Search Results for - Narrowed by: Logiciels d'application -- Développement. - Sécurité informatique.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Logiciels$002bd$002527application$002b--$002bD$0025C3$0025A9veloppement.$002509Logiciels$002bd$002527application$002b--$002bD$0025C3$0025A9veloppement.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300$0026isd$003dtrue?
2024-06-21T13:59:36Z
Designing secure software : a guide for developers
ent://SD_ILS/0/SD_ILS:2329594
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by Kohnfelder, Loren, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129804/?ar">https://learning.oreilly.com/library/view/~/9781098129804/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129804">https://learning.oreilly.com/library/view/~/9781098129804</a><br/>Format: Electronic Resources<br/>
The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more
ent://SD_ILS/0/SD_ILS:2332630
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format: Electronic Resources<br/>
Alice and Bob learn application security.
ent://SD_ILS/0/SD_ILS:2325958
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by Janca, Tanya.<br/><a href="https://learning.oreilly.com/library/view/~/9781119687351">https://learning.oreilly.com/library/view/~/9781119687351</a>
<a href="https://learning.oreilly.com/library/view/~/9781119687351/?ar">https://learning.oreilly.com/library/view/~/9781119687351/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar">https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2322053
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on Spring security 5.1.1
ent://SD_ILS/0/SD_ILS:2319110
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by Lelek, Tomasz, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789802931/?ar">https://learning.oreilly.com/videos/~/9781789802931/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789802931/?ar">https://go.oreilly.com/library-access/library/view/-/9781789802931/?ar</a><br/>Format: Electronic Resources<br/>
Apache Kafka series : Kafka security (SSL SASL Kerberos ACL)
ent://SD_ILS/0/SD_ILS:2316736
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by Maarek, Stéphane, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar">https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789342420/?ar">https://learning.oreilly.com/videos/~/9781789342420/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on Spring Security 5 for Reactive applications : learn effective ways to secure your applications with Spring and Spring WebFlux
ent://SD_ILS/0/SD_ILS:2317237
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by John, Tomcy, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788995979/?ar">https://learning.oreilly.com/library/view/~/9781788995979/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788995979/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995979/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2316778
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format: Electronic Resources<br/>
Fluent conference 2017, San Jose, CA.
ent://SD_ILS/0/SD_ILS:2313669
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by Fluent (2017 : San Jose, California)<br/><a href="https://learning.oreilly.com/videos/~/9781491985298/?ar">https://learning.oreilly.com/videos/~/9781491985298/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491985298/?ar">https://go.oreilly.com/library-access/library/view/-/9781491985298/?ar</a><br/>Format: Electronic Resources<br/>
Fluent 2016 : San Francisco, California video compilation
ent://SD_ILS/0/SD_ILS:2310254
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by Fluent. ( 2016 : San Francisco, California)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491944585/?ar">https://go.oreilly.com/library-access/library/view/-/9781491944585/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491944585/?ar">https://learning.oreilly.com/videos/~/9781491944585/?ar</a><br/>Format: Electronic Resources<br/>
Bulletproof Android : practical advice for building secure apps
ent://SD_ILS/0/SD_ILS:2305298
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by Nolan, Godfrey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780133995121/?ar">https://learning.oreilly.com/library/view/~/9780133995121/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133995121">https://learning.oreilly.com/library/view/~/9780133995121</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133995121/?ar">https://go.oreilly.com/library-access/library/view/-/9780133995121/?ar</a><br/>Format: Electronic Resources<br/>
Fluent conference 2015 : complete video compilation
ent://SD_ILS/0/SD_ILS:2307530
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by Fluent. San Francisco, April 20-25<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491927786/?ar">https://go.oreilly.com/library-access/library/view/-/9781491927786/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491927786/?ar">https://learning.oreilly.com/videos/~/9781491927786/?ar</a><br/>Format: Electronic Resources<br/>
Łamanie i zabezpieczanie aplikacji w systemie iOS
ent://SD_ILS/0/SD_ILS:2297986
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by Zdziarski, Jonathan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781457177057/?ar">https://learning.oreilly.com/library/view/~/9781457177057/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457177057/?ar">https://go.oreilly.com/library-access/library/view/-/9781457177057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457177057">https://learning.oreilly.com/library/view/~/9781457177057</a><br/>Format: Electronic Resources<br/>
Hacking and securing iOS applications
ent://SD_ILS/0/SD_ILS:2293464
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by Zdziarski, Jonathan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781449325213/?ar">https://learning.oreilly.com/library/view/~/9781449325213/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781449325213/?ar">https://go.oreilly.com/library-access/library/view/-/9781449325213/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449325213">https://learning.oreilly.com/library/view/~/9781449325213</a><br/>Format: Electronic Resources<br/>
Web application obfuscation : '-/WAFs.evasion.filters//alert (/obfuscation/)-'
ent://SD_ILS/0/SD_ILS:2290508
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by Heiderich, Mario.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496049/?ar">https://learning.oreilly.com/library/view/~/9781597496049/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496049/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496049/?ar</a><br/>Format: Electronic Resources<br/>
Secure and Resilient Software
ent://SD_ILS/0/SD_ILS:2323699
2024-06-21T13:59:36Z
2024-06-21T13:59:36Z
by Merkow, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439866221/?ar">https://learning.oreilly.com/library/view/~/9781439866221/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439866221/?ar">https://go.oreilly.com/library-access/library/view/-/9781439866221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439866221">https://learning.oreilly.com/library/view/~/9781439866221</a><br/>Format: Electronic Resources<br/>