Search Results for - Narrowed by: Réseaux d'ordinateurs -- Sécurité -- Mesures. - Protocoles de réseaux d'ordinateurs.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dSUBJECT$002509Subject$002509Protocoles$002bde$002br$0025C3$0025A9seaux$002bd$002527ordinateurs.$002509Protocoles$002bde$002br$0025C3$0025A9seaux$002bd$002527ordinateurs.$0026ps$003d300?
2024-05-31T15:14:18Z
Netzwerkprotokolle hacken : Sicherheislücken verstehen, analysieren und schützen
ent://SD_ILS/0/SD_ILS:2317121
2024-05-31T15:14:18Z
2024-05-31T15:14:18Z
by Forshaw, James, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492068631/?ar">https://learning.oreilly.com/library/view/~/9781492068631/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492068631/?ar">https://go.oreilly.com/library-access/library/view/-/9781492068631/?ar</a><br/>Format: Electronic Resources<br/>
Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threats
ent://SD_ILS/0/SD_ILS:2316833
2024-05-31T15:14:18Z
2024-05-31T15:14:18Z
by Crouthamel, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788626521/?ar">https://learning.oreilly.com/library/view/~/9781788626521/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar">https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar</a><br/>Format: Electronic Resources<br/>
Cisco Intelligent WAN (IWAN)
ent://SD_ILS/0/SD_ILS:2311998
2024-05-31T15:14:18Z
2024-05-31T15:14:18Z
by Edgeworth, Brad, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar">https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134423760/?ar">https://learning.oreilly.com/library/view/~/9780134423760/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134423760">https://learning.oreilly.com/library/view/~/9780134423760</a><br/>Format: Electronic Resources<br/>
Cisco ISE for BYOD and secure unified access
ent://SD_ILS/0/SD_ILS:2313856
2024-05-31T15:14:18Z
2024-05-31T15:14:18Z
by Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134586656/?ar">https://learning.oreilly.com/library/view/~/9780134586656/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134586656/?ar">https://go.oreilly.com/library-access/library/view/-/9780134586656/?ar</a><br/>Format: Electronic Resources<br/>
Cisco bring your own device (BYOD) networking
ent://SD_ILS/0/SD_ILS:2303678
2024-05-31T15:14:18Z
2024-05-31T15:14:18Z
by Redmon, Kevin.<br/><a href="https://learning.oreilly.com/videos/~/9780133835793/?ar">https://learning.oreilly.com/videos/~/9780133835793/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133835793/?ar">https://go.oreilly.com/library-access/library/view/-/9780133835793/?ar</a><br/>Format: Electronic Resources<br/>
Implementing NAP and NAC security technologies : the complete guide to network access control
ent://SD_ILS/0/SD_ILS:2284693
2024-05-31T15:14:18Z
2024-05-31T15:14:18Z
by Hoffman, Daniel (Daniel V.), 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470238387/?ar">https://learning.oreilly.com/library/view/~/9780470238387/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar">https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470238387">https://learning.oreilly.com/library/view/~/9780470238387</a><br/>Format: Electronic Resources<br/>
Ethereal : packet sniffing
ent://SD_ILS/0/SD_ILS:2281331
2024-05-31T15:14:18Z
2024-05-31T15:14:18Z
by Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266825">https://learning.oreilly.com/library/view/~/9781932266825</a>
<a href="https://www.sciencedirect.com/science/book/9781932266825">https://www.sciencedirect.com/science/book/9781932266825</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266825/?ar">https://learning.oreilly.com/library/view/~/9781932266825/?ar</a><br/>Format: Electronic Resources<br/>
Network security with OpenSSL
ent://SD_ILS/0/SD_ILS:2280896
2024-05-31T15:14:18Z
2024-05-31T15:14:18Z
by Viega, John.<br/><a href="https://learning.oreilly.com/library/view/~/059600270X/?ar">https://learning.oreilly.com/library/view/~/059600270X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/059600270X/?ar">https://go.oreilly.com/library-access/library/view/-/059600270X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/059600270X">https://learning.oreilly.com/library/view/~/059600270X</a><br/>Format: Electronic Resources<br/>
The Modelling and Analysis of Security Protocols: the CSP Approach
ent://SD_ILS/0/SD_ILS:2326682
2024-05-31T15:14:18Z
2024-05-31T15:14:18Z
by Ryan, P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201674718/?ar">https://go.oreilly.com/library-access/library/view/-/0201674718/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201674718/?ar">https://learning.oreilly.com/library/view/~/0201674718/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201674718">https://learning.oreilly.com/library/view/~/0201674718</a><br/>Format: Electronic Resources<br/>