Search Results for - Narrowed by: S&eacute;curit&eacute; informatique. - 2006 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092006$0025092006$0026ps$003d300? 2024-06-08T09:32:27Z Encryption in a Windows Environment : EFS File, 802.1x wireless, IPSec transport, and S/MIME exchange ent://SD_ILS/0/SD_ILS:2310770 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Morimoto, Rand.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0768668298/?ar">https://go.oreilly.com/library-access/library/view/-/0768668298/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0768668298/?ar">https://learning.oreilly.com/library/view/~/0768668298/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0768668298">https://learning.oreilly.com/library/view/~/0768668298</a><br/>Format:&#160;Electronic Resources<br/> Certification study guide. IBM Tivoli Access Manager for e-business 6.0 ent://SD_ILS/0/SD_ILS:2295805 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;B&uuml;cker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738496030">https://learning.oreilly.com/library/view/~/0738496030</a> <a href="https://learning.oreilly.com/library/view/~/0738496030/?ar">https://learning.oreilly.com/library/view/~/0738496030/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738496030/?ar">https://go.oreilly.com/library-access/library/view/-/0738496030/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security considerations in Lotus Notes and Domino 7 : making great security easier to implement ent://SD_ILS/0/SD_ILS:2295704 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Dahm, Frederic.<br/><a href="https://learning.oreilly.com/library/view/~/0738497347/?ar">https://learning.oreilly.com/library/view/~/0738497347/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738497347/?ar">https://go.oreilly.com/library-access/library/view/-/0738497347/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738497347">https://learning.oreilly.com/library/view/~/0738497347</a><br/>Format:&#160;Electronic Resources<br/> How personal &amp; Internet security works ent://SD_ILS/0/SD_ILS:2282444 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Gralla, Preston.<br/><a href="https://learning.oreilly.com/library/view/~/0789735539/?ar">https://learning.oreilly.com/library/view/~/0789735539/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0789735539/?ar">https://go.oreilly.com/library-access/library/view/-/0789735539/?ar</a><br/>Format:&#160;Electronic Resources<br/> Software security : building security in ent://SD_ILS/0/SD_ILS:2282180 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;McGraw, Gary, 1966-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321356705/?ar">https://go.oreilly.com/library-access/library/view/-/0321356705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321356705/?ar">https://learning.oreilly.com/library/view/~/0321356705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321356705">https://learning.oreilly.com/library/view/~/0321356705</a><br/>Format:&#160;Electronic Resources<br/> Hunting security bugs ent://SD_ILS/0/SD_ILS:2282720 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Gallagher, Tom.<br/><a href="https://learning.oreilly.com/library/view/~/073562187X">https://learning.oreilly.com/library/view/~/073562187X</a> <a href="https://learning.oreilly.com/library/view/~/073562187X/?ar">https://learning.oreilly.com/library/view/~/073562187X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/073562187X/?ar">https://go.oreilly.com/library-access/library/view/-/073562187X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security hacks ent://SD_ILS/0/SD_ILS:2282983 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596527632/?ar">https://go.oreilly.com/library-access/library/view/-/0596527632/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596527632">https://learning.oreilly.com/library/view/~/0596527632</a> <a href="https://learning.oreilly.com/library/view/~/0596527632/?ar">https://learning.oreilly.com/library/view/~/0596527632/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux annoyances for geeks ent://SD_ILS/0/SD_ILS:2282166 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Jang, Michael H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008015/?ar">https://go.oreilly.com/library-access/library/view/-/0596008015/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008015/?ar">https://learning.oreilly.com/library/view/~/0596008015/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008015">https://learning.oreilly.com/library/view/~/0596008015</a><br/>Format:&#160;Electronic Resources<br/> Intrusion prevention fundamentals ent://SD_ILS/0/SD_ILS:2282170 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Carter, Earl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587052393/?ar">https://go.oreilly.com/library-access/library/view/-/1587052393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587052393">https://learning.oreilly.com/library/view/~/1587052393</a> <a href="https://learning.oreilly.com/library/view/~/1587052393/?ar">https://learning.oreilly.com/library/view/~/1587052393/?ar</a><br/>Format:&#160;Electronic Resources<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:2281991 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490481">https://learning.oreilly.com/library/view/~/9781597490481</a> <a href="https://www.sciencedirect.com/science/book/9781597490481">https://www.sciencedirect.com/science/book/9781597490481</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490481/?ar">https://learning.oreilly.com/library/view/~/9781597490481/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced host intrusion prevention with CSA ent://SD_ILS/0/SD_ILS:2282200 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Sullivan, Chad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587052520/?ar">https://go.oreilly.com/library-access/library/view/-/1587052520/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587052520">https://learning.oreilly.com/library/view/~/1587052520</a> <a href="https://learning.oreilly.com/library/view/~/1587052520/?ar">https://learning.oreilly.com/library/view/~/1587052520/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure coding in C and C++ ent://SD_ILS/0/SD_ILS:2284651 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Seacord, Robert C.<br/><a href="https://learning.oreilly.com/library/view/~/9780768685923/?ar">https://learning.oreilly.com/library/view/~/9780768685923/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780768685923/?ar">https://go.oreilly.com/library-access/library/view/-/9780768685923/?ar</a><br/>Format:&#160;Electronic Resources<br/> The security development lifecycle : SDL, a process for developing demonstrably more secure software ent://SD_ILS/0/SD_ILS:2282462 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/0735622140">https://learning.oreilly.com/library/view/~/0735622140</a> <a href="https://learning.oreilly.com/library/view/~/0735622140/?ar">https://learning.oreilly.com/library/view/~/0735622140/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0735622140/?ar">https://go.oreilly.com/library-access/library/view/-/0735622140/?ar</a><br/>Format:&#160;Electronic Resources<br/> Internet forensics ent://SD_ILS/0/SD_ILS:2282055 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Jones, Robert, 1957 July 15-<br/><a href="https://learning.oreilly.com/library/view/~/059610006X">https://learning.oreilly.com/library/view/~/059610006X</a> <a href="https://learning.oreilly.com/library/view/~/059610006X/?ar">https://learning.oreilly.com/library/view/~/059610006X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/059610006X/?ar">https://go.oreilly.com/library-access/library/view/-/059610006X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Windows XP networking and security : also covers Windows 2000 ent://SD_ILS/0/SD_ILS:2282465 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Bott, Ed.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735620423/?ar">https://go.oreilly.com/library-access/library/view/-/0735620423/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735620423/?ar">https://learning.oreilly.com/library/view/~/0735620423/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:2282147 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Amini, Rob.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492430">https://learning.oreilly.com/library/view/~/9781597492430</a> <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a> <a href="https://learning.oreilly.com/library/view/~/9781597492430/?ar">https://learning.oreilly.com/library/view/~/9781597492430/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492430/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492430/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:2284090 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Contos, Brian T.<br/><a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a> <a href="https://learning.oreilly.com/library/view/~/9781597491297">https://learning.oreilly.com/library/view/~/9781597491297</a> <a href="https://learning.oreilly.com/library/view/~/9781597491297/?ar">https://learning.oreilly.com/library/view/~/9781597491297/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491297/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:2287800 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Baskin, Brian.<br/><a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490641/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490641/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490641/?ar">https://learning.oreilly.com/library/view/~/9781597490641/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490641">https://learning.oreilly.com/library/view/~/9781597490641</a><br/>Format:&#160;Electronic Resources<br/> Core security patterns : best practices and strategies for J2EE(TM), Web services, and identity management ent://SD_ILS/0/SD_ILS:2288350 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Steel, Christopher, 1968-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0131463071/?ar">https://go.oreilly.com/library-access/library/view/-/0131463071/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131463071/?ar">https://learning.oreilly.com/library/view/~/0131463071/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131463071">https://learning.oreilly.com/library/view/~/0131463071</a><br/>Format:&#160;Electronic Resources<br/> Designing and implementing Linux firewalls and QoS using Netfilter, Iproute2, NAT, and L7-Filter : learn how to secure your system and implement QoS using real-world scenarios for networks of all sizes ent://SD_ILS/0/SD_ILS:2286352 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Gheorghe, Lucian.<br/><a href="https://learning.oreilly.com/library/view/~/9781904811657/?ar">https://learning.oreilly.com/library/view/~/9781904811657/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781904811657/?ar">https://go.oreilly.com/library-access/library/view/-/9781904811657/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of software security assessment : identifying and preventing software vulnerabilities ent://SD_ILS/0/SD_ILS:2282886 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Dowd, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321444426/?ar">https://go.oreilly.com/library-access/library/view/-/0321444426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321444426/?ar">https://learning.oreilly.com/library/view/~/0321444426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321444426">https://learning.oreilly.com/library/view/~/0321444426</a><br/>Format:&#160;Electronic Resources<br/> Computer security basics ent://SD_ILS/0/SD_ILS:2282377 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Lehtinen, Rick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596006691/?ar">https://go.oreilly.com/library-access/library/view/-/0596006691/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596006691">https://learning.oreilly.com/library/view/~/0596006691</a> <a href="https://learning.oreilly.com/library/view/~/0596006691/?ar">https://learning.oreilly.com/library/view/~/0596006691/?ar</a><br/>Format:&#160;Electronic Resources<br/> Essential computer security : everyone's guide to e-mail, Internet, and wireless security ent://SD_ILS/0/SD_ILS:2316026 2024-06-08T09:32:27Z 2024-06-08T09:32:27Z by&#160;Bradley, Tony, 1969- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491143/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491143/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491143/?ar">https://learning.oreilly.com/library/view/~/9781597491143/?ar</a><br/>Format:&#160;Electronic Resources<br/>