learning.oreilly.com/videos/~/8882021010401</a> <a href="https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar</a><br/>Format:&#160;Video recording<br/>