Search Results for - Narrowed by: Réseaux d'ordinateurs -- Sécurité -- Mesures. - 2021
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092021$0025092021$0026ps$003d300?
2024-06-01T06:21:36Z
Cyberjutsu : cybersecurity for the modern ninja
ent://SD_ILS/0/SD_ILS:2326541
2024-06-01T06:21:36Z
2024-06-01T06:21:36Z
by McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format: Electronic Resources<br/>
Multi-site network and security services with NSX-T : implement network security, stateful services, and operations
ent://SD_ILS/0/SD_ILS:2328881
2024-06-01T06:21:36Z
2024-06-01T06:21:36Z
by Hoogendoorn, Iwan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484270837/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270837/?ar">https://learning.oreilly.com/library/view/~/9781484270837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270837">https://learning.oreilly.com/library/view/~/9781484270837</a><br/>Format: Electronic Resources<br/>
Zero Trust security : an enterprise guide
ent://SD_ILS/0/SD_ILS:2328396
2024-06-01T06:21:36Z
2024-06-01T06:21:36Z
by Garbis, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484267028">https://learning.oreilly.com/library/view/~/9781484267028</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484267028/?ar">https://go.oreilly.com/library-access/library/view/-/9781484267028/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484267028/?ar">https://learning.oreilly.com/library/view/~/9781484267028/?ar</a><br/>Format: Electronic Resources<br/>
Threat modeling a practical guide for developing teams
ent://SD_ILS/0/SD_ILS:2331156
2024-06-01T06:21:36Z
2024-06-01T06:21:36Z
by Tarandach, Izar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056546/?ar">https://learning.oreilly.com/library/view/~/9781492056546/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492056546">https://learning.oreilly.com/library/view/~/9781492056546</a><br/>Format: Electronic Resources<br/>
Pentesting Industrial Control Systems : an Ethical Hacker's Guide to Analyzing, Compromising, Mitigating, and Securing Industrial Processes.
ent://SD_ILS/0/SD_ILS:2330864
2024-06-01T06:21:36Z
2024-06-01T06:21:36Z
by Smith, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202382/?ar">https://learning.oreilly.com/library/view/~/9781800202382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202382">https://learning.oreilly.com/library/view/~/9781800202382</a><br/>Format: Electronic Resources<br/>
Digital forensics for pentesters : hands-on learning.
ent://SD_ILS/0/SD_ILS:2331969
2024-06-01T06:21:36Z
2024-06-01T06:21:36Z
by Krahenbill, Cliff, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803231969">https://learning.oreilly.com/videos/~/9781803231969</a>
<a href="https://learning.oreilly.com/videos/~/9781803231969/?ar">https://learning.oreilly.com/videos/~/9781803231969/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar</a><br/>Format: Video recording<br/>
How to hack like a ghost
ent://SD_ILS/0/SD_ILS:2326507
2024-06-01T06:21:36Z
2024-06-01T06:21:36Z
by Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format: Electronic Resources<br/>
CEH v11 certified ethical hacker study guide
ent://SD_ILS/0/SD_ILS:2329776
2024-06-01T06:21:36Z
2024-06-01T06:21:36Z
by Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119800286/?ar">https://learning.oreilly.com/library/view/~/9781119800286/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar">https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119800286">https://learning.oreilly.com/library/view/~/9781119800286</a><br/>Format: Electronic Resources<br/>
Mastering Active Directory - Third Edition
ent://SD_ILS/0/SD_ILS:2331105
2024-06-01T06:21:36Z
2024-06-01T06:21:36Z
by Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format: Electronic Resources<br/>
Secure operations and protections
ent://SD_ILS/0/SD_ILS:2332092
2024-06-01T06:21:36Z
2024-06-01T06:21:36Z
by Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format: Video recording<br/>
CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide
ent://SD_ILS/0/SD_ILS:2330975
2024-06-01T06:21:36Z
2024-06-01T06:21:36Z
by Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar">https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780136634829/?ar">https://learning.oreilly.com/library/view/~/9780136634829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780136634829">https://learning.oreilly.com/library/view/~/9780136634829</a><br/>Format: Electronic Resources<br/>
Penetration Testing Azure for Ethical Hackers
ent://SD_ILS/0/SD_ILS:2331077
2024-06-01T06:21:36Z
2024-06-01T06:21:36Z
by Okeyode, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212932/?ar">https://learning.oreilly.com/library/view/~/9781839212932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212932">https://learning.oreilly.com/library/view/~/9781839212932</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar</a><br/>Format: Electronic Resources<br/>
8 steps to better security : a simple cyber resilience guide for business
ent://SD_ILS/0/SD_ILS:2330835
2024-06-01T06:21:36Z
2024-06-01T06:21:36Z
by Crawley, Kim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119811237/?ar">https://learning.oreilly.com/library/view/~/9781119811237/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119811237">https://learning.oreilly.com/library/view/~/9781119811237</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar">https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar</a><br/>Format: Electronic Resources<br/>
How cybersecurity really works : a hands-on guide for total beginners
ent://SD_ILS/0/SD_ILS:2328036
2024-06-01T06:21:36Z
2024-06-01T06:21:36Z
by Grubb, Sam (Cyber security consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999/?ar">https://learning.oreilly.com/library/view/~/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999">https://learning.oreilly.com/library/view/~/9781098128999</a><br/>Format: Electronic Resources<br/>
Artificial Intelligence, Cybersecurity and Cyber Defence
ent://SD_ILS/0/SD_ILS:2328358
2024-06-01T06:21:36Z
2024-06-01T06:21:36Z
by Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format: Electronic Resources<br/>