Search Results for - Narrowed by: Réseaux d'ordinateurs -- Sécurité -- Mesures. - Network security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dSUBJECT$002509Subject$002509Network$002bsecurity.$002509Network$002bsecurity.$0026ps$003d300?2024-05-26T19:28:57ZLearning Python for forensics : leverage the power of Python in forensic investigationsent://SD_ILS/0/SD_ILS:23191162024-05-26T19:28:57Z2024-05-26T19:28:57Zby Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format: Electronic Resources<br/>Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOpsent://SD_ILS/0/SD_ILS:23172982024-05-26T19:28:57Z2024-05-26T19:28:57Zby Hsu, Tony, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788995504/?ar">https://learning.oreilly.com/library/view/~/9781788995504/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995504">https://learning.oreilly.com/library/view/~/9781788995504</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar</a><br/>Format: Electronic Resources<br/>Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackersent://SD_ILS/0/SD_ILS:23160892024-05-26T19:28:57Z2024-05-26T19:28:57Zby Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format: Electronic Resources<br/>Practical Industrial Internet of Things security : a practitioner's guide to securing connected industriesent://SD_ILS/0/SD_ILS:23172852024-05-26T19:28:57Z2024-05-26T19:28:57Zby Bhattacharjee, Sravani, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788832687/?ar">https://learning.oreilly.com/library/view/~/9781788832687/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788832687">https://learning.oreilly.com/library/view/~/9781788832687</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar">https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tacticsent://SD_ILS/0/SD_ILS:23157062024-05-26T19:28:57Z2024-05-26T19:28:57Zby Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format: Electronic Resources<br/>Learn social engineering : learn the art of human hacking with an internationally renowned expertent://SD_ILS/0/SD_ILS:23165462024-05-26T19:28:57Z2024-05-26T19:28:57Zby Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar">https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788837927/?ar">https://learning.oreilly.com/library/view/~/9781788837927/?ar</a><br/>Format: Electronic Resources<br/>Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchainent://SD_ILS/0/SD_ILS:23170922024-05-26T19:28:57Z2024-05-26T19:28:57Zby Gupta, Rajneesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990189">https://learning.oreilly.com/library/view/~/9781788990189</a>
<a href="https://learning.oreilly.com/library/view/~/9781788990189/?ar">https://learning.oreilly.com/library/view/~/9781788990189/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar</a><br/>Format: Electronic Resources<br/>Thinking security : stopping next year's hackersent://SD_ILS/0/SD_ILS:23089322024-05-26T19:28:57Z2024-05-26T19:28:57Zby Bellovin, Steven M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar">https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134278223">https://learning.oreilly.com/library/view/~/9780134278223</a>
<a href="https://learning.oreilly.com/library/view/~/9780134278223/?ar">https://learning.oreilly.com/library/view/~/9780134278223/?ar</a><br/>Format: Electronic Resources<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:23026262024-05-26T19:28:57Z2024-05-26T19:28:57Zby Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format: Electronic Resources<br/>24 deadly sins of software security : programming flaws and how to fix thement://SD_ILS/0/SD_ILS:22871762024-05-26T19:28:57Z2024-05-26T19:28:57Zby Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780071626750/?ar">https://learning.oreilly.com/library/view/~/9780071626750/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar">https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071626750">https://learning.oreilly.com/library/view/~/9780071626750</a><br/>Format: Electronic Resources<br/>Unauthorised access : physical penetration testing for IT security teamsent://SD_ILS/0/SD_ILS:22884522024-05-26T19:28:57Z2024-05-26T19:28:57Zby Allsopp, Wil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar">https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470747612/?ar">https://learning.oreilly.com/library/view/~/9780470747612/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470747612">https://learning.oreilly.com/library/view/~/9780470747612</a><br/>Format: Electronic Resources<br/>