Search Results for - Narrowed by: Sécurité informatique. - Database security.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509Database$002bsecurity.$002509Database$002bsecurity.$0026ps$003d300?
2024-05-27T23:52:47Z
Data analytics for IT networks : developing innovative use cases
ent://SD_ILS/0/SD_ILS:2317559
2024-05-27T23:52:47Z
2024-05-27T23:52:47Z
by Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
ent://SD_ILS/0/SD_ILS:2317092
2024-05-27T23:52:47Z
2024-05-27T23:52:47Z
by Gupta, Rajneesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990189">https://learning.oreilly.com/library/view/~/9781788990189</a>
<a href="https://learning.oreilly.com/library/view/~/9781788990189/?ar">https://learning.oreilly.com/library/view/~/9781788990189/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar</a><br/>Format: Electronic Resources<br/>
Cyber security engineering : a practical approach for systems and software assurance
ent://SD_ILS/0/SD_ILS:2311996
2024-05-27T23:52:47Z
2024-05-27T23:52:47Z
by Mead, Nancy R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar">https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134189857/?ar">https://learning.oreilly.com/library/view/~/9780134189857/?ar</a><br/>Format: Electronic Resources<br/>
Introduction to information security : LiveLessons (Sneak Peek Video Training)
ent://SD_ILS/0/SD_ILS:2306346
2024-05-27T23:52:47Z
2024-05-27T23:52:47Z
by Aurnou, Scott, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar">https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134135823/?ar">https://learning.oreilly.com/videos/~/9780134135823/?ar</a><br/>Format: Electronic Resources<br/>
Securing SQL server : protecting your database from attackers
ent://SD_ILS/0/SD_ILS:2290991
2024-05-27T23:52:47Z
2024-05-27T23:52:47Z
by Cherry, Denny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496254">https://learning.oreilly.com/library/view/~/9781597496254</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496254/?ar">https://learning.oreilly.com/library/view/~/9781597496254/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496254/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496254/?ar</a><br/>Format: Electronic Resources<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:2295995
2024-05-27T23:52:47Z
2024-05-27T23:52:47Z
by Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a>
<a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format: Electronic Resources<br/>