Search Results for - Narrowed by: R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures. - Network security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dSUBJECT$002509Subject$002509Network$002bsecurity.$002509Network$002bsecurity.$0026ps$003d300? 2024-05-26T19:28:57Z Learning Python for forensics : leverage the power of Python in forensic investigations ent://SD_ILS/0/SD_ILS:2319116 2024-05-26T19:28:57Z 2024-05-26T19:28:57Z by&#160;Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOps ent://SD_ILS/0/SD_ILS:2317298 2024-05-26T19:28:57Z 2024-05-26T19:28:57Z by&#160;Hsu, Tony, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788995504/?ar">https://learning.oreilly.com/library/view/~/9781788995504/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995504">https://learning.oreilly.com/library/view/~/9781788995504</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers ent://SD_ILS/0/SD_ILS:2316089 2024-05-26T19:28:57Z 2024-05-26T19:28:57Z by&#160;Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Industrial Internet of Things security : a practitioner's guide to securing connected industries ent://SD_ILS/0/SD_ILS:2317285 2024-05-26T19:28:57Z 2024-05-26T19:28:57Z by&#160;Bhattacharjee, Sravani, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788832687/?ar">https://learning.oreilly.com/library/view/~/9781788832687/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788832687">https://learning.oreilly.com/library/view/~/9781788832687</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar">https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics ent://SD_ILS/0/SD_ILS:2315706 2024-05-26T19:28:57Z 2024-05-26T19:28:57Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn social engineering : learn the art of human hacking with an internationally renowned expert ent://SD_ILS/0/SD_ILS:2316546 2024-05-26T19:28:57Z 2024-05-26T19:28:57Z by&#160;Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar">https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788837927/?ar">https://learning.oreilly.com/library/view/~/9781788837927/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain ent://SD_ILS/0/SD_ILS:2317092 2024-05-26T19:28:57Z 2024-05-26T19:28:57Z by&#160;Gupta, Rajneesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990189">https://learning.oreilly.com/library/view/~/9781788990189</a> <a href="https://learning.oreilly.com/library/view/~/9781788990189/?ar">https://learning.oreilly.com/library/view/~/9781788990189/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar</a><br/>Format:&#160;Electronic Resources<br/> Thinking security : stopping next year's hackers ent://SD_ILS/0/SD_ILS:2308932 2024-05-26T19:28:57Z 2024-05-26T19:28:57Z by&#160;Bellovin, Steven M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar">https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134278223">https://learning.oreilly.com/library/view/~/9780134278223</a> <a href="https://learning.oreilly.com/library/view/~/9780134278223/?ar">https://learning.oreilly.com/library/view/~/9780134278223/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:2302626 2024-05-26T19:28:57Z 2024-05-26T19:28:57Z by&#160;Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format:&#160;Electronic Resources<br/> 24 deadly sins of software security : programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:2287176 2024-05-26T19:28:57Z 2024-05-26T19:28:57Z by&#160;Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780071626750/?ar">https://learning.oreilly.com/library/view/~/9780071626750/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar">https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071626750">https://learning.oreilly.com/library/view/~/9780071626750</a><br/>Format:&#160;Electronic Resources<br/> Unauthorised access : physical penetration testing for IT security teams ent://SD_ILS/0/SD_ILS:2288452 2024-05-26T19:28:57Z 2024-05-26T19:28:57Z by&#160;Allsopp, Wil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar">https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470747612/?ar">https://learning.oreilly.com/library/view/~/9780470747612/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470747612">https://learning.oreilly.com/library/view/~/9780470747612</a><br/>Format:&#160;Electronic Resources<br/>