Search Results for - Narrowed by: Sécurité informatique. - 2006SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092006$0025092006$0026ps$003d300?2024-06-08T09:32:27ZEncryption in a Windows Environment : EFS File, 802.1x wireless, IPSec transport, and S/MIME exchangeent://SD_ILS/0/SD_ILS:23107702024-06-08T09:32:27Z2024-06-08T09:32:27Zby Morimoto, Rand.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0768668298/?ar">https://go.oreilly.com/library-access/library/view/-/0768668298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0768668298/?ar">https://learning.oreilly.com/library/view/~/0768668298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0768668298">https://learning.oreilly.com/library/view/~/0768668298</a><br/>Format: Electronic Resources<br/>Certification study guide. IBM Tivoli Access Manager for e-business 6.0ent://SD_ILS/0/SD_ILS:22958052024-06-08T09:32:27Z2024-06-08T09:32:27Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738496030">https://learning.oreilly.com/library/view/~/0738496030</a>
<a href="https://learning.oreilly.com/library/view/~/0738496030/?ar">https://learning.oreilly.com/library/view/~/0738496030/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738496030/?ar">https://go.oreilly.com/library-access/library/view/-/0738496030/?ar</a><br/>Format: Electronic Resources<br/>Security considerations in Lotus Notes and Domino 7 : making great security easier to implementent://SD_ILS/0/SD_ILS:22957042024-06-08T09:32:27Z2024-06-08T09:32:27Zby Dahm, Frederic.<br/><a href="https://learning.oreilly.com/library/view/~/0738497347/?ar">https://learning.oreilly.com/library/view/~/0738497347/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738497347/?ar">https://go.oreilly.com/library-access/library/view/-/0738497347/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738497347">https://learning.oreilly.com/library/view/~/0738497347</a><br/>Format: Electronic Resources<br/>How personal & Internet security worksent://SD_ILS/0/SD_ILS:22824442024-06-08T09:32:27Z2024-06-08T09:32:27Zby Gralla, Preston.<br/><a href="https://learning.oreilly.com/library/view/~/0789735539/?ar">https://learning.oreilly.com/library/view/~/0789735539/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0789735539/?ar">https://go.oreilly.com/library-access/library/view/-/0789735539/?ar</a><br/>Format: Electronic Resources<br/>Software security : building security inent://SD_ILS/0/SD_ILS:22821802024-06-08T09:32:27Z2024-06-08T09:32:27Zby McGraw, Gary, 1966-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321356705/?ar">https://go.oreilly.com/library-access/library/view/-/0321356705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321356705/?ar">https://learning.oreilly.com/library/view/~/0321356705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321356705">https://learning.oreilly.com/library/view/~/0321356705</a><br/>Format: Electronic Resources<br/>Hunting security bugsent://SD_ILS/0/SD_ILS:22827202024-06-08T09:32:27Z2024-06-08T09:32:27Zby Gallagher, Tom.<br/><a href="https://learning.oreilly.com/library/view/~/073562187X">https://learning.oreilly.com/library/view/~/073562187X</a>
<a href="https://learning.oreilly.com/library/view/~/073562187X/?ar">https://learning.oreilly.com/library/view/~/073562187X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/073562187X/?ar">https://go.oreilly.com/library-access/library/view/-/073562187X/?ar</a><br/>Format: Electronic Resources<br/>Network security hacksent://SD_ILS/0/SD_ILS:22829832024-06-08T09:32:27Z2024-06-08T09:32:27Zby Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596527632/?ar">https://go.oreilly.com/library-access/library/view/-/0596527632/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596527632">https://learning.oreilly.com/library/view/~/0596527632</a>
<a href="https://learning.oreilly.com/library/view/~/0596527632/?ar">https://learning.oreilly.com/library/view/~/0596527632/?ar</a><br/>Format: Electronic Resources<br/>Linux annoyances for geeksent://SD_ILS/0/SD_ILS:22821662024-06-08T09:32:27Z2024-06-08T09:32:27Zby Jang, Michael H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008015/?ar">https://go.oreilly.com/library-access/library/view/-/0596008015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008015/?ar">https://learning.oreilly.com/library/view/~/0596008015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008015">https://learning.oreilly.com/library/view/~/0596008015</a><br/>Format: Electronic Resources<br/>Intrusion prevention fundamentalsent://SD_ILS/0/SD_ILS:22821702024-06-08T09:32:27Z2024-06-08T09:32:27Zby Carter, Earl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587052393/?ar">https://go.oreilly.com/library-access/library/view/-/1587052393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587052393">https://learning.oreilly.com/library/view/~/1587052393</a>
<a href="https://learning.oreilly.com/library/view/~/1587052393/?ar">https://learning.oreilly.com/library/view/~/1587052393/?ar</a><br/>Format: Electronic Resources<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:22819912024-06-08T09:32:27Z2024-06-08T09:32:27Zby Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490481">https://learning.oreilly.com/library/view/~/9781597490481</a>
<a href="https://www.sciencedirect.com/science/book/9781597490481">https://www.sciencedirect.com/science/book/9781597490481</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490481/?ar">https://learning.oreilly.com/library/view/~/9781597490481/?ar</a><br/>Format: Electronic Resources<br/>Advanced host intrusion prevention with CSAent://SD_ILS/0/SD_ILS:22822002024-06-08T09:32:27Z2024-06-08T09:32:27Zby Sullivan, Chad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587052520/?ar">https://go.oreilly.com/library-access/library/view/-/1587052520/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587052520">https://learning.oreilly.com/library/view/~/1587052520</a>
<a href="https://learning.oreilly.com/library/view/~/1587052520/?ar">https://learning.oreilly.com/library/view/~/1587052520/?ar</a><br/>Format: Electronic Resources<br/>Secure coding in C and C++ent://SD_ILS/0/SD_ILS:22846512024-06-08T09:32:27Z2024-06-08T09:32:27Zby Seacord, Robert C.<br/><a href="https://learning.oreilly.com/library/view/~/9780768685923/?ar">https://learning.oreilly.com/library/view/~/9780768685923/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768685923/?ar">https://go.oreilly.com/library-access/library/view/-/9780768685923/?ar</a><br/>Format: Electronic Resources<br/>The security development lifecycle : SDL, a process for developing demonstrably more secure softwareent://SD_ILS/0/SD_ILS:22824622024-06-08T09:32:27Z2024-06-08T09:32:27Zby Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/0735622140">https://learning.oreilly.com/library/view/~/0735622140</a>
<a href="https://learning.oreilly.com/library/view/~/0735622140/?ar">https://learning.oreilly.com/library/view/~/0735622140/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0735622140/?ar">https://go.oreilly.com/library-access/library/view/-/0735622140/?ar</a><br/>Format: Electronic Resources<br/>Internet forensicsent://SD_ILS/0/SD_ILS:22820552024-06-08T09:32:27Z2024-06-08T09:32:27Zby Jones, Robert, 1957 July 15-<br/><a href="https://learning.oreilly.com/library/view/~/059610006X">https://learning.oreilly.com/library/view/~/059610006X</a>
<a href="https://learning.oreilly.com/library/view/~/059610006X/?ar">https://learning.oreilly.com/library/view/~/059610006X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/059610006X/?ar">https://go.oreilly.com/library-access/library/view/-/059610006X/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Windows XP networking and security : also covers Windows 2000ent://SD_ILS/0/SD_ILS:22824652024-06-08T09:32:27Z2024-06-08T09:32:27Zby Bott, Ed.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735620423/?ar">https://go.oreilly.com/library-access/library/view/-/0735620423/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735620423/?ar">https://learning.oreilly.com/library/view/~/0735620423/?ar</a><br/>Format: Electronic Resources<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:22821472024-06-08T09:32:27Z2024-06-08T09:32:27Zby Amini, Rob.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492430">https://learning.oreilly.com/library/view/~/9781597492430</a>
<a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492430/?ar">https://learning.oreilly.com/library/view/~/9781597492430/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492430/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492430/?ar</a><br/>Format: Electronic Resources<br/>Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:22840902024-06-08T09:32:27Z2024-06-08T09:32:27Zby Contos, Brian T.<br/><a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491297">https://learning.oreilly.com/library/view/~/9781597491297</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491297/?ar">https://learning.oreilly.com/library/view/~/9781597491297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491297/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491297/?ar</a><br/>Format: Electronic Resources<br/>Combating spyware in the enterpriseent://SD_ILS/0/SD_ILS:22878002024-06-08T09:32:27Z2024-06-08T09:32:27Zby Baskin, Brian.<br/><a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490641/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490641/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490641/?ar">https://learning.oreilly.com/library/view/~/9781597490641/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490641">https://learning.oreilly.com/library/view/~/9781597490641</a><br/>Format: Electronic Resources<br/>Core security patterns : best practices and strategies for J2EE(TM), Web services, and identity managementent://SD_ILS/0/SD_ILS:22883502024-06-08T09:32:27Z2024-06-08T09:32:27Zby Steel, Christopher, 1968-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0131463071/?ar">https://go.oreilly.com/library-access/library/view/-/0131463071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131463071/?ar">https://learning.oreilly.com/library/view/~/0131463071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131463071">https://learning.oreilly.com/library/view/~/0131463071</a><br/>Format: Electronic Resources<br/>Designing and implementing Linux firewalls and QoS using Netfilter, Iproute2, NAT, and L7-Filter : learn how to secure your system and implement QoS using real-world scenarios for networks of all sizesent://SD_ILS/0/SD_ILS:22863522024-06-08T09:32:27Z2024-06-08T09:32:27Zby Gheorghe, Lucian.<br/><a href="https://learning.oreilly.com/library/view/~/9781904811657/?ar">https://learning.oreilly.com/library/view/~/9781904811657/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781904811657/?ar">https://go.oreilly.com/library-access/library/view/-/9781904811657/?ar</a><br/>Format: Electronic Resources<br/>The art of software security assessment : identifying and preventing software vulnerabilitiesent://SD_ILS/0/SD_ILS:22828862024-06-08T09:32:27Z2024-06-08T09:32:27Zby Dowd, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321444426/?ar">https://go.oreilly.com/library-access/library/view/-/0321444426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321444426/?ar">https://learning.oreilly.com/library/view/~/0321444426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321444426">https://learning.oreilly.com/library/view/~/0321444426</a><br/>Format: Electronic Resources<br/>Computer security basicsent://SD_ILS/0/SD_ILS:22823772024-06-08T09:32:27Z2024-06-08T09:32:27Zby Lehtinen, Rick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596006691/?ar">https://go.oreilly.com/library-access/library/view/-/0596006691/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006691">https://learning.oreilly.com/library/view/~/0596006691</a>
<a href="https://learning.oreilly.com/library/view/~/0596006691/?ar">https://learning.oreilly.com/library/view/~/0596006691/?ar</a><br/>Format: Electronic Resources<br/>Essential computer security : everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:23160262024-06-08T09:32:27Z2024-06-08T09:32:27Zby Bradley, Tony, 1969- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491143/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491143/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491143/?ar">https://learning.oreilly.com/library/view/~/9781597491143/?ar</a><br/>Format: Electronic Resources<br/>