Search Results for - Narrowed by: R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures. - 2005 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026ps$003d300? 2024-05-29T01:15:51Z Business continuity and disaster recovery for infosec managers ent://SD_ILS/0/SD_ILS:2297051 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Rittinghouse, John W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781555583392/?ar">https://go.oreilly.com/library-access/library/view/-/9781555583392/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781555583392/?ar">https://learning.oreilly.com/library/view/~/9781555583392/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security : a practical approach ent://SD_ILS/0/SD_ILS:2296928 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Harrington, Jan L.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123116338/?ar">https://go.oreilly.com/library-access/library/view/-/9780123116338/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123116338/?ar">https://learning.oreilly.com/library/view/~/9780123116338/?ar</a><br/>Format:&#160;Electronic Resources<br/> Snort cookbook ent://SD_ILS/0/SD_ILS:2282585 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/0596007914">https://learning.oreilly.com/library/view/~/0596007914</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596007914/?ar">https://go.oreilly.com/library-access/library/view/-/0596007914/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007914/?ar">https://learning.oreilly.com/library/view/~/0596007914/?ar</a><br/>Format:&#160;Electronic Resources<br/> SSH, the secure shell : the definitive guide ent://SD_ILS/0/SD_ILS:2282587 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Barrett, Daniel J.<br/><a href="https://learning.oreilly.com/library/view/~/0596008953/?ar">https://learning.oreilly.com/library/view/~/0596008953/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596008953/?ar">https://go.oreilly.com/library-access/library/view/-/0596008953/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008953">https://learning.oreilly.com/library/view/~/0596008953</a><br/>Format:&#160;Electronic Resources<br/> Inside network perimeter security ent://SD_ILS/0/SD_ILS:2283365 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Northcutt, Stephen.<br/><a href="https://learning.oreilly.com/library/view/~/0672327376">https://learning.oreilly.com/library/view/~/0672327376</a> <a href="https://learning.oreilly.com/library/view/~/0672327376/?ar">https://learning.oreilly.com/library/view/~/0672327376/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0672327376/?ar">https://go.oreilly.com/library-access/library/view/-/0672327376/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco ASA and PIX firewall handbook ent://SD_ILS/0/SD_ILS:2282247 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Hucaby, Dave.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587051583/?ar">https://go.oreilly.com/library-access/library/view/-/1587051583/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587051583/?ar">https://learning.oreilly.com/library/view/~/1587051583/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587051583">https://learning.oreilly.com/library/view/~/1587051583</a><br/>Format:&#160;Electronic Resources<br/> The business case for network security : advocacy, governance, and ROI ent://SD_ILS/0/SD_ILS:2281646 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587201216/?ar">https://go.oreilly.com/library-access/library/view/-/1587201216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587201216/?ar">https://learning.oreilly.com/library/view/~/1587201216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587201216">https://learning.oreilly.com/library/view/~/1587201216</a><br/>Format:&#160;Electronic Resources<br/> Cisco router firewall security ent://SD_ILS/0/SD_ILS:2281579 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Deal, Richard A.<br/><a href="https://learning.oreilly.com/library/view/~/1587051753">https://learning.oreilly.com/library/view/~/1587051753</a> <a href="https://learning.oreilly.com/library/view/~/1587051753/?ar">https://learning.oreilly.com/library/view/~/1587051753/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587051753/?ar">https://go.oreilly.com/library-access/library/view/-/1587051753/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security tools ent://SD_ILS/0/SD_ILS:2282158 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Clarke, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/0596007949">https://learning.oreilly.com/library/view/~/0596007949</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596007949/?ar">https://go.oreilly.com/library-access/library/view/-/0596007949/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007949/?ar">https://learning.oreilly.com/library/view/~/0596007949/?ar</a><br/>Format:&#160;Electronic Resources<br/> Phishing exposed ent://SD_ILS/0/SD_ILS:2281992 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;James, Lance.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490306/?ar">https://learning.oreilly.com/library/view/~/9781597490306/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490306">https://learning.oreilly.com/library/view/~/9781597490306</a> <a href="https://www.sciencedirect.com/science/book/9781597490306">https://www.sciencedirect.com/science/book/9781597490306</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490306/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490306/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nessus, Snort, &amp; Ethereal power tools : customizing open source security applications ent://SD_ILS/0/SD_ILS:2281994 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Archibald, Neil.<br/><a href="https://www.sciencedirect.com/science/book/9781597490207">https://www.sciencedirect.com/science/book/9781597490207</a> <a href="https://learning.oreilly.com/library/view/~/9781597490207">https://learning.oreilly.com/library/view/~/9781597490207</a> <a href="https://learning.oreilly.com/library/view/~/9781597490207/?ar">https://learning.oreilly.com/library/view/~/9781597490207/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar</a><br/>Format:&#160;Electronic Resources<br/> Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses ent://SD_ILS/0/SD_ILS:2283103 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Skoudis, Ed.<br/><a href="https://learning.oreilly.com/library/view/~/9780131481046/?ar">https://learning.oreilly.com/library/view/~/9780131481046/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar">https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft windows security resource kit ent://SD_ILS/0/SD_ILS:2282820 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Smith, Ben, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780735621749">https://learning.oreilly.com/library/view/~/9780735621749</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar">https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735621749/?ar">https://learning.oreilly.com/library/view/~/9780735621749/?ar</a><br/>Format:&#160;Electronic Resources<br/> The database hacker's handbook : defending database servers ent://SD_ILS/0/SD_ILS:2282264 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Litchfield, David, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780764578014/?ar">https://learning.oreilly.com/library/view/~/9780764578014/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar">https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780764578014">https://learning.oreilly.com/library/view/~/9780764578014</a><br/>Format:&#160;Electronic Resources<br/> Network security fundamentals ent://SD_ILS/0/SD_ILS:2281642 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Laet, Gert De.<br/><a href="https://learning.oreilly.com/library/view/~/1587051672">https://learning.oreilly.com/library/view/~/1587051672</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587051672/?ar">https://go.oreilly.com/library-access/library/view/-/1587051672/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587051672/?ar">https://learning.oreilly.com/library/view/~/1587051672/?ar</a><br/>Format:&#160;Electronic Resources<br/> Inside network security assessment : guarding your IT infrastructure ent://SD_ILS/0/SD_ILS:2282083 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Gregg, Michael (Michael C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672328097/?ar">https://go.oreilly.com/library-access/library/view/-/0672328097/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672328097/?ar">https://learning.oreilly.com/library/view/~/0672328097/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672328097">https://learning.oreilly.com/library/view/~/0672328097</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2003 security cookbook ent://SD_ILS/0/SD_ILS:2282098 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Danseglio, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596007531/?ar">https://go.oreilly.com/library-access/library/view/-/0596007531/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007531/?ar">https://learning.oreilly.com/library/view/~/0596007531/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007531">https://learning.oreilly.com/library/view/~/0596007531</a><br/>Format:&#160;Electronic Resources<br/> Configuring Check Point NGX VPN-1/FireWall-1 ent://SD_ILS/0/SD_ILS:2282000 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Stephens, Robert (Information security consultant)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490313/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490313/?ar">https://learning.oreilly.com/library/view/~/9781597490313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490313">https://learning.oreilly.com/library/view/~/9781597490313</a><br/>Format:&#160;Electronic Resources<br/> Host integrity monitoring : using Osiris and Samhain ent://SD_ILS/0/SD_ILS:2282620 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Wotring, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490184">https://learning.oreilly.com/library/view/~/9781597490184</a> <a href="https://learning.oreilly.com/library/view/~/9781597490184/?ar">https://learning.oreilly.com/library/view/~/9781597490184/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781597490184">https://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Electronic Resources<br/> Cisco Security Agent ent://SD_ILS/0/SD_ILS:2281812 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Sullivan, Chad.<br/><a href="https://learning.oreilly.com/library/view/~/1587052059">https://learning.oreilly.com/library/view/~/1587052059</a> <a href="https://learning.oreilly.com/library/view/~/1587052059/?ar">https://learning.oreilly.com/library/view/~/1587052059/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587052059/?ar">https://go.oreilly.com/library-access/library/view/-/1587052059/?ar</a><br/>Format:&#160;Electronic Resources<br/> Silence on the wire : a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:2287377 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Zalewski, Michal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1593270461/?ar">https://go.oreilly.com/library-access/library/view/-/1593270461/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1593270461/?ar">https://learning.oreilly.com/library/view/~/1593270461/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1593270461">https://learning.oreilly.com/library/view/~/1593270461</a><br/>Format:&#160;Electronic Resources<br/> IBM system z9 109 technical introduction ent://SD_ILS/0/SD_ILS:2287791 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Ogden, Bill.<br/><a href="https://learning.oreilly.com/library/view/~/0738493813/?ar">https://learning.oreilly.com/library/view/~/0738493813/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738493813">https://learning.oreilly.com/library/view/~/0738493813</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738493813/?ar">https://go.oreilly.com/library-access/library/view/-/0738493813/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital identity ent://SD_ILS/0/SD_ILS:2293288 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Windley, Phillip J., 1958-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008783/?ar">https://go.oreilly.com/library-access/library/view/-/0596008783/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008783/?ar">https://learning.oreilly.com/library/view/~/0596008783/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008783">https://learning.oreilly.com/library/view/~/0596008783</a><br/>Format:&#160;Electronic Resources<br/> WebSphere Application Server for z/OS V5 and J2EE 1.3 security handbook ent://SD_ILS/0/SD_ILS:2296187 2024-05-29T01:15:51Z 2024-05-29T01:15:51Z by&#160;Allison, Steve.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738490679/?ar">https://go.oreilly.com/library-access/library/view/-/0738490679/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738490679/?ar">https://learning.oreilly.com/library/view/~/0738490679/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738490679">https://learning.oreilly.com/library/view/~/0738490679</a><br/>Format:&#160;Electronic Resources<br/>