Search Results for - Narrowed by: Réseaux d'ordinateurs -- Sécurité -- Mesures. - 2005
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026ps$003d300?
2024-05-29T01:15:51Z
Business continuity and disaster recovery for infosec managers
ent://SD_ILS/0/SD_ILS:2297051
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Rittinghouse, John W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781555583392/?ar">https://go.oreilly.com/library-access/library/view/-/9781555583392/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781555583392/?ar">https://learning.oreilly.com/library/view/~/9781555583392/?ar</a><br/>Format: Electronic Resources<br/>
Network security : a practical approach
ent://SD_ILS/0/SD_ILS:2296928
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Harrington, Jan L.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123116338/?ar">https://go.oreilly.com/library-access/library/view/-/9780123116338/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123116338/?ar">https://learning.oreilly.com/library/view/~/9780123116338/?ar</a><br/>Format: Electronic Resources<br/>
Snort cookbook
ent://SD_ILS/0/SD_ILS:2282585
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/0596007914">https://learning.oreilly.com/library/view/~/0596007914</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596007914/?ar">https://go.oreilly.com/library-access/library/view/-/0596007914/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007914/?ar">https://learning.oreilly.com/library/view/~/0596007914/?ar</a><br/>Format: Electronic Resources<br/>
SSH, the secure shell : the definitive guide
ent://SD_ILS/0/SD_ILS:2282587
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Barrett, Daniel J.<br/><a href="https://learning.oreilly.com/library/view/~/0596008953/?ar">https://learning.oreilly.com/library/view/~/0596008953/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596008953/?ar">https://go.oreilly.com/library-access/library/view/-/0596008953/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008953">https://learning.oreilly.com/library/view/~/0596008953</a><br/>Format: Electronic Resources<br/>
Inside network perimeter security
ent://SD_ILS/0/SD_ILS:2283365
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Northcutt, Stephen.<br/><a href="https://learning.oreilly.com/library/view/~/0672327376">https://learning.oreilly.com/library/view/~/0672327376</a>
<a href="https://learning.oreilly.com/library/view/~/0672327376/?ar">https://learning.oreilly.com/library/view/~/0672327376/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672327376/?ar">https://go.oreilly.com/library-access/library/view/-/0672327376/?ar</a><br/>Format: Electronic Resources<br/>
Cisco ASA and PIX firewall handbook
ent://SD_ILS/0/SD_ILS:2282247
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Hucaby, Dave.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587051583/?ar">https://go.oreilly.com/library-access/library/view/-/1587051583/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587051583/?ar">https://learning.oreilly.com/library/view/~/1587051583/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587051583">https://learning.oreilly.com/library/view/~/1587051583</a><br/>Format: Electronic Resources<br/>
The business case for network security : advocacy, governance, and ROI
ent://SD_ILS/0/SD_ILS:2281646
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587201216/?ar">https://go.oreilly.com/library-access/library/view/-/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216/?ar">https://learning.oreilly.com/library/view/~/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216">https://learning.oreilly.com/library/view/~/1587201216</a><br/>Format: Electronic Resources<br/>
Cisco router firewall security
ent://SD_ILS/0/SD_ILS:2281579
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Deal, Richard A.<br/><a href="https://learning.oreilly.com/library/view/~/1587051753">https://learning.oreilly.com/library/view/~/1587051753</a>
<a href="https://learning.oreilly.com/library/view/~/1587051753/?ar">https://learning.oreilly.com/library/view/~/1587051753/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587051753/?ar">https://go.oreilly.com/library-access/library/view/-/1587051753/?ar</a><br/>Format: Electronic Resources<br/>
Network security tools
ent://SD_ILS/0/SD_ILS:2282158
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Clarke, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/0596007949">https://learning.oreilly.com/library/view/~/0596007949</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596007949/?ar">https://go.oreilly.com/library-access/library/view/-/0596007949/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007949/?ar">https://learning.oreilly.com/library/view/~/0596007949/?ar</a><br/>Format: Electronic Resources<br/>
Phishing exposed
ent://SD_ILS/0/SD_ILS:2281992
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by James, Lance.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490306/?ar">https://learning.oreilly.com/library/view/~/9781597490306/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490306">https://learning.oreilly.com/library/view/~/9781597490306</a>
<a href="https://www.sciencedirect.com/science/book/9781597490306">https://www.sciencedirect.com/science/book/9781597490306</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490306/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490306/?ar</a><br/>Format: Electronic Resources<br/>
Nessus, Snort, & Ethereal power tools : customizing open source security applications
ent://SD_ILS/0/SD_ILS:2281994
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Archibald, Neil.<br/><a href="https://www.sciencedirect.com/science/book/9781597490207">https://www.sciencedirect.com/science/book/9781597490207</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490207">https://learning.oreilly.com/library/view/~/9781597490207</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490207/?ar">https://learning.oreilly.com/library/view/~/9781597490207/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar</a><br/>Format: Electronic Resources<br/>
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
ent://SD_ILS/0/SD_ILS:2283103
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Skoudis, Ed.<br/><a href="https://learning.oreilly.com/library/view/~/9780131481046/?ar">https://learning.oreilly.com/library/view/~/9780131481046/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar">https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft windows security resource kit
ent://SD_ILS/0/SD_ILS:2282820
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Smith, Ben, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780735621749">https://learning.oreilly.com/library/view/~/9780735621749</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar">https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735621749/?ar">https://learning.oreilly.com/library/view/~/9780735621749/?ar</a><br/>Format: Electronic Resources<br/>
The database hacker's handbook : defending database servers
ent://SD_ILS/0/SD_ILS:2282264
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Litchfield, David, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780764578014/?ar">https://learning.oreilly.com/library/view/~/9780764578014/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar">https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764578014">https://learning.oreilly.com/library/view/~/9780764578014</a><br/>Format: Electronic Resources<br/>
Network security fundamentals
ent://SD_ILS/0/SD_ILS:2281642
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Laet, Gert De.<br/><a href="https://learning.oreilly.com/library/view/~/1587051672">https://learning.oreilly.com/library/view/~/1587051672</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587051672/?ar">https://go.oreilly.com/library-access/library/view/-/1587051672/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587051672/?ar">https://learning.oreilly.com/library/view/~/1587051672/?ar</a><br/>Format: Electronic Resources<br/>
Inside network security assessment : guarding your IT infrastructure
ent://SD_ILS/0/SD_ILS:2282083
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Gregg, Michael (Michael C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672328097/?ar">https://go.oreilly.com/library-access/library/view/-/0672328097/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672328097/?ar">https://learning.oreilly.com/library/view/~/0672328097/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672328097">https://learning.oreilly.com/library/view/~/0672328097</a><br/>Format: Electronic Resources<br/>
Windows Server 2003 security cookbook
ent://SD_ILS/0/SD_ILS:2282098
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Danseglio, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596007531/?ar">https://go.oreilly.com/library-access/library/view/-/0596007531/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007531/?ar">https://learning.oreilly.com/library/view/~/0596007531/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007531">https://learning.oreilly.com/library/view/~/0596007531</a><br/>Format: Electronic Resources<br/>
Configuring Check Point NGX VPN-1/FireWall-1
ent://SD_ILS/0/SD_ILS:2282000
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Stephens, Robert (Information security consultant)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490313/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490313/?ar">https://learning.oreilly.com/library/view/~/9781597490313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490313">https://learning.oreilly.com/library/view/~/9781597490313</a><br/>Format: Electronic Resources<br/>
Host integrity monitoring : using Osiris and Samhain
ent://SD_ILS/0/SD_ILS:2282620
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Wotring, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490184">https://learning.oreilly.com/library/view/~/9781597490184</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490184/?ar">https://learning.oreilly.com/library/view/~/9781597490184/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597490184">https://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Electronic Resources<br/>
Cisco Security Agent
ent://SD_ILS/0/SD_ILS:2281812
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Sullivan, Chad.<br/><a href="https://learning.oreilly.com/library/view/~/1587052059">https://learning.oreilly.com/library/view/~/1587052059</a>
<a href="https://learning.oreilly.com/library/view/~/1587052059/?ar">https://learning.oreilly.com/library/view/~/1587052059/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587052059/?ar">https://go.oreilly.com/library-access/library/view/-/1587052059/?ar</a><br/>Format: Electronic Resources<br/>
Silence on the wire : a field guide to passive reconnaissance and indirect attacks
ent://SD_ILS/0/SD_ILS:2287377
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Zalewski, Michal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1593270461/?ar">https://go.oreilly.com/library-access/library/view/-/1593270461/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1593270461/?ar">https://learning.oreilly.com/library/view/~/1593270461/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1593270461">https://learning.oreilly.com/library/view/~/1593270461</a><br/>Format: Electronic Resources<br/>
IBM system z9 109 technical introduction
ent://SD_ILS/0/SD_ILS:2287791
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Ogden, Bill.<br/><a href="https://learning.oreilly.com/library/view/~/0738493813/?ar">https://learning.oreilly.com/library/view/~/0738493813/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738493813">https://learning.oreilly.com/library/view/~/0738493813</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738493813/?ar">https://go.oreilly.com/library-access/library/view/-/0738493813/?ar</a><br/>Format: Electronic Resources<br/>
Digital identity
ent://SD_ILS/0/SD_ILS:2293288
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Windley, Phillip J., 1958-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008783/?ar">https://go.oreilly.com/library-access/library/view/-/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783/?ar">https://learning.oreilly.com/library/view/~/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783">https://learning.oreilly.com/library/view/~/0596008783</a><br/>Format: Electronic Resources<br/>
WebSphere Application Server for z/OS V5 and J2EE 1.3 security handbook
ent://SD_ILS/0/SD_ILS:2296187
2024-05-29T01:15:51Z
2024-05-29T01:15:51Z
by Allison, Steve.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738490679/?ar">https://go.oreilly.com/library-access/library/view/-/0738490679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738490679/?ar">https://learning.oreilly.com/library/view/~/0738490679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738490679">https://learning.oreilly.com/library/view/~/0738490679</a><br/>Format: Electronic Resources<br/>