Search Results for - Narrowed by: R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures. - Protocoles de r&eacute;seaux d'ordinateurs. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dSUBJECT$002509Subject$002509Protocoles$002bde$002br$0025C3$0025A9seaux$002bd$002527ordinateurs.$002509Protocoles$002bde$002br$0025C3$0025A9seaux$002bd$002527ordinateurs.$0026ps$003d300? 2024-05-31T15:14:18Z Netzwerkprotokolle hacken : Sicherheisl&uuml;cken verstehen, analysieren und sch&uuml;tzen ent://SD_ILS/0/SD_ILS:2317121 2024-05-31T15:14:18Z 2024-05-31T15:14:18Z by&#160;Forshaw, James, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492068631/?ar">https://learning.oreilly.com/library/view/~/9781492068631/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492068631/?ar">https://go.oreilly.com/library-access/library/view/-/9781492068631/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threats ent://SD_ILS/0/SD_ILS:2316833 2024-05-31T15:14:18Z 2024-05-31T15:14:18Z by&#160;Crouthamel, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788626521/?ar">https://learning.oreilly.com/library/view/~/9781788626521/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar">https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco Intelligent WAN (IWAN) ent://SD_ILS/0/SD_ILS:2311998 2024-05-31T15:14:18Z 2024-05-31T15:14:18Z by&#160;Edgeworth, Brad, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar">https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134423760/?ar">https://learning.oreilly.com/library/view/~/9780134423760/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134423760">https://learning.oreilly.com/library/view/~/9780134423760</a><br/>Format:&#160;Electronic Resources<br/> Cisco ISE for BYOD and secure unified access ent://SD_ILS/0/SD_ILS:2313856 2024-05-31T15:14:18Z 2024-05-31T15:14:18Z by&#160;Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134586656/?ar">https://learning.oreilly.com/library/view/~/9780134586656/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134586656/?ar">https://go.oreilly.com/library-access/library/view/-/9780134586656/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco bring your own device (BYOD) networking ent://SD_ILS/0/SD_ILS:2303678 2024-05-31T15:14:18Z 2024-05-31T15:14:18Z by&#160;Redmon, Kevin.<br/><a href="https://learning.oreilly.com/videos/~/9780133835793/?ar">https://learning.oreilly.com/videos/~/9780133835793/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133835793/?ar">https://go.oreilly.com/library-access/library/view/-/9780133835793/?ar</a><br/>Format:&#160;Electronic Resources<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:2284693 2024-05-31T15:14:18Z 2024-05-31T15:14:18Z by&#160;Hoffman, Daniel (Daniel V.), 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470238387/?ar">https://learning.oreilly.com/library/view/~/9780470238387/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar">https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470238387">https://learning.oreilly.com/library/view/~/9780470238387</a><br/>Format:&#160;Electronic Resources<br/> Ethereal : packet sniffing ent://SD_ILS/0/SD_ILS:2281331 2024-05-31T15:14:18Z 2024-05-31T15:14:18Z by&#160;Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266825">https://learning.oreilly.com/library/view/~/9781932266825</a> <a href="https://www.sciencedirect.com/science/book/9781932266825">https://www.sciencedirect.com/science/book/9781932266825</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781932266825/?ar">https://learning.oreilly.com/library/view/~/9781932266825/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security with OpenSSL ent://SD_ILS/0/SD_ILS:2280896 2024-05-31T15:14:18Z 2024-05-31T15:14:18Z by&#160;Viega, John.<br/><a href="https://learning.oreilly.com/library/view/~/059600270X/?ar">https://learning.oreilly.com/library/view/~/059600270X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/059600270X/?ar">https://go.oreilly.com/library-access/library/view/-/059600270X/?ar</a> <a href="https://learning.oreilly.com/library/view/~/059600270X">https://learning.oreilly.com/library/view/~/059600270X</a><br/>Format:&#160;Electronic Resources<br/> The Modelling and Analysis of Security Protocols: the CSP Approach ent://SD_ILS/0/SD_ILS:2326682 2024-05-31T15:14:18Z 2024-05-31T15:14:18Z by&#160;Ryan, P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201674718/?ar">https://go.oreilly.com/library-access/library/view/-/0201674718/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0201674718/?ar">https://learning.oreilly.com/library/view/~/0201674718/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0201674718">https://learning.oreilly.com/library/view/~/0201674718</a><br/>Format:&#160;Electronic Resources<br/>