Search Results for - Narrowed by: Sécurité informatique. - Computer networks -- Access control.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bAccess$002bcontrol.$002509Computer$002bnetworks$002b--$002bAccess$002bcontrol.$0026ps$003d300?
2024-05-31T22:07:14Z
Shifting left for application security : bridging the divide between DevOps and security with the right security tools
ent://SD_ILS/0/SD_ILS:2332575
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format: Electronic Resources<br/>
Implementing identity management on AWS : a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments
ent://SD_ILS/0/SD_ILS:2330023
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Lehtinen, Jon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800562288">https://learning.oreilly.com/library/view/~/9781800562288</a>
<a href="https://learning.oreilly.com/library/view/~/9781800562288/?ar">https://learning.oreilly.com/library/view/~/9781800562288/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar">https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar</a><br/>Format: Electronic Resources<br/>
Incident response primer : how to keep from getting pwned too hard
ent://SD_ILS/0/SD_ILS:2323316
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format: Electronic Resources<br/>
Mastering VMware NSX for vSphere
ent://SD_ILS/0/SD_ILS:2327302
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119513544">https://learning.oreilly.com/library/view/~/9781119513544</a>
<a href="https://learning.oreilly.com/library/view/~/9781119513544/?ar">https://learning.oreilly.com/library/view/~/9781119513544/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar">https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar</a><br/>Format: Electronic Resources<br/>
The complete Metasploit guide : explore effective penetration testing techniques with Metasploit
ent://SD_ILS/0/SD_ILS:2327077
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477">https://learning.oreilly.com/library/view/~/9781838822477</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477/?ar">https://learning.oreilly.com/library/view/~/9781838822477/?ar</a><br/>Format: Electronic Resources<br/>
Security from first principles : a practical guide to the information security practice principles
ent://SD_ILS/0/SD_ILS:2314425
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Jackson, Craig, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996911/?ar">https://learning.oreilly.com/library/view/~/9781491996911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996911">https://learning.oreilly.com/library/view/~/9781491996911</a><br/>Format: Electronic Resources<br/>
Metasploit for beginners : create a threat-free environment with the best-in-class tool
ent://SD_ILS/0/SD_ILS:2313840
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970/?ar">https://learning.oreilly.com/library/view/~/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970">https://learning.oreilly.com/library/view/~/9781788295970</a><br/>Format: Electronic Resources<br/>
VCP6-NV official cert guide : (exam #2VO-641)
ent://SD_ILS/0/SD_ILS:2311292
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Sena Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134133713">https://learning.oreilly.com/library/view/~/9780134133713</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar">https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134133713/?ar">https://learning.oreilly.com/library/view/~/9780134133713/?ar</a><br/>Format: Electronic Resources<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:2313484
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format: Electronic Resources<br/>
VCP6-DCV official cert guide : (exam #2VO-621)
ent://SD_ILS/0/SD_ILS:2310569
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Davis, John A. (Software consultant), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134392974/?ar">https://learning.oreilly.com/library/view/~/9780134392974/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134392974/?ar">https://go.oreilly.com/library-access/library/view/-/9780134392974/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134392974">https://learning.oreilly.com/library/view/~/9780134392974</a><br/>Format: Electronic Resources<br/>
Beyond cybersecurity : protecting your digital business
ent://SD_ILS/0/SD_ILS:2306934
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Kaplan, James M., 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119026846">https://learning.oreilly.com/library/view/~/9781119026846</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar">https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119026846/?ar">https://learning.oreilly.com/library/view/~/9781119026846/?ar</a><br/>Format: Electronic Resources<br/>
VCP5-DVC official cert training : VMware certified professional : data center virtualization (Exam VCP 550)
ent://SD_ILS/0/SD_ILS:2302574
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Ferguson, Bill.<br/><a href="https://learning.oreilly.com/videos/~/9780133838176/?ar">https://learning.oreilly.com/videos/~/9780133838176/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133838176/?ar">https://go.oreilly.com/library-access/library/view/-/9780133838176/?ar</a><br/>Format: Electronic Resources<br/>
Federated identity primer
ent://SD_ILS/0/SD_ILS:2296698
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Rountree, Derrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar">https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124071896/?ar">https://learning.oreilly.com/library/view/~/9780124071896/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124071896">https://learning.oreilly.com/library/view/~/9780124071896</a><br/>Format: Electronic Resources<br/>
Endpoint security and compliance management design guide : using IBM Tivoli Endpoint Manager
ent://SD_ILS/0/SD_ILS:2297512
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738436984">https://learning.oreilly.com/library/view/~/0738436984</a>
<a href="https://learning.oreilly.com/library/view/~/0738436984/?ar">https://learning.oreilly.com/library/view/~/0738436984/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738436984/?ar">https://go.oreilly.com/library-access/library/view/-/0738436984/?ar</a><br/>Format: Electronic Resources<br/>
Network intrusion prevention design guide
ent://SD_ILS/0/SD_ILS:2294353
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738436216/?ar">https://learning.oreilly.com/library/view/~/0738436216/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738436216/?ar">https://go.oreilly.com/library-access/library/view/-/0738436216/?ar</a><br/>Format: Electronic Resources<br/>
Deployment guide series. IBM Tivoli Identity Manager 5.0
ent://SD_ILS/0/SD_ILS:2285844
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738432067/?ar">https://go.oreilly.com/library-access/library/view/-/0738432067/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738432067/?ar">https://learning.oreilly.com/library/view/~/0738432067/?ar</a><br/>Format: Electronic Resources<br/>
Understanding Windows CardSpace : an introduction to the concepts and challenges of digital identities
ent://SD_ILS/0/SD_ILS:2284402
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Bertocci, Vittorio.<br/><a href="https://learning.oreilly.com/library/view/~/9780321496843/?ar">https://learning.oreilly.com/library/view/~/9780321496843/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar">https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar</a><br/>Format: Electronic Resources<br/>
Intrusion prevention fundamentals
ent://SD_ILS/0/SD_ILS:2282170
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Carter, Earl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587052393/?ar">https://go.oreilly.com/library-access/library/view/-/1587052393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587052393">https://learning.oreilly.com/library/view/~/1587052393</a>
<a href="https://learning.oreilly.com/library/view/~/1587052393/?ar">https://learning.oreilly.com/library/view/~/1587052393/?ar</a><br/>Format: Electronic Resources<br/>
Certification study guide. IBM Tivoli Access Manager for e-business 6.0
ent://SD_ILS/0/SD_ILS:2295805
2024-05-31T22:07:14Z
2024-05-31T22:07:14Z
by Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738496030">https://learning.oreilly.com/library/view/~/0738496030</a>
<a href="https://learning.oreilly.com/library/view/~/0738496030/?ar">https://learning.oreilly.com/library/view/~/0738496030/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738496030/?ar">https://go.oreilly.com/library-access/library/view/-/0738496030/?ar</a><br/>Format: Electronic Resources<br/>