Search Results for - Narrowed by: Sécurité informatique. - Infonuagique.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509Infonuagique.$002509Infonuagique.$0026ps$003d300?
2024-05-31T20:12:19Z
Snowflake security : securing your Snowflake data cloud
ent://SD_ILS/0/SD_ILS:2330261
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Herzberg, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484273890">https://learning.oreilly.com/library/view/~/9781484273890</a>
<a href="https://learning.oreilly.com/library/view/~/9781484273890/?ar">https://learning.oreilly.com/library/view/~/9781484273890/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar">https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar</a><br/>Format: Electronic Resources<br/>
The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more
ent://SD_ILS/0/SD_ILS:2332630
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format: Electronic Resources<br/>
Temenos on IBM LinuxONE Best Practices Guide
ent://SD_ILS/0/SD_ILS:2323440
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Coble, Deana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458458">https://learning.oreilly.com/library/view/~/9780738458458</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458458/?ar">https://learning.oreilly.com/library/view/~/9780738458458/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar</a><br/>Format: Electronic Resources<br/>
Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
ent://SD_ILS/0/SD_ILS:2324802
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format: Electronic Resources<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2322053
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format: Electronic Resources<br/>
Securing your cloud : IBM security for LinuxONE
ent://SD_ILS/0/SD_ILS:2321597
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Alves, Edi Lopes, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457949/?ar">https://learning.oreilly.com/library/view/~/9780738457949/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar</a><br/>Format: Electronic Resources<br/>
Serverless security : protect functions using the CLAD security model
ent://SD_ILS/0/SD_ILS:2323066
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar">https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538/?ar">https://learning.oreilly.com/library/view/~/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538">https://learning.oreilly.com/library/view/~/9781492082538</a><br/>Format: Electronic Resources<br/>
Oracle cloud user security : providing for separation of duties and appropriate access by job function.
ent://SD_ILS/0/SD_ILS:2322966
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Malcher, Michelle, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar">https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484255643/?ar">https://learning.oreilly.com/videos/~/9781484255643/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484255643">https://learning.oreilly.com/videos/~/9781484255643</a><br/>Format: Electronic Resources<br/>
Apache Kafka series : Kafka security (SSL SASL Kerberos ACL)
ent://SD_ILS/0/SD_ILS:2316736
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Maarek, Stéphane, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar">https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789342420/?ar">https://learning.oreilly.com/videos/~/9781789342420/?ar</a><br/>Format: Electronic Resources<br/>
Securing DevOps
ent://SD_ILS/0/SD_ILS:2319465
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Vehent, Julien, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar">https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617294136">https://learning.oreilly.com/library/view/~/9781617294136</a>
<a href="https://learning.oreilly.com/library/view/~/9781617294136/?ar">https://learning.oreilly.com/library/view/~/9781617294136/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2316778
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format: Electronic Resources<br/>
Securing your cloud : IBM z/VM security for IBM z Systems and LinuxONE
ent://SD_ILS/0/SD_ILS:2311804
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Parziale, Lydia, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442020/?ar">https://learning.oreilly.com/library/view/~/9780738442020/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738442020/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442020/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security : overview and best practices
ent://SD_ILS/0/SD_ILS:2315521
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Bond, James (Cloud chief technologist)<br/><a href="https://learning.oreilly.com/library/view/~/9781492033790">https://learning.oreilly.com/library/view/~/9781492033790</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492033790/?ar">https://go.oreilly.com/library-access/library/view/-/9781492033790/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492033790/?ar">https://learning.oreilly.com/library/view/~/9781492033790/?ar</a><br/>Format: Electronic Resources<br/>
CSA guide to cloud computing : implementing cloud privacy and security
ent://SD_ILS/0/SD_ILS:2304776
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Samani, Raj, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar">https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124201255/?ar">https://learning.oreilly.com/library/view/~/9780124201255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124201255">https://learning.oreilly.com/library/view/~/9780124201255</a><br/>Format: Electronic Resources<br/>
Securing cloud services
ent://SD_ILS/0/SD_ILS:2306121
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Miller, David, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar">https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771373340/?ar">https://learning.oreilly.com/videos/~/9781771373340/?ar</a><br/>Format: Electronic Resources<br/>
Collaboration with cloud computing : security, social media, and unified communications
ent://SD_ILS/0/SD_ILS:2303105
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Messier, Ric.<br/><a href="https://learning.oreilly.com/library/view/~/9780124170407/?ar">https://learning.oreilly.com/library/view/~/9780124170407/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar">https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar</a><br/>Format: Electronic Resources<br/>
Cloud management and security
ent://SD_ILS/0/SD_ILS:2303282
2024-05-31T20:12:19Z
2024-05-31T20:12:19Z
by Abbadi, Imad M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118817094/?ar">https://learning.oreilly.com/library/view/~/9781118817094/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118817094/?ar">https://go.oreilly.com/library-access/library/view/-/9781118817094/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118817094">https://learning.oreilly.com/library/view/~/9781118817094</a><br/>Format: Electronic Resources<br/>