Search Results for - Narrowed by: S&eacute;curit&eacute; informatique. - 2005 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026ps$003d300? 2024-06-07T22:59:26Z Internet forensics ent://SD_ILS/0/SD_ILS:2282055 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Jones, Robert, 1957 July 15-<br/><a href="https://learning.oreilly.com/library/view/~/059610006X">https://learning.oreilly.com/library/view/~/059610006X</a> <a href="https://learning.oreilly.com/library/view/~/059610006X/?ar">https://learning.oreilly.com/library/view/~/059610006X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/059610006X/?ar">https://go.oreilly.com/library-access/library/view/-/059610006X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Core security patterns : best practices and strategies for J2EE(TM), Web services, and identity management ent://SD_ILS/0/SD_ILS:2288350 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Steel, Christopher, 1968-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0131463071/?ar">https://go.oreilly.com/library-access/library/view/-/0131463071/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131463071/?ar">https://learning.oreilly.com/library/view/~/0131463071/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131463071">https://learning.oreilly.com/library/view/~/0131463071</a><br/>Format:&#160;Electronic Resources<br/> Building a global information assurance program ent://SD_ILS/0/SD_ILS:2322916 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Curts, Raymond J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780203997550/?ar">https://learning.oreilly.com/library/view/~/9780203997550/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar">https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar</a><br/>Format:&#160;Electronic Resources<br/> Absolute beginner's guide to security, spam, spyware and viruses ent://SD_ILS/0/SD_ILS:2282088 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Walker, Andy.<br/><a href="https://learning.oreilly.com/library/view/~/0789734591">https://learning.oreilly.com/library/view/~/0789734591</a> <a href="https://go.oreilly.com/library-access/library/view/-/0789734591/?ar">https://go.oreilly.com/library-access/library/view/-/0789734591/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0789734591/?ar">https://learning.oreilly.com/library/view/~/0789734591/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of computer virus research and defense ent://SD_ILS/0/SD_ILS:2281621 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Szor, Peter.<br/><a href="https://learning.oreilly.com/library/view/~/0321304543/?ar">https://learning.oreilly.com/library/view/~/0321304543/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321304543/?ar">https://go.oreilly.com/library-access/library/view/-/0321304543/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321304543">https://learning.oreilly.com/library/view/~/0321304543</a><br/>Format:&#160;Electronic Resources<br/> Enterprise security architecture : a business-driven approach ent://SD_ILS/0/SD_ILS:2305980 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Sherwood, John, 1947- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781578203185/?ar">https://learning.oreilly.com/library/view/~/9781578203185/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781578203185/?ar">https://go.oreilly.com/library-access/library/view/-/9781578203185/?ar</a><br/>Format:&#160;Electronic Resources<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:2282271 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Wyler, Neil R.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836203">https://learning.oreilly.com/library/view/~/9781931836203</a> <a href="https://learning.oreilly.com/library/view/~/9781931836203/?ar">https://learning.oreilly.com/library/view/~/9781931836203/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836203/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836203/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781931836203">https://www.sciencedirect.com/science/book/9781931836203</a><br/>Format:&#160;Electronic Resources<br/> Cyber spying : tracking your family's (sometimes) secret online lives ent://SD_ILS/0/SD_ILS:2282272 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Fair, Ted.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836418">https://learning.oreilly.com/library/view/~/9781931836418</a> <a href="https://learning.oreilly.com/library/view/~/9781931836418/?ar">https://learning.oreilly.com/library/view/~/9781931836418/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836418/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836418/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781931836418">https://www.sciencedirect.com/science/book/9781931836418</a><br/>Format:&#160;Electronic Resources<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:2281995 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Craig, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266986">https://learning.oreilly.com/library/view/~/9781932266986</a> <a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781932266986/?ar">https://learning.oreilly.com/library/view/~/9781932266986/?ar</a><br/>Format:&#160;Electronic Resources<br/> Snort cookbook ent://SD_ILS/0/SD_ILS:2282585 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/0596007914">https://learning.oreilly.com/library/view/~/0596007914</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596007914/?ar">https://go.oreilly.com/library-access/library/view/-/0596007914/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007914/?ar">https://learning.oreilly.com/library/view/~/0596007914/?ar</a><br/>Format:&#160;Electronic Resources<br/> The business case for network security : advocacy, governance, and ROI ent://SD_ILS/0/SD_ILS:2281646 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587201216/?ar">https://go.oreilly.com/library-access/library/view/-/1587201216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587201216/?ar">https://learning.oreilly.com/library/view/~/1587201216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587201216">https://learning.oreilly.com/library/view/~/1587201216</a><br/>Format:&#160;Electronic Resources<br/> Network security tools ent://SD_ILS/0/SD_ILS:2282158 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Clarke, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/0596007949">https://learning.oreilly.com/library/view/~/0596007949</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596007949/?ar">https://go.oreilly.com/library-access/library/view/-/0596007949/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007949/?ar">https://learning.oreilly.com/library/view/~/0596007949/?ar</a><br/>Format:&#160;Electronic Resources<br/> The database hacker's handbook : defending database servers ent://SD_ILS/0/SD_ILS:2282264 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Litchfield, David, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780764578014/?ar">https://learning.oreilly.com/library/view/~/9780764578014/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar">https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780764578014">https://learning.oreilly.com/library/view/~/9780764578014</a><br/>Format:&#160;Electronic Resources<br/> The art of intrusion : the real stories behind the exploits of hackers, intruders &amp; deceivers ent://SD_ILS/0/SD_ILS:2281569 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Mitnick, Kevin D. (Kevin David), 1963-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar">https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470503829/?ar">https://learning.oreilly.com/library/view/~/9780470503829/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470503829">https://learning.oreilly.com/library/view/~/9780470503829</a><br/>Format:&#160;Electronic Resources<br/> Microsoft windows security resource kit ent://SD_ILS/0/SD_ILS:2282820 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Smith, Ben, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780735621749">https://learning.oreilly.com/library/view/~/9780735621749</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar">https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735621749/?ar">https://learning.oreilly.com/library/view/~/9780735621749/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data Protection and Information Lifecycle Management. ent://SD_ILS/0/SD_ILS:2290466 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Petrocelli, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0131927574/?ar">https://go.oreilly.com/library-access/library/view/-/0131927574/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131927574/?ar">https://learning.oreilly.com/library/view/~/0131927574/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131927574">https://learning.oreilly.com/library/view/~/0131927574</a><br/>Format:&#160;Electronic Resources<br/> SELINUX : NSA's open source security enhanced Linux ent://SD_ILS/0/SD_ILS:2288931 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;McCarty, Bill, 1953-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596007167/?ar">https://go.oreilly.com/library-access/library/view/-/0596007167/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007167">https://learning.oreilly.com/library/view/~/0596007167</a> <a href="https://learning.oreilly.com/library/view/~/0596007167/?ar">https://learning.oreilly.com/library/view/~/0596007167/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nine steps to success : an ISO 27001 implementation overview ent://SD_ILS/0/SD_ILS:2289743 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Calder, Alan, 1957-<br/><a href="https://learning.oreilly.com/library/view/~/9781905356126/?ar">https://learning.oreilly.com/library/view/~/9781905356126/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering FreeBSD and OpenBSD security ent://SD_ILS/0/SD_ILS:2289327 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Korff, Yanek.<br/><a href="https://learning.oreilly.com/library/view/~/0596006268">https://learning.oreilly.com/library/view/~/0596006268</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596006268/?ar">https://go.oreilly.com/library-access/library/view/-/0596006268/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596006268/?ar">https://learning.oreilly.com/library/view/~/0596006268/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography in C and C++ ent://SD_ILS/0/SD_ILS:2282126 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Welschenbach, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781590595022">https://learning.oreilly.com/library/view/~/9781590595022</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781590595022/?ar">https://go.oreilly.com/library-access/library/view/-/9781590595022/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781590595022/?ar">https://learning.oreilly.com/library/view/~/9781590595022/?ar</a><br/>Format:&#160;Electronic Resources<br/> Sockets, shellcode, porting &amp; coding : reverse engineering exploits and tool coding for security professionals ent://SD_ILS/0/SD_ILS:2282685 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Foster, James C.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490054/?ar">https://learning.oreilly.com/library/view/~/9781597490054/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490054/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490054/?ar</a><br/>Format:&#160;Electronic Resources<br/> InfoSec career hacking : sell your skillz, not your soul ent://SD_ILS/0/SD_ILS:2282691 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Bayles, Aaron W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490115/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490115/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490115/?ar">https://learning.oreilly.com/library/view/~/9781597490115/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490115">https://learning.oreilly.com/library/view/~/9781597490115</a> <a href="https://www.sciencedirect.com/science/book/9781597490115">https://www.sciencedirect.com/science/book/9781597490115</a><br/>Format:&#160;Electronic Resources<br/> Linux server security ent://SD_ILS/0/SD_ILS:2281596 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Bauer, Michael D.<br/><a href="https://learning.oreilly.com/library/view/~/0596006705">https://learning.oreilly.com/library/view/~/0596006705</a> <a href="https://learning.oreilly.com/library/view/~/0596006705/?ar">https://learning.oreilly.com/library/view/~/0596006705/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596006705/?ar">https://go.oreilly.com/library-access/library/view/-/0596006705/?ar</a><br/>Format:&#160;Electronic Resources<br/> Silence on the wire : a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:2287377 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Zalewski, Michal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1593270461/?ar">https://go.oreilly.com/library-access/library/view/-/1593270461/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1593270461/?ar">https://learning.oreilly.com/library/view/~/1593270461/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1593270461">https://learning.oreilly.com/library/view/~/1593270461</a><br/>Format:&#160;Electronic Resources<br/> Rootkits : subverting the Windows kernel ent://SD_ILS/0/SD_ILS:2285981 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Hoglund, Greg.<br/><a href="https://learning.oreilly.com/library/view/~/0321294319/?ar">https://learning.oreilly.com/library/view/~/0321294319/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321294319/?ar">https://go.oreilly.com/library-access/library/view/-/0321294319/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321294319">https://learning.oreilly.com/library/view/~/0321294319</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2003 security : a technical reference ent://SD_ILS/0/SD_ILS:2281810 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Bragg, Roberta.<br/><a href="https://learning.oreilly.com/library/view/~/0321305019/?ar">https://learning.oreilly.com/library/view/~/0321305019/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321305019">https://learning.oreilly.com/library/view/~/0321305019</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321305019/?ar">https://go.oreilly.com/library-access/library/view/-/0321305019/?ar</a><br/>Format:&#160;Electronic Resources<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:2281823 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Kairab, Sudhanshu.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203507230/?ar">https://go.oreilly.com/library-access/library/view/-/9780203507230/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780203507230/?ar">https://learning.oreilly.com/library/view/~/9780203507230/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780203507230">https://learning.oreilly.com/library/view/~/9780203507230</a><br/>Format:&#160;Electronic Resources<br/> Host integrity monitoring : using Osiris and Samhain ent://SD_ILS/0/SD_ILS:2282620 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Wotring, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490184">https://learning.oreilly.com/library/view/~/9781597490184</a> <a href="https://learning.oreilly.com/library/view/~/9781597490184/?ar">https://learning.oreilly.com/library/view/~/9781597490184/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781597490184">https://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Electronic Resources<br/> Reversing : secrets of reverse engineering ent://SD_ILS/0/SD_ILS:2282621 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Eilam, Eldad.<br/><a href="https://learning.oreilly.com/library/view/~/9780764574818/?ar">https://learning.oreilly.com/library/view/~/9780764574818/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780764574818/?ar">https://go.oreilly.com/library-access/library/view/-/9780764574818/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780764574818">https://learning.oreilly.com/library/view/~/9780764574818</a><br/>Format:&#160;Electronic Resources<br/> The art of intrusion the real stories behind the exploits of hackers, intruders &amp; deceivers ent://SD_ILS/0/SD_ILS:334708 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Mitnick, Kevin D. (Kevin David), 1963-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892</a><br/>Format:&#160;Electronic Resources<br/> IT Governance : Guidelines for Directors. ent://SD_ILS/0/SD_ILS:2290678 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Calder, Alan.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281058/?ar">https://learning.oreilly.com/library/view/~/9781849281058/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281058/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281058/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux Firewalls, Third Edition ent://SD_ILS/0/SD_ILS:2319668 2024-06-07T22:59:26Z 2024-06-07T22:59:26Z by&#160;Suehring, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/0672327716/?ar">https://learning.oreilly.com/library/view/~/0672327716/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672327716">https://learning.oreilly.com/library/view/~/0672327716</a> <a href="https://go.oreilly.com/library-access/library/view/-/0672327716/?ar">https://go.oreilly.com/library-access/library/view/-/0672327716/?ar</a><br/>Format:&#160;Electronic Resources<br/>