Search Results for - Narrowed by: Sécurité informatique. - 2005
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026ps$003d300?
2024-06-07T22:59:26Z
Internet forensics
ent://SD_ILS/0/SD_ILS:2282055
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Jones, Robert, 1957 July 15-<br/><a href="https://learning.oreilly.com/library/view/~/059610006X">https://learning.oreilly.com/library/view/~/059610006X</a>
<a href="https://learning.oreilly.com/library/view/~/059610006X/?ar">https://learning.oreilly.com/library/view/~/059610006X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/059610006X/?ar">https://go.oreilly.com/library-access/library/view/-/059610006X/?ar</a><br/>Format: Electronic Resources<br/>
Core security patterns : best practices and strategies for J2EE(TM), Web services, and identity management
ent://SD_ILS/0/SD_ILS:2288350
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Steel, Christopher, 1968-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0131463071/?ar">https://go.oreilly.com/library-access/library/view/-/0131463071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131463071/?ar">https://learning.oreilly.com/library/view/~/0131463071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131463071">https://learning.oreilly.com/library/view/~/0131463071</a><br/>Format: Electronic Resources<br/>
Building a global information assurance program
ent://SD_ILS/0/SD_ILS:2322916
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Curts, Raymond J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780203997550/?ar">https://learning.oreilly.com/library/view/~/9780203997550/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar">https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar</a><br/>Format: Electronic Resources<br/>
Absolute beginner's guide to security, spam, spyware and viruses
ent://SD_ILS/0/SD_ILS:2282088
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Walker, Andy.<br/><a href="https://learning.oreilly.com/library/view/~/0789734591">https://learning.oreilly.com/library/view/~/0789734591</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0789734591/?ar">https://go.oreilly.com/library-access/library/view/-/0789734591/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0789734591/?ar">https://learning.oreilly.com/library/view/~/0789734591/?ar</a><br/>Format: Electronic Resources<br/>
The art of computer virus research and defense
ent://SD_ILS/0/SD_ILS:2281621
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Szor, Peter.<br/><a href="https://learning.oreilly.com/library/view/~/0321304543/?ar">https://learning.oreilly.com/library/view/~/0321304543/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321304543/?ar">https://go.oreilly.com/library-access/library/view/-/0321304543/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321304543">https://learning.oreilly.com/library/view/~/0321304543</a><br/>Format: Electronic Resources<br/>
Enterprise security architecture : a business-driven approach
ent://SD_ILS/0/SD_ILS:2305980
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Sherwood, John, 1947- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781578203185/?ar">https://learning.oreilly.com/library/view/~/9781578203185/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781578203185/?ar">https://go.oreilly.com/library-access/library/view/-/9781578203185/?ar</a><br/>Format: Electronic Resources<br/>
Aggressive network self-defense
ent://SD_ILS/0/SD_ILS:2282271
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Wyler, Neil R.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836203">https://learning.oreilly.com/library/view/~/9781931836203</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836203/?ar">https://learning.oreilly.com/library/view/~/9781931836203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836203/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836203/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781931836203">https://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Electronic Resources<br/>
Cyber spying : tracking your family's (sometimes) secret online lives
ent://SD_ILS/0/SD_ILS:2282272
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Fair, Ted.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836418">https://learning.oreilly.com/library/view/~/9781931836418</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836418/?ar">https://learning.oreilly.com/library/view/~/9781931836418/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836418/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836418/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781931836418">https://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Electronic Resources<br/>
Software piracy exposed
ent://SD_ILS/0/SD_ILS:2281995
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Craig, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266986">https://learning.oreilly.com/library/view/~/9781932266986</a>
<a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266986/?ar">https://learning.oreilly.com/library/view/~/9781932266986/?ar</a><br/>Format: Electronic Resources<br/>
Snort cookbook
ent://SD_ILS/0/SD_ILS:2282585
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/0596007914">https://learning.oreilly.com/library/view/~/0596007914</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596007914/?ar">https://go.oreilly.com/library-access/library/view/-/0596007914/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007914/?ar">https://learning.oreilly.com/library/view/~/0596007914/?ar</a><br/>Format: Electronic Resources<br/>
The business case for network security : advocacy, governance, and ROI
ent://SD_ILS/0/SD_ILS:2281646
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587201216/?ar">https://go.oreilly.com/library-access/library/view/-/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216/?ar">https://learning.oreilly.com/library/view/~/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216">https://learning.oreilly.com/library/view/~/1587201216</a><br/>Format: Electronic Resources<br/>
Network security tools
ent://SD_ILS/0/SD_ILS:2282158
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Clarke, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/0596007949">https://learning.oreilly.com/library/view/~/0596007949</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596007949/?ar">https://go.oreilly.com/library-access/library/view/-/0596007949/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007949/?ar">https://learning.oreilly.com/library/view/~/0596007949/?ar</a><br/>Format: Electronic Resources<br/>
The database hacker's handbook : defending database servers
ent://SD_ILS/0/SD_ILS:2282264
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Litchfield, David, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780764578014/?ar">https://learning.oreilly.com/library/view/~/9780764578014/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar">https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764578014">https://learning.oreilly.com/library/view/~/9780764578014</a><br/>Format: Electronic Resources<br/>
The art of intrusion : the real stories behind the exploits of hackers, intruders & deceivers
ent://SD_ILS/0/SD_ILS:2281569
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Mitnick, Kevin D. (Kevin David), 1963-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar">https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470503829/?ar">https://learning.oreilly.com/library/view/~/9780470503829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470503829">https://learning.oreilly.com/library/view/~/9780470503829</a><br/>Format: Electronic Resources<br/>
Microsoft windows security resource kit
ent://SD_ILS/0/SD_ILS:2282820
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Smith, Ben, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780735621749">https://learning.oreilly.com/library/view/~/9780735621749</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar">https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735621749/?ar">https://learning.oreilly.com/library/view/~/9780735621749/?ar</a><br/>Format: Electronic Resources<br/>
Data Protection and Information Lifecycle Management.
ent://SD_ILS/0/SD_ILS:2290466
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Petrocelli, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0131927574/?ar">https://go.oreilly.com/library-access/library/view/-/0131927574/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131927574/?ar">https://learning.oreilly.com/library/view/~/0131927574/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131927574">https://learning.oreilly.com/library/view/~/0131927574</a><br/>Format: Electronic Resources<br/>
SELINUX : NSA's open source security enhanced Linux
ent://SD_ILS/0/SD_ILS:2288931
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by McCarty, Bill, 1953-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596007167/?ar">https://go.oreilly.com/library-access/library/view/-/0596007167/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007167">https://learning.oreilly.com/library/view/~/0596007167</a>
<a href="https://learning.oreilly.com/library/view/~/0596007167/?ar">https://learning.oreilly.com/library/view/~/0596007167/?ar</a><br/>Format: Electronic Resources<br/>
Nine steps to success : an ISO 27001 implementation overview
ent://SD_ILS/0/SD_ILS:2289743
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Calder, Alan, 1957-<br/><a href="https://learning.oreilly.com/library/view/~/9781905356126/?ar">https://learning.oreilly.com/library/view/~/9781905356126/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar</a><br/>Format: Electronic Resources<br/>
Mastering FreeBSD and OpenBSD security
ent://SD_ILS/0/SD_ILS:2289327
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Korff, Yanek.<br/><a href="https://learning.oreilly.com/library/view/~/0596006268">https://learning.oreilly.com/library/view/~/0596006268</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006268/?ar">https://go.oreilly.com/library-access/library/view/-/0596006268/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006268/?ar">https://learning.oreilly.com/library/view/~/0596006268/?ar</a><br/>Format: Electronic Resources<br/>
Cryptography in C and C++
ent://SD_ILS/0/SD_ILS:2282126
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Welschenbach, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781590595022">https://learning.oreilly.com/library/view/~/9781590595022</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781590595022/?ar">https://go.oreilly.com/library-access/library/view/-/9781590595022/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781590595022/?ar">https://learning.oreilly.com/library/view/~/9781590595022/?ar</a><br/>Format: Electronic Resources<br/>
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
ent://SD_ILS/0/SD_ILS:2282685
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Foster, James C.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490054/?ar">https://learning.oreilly.com/library/view/~/9781597490054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490054/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490054/?ar</a><br/>Format: Electronic Resources<br/>
InfoSec career hacking : sell your skillz, not your soul
ent://SD_ILS/0/SD_ILS:2282691
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Bayles, Aaron W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490115/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490115/?ar">https://learning.oreilly.com/library/view/~/9781597490115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490115">https://learning.oreilly.com/library/view/~/9781597490115</a>
<a href="https://www.sciencedirect.com/science/book/9781597490115">https://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Electronic Resources<br/>
Linux server security
ent://SD_ILS/0/SD_ILS:2281596
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Bauer, Michael D.<br/><a href="https://learning.oreilly.com/library/view/~/0596006705">https://learning.oreilly.com/library/view/~/0596006705</a>
<a href="https://learning.oreilly.com/library/view/~/0596006705/?ar">https://learning.oreilly.com/library/view/~/0596006705/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006705/?ar">https://go.oreilly.com/library-access/library/view/-/0596006705/?ar</a><br/>Format: Electronic Resources<br/>
Silence on the wire : a field guide to passive reconnaissance and indirect attacks
ent://SD_ILS/0/SD_ILS:2287377
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Zalewski, Michal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1593270461/?ar">https://go.oreilly.com/library-access/library/view/-/1593270461/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1593270461/?ar">https://learning.oreilly.com/library/view/~/1593270461/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1593270461">https://learning.oreilly.com/library/view/~/1593270461</a><br/>Format: Electronic Resources<br/>
Rootkits : subverting the Windows kernel
ent://SD_ILS/0/SD_ILS:2285981
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Hoglund, Greg.<br/><a href="https://learning.oreilly.com/library/view/~/0321294319/?ar">https://learning.oreilly.com/library/view/~/0321294319/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321294319/?ar">https://go.oreilly.com/library-access/library/view/-/0321294319/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321294319">https://learning.oreilly.com/library/view/~/0321294319</a><br/>Format: Electronic Resources<br/>
Windows Server 2003 security : a technical reference
ent://SD_ILS/0/SD_ILS:2281810
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Bragg, Roberta.<br/><a href="https://learning.oreilly.com/library/view/~/0321305019/?ar">https://learning.oreilly.com/library/view/~/0321305019/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321305019">https://learning.oreilly.com/library/view/~/0321305019</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321305019/?ar">https://go.oreilly.com/library-access/library/view/-/0321305019/?ar</a><br/>Format: Electronic Resources<br/>
A practical guide to security assessments
ent://SD_ILS/0/SD_ILS:2281823
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Kairab, Sudhanshu.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203507230/?ar">https://go.oreilly.com/library-access/library/view/-/9780203507230/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203507230/?ar">https://learning.oreilly.com/library/view/~/9780203507230/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203507230">https://learning.oreilly.com/library/view/~/9780203507230</a><br/>Format: Electronic Resources<br/>
Host integrity monitoring : using Osiris and Samhain
ent://SD_ILS/0/SD_ILS:2282620
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Wotring, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490184">https://learning.oreilly.com/library/view/~/9781597490184</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490184/?ar">https://learning.oreilly.com/library/view/~/9781597490184/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597490184">https://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Electronic Resources<br/>
Reversing : secrets of reverse engineering
ent://SD_ILS/0/SD_ILS:2282621
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Eilam, Eldad.<br/><a href="https://learning.oreilly.com/library/view/~/9780764574818/?ar">https://learning.oreilly.com/library/view/~/9780764574818/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780764574818/?ar">https://go.oreilly.com/library-access/library/view/-/9780764574818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764574818">https://learning.oreilly.com/library/view/~/9780764574818</a><br/>Format: Electronic Resources<br/>
The art of intrusion the real stories behind the exploits of hackers, intruders & deceivers
ent://SD_ILS/0/SD_ILS:334708
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Mitnick, Kevin D. (Kevin David), 1963-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892</a><br/>Format: Electronic Resources<br/>
IT Governance : Guidelines for Directors.
ent://SD_ILS/0/SD_ILS:2290678
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Calder, Alan.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281058/?ar">https://learning.oreilly.com/library/view/~/9781849281058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281058/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281058/?ar</a><br/>Format: Electronic Resources<br/>
Linux Firewalls, Third Edition
ent://SD_ILS/0/SD_ILS:2319668
2024-06-07T22:59:26Z
2024-06-07T22:59:26Z
by Suehring, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/0672327716/?ar">https://learning.oreilly.com/library/view/~/0672327716/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672327716">https://learning.oreilly.com/library/view/~/0672327716</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672327716/?ar">https://go.oreilly.com/library-access/library/view/-/0672327716/?ar</a><br/>Format: Electronic Resources<br/>