Search Results for - Narrowed by: Linux. - S&eacute;curit&eacute; informatique. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Linux.$002509Linux.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300? 2024-05-29T01:41:57Z Mastering Linux Security and Hardening - Second Edition ent://SD_ILS/0/SD_ILS:2324167 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Tevault, Donald A.<br/><a href="https://learning.oreilly.com/library/view/~/9781838981778/?ar">https://learning.oreilly.com/library/view/~/9781838981778/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar">https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838981778">https://learning.oreilly.com/library/view/~/9781838981778</a><br/>Format:&#160;Electronic Resources<br/> Temenos on IBM LinuxONE Best Practices Guide ent://SD_ILS/0/SD_ILS:2323440 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Coble, Deana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458458">https://learning.oreilly.com/library/view/~/9780738458458</a> <a href="https://learning.oreilly.com/library/view/~/9780738458458/?ar">https://learning.oreilly.com/library/view/~/9780738458458/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux essentials for cybersecurity lab manual ent://SD_ILS/0/SD_ILS:2317558 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux troubleshooting course with real life examples ent://SD_ILS/0/SD_ILS:2323238 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with Linux on Z Encryption for data at-rest ent://SD_ILS/0/SD_ILS:2321973 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738457468/?ar">https://learning.oreilly.com/library/view/~/9780738457468/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing your cloud : IBM security for LinuxONE ent://SD_ILS/0/SD_ILS:2321597 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Alves, Edi Lopes, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457949/?ar">https://learning.oreilly.com/library/view/~/9780738457949/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Linux security cookbook : secure your Linux environment from modern-day attacks with practical recipes ent://SD_ILS/0/SD_ILS:2317509 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Kalsi, Tajinder, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789138399/?ar">https://learning.oreilly.com/library/view/~/9781789138399/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789138399/?ar">https://go.oreilly.com/library-access/library/view/-/9781789138399/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats ent://SD_ILS/0/SD_ILS:2315528 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Tevault, Donald A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788620307/?ar">https://go.oreilly.com/library-access/library/view/-/9781788620307/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788620307/?ar">https://learning.oreilly.com/library/view/~/9781788620307/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788620307">https://learning.oreilly.com/library/view/~/9781788620307</a><br/>Format:&#160;Electronic Resources<br/> Linux&reg; hardening in hostile networks : server security from TLS to TOR ent://SD_ILS/0/SD_ILS:2314177 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format:&#160;Electronic Resources<br/> Red Hat Certificate of Expertise in server hardening - exam EX413 training : prepare to take the Red Hat EX413 exam and work towards your RHCA datacenter certification ent://SD_ILS/0/SD_ILS:2312826 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Rothwell, William, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491974483/?ar">https://go.oreilly.com/library-access/library/view/-/9781491974483/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491974483/?ar">https://learning.oreilly.com/videos/~/9781491974483/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes ent://SD_ILS/0/SD_ILS:2310585 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Kalsi, Tajinder, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785286421/?ar">https://learning.oreilly.com/library/view/~/9781785286421/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785286421/?ar">https://go.oreilly.com/library-access/library/view/-/9781785286421/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785286421">https://learning.oreilly.com/library/view/~/9781785286421</a><br/>Format:&#160;Electronic Resources<br/> Security for Linux on System z ent://SD_ILS/0/SD_ILS:2301872 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Parziale, Lydia.<br/><a href="https://learning.oreilly.com/library/view/~/0738437549/?ar">https://learning.oreilly.com/library/view/~/0738437549/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738437549/?ar">https://go.oreilly.com/library-access/library/view/-/0738437549/?ar</a><br/>Format:&#160;Electronic Resources<br/> BackTrack 4 : assuring security by penetration testing ent://SD_ILS/0/SD_ILS:2293871 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Ali, Shakeel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar">https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849513944/?ar">https://learning.oreilly.com/library/view/~/9781849513944/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849513944">https://learning.oreilly.com/library/view/~/9781849513944</a><br/>Format:&#160;Electronic Resources<br/> Linux annoyances for geeks ent://SD_ILS/0/SD_ILS:2282166 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Jang, Michael H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008015/?ar">https://go.oreilly.com/library-access/library/view/-/0596008015/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008015/?ar">https://learning.oreilly.com/library/view/~/0596008015/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008015">https://learning.oreilly.com/library/view/~/0596008015</a><br/>Format:&#160;Electronic Resources<br/> Designing and implementing Linux firewalls and QoS using Netfilter, Iproute2, NAT, and L7-Filter : learn how to secure your system and implement QoS using real-world scenarios for networks of all sizes ent://SD_ILS/0/SD_ILS:2286352 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Gheorghe, Lucian.<br/><a href="https://learning.oreilly.com/library/view/~/9781904811657/?ar">https://learning.oreilly.com/library/view/~/9781904811657/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781904811657/?ar">https://go.oreilly.com/library-access/library/view/-/9781904811657/?ar</a><br/>Format:&#160;Electronic Resources<br/> SELINUX : NSA's open source security enhanced Linux ent://SD_ILS/0/SD_ILS:2288931 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;McCarty, Bill, 1953-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596007167/?ar">https://go.oreilly.com/library-access/library/view/-/0596007167/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007167">https://learning.oreilly.com/library/view/~/0596007167</a> <a href="https://learning.oreilly.com/library/view/~/0596007167/?ar">https://learning.oreilly.com/library/view/~/0596007167/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux server security ent://SD_ILS/0/SD_ILS:2281596 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Bauer, Michael D.<br/><a href="https://learning.oreilly.com/library/view/~/0596006705">https://learning.oreilly.com/library/view/~/0596006705</a> <a href="https://learning.oreilly.com/library/view/~/0596006705/?ar">https://learning.oreilly.com/library/view/~/0596006705/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596006705/?ar">https://go.oreilly.com/library-access/library/view/-/0596006705/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux on IBM eserver zSeries and S/390 best security practices ent://SD_ILS/0/SD_ILS:2304314 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z by&#160;Geiselhart, Gregory.<br/><a href="https://learning.oreilly.com/library/view/~/0738497665/?ar">https://learning.oreilly.com/library/view/~/0738497665/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738497665/?ar">https://go.oreilly.com/library-access/library/view/-/0738497665/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738497665">https://learning.oreilly.com/library/view/~/0738497665</a><br/>Format:&#160;Electronic Resources<br/> Maximum Linux security : a hacker's guide to protecting your Linux server and workstation ent://SD_ILS/0/SD_ILS:2281137 2024-05-29T01:41:57Z 2024-05-29T01:41:57Z <a href="https://learning.oreilly.com/library/view/~/0672316706/?ar">https://learning.oreilly.com/library/view/~/0672316706/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0672316706/?ar">https://go.oreilly.com/library-access/library/view/-/0672316706/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672316706">https://learning.oreilly.com/library/view/~/0672316706</a><br/>Format:&#160;Electronic Resources<br/>