Search Results for - Narrowed by: S&eacute;curit&eacute; informatique. - Computer networks -- Access control. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bAccess$002bcontrol.$002509Computer$002bnetworks$002b--$002bAccess$002bcontrol.$0026ps$003d300? 2024-05-31T22:07:14Z Shifting left for application security : bridging the divide between DevOps and security with the right security tools ent://SD_ILS/0/SD_ILS:2332575 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a> <a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format:&#160;Electronic Resources<br/> Implementing identity management on AWS : a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments ent://SD_ILS/0/SD_ILS:2330023 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;Lehtinen, Jon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800562288">https://learning.oreilly.com/library/view/~/9781800562288</a> <a href="https://learning.oreilly.com/library/view/~/9781800562288/?ar">https://learning.oreilly.com/library/view/~/9781800562288/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar">https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident response primer : how to keep from getting pwned too hard ent://SD_ILS/0/SD_ILS:2323316 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format:&#160;Electronic Resources<br/> Mastering VMware NSX for vSphere ent://SD_ILS/0/SD_ILS:2327302 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119513544">https://learning.oreilly.com/library/view/~/9781119513544</a> <a href="https://learning.oreilly.com/library/view/~/9781119513544/?ar">https://learning.oreilly.com/library/view/~/9781119513544/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar">https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar</a><br/>Format:&#160;Electronic Resources<br/> The complete Metasploit guide : explore effective penetration testing techniques with Metasploit ent://SD_ILS/0/SD_ILS:2327077 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838822477">https://learning.oreilly.com/library/view/~/9781838822477</a> <a href="https://learning.oreilly.com/library/view/~/9781838822477/?ar">https://learning.oreilly.com/library/view/~/9781838822477/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security from first principles : a practical guide to the information security practice principles ent://SD_ILS/0/SD_ILS:2314425 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;Jackson, Craig, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996911/?ar">https://learning.oreilly.com/library/view/~/9781491996911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996911">https://learning.oreilly.com/library/view/~/9781491996911</a><br/>Format:&#160;Electronic Resources<br/> Metasploit for beginners : create a threat-free environment with the best-in-class tool ent://SD_ILS/0/SD_ILS:2313840 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295970/?ar">https://learning.oreilly.com/library/view/~/9781788295970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295970">https://learning.oreilly.com/library/view/~/9781788295970</a><br/>Format:&#160;Electronic Resources<br/> VCP6-NV official cert guide : (exam #2VO-641) ent://SD_ILS/0/SD_ILS:2311292 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;Sena Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134133713">https://learning.oreilly.com/library/view/~/9780134133713</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar">https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134133713/?ar">https://learning.oreilly.com/library/view/~/9780134133713/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:2313484 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format:&#160;Electronic Resources<br/> VCP6-DCV official cert guide : (exam #2VO-621) ent://SD_ILS/0/SD_ILS:2310569 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;Davis, John A. (Software consultant), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134392974/?ar">https://learning.oreilly.com/library/view/~/9780134392974/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134392974/?ar">https://go.oreilly.com/library-access/library/view/-/9780134392974/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134392974">https://learning.oreilly.com/library/view/~/9780134392974</a><br/>Format:&#160;Electronic Resources<br/> Beyond cybersecurity : protecting your digital business ent://SD_ILS/0/SD_ILS:2306934 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;Kaplan, James M., 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119026846">https://learning.oreilly.com/library/view/~/9781119026846</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar">https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119026846/?ar">https://learning.oreilly.com/library/view/~/9781119026846/?ar</a><br/>Format:&#160;Electronic Resources<br/> VCP5-DVC official cert training : VMware certified professional : data center virtualization (Exam VCP 550) ent://SD_ILS/0/SD_ILS:2302574 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;Ferguson, Bill.<br/><a href="https://learning.oreilly.com/videos/~/9780133838176/?ar">https://learning.oreilly.com/videos/~/9780133838176/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133838176/?ar">https://go.oreilly.com/library-access/library/view/-/9780133838176/?ar</a><br/>Format:&#160;Electronic Resources<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:2296698 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;Rountree, Derrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar">https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124071896/?ar">https://learning.oreilly.com/library/view/~/9780124071896/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124071896">https://learning.oreilly.com/library/view/~/9780124071896</a><br/>Format:&#160;Electronic Resources<br/> Endpoint security and compliance management design guide : using IBM Tivoli Endpoint Manager ent://SD_ILS/0/SD_ILS:2297512 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;B&uuml;cker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738436984">https://learning.oreilly.com/library/view/~/0738436984</a> <a href="https://learning.oreilly.com/library/view/~/0738436984/?ar">https://learning.oreilly.com/library/view/~/0738436984/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738436984/?ar">https://go.oreilly.com/library-access/library/view/-/0738436984/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network intrusion prevention design guide ent://SD_ILS/0/SD_ILS:2294353 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;B&uuml;cker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738436216/?ar">https://learning.oreilly.com/library/view/~/0738436216/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738436216/?ar">https://go.oreilly.com/library-access/library/view/-/0738436216/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deployment guide series. IBM Tivoli Identity Manager 5.0 ent://SD_ILS/0/SD_ILS:2285844 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;B&uuml;cker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738432067/?ar">https://go.oreilly.com/library-access/library/view/-/0738432067/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738432067/?ar">https://learning.oreilly.com/library/view/~/0738432067/?ar</a><br/>Format:&#160;Electronic Resources<br/> Understanding Windows CardSpace : an introduction to the concepts and challenges of digital identities ent://SD_ILS/0/SD_ILS:2284402 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;Bertocci, Vittorio.<br/><a href="https://learning.oreilly.com/library/view/~/9780321496843/?ar">https://learning.oreilly.com/library/view/~/9780321496843/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar">https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar</a><br/>Format:&#160;Electronic Resources<br/> Intrusion prevention fundamentals ent://SD_ILS/0/SD_ILS:2282170 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;Carter, Earl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587052393/?ar">https://go.oreilly.com/library-access/library/view/-/1587052393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587052393">https://learning.oreilly.com/library/view/~/1587052393</a> <a href="https://learning.oreilly.com/library/view/~/1587052393/?ar">https://learning.oreilly.com/library/view/~/1587052393/?ar</a><br/>Format:&#160;Electronic Resources<br/> Certification study guide. IBM Tivoli Access Manager for e-business 6.0 ent://SD_ILS/0/SD_ILS:2295805 2024-05-31T22:07:14Z 2024-05-31T22:07:14Z by&#160;B&uuml;cker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738496030">https://learning.oreilly.com/library/view/~/0738496030</a> <a href="https://learning.oreilly.com/library/view/~/0738496030/?ar">https://learning.oreilly.com/library/view/~/0738496030/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738496030/?ar">https://go.oreilly.com/library-access/library/view/-/0738496030/?ar</a><br/>Format:&#160;Electronic Resources<br/>