Search Results for - Narrowed by: Sécurité informatique. - Computer crimes -- Prevention.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes$002b--$002bPrevention.$002509Computer$002bcrimes$002b--$002bPrevention.$0026ps$003d300?
2024-06-15T14:49:48Z
Ransomware protection playbook
ent://SD_ILS/0/SD_ILS:2330090
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Grimes, Roger A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119849124">https://learning.oreilly.com/library/view/~/9781119849124</a>
<a href="https://learning.oreilly.com/library/view/~/9781119849124/?ar">https://learning.oreilly.com/library/view/~/9781119849124/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar">https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar</a><br/>Format: Electronic Resources<br/>
Navigating the cybersecurity career path
ent://SD_ILS/0/SD_ILS:2330836
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Patton, Helen E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119833420">https://learning.oreilly.com/library/view/~/9781119833420</a>
<a href="https://learning.oreilly.com/library/view/~/9781119833420/?ar">https://learning.oreilly.com/library/view/~/9781119833420/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar">https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar</a><br/>Format: Electronic Resources<br/>
Case study : how Tools & Solutions survived a ransomware attack.
ent://SD_ILS/0/SD_ILS:2332364
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Majumdar, Partha, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar">https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0636920673859">https://learning.oreilly.com/library/view/~/0636920673859</a>
<a href="https://learning.oreilly.com/library/view/~/0636920673859/?ar">https://learning.oreilly.com/library/view/~/0636920673859/?ar</a><br/>Format: Video recording<br/>
Ransomware
ent://SD_ILS/0/SD_ILS:2332705
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Messdaghi, Chloé, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar">https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641/?ar">https://learning.oreilly.com/videos/~/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641">https://learning.oreilly.com/videos/~/0636920702641</a><br/>Format: Video recording<br/>
Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them
ent://SD_ILS/0/SD_ILS:2332411
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format: Electronic Resources<br/>
How cybersecurity really works : a hands-on guide for total beginners
ent://SD_ILS/0/SD_ILS:2328036
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Grubb, Sam (Cyber security consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999/?ar">https://learning.oreilly.com/library/view/~/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999">https://learning.oreilly.com/library/view/~/9781098128999</a><br/>Format: Electronic Resources<br/>
Cyberjutsu : cybersecurity for the modern ninja
ent://SD_ILS/0/SD_ILS:2326541
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format: Electronic Resources<br/>
Cyber smart : five habits to protect your family, money, and identity from cyber criminals
ent://SD_ILS/0/SD_ILS:2318868
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by McDonough, Bart R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469071503/?ar">https://learning.oreilly.com/library/view/~/9781469071503/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar">https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469071503">https://learning.oreilly.com/library/view/~/9781469071503</a><br/>Format: Sound recording<br/>
Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacks
ent://SD_ILS/0/SD_ILS:2322400
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242551/?ar">https://learning.oreilly.com/library/view/~/9781484242551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242551">https://learning.oreilly.com/library/view/~/9781484242551</a><br/>Format: Electronic Resources<br/>
Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threats
ent://SD_ILS/0/SD_ILS:2316016
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Donaldson, Scott E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232583/?ar">https://learning.oreilly.com/library/view/~/9781484232583/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484232583">https://learning.oreilly.com/library/view/~/9781484232583</a><br/>Format: Electronic Resources<br/>
Hacking exposed industrial control systems : ICS and SCADA security secrets & solutions
ent://SD_ILS/0/SD_ILS:2311403
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Bodungen, Clint E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781259589720/?ar">https://go.oreilly.com/library-access/library/view/-/9781259589720/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781259589720/?ar">https://learning.oreilly.com/library/view/~/9781259589720/?ar</a><br/>Format: Electronic Resources<br/>
Penetration testing essentials.
ent://SD_ILS/0/SD_ILS:2311955
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Oriyano, Sean-Philip.<br/><a href="https://learning.oreilly.com/library/view/~/9781119235309">https://learning.oreilly.com/library/view/~/9781119235309</a>
<a href="https://learning.oreilly.com/library/view/~/9781119235309/?ar">https://learning.oreilly.com/library/view/~/9781119235309/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar">https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar</a><br/>Format: Electronic Resources<br/>
People-centric security : transforming your enterprise security culture
ent://SD_ILS/0/SD_ILS:2309517
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Hayden, Lance, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071846790/?ar">https://learning.oreilly.com/library/view/~/9780071846790/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar">https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar</a><br/>Format: Electronic Resources<br/>
Network attacks and exploitation : a framework
ent://SD_ILS/0/SD_ILS:2307717
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Monte, Matthew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118987124">https://learning.oreilly.com/library/view/~/9781118987124</a>
<a href="https://learning.oreilly.com/library/view/~/9781118987124/?ar">https://learning.oreilly.com/library/view/~/9781118987124/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118987124/?ar">https://go.oreilly.com/library-access/library/view/-/9781118987124/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity : managing systems, conducting testing, and investigating intrusions
ent://SD_ILS/0/SD_ILS:2301524
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Mowbray, Thomas J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar">https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115/?ar">https://learning.oreilly.com/library/view/~/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115">https://learning.oreilly.com/library/view/~/9781118697115</a><br/>Format: Electronic Resources<br/>
Collaboration with cloud computing : security, social media, and unified communications
ent://SD_ILS/0/SD_ILS:2303105
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Messier, Ric.<br/><a href="https://learning.oreilly.com/library/view/~/9780124170407/?ar">https://learning.oreilly.com/library/view/~/9780124170407/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar">https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar</a><br/>Format: Electronic Resources<br/>
Cyber threat! : how to manage the growing risk of cyber attacks
ent://SD_ILS/0/SD_ILS:2303448
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Ulsch, N. MacDonnell, 1951-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar">https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118935958/?ar">https://learning.oreilly.com/library/view/~/9781118935958/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118935958">https://learning.oreilly.com/library/view/~/9781118935958</a><br/>Format: Electronic Resources<br/>
Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers
ent://SD_ILS/0/SD_ILS:2296624
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by O'Connor, T. J.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499576/?ar">https://learning.oreilly.com/library/view/~/9781597499576/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499576">https://learning.oreilly.com/library/view/~/9781597499576</a><br/>Format: Electronic Resources<br/>
Web Application Defender's Cookbook : Battling Hackers and Protecting Users.
ent://SD_ILS/0/SD_ILS:2298453
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Barnett, Ryan C.<br/><a href="https://learning.oreilly.com/library/view/~/9781118417058/?ar">https://learning.oreilly.com/library/view/~/9781118417058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar">https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118417058">https://learning.oreilly.com/library/view/~/9781118417058</a><br/>Format: Electronic Resources<br/>
Suits and spooks conference : attacks, threats, and defense in cyberspace : complete video compliation.
ent://SD_ILS/0/SD_ILS:2301909
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
<a href="https://learning.oreilly.com/videos/~/9781491946435">https://learning.oreilly.com/videos/~/9781491946435</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar">https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491946435/?ar">https://learning.oreilly.com/videos/~/9781491946435/?ar</a><br/>Format: Electronic Resources<br/>
The Basics of Hacking and Penetration Testing : Ethical Hacking and Penetration Testing Made Easy
ent://SD_ILS/0/SD_ILS:2299520
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Engebretson, Patrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar">https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124116443/?ar">https://learning.oreilly.com/library/view/~/9780124116443/?ar</a><br/>Format: Electronic Resources<br/>
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
ent://SD_ILS/0/SD_ILS:2294170
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format: Electronic Resources<br/>
Hacking web apps : detecting and preventing web application security problems
ent://SD_ILS/0/SD_ILS:2295912
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Shema, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499514/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499514/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499514/?ar">https://learning.oreilly.com/library/view/~/9781597499514/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499514">https://learning.oreilly.com/library/view/~/9781597499514</a><br/>Format: Electronic Resources<br/>
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
ent://SD_ILS/0/SD_ILS:2293057
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Engebretson, Pat (Patrick Henry), 1974-<br/><a href="https://learning.oreilly.com/library/view/~/9781597496551">https://learning.oreilly.com/library/view/~/9781597496551</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496551/?ar">https://learning.oreilly.com/library/view/~/9781597496551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar</a><br/>Format: Electronic Resources<br/>
Ninja hacking : unconventional penetration testing tactics and techniques
ent://SD_ILS/0/SD_ILS:2290304
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Wilhelm, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495899">https://learning.oreilly.com/library/view/~/9781597495899</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495899/?ar">https://learning.oreilly.com/library/view/~/9781597495899/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar</a><br/>Format: Electronic Resources<br/>
Seven deadliest social network attacks
ent://SD_ILS/0/SD_ILS:2289718
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Timm, Carl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495455/?ar">https://learning.oreilly.com/library/view/~/9781597495455/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495455">https://learning.oreilly.com/library/view/~/9781597495455</a><br/>Format: Electronic Resources<br/>
Cyber fraud tactics, techniques and procedures
ent://SD_ILS/0/SD_ILS:2287651
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Howard, Rick.<br/><a href="https://learning.oreilly.com/library/view/~/9781420091281">https://learning.oreilly.com/library/view/~/9781420091281</a>
<a href="https://learning.oreilly.com/library/view/~/9781420091281/?ar">https://learning.oreilly.com/library/view/~/9781420091281/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420091281/?ar">https://go.oreilly.com/library-access/library/view/-/9781420091281/?ar</a><br/>Format: Electronic Resources<br/>
Computer forensics for dummies
ent://SD_ILS/0/SD_ILS:2285672
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Volonino, Linda.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470371916/?ar">https://learning.oreilly.com/library/view/~/9780470371916/?ar</a><br/>Format: Electronic Resources<br/>
Zen and the art of information security
ent://SD_ILS/0/SD_ILS:2283974
2024-06-15T14:49:48Z
2024-06-15T14:49:48Z
by Winkler, Ira.<br/><a href="https://learning.oreilly.com/library/view/~/9780080554747">https://learning.oreilly.com/library/view/~/9780080554747</a>
<a href="https://learning.oreilly.com/library/view/~/9780080554747/?ar">https://learning.oreilly.com/library/view/~/9780080554747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080554747/?ar">https://go.oreilly.com/library-access/library/view/-/9780080554747/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>