Search Results for - Narrowed by: R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures. - Database security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dSUBJECT$002509Subject$002509Database$002bsecurity.$002509Database$002bsecurity.$0026ps$003d300? 2024-05-31T06:05:12Z Data analytics for IT networks : developing innovative use cases ent://SD_ILS/0/SD_ILS:2317559 2024-05-31T06:05:12Z 2024-05-31T06:05:12Z by&#160;Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain ent://SD_ILS/0/SD_ILS:2317092 2024-05-31T06:05:12Z 2024-05-31T06:05:12Z by&#160;Gupta, Rajneesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990189">https://learning.oreilly.com/library/view/~/9781788990189</a> <a href="https://learning.oreilly.com/library/view/~/9781788990189/?ar">https://learning.oreilly.com/library/view/~/9781788990189/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar</a><br/>Format:&#160;Electronic Resources<br/> Designing an IAM framework with Oracle Identity and access management suite ent://SD_ILS/0/SD_ILS:2289729 2024-05-31T06:05:12Z 2024-05-31T06:05:12Z by&#160;Scheidel, Jeff.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar">https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071741378/?ar">https://learning.oreilly.com/library/view/~/9780071741378/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071741378">https://learning.oreilly.com/library/view/~/9780071741378</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:2282147 2024-05-31T06:05:12Z 2024-05-31T06:05:12Z by&#160;Amini, Rob.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492430">https://learning.oreilly.com/library/view/~/9781597492430</a> <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a> <a href="https://learning.oreilly.com/library/view/~/9781597492430/?ar">https://learning.oreilly.com/library/view/~/9781597492430/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492430/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492430/?ar</a><br/>Format:&#160;Electronic Resources<br/> The database hacker's handbook : defending database servers ent://SD_ILS/0/SD_ILS:2282264 2024-05-31T06:05:12Z 2024-05-31T06:05:12Z by&#160;Litchfield, David, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780764578014/?ar">https://learning.oreilly.com/library/view/~/9780764578014/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar">https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780764578014">https://learning.oreilly.com/library/view/~/9780764578014</a><br/>Format:&#160;Electronic Resources<br/>