Search Results for - Narrowed by: Vid&eacute;os sur Internet. - Lakhani, Aamir, presenter. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Vid$0025C3$0025A9os$002bsur$002bInternet.$002509Vid$0025C3$0025A9os$002bsur$002bInternet.$0026qf$003dAUTHOR$002509Author$002509Lakhani$00252C$002bAamir$00252C$002bpresenter.$002509Lakhani$00252C$002bAamir$00252C$002bpresenter.$0026ps$003d300? 2024-05-25T20:55:18Z System and privacy data protection. ent://SD_ILS/0/SD_ILS:2331777 2024-05-25T20:55:18Z 2024-05-25T20:55:18Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a> <a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format:&#160;Video recording<br/> Threat Intelligence and threat hunting ent://SD_ILS/0/SD_ILS:2331779 2024-05-25T20:55:18Z 2024-05-25T20:55:18Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137896301/?ar">https://learning.oreilly.com/videos/~/9780137896301/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar">https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137896301">https://learning.oreilly.com/videos/~/9780137896301</a><br/>Format:&#160;Video recording<br/> Cybersecurity pevention and detection (Video collection). ent://SD_ILS/0/SD_ILS:2332252 2024-05-25T20:55:18Z 2024-05-25T20:55:18Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137929351">https://learning.oreilly.com/videos/~/9780137929351</a> <a href="https://learning.oreilly.com/videos/~/9780137929351/?ar">https://learning.oreilly.com/videos/~/9780137929351/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137929351/?ar">https://go.oreilly.com/library-access/library/view/-/9780137929351/?ar</a><br/>Format:&#160;Video recording<br/> CompTIA cybersecurity analyst (CSA+) CS0-002 ent://SD_ILS/0/SD_ILS:2331975 2024-05-25T20:55:18Z 2024-05-25T20:55:18Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137432110">https://learning.oreilly.com/videos/~/9780137432110</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137432110/?ar">https://go.oreilly.com/library-access/library/view/-/9780137432110/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137432110/?ar">https://learning.oreilly.com/videos/~/9780137432110/?ar</a><br/>Format:&#160;Video recording<br/> Malware and incident response ent://SD_ILS/0/SD_ILS:2332091 2024-05-25T20:55:18Z 2024-05-25T20:55:18Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137894741/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894741/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137894741/?ar">https://learning.oreilly.com/videos/~/9780137894741/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137894741">https://learning.oreilly.com/videos/~/9780137894741</a><br/>Format:&#160;Video recording<br/> Secure operations and protections ent://SD_ILS/0/SD_ILS:2332092 2024-05-25T20:55:18Z 2024-05-25T20:55:18Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format:&#160;Video recording<br/>