Search Results for - Narrowed by: Sécurité informatique. - Risk Assessment
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509Risk$002bAssessment$002509Risk$002bAssessment$0026ps$003d300?
2024-05-31T06:14:03Z
Risk centric threat modeling : process for attack simulation and threat analysis
ent://SD_ILS/0/SD_ILS:2308792
2024-05-31T06:14:03Z
2024-05-31T06:14:03Z
by Uceda Vélez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format: Electronic Resources<br/>
Information security risk assessment toolkit : practical assessments through data collection and data analysis
ent://SD_ILS/0/SD_ILS:2298519
2024-05-31T06:14:03Z
2024-05-31T06:14:03Z
by Talabis, Mark Ryan M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497350/?ar">https://learning.oreilly.com/library/view/~/9781597497350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597497350/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497350/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497350">https://learning.oreilly.com/library/view/~/9781597497350</a><br/>Format: Electronic Resources<br/>
The shellcoder's handbook : discovering and exploiting security holes
ent://SD_ILS/0/SD_ILS:2283852
2024-05-31T06:14:03Z
2024-05-31T06:14:03Z
by Anley, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780470080238">https://learning.oreilly.com/library/view/~/9780470080238</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar">https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470080238/?ar">https://learning.oreilly.com/library/view/~/9780470080238/?ar</a><br/>Format: Electronic Resources<br/>
Assessing and Managing Security Risk in IT Systems
ent://SD_ILS/0/SD_ILS:2326305
2024-05-31T06:14:03Z
2024-05-31T06:14:03Z
by McCumber, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar">https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203490426">https://learning.oreilly.com/library/view/~/9780203490426</a>
<a href="https://learning.oreilly.com/library/view/~/9780203490426/?ar">https://learning.oreilly.com/library/view/~/9780203490426/?ar</a><br/>Format: Electronic Resources<br/>
The shellcoder's handbook : discovering and exploiting security holes
ent://SD_ILS/0/SD_ILS:2281833
2024-05-31T06:14:03Z
2024-05-31T06:14:03Z
by Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9780764544682">https://learning.oreilly.com/library/view/~/9780764544682</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780764544682/?ar">https://go.oreilly.com/library-access/library/view/-/9780764544682/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764544682/?ar">https://learning.oreilly.com/library/view/~/9780764544682/?ar</a><br/>Format: Electronic Resources<br/>