Search Results for - Narrowed by: Réseaux d'ordinateurs -- Sécurité -- Mesures. - 2013SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026ps$003d300?2024-05-28T23:11:16ZLearning computer forensicsent://SD_ILS/0/SD_ILS:22985542024-05-28T23:11:16Z2024-05-28T23:11:16Zby Messier, Ric.<br/><a href="https://learning.oreilly.com/videos/~/9781771370615/?ar">https://learning.oreilly.com/videos/~/9781771370615/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar</a><br/>Format: Electronic Resources<br/>Pro Spring securityent://SD_ILS/0/SD_ILS:22986982024-05-28T23:11:16Z2024-05-28T23:11:16Zby Scarioni, Carlo.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430248187/?ar">https://go.oreilly.com/library-access/library/view/-/9781430248187/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430248187/?ar">https://learning.oreilly.com/library/view/~/9781430248187/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430248187">https://learning.oreilly.com/library/view/~/9781430248187</a><br/>Format: Electronic Resources<br/>Professional penetration testing : creating and learning in a hacking labent://SD_ILS/0/SD_ILS:22994832024-05-28T23:11:16Z2024-05-28T23:11:16Zby Wilhelm, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499934/?ar">https://learning.oreilly.com/library/view/~/9781597499934/?ar</a><br/>Format: Electronic Resources<br/>Practical anonymity : hiding in plain sight onlineent://SD_ILS/0/SD_ILS:22995152024-05-28T23:11:16Z2024-05-28T23:11:16Zby Loshin, Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar">https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124104044/?ar">https://learning.oreilly.com/library/view/~/9780124104044/?ar</a><br/>Format: Electronic Resources<br/>Applied cyber security and the smart grid : implementing security controls into the modern power infrastructureent://SD_ILS/0/SD_ILS:22989172024-05-28T23:11:16Z2024-05-28T23:11:16Zby Knapp, Eric D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499989/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499989/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499989/?ar">https://learning.oreilly.com/library/view/~/9781597499989/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499989">https://learning.oreilly.com/library/view/~/9781597499989</a><br/>Format: Electronic Resources<br/>Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linuxent://SD_ILS/0/SD_ILS:23003502024-05-28T23:11:16Z2024-05-28T23:11:16Zby Muniz, Joseph.<br/><a href="https://learning.oreilly.com/library/view/~/9781782163169">https://learning.oreilly.com/library/view/~/9781782163169</a>
<a href="https://learning.oreilly.com/library/view/~/9781782163169/?ar">https://learning.oreilly.com/library/view/~/9781782163169/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar">https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar</a><br/>Format: Electronic Resources<br/>Computer and information security handbook, second editionent://SD_ILS/0/SD_ILS:23001972024-05-28T23:11:16Z2024-05-28T23:11:16Zby Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar">https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123943972/?ar">https://learning.oreilly.com/library/view/~/9780123943972/?ar</a><br/>Format: Electronic Resources<br/>PCI DSS : a pocket guideent://SD_ILS/0/SD_ILS:23028952024-05-28T23:11:16Z2024-05-28T23:11:16Zby Calder, Alan, 1957-<br/><a href="https://learning.oreilly.com/library/view/~/9781849285551">https://learning.oreilly.com/library/view/~/9781849285551</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285551/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285551/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285551/?ar">https://learning.oreilly.com/library/view/~/9781849285551/?ar</a><br/>Format: Electronic Resources<br/>Security patterns in practice : designing secure architectures using software patternsent://SD_ILS/0/SD_ILS:23007672024-05-28T23:11:16Z2024-05-28T23:11:16Zby Fernandez, Eduardo B., 1936-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar">https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119970484/?ar">https://learning.oreilly.com/library/view/~/9781119970484/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119970484">https://learning.oreilly.com/library/view/~/9781119970484</a><br/>Format: Electronic Resources<br/>The practice of network security monitoringent://SD_ILS/0/SD_ILS:23002322024-05-28T23:11:16Z2024-05-28T23:11:16Zby Bejtlich, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457185175/?ar">https://go.oreilly.com/library-access/library/view/-/9781457185175/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457185175/?ar">https://learning.oreilly.com/library/view/~/9781457185175/?ar</a><br/>Format: Electronic Resources<br/>Web Application Defender's Cookbook : Battling Hackers and Protecting Users.ent://SD_ILS/0/SD_ILS:22984532024-05-28T23:11:16Z2024-05-28T23:11:16Zby Barnett, Ryan C.<br/><a href="https://learning.oreilly.com/library/view/~/9781118417058/?ar">https://learning.oreilly.com/library/view/~/9781118417058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar">https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118417058">https://learning.oreilly.com/library/view/~/9781118417058</a><br/>Format: Electronic Resources<br/>Iris biometric model for secured network accessent://SD_ILS/0/SD_ILS:22984662024-05-28T23:11:16Z2024-05-28T23:11:16Zby El Khoury, Franjieh.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502147/?ar">https://learning.oreilly.com/library/view/~/9781466502147/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466502147">https://learning.oreilly.com/library/view/~/9781466502147</a><br/>Format: Electronic Resources<br/>The basics of web hacking : tools and techniques to attack the webent://SD_ILS/0/SD_ILS:23000582024-05-28T23:11:16Z2024-05-28T23:11:16Zby Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format: Electronic Resources<br/>Learning PHP securityent://SD_ILS/0/SD_ILS:23014382024-05-28T23:11:16Z2024-05-28T23:11:16Zby Bierer, Doug.<br/><a href="https://learning.oreilly.com/videos/~/9781771371636/?ar">https://learning.oreilly.com/videos/~/9781771371636/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771371636/?ar">https://go.oreilly.com/library-access/library/view/-/9781771371636/?ar</a><br/>Format: Electronic Resources<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:23011512024-05-28T23:11:16Z2024-05-28T23:11:16Zby Sanders, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar">https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124172081/?ar">https://learning.oreilly.com/library/view/~/9780124172081/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124172081">https://learning.oreilly.com/library/view/~/9780124172081</a><br/>Format: Electronic Resources<br/>SolarWinds server & application monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server & Application Monitor with minimum hassleent://SD_ILS/0/SD_ILS:23009192024-05-28T23:11:16Z2024-05-28T23:11:16Zby Brant, Justin M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783551019/?ar">https://go.oreilly.com/library-access/library/view/-/9781783551019/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783551019/?ar">https://learning.oreilly.com/library/view/~/9781783551019/?ar</a><br/>Format: Electronic Resources<br/>Handbook of SCADA/control systems securityent://SD_ILS/0/SD_ILS:22975372024-05-28T23:11:16Z2024-05-28T23:11:16Zby Radvanovsky, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502260/?ar">https://learning.oreilly.com/library/view/~/9781466502260/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466502260">https://learning.oreilly.com/library/view/~/9781466502260</a><br/>Format: Electronic Resources<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:22975342024-05-28T23:11:16Z2024-05-28T23:11:16Zby Yang, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047020">https://learning.oreilly.com/library/view/~/9780124047020</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124047020/?ar">https://learning.oreilly.com/library/view/~/9780124047020/?ar</a><br/>Format: Electronic Resources<br/>Information security : the complete referenceent://SD_ILS/0/SD_ILS:22998852024-05-28T23:11:16Z2024-05-28T23:11:16Zby Rhodes-Ousley, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071784351/?ar">https://go.oreilly.com/library-access/library/view/-/9780071784351/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071784351/?ar">https://learning.oreilly.com/library/view/~/9780071784351/?ar</a><br/>Format: Electronic Resources<br/>UTM security with Fortinet : Mastering FortiOSent://SD_ILS/0/SD_ILS:22966172024-05-28T23:11:16Z2024-05-28T23:11:16Zby Tam, Kenneth.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497473/?ar">https://learning.oreilly.com/library/view/~/9781597497473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497473">https://learning.oreilly.com/library/view/~/9781597497473</a><br/>Format: Electronic Resources<br/>Advanced persistent threat : understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:22968452024-05-28T23:11:16Z2024-05-28T23:11:16Zby Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499491">https://learning.oreilly.com/library/view/~/9781597499491</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499491/?ar">https://learning.oreilly.com/library/view/~/9781597499491/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499491/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499491/?ar</a><br/>Format: Electronic Resources<br/>Windows 2012 server network security : securing your windows network systems and infrastructureent://SD_ILS/0/SD_ILS:22984942024-05-28T23:11:16Z2024-05-28T23:11:16Zby Rountree, Derrick.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499583/?ar">https://learning.oreilly.com/library/view/~/9781597499583/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499583/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499583/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499583">https://learning.oreilly.com/library/view/~/9781597499583</a><br/>Format: Electronic Resources<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:22983362024-05-28T23:11:16Z2024-05-28T23:11:16Zby Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar">https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118380956/?ar">https://learning.oreilly.com/library/view/~/9781118380956/?ar</a><br/>Format: Electronic Resources<br/>Introduction to computer networks and cybersecurityent://SD_ILS/0/SD_ILS:23055782024-05-28T23:11:16Z2024-05-28T23:11:16Zby Wu, Chwan-Hwa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar">https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466572133/?ar">https://learning.oreilly.com/library/view/~/9781466572133/?ar</a><br/>Format: Electronic Resources<br/>Hacking exposed : mobile security secrets & solutionsent://SD_ILS/0/SD_ILS:23010162024-05-28T23:11:16Z2024-05-28T23:11:16Zby Bergman, Neil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar">https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071817011/?ar">https://learning.oreilly.com/library/view/~/9780071817011/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071817011">https://learning.oreilly.com/library/view/~/9780071817011</a><br/>Format: Electronic Resources<br/>Security risks in social media technologies : safe practices in public service applicationsent://SD_ILS/0/SD_ILS:23010762024-05-28T23:11:16Z2024-05-28T23:11:16Zby Oxley, Alan.<br/><a href="https://learning.oreilly.com/library/view/~/9781843347149">https://learning.oreilly.com/library/view/~/9781843347149</a>
<a href="https://learning.oreilly.com/library/view/~/9781843347149/?ar">https://learning.oreilly.com/library/view/~/9781843347149/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781843347149/?ar">https://go.oreilly.com/library-access/library/view/-/9781843347149/?ar</a><br/>Format: Electronic Resources<br/>Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this dayent://SD_ILS/0/SD_ILS:22980532024-05-28T23:11:16Z2024-05-28T23:11:16Zby Yerrid, K. C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960/?ar">https://learning.oreilly.com/library/view/~/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960">https://learning.oreilly.com/library/view/~/9781849519960</a><br/>Format: Electronic Resources<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:23134822024-05-28T23:11:16Z2024-05-28T23:11:16Zby Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format: Electronic Resources<br/>Strategic Information Management, 3rd Editionent://SD_ILS/0/SD_ILS:23199142024-05-28T23:11:16Z2024-05-28T23:11:16Zby Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format: Electronic Resources<br/>Surviving the Top Ten Challenges of Software Testing : a People-Oriented Approachent://SD_ILS/0/SD_ILS:23058322024-05-28T23:11:16Z2024-05-28T23:11:16Zby Rice, William E. Perry. Randall W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163">https://learning.oreilly.com/library/view/~/9780133489163</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163/?ar">https://learning.oreilly.com/library/view/~/9780133489163/?ar</a><br/>Format: Electronic Resources<br/>Best Practices for the Formal Software Testing Process : a Menu of Testing Tasksent://SD_ILS/0/SD_ILS:23206912024-05-28T23:11:16Z2024-05-28T23:11:16Zby Drabick, Rodger, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309/?ar">https://learning.oreilly.com/library/view/~/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309">https://learning.oreilly.com/library/view/~/9780133489309</a><br/>Format: Electronic Resources<br/>