Logging in...
User ID
:
Password
:
Register
Forgot your PIN?
Forgot my PIN
Enter your username and a recovery link will be emailed to the email address on file at your library.
User ID
:
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
All Fields
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
To enable accessibility mode, return to the beginning of the page and use the link in the menu bar.
Advanced Search
Home Room
Book Collection
E-Book Collection
Multimedia Collection
Thesis Collection
Transportation Engineering Collection
Periodicals Collections
Green Campus
Limit Search Results
Narrowed by:
Included
Shelf Location: O'reilly E-Books
Included
Subject: Computer security.
Author
Include
Exclude
Safari, an O'Reilly Media Company.
(27)
O'Reilly (Firm), publisher.
(19)
International Business Machines Corporation. International Technical Support Organization.
(17)
Packt Publishing, publisher.
(11)
Manning (Firm), publisher.
(10)
O'Reilly for Higher Education (Firm), distributor.
(9)
Bücker, Axel.
(6)
Ozkaya, Erdal, author.
(6)
Diogenes, Yuri, author.
(5)
Gupta, Sunil, speaker.
(5)
International Business Machines Corporation. International Technical Support Organization, issuing body.
(5)
Oni, Alexander, presenter.
(5)
Santos, Omar, on-screen presenter.
(5)
Santos, Omar, presenter.
(5)
Hassan, Nihad A., author.
(4)
Messier, Ric, author.
(4)
Messier, Ric, presenter.
(4)
O'Reilly & Associates, publisher.
(4)
Rahalkar, Sagar, author.
(4)
Winkler, Ira, author.
(4)
Ayala, Luis, author.
(3)
Brabetz, Sebastian, author.
(3)
Calder, Alan, 1957- author.
(3)
Carey, Marcus J. (Cybersecurity professional), author.
(3)
Carvey, Harlan A., author.
(3)
Cole, Eric, author.
(3)
Dalziel, Henry, author.
(3)
Dion, Jason, on-screen presenter.
(3)
Givre, Charles, presenter.
(3)
Jaswal, Nipun, author.
(3)
Messdaghi, Chloé, presenter.
(3)
Messier, Ric.
(3)
O'Reilly & Associates.
(3)
Parziale, Lydia, author.
(3)
Pearson (Firm), publisher.
(3)
Sharma, Himanshu, author.
(3)
Steinberg, Joseph (Cybersecurity expert), author.
(3)
Sutton, David (Information security practitioner), author.
(3)
White, Bill, author.
(3)
Ackerman, Pascal, author.
(2)
Albing, Carl, author.
(2)
Amiri, Iraj Sadegh, 1977- author.
(2)
Andress, Jason, author.
(2)
Anonymous, author.
(2)
Anson, Steve.
(2)
Aquilina, James M.
(2)
Aslam, Abdul, author.
(2)
Bachaalany, Elias, author.
(2)
Baucom, Michael, author.
(2)
Beaver, Kevin, author.
(2)
Berkouwer, Sander, author.
(2)
Bishop, Matt (Matthew A.), author.
(2)
Brooks, R. R. (Richard R.)
(2)
Bücker, Axel, author.
(2)
Calder, Alan, 1957-
(2)
Calder, Alan.
(2)
Carpenter, Perry, author.
(2)
Casey, Eoghan.
(2)
Cerra, Allison, author.
(2)
Chaillan, Nicolas, presenter.
(2)
Cherry, Denny.
(2)
Chio, Clarence.
(2)
Conrad, Peter, author.
(2)
Coombs, Ted, author.
(2)
Copeland, Marshall.
(2)
Cross, Vic, author.
(2)
Czagan, Dawid, presenter.
(2)
Diogenes, Yuri.
(2)
Donaldson, Scott E., author.
(2)
Dunkerley, Mark, author.
(2)
Easttom, Chuck, author.
(2)
Elisan, Christopher C., author.
(2)
Freeman, David, 1979- author.
(2)
Gantz, Stephen D.
(2)
Grimes, Roger A., author.
(2)
Grove, Christopher, narrator.
(2)
Haber, Morey J.
(2)
Harper, Allen, author.
(2)
Hijazi, Rami, author.
(2)
Jaswal, Nipun.
(2)
Jin, Jennifer, author.
(2)
Jin, Jennifer.
(2)
Kalsi, Tajinder, author.
(2)
Klein, Tobias.
(2)
Kraus, Aaron, author.
(2)
Krausz, Michael.
(2)
Krutz, Ronald L., 1938-
(2)
Lakhani, Aamir, presenter.
(2)
Lambros, Kyriakos P., author.
(2)
Ligh, Michael Hale.
(2)
Linn, Ryan, author.
(2)
Liska, Allan, author.
(2)
Long, Johnny, author.
(2)
Loshin, Peter.
(2)
Malin, Cameron H.
(2)
McCoy, Chris, on-screen presenter.
(2)
Merkow, Mark S.
(2)
Moskowitz, Jeremy.
(2)
Mullen, Timothy M.
(2)
O'Reilly (Firm)
(2)
Oettinger, William, author.
(2)
Olups, Rihards, author.
(2)
Parker, Carey, author.
(2)
Paul, Mano.
(2)
Pearson IT Certification (Firm), publisher.
(2)
Pfleeger, Shari Lawrence.
(2)
Podjarny, Guy, author.
(2)
Pollack, Edward, author.
(2)
Regalado, Daniel, author.
(2)
Richard, Philippe, author.
(2)
Roer, Kai, author.
(2)
Rogers, Russ.
(2)
Russell, Brian, author.
(2)
Sabih, Zaid, on-screen presenter.
(2)
Sanbower, Jamie, author.
(2)
Santuka, Vivek, author.
(2)
Sarraj, Saad, presenter.
(2)
Scambray, Joel.
(2)
Schneier, Bruce, 1963- author.
(2)
Seacord, Robert C.
(2)
Seitz, Justin, author.
(2)
Sharp, Matthew K., author.
(2)
Shinder, Thomas W.
(2)
Shinder, Thomas W., author.
(2)
Siegel, Stanley G., author.
(2)
Sims, Stephen, author.
(2)
Singer, Bryan L., author.
(2)
Sletten, Brian, on-screen presenter.
(2)
Sternstein, Jon, on-screen presenter.
(2)
Taylor, Ron, on-screen presenter.
(2)
Troncone, Paul, author.
(2)
Tumbarello, Matt, author.
(2)
Van Duren, Drew, author.
(2)
Watkins, Steve, 1970-
(2)
White, Bill (Telecommunications engineer), author.
(2)
Williams, Chris K., author.
(2)
Woland, Aaron T., author.
(2)
Wong, David (Cryptography engineer), author.
(2)
Yan, Eva, author.
(2)
Zdziarski, Jonathan A.
(2)
AXELOS, AXELOS.
(1)
Abbadi, Imad M., author.
(1)
Abdulhayoglu, Melih, author.
(1)
Addison-Wesley Professional (Firm), publisher.
(1)
Addison-Wesley Professional (Firm), publisher. )
(1)
Adkins, Heather, on-screen presenter.
(1)
Afzal, Imran, speaker.
(1)
Aggarwal, Manuj, author.
(1)
Ahmed, Mohiuddin (Computer scientist), editor.
(1)
Ajmani, Neelesh, author.
(1)
Akanbi, Oluwatobi Ayodeji, author.
(1)
Al-Shaer, Ehab.
(1)
Alani, Mohammed M., author.
(1)
Ali, Shakeel, author.
(1)
Ali, Shakeel.
(1)
Allen, Christopher, contributor.
(1)
Allen, Lee (Information security specialist), author.
(1)
Allsopp, John, on-screen presenter.
(1)
Alves, Edi Lopes, author.
(1)
Amberg, Eric, author
(1)
Amberg, Eric, author.
(1)
Anbalahan, Siddharth, author.
(1)
Anderson, Brian.
(1)
Anderson, Ross, 1956-
(1)
Andress, Jason.
(1)
Arcuri, Jennifer, author.
(1)
Armstrong, Andy, author.
(1)
Arnold, Isabel, author.
(1)
Arthur, Will, author.
(1)
Assemble You, publisher.
(1)
August, Thomas, author.
(1)
Aumasson, Jean-Philippe, author.
(1)
Aurnou, Scott, on-screen presenter.
(1)
BCS, The Chartered Institute for IT.
(1)
Baca, Steve, author.
(1)
Bace, Rebecca Gurley, on-screen presenter.
(1)
Bachrach, Daniel G., author.
(1)
Bahi, Jacques Mohcine, author.
(1)
Bailey, Tucker, author.
(1)
Bais, Teo, author.
(1)
Barbeau, Michel (Computer scientist)
(1)
Barker, Dylan.
(1)
Barker, Jessica (Cyber security), author.
(1)
Barker, William.
(1)
Barlow, Mike (Michael Alan), author.
(1)
Barnett, Ryan C.
(1)
Barnum, Todd.
(1)
Barrett, Diane.
(1)
Baskin, Brian, author.
(1)
Bathurst, Robert.
(1)
Bauhaus, Mark.
(1)
Baum, David, author.
(1)
Baumrucker, C. Tate, author.
(1)
Beaver, Kevin M., author.
(1)
Beaver, Kevin.
(1)
Bell, Laura, author.
(1)
Bellovin, Steven M., author.
(1)
Bennett, Steve.
(1)
Bera, P.
(1)
Berninger, Matt, author.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
(785)
Language
Include
Exclude
English
(757)
German
(15)
Chinese
(4)
Undetermined
(4)
Polish
(3)
French
(1)
Japanese
(1)
More
View All
Fewer
Collapse All
Publication Date
Include
Exclude
This graph shows the distribution of publication dates for use with a date range slider. Switch to Years view for a more detailed breakdown of search results by year.
From Publication Year
-
To Publication Year
2022
(109)
2018
(82)
2019
(73)
2015
(65)
2016
(61)
2014
(54)
2017
(52)
2021
(52)
2020
(50)
2011
(43)
2012
(42)
2013
(40)
2010
(23)
2002
(8)
2003
(7)
2004
(7)
2005
(7)
2008
(5)
2001
(4)
2006
(4)
2007
(4)
2009
(2)
2023
(2)
3
(1)
1995
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Sécurité informatique.
(633)
Computer Security
(406)
Electronic books.
(349)
Computer networks -- Security measures.
(264)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(221)
COMPUTERS -- Security -- General.
(120)
Data protection.
(64)
COMPUTERS -- Networking -- Security.
(58)
Penetration testing (Computer security)
(55)
Protection de l'information (Informatique)
(55)
COMPUTERS -- Internet -- Security.
(53)
Instructional films.
(48)
Tests d'intrusion.
(48)
Internet videos.
(47)
Nonfiction films.
(47)
Computer crimes -- Investigation.
(37)
Hacking.
(36)
Hackers.
(34)
Computer crimes -- Prevention.
(33)
Computers -- Access control.
(33)
Internet -- Security measures.
(33)
Piratage informatique.
(32)
Malware (Computer software)
(31)
Microsoft Windows (Computer file)
(31)
Criminalité informatique -- Enquêtes.
(30)
Ordinateurs -- Accès -- Contrôle.
(30)
Electronic videos.
(28)
Logiciels malveillants.
(28)
Data encryption (Computer science)
(27)
Pirates informatiques.
(27)
Internet -- Sécurité -- Mesures.
(26)
Chiffrement (Informatique)
(25)
Cloud computing.
(25)
Information technology -- Security measures.
(25)
Computer networks -- Access control.
(22)
Business enterprises -- Computer networks -- Security measures.
(21)
Cloud computing -- Security measures.
(21)
Computer crimes.
(21)
Technologie de l'information -- Sécurité -- Mesures.
(21)
Handbooks and manuals.
(19)
Application software -- Development.
(18)
Computer Science.
(18)
Films de formation.
(18)
Infonuagique.
(18)
Linux.
(18)
Films autres que de fiction.
(17)
Information technology -- Management.
(17)
Kali Linux.
(17)
Logiciels d'application -- Développement.
(17)
Operating systems (Computers)
(17)
Vidéos sur Internet.
(17)
Webcast
(17)
Computers -- Security -- General.
(16)
Criminalité informatique.
(16)
Engineering & Applied Sciences.
(16)
Infonuagique -- Sécurité -- Mesures.
(16)
Audiobooks.
(15)
Computer networks.
(15)
Computer security -- Handbooks, manuals, etc.
(15)
Electronic data processing personnel -- Certification.
(15)
Systèmes d'exploitation (Ordinateurs)
(15)
Sécurité informatique -- Guides, manuels, etc.
(15)
operating systems.
(15)
Technologie de l'information -- Gestion.
(14)
COMPUTERS -- Security -- Networking.
(13)
Cryptography.
(13)
Machine learning.
(13)
Réseaux d'ordinateurs.
(13)
Cryptographie.
(12)
Downloadable audio books.
(12)
Examinations.
(12)
Network security.
(12)
Open source software.
(12)
Python (Computer program language)
(12)
Python (Langage de programmation)
(12)
Client/server computing.
(11)
Study guides.
(11)
Systèmes virtuels (Informatique)
(11)
Virtual computer systems.
(11)
Apprentissage automatique.
(10)
Architecture client-serveur (Informatique)
(10)
BUSINESS & ECONOMICS -- Industrial Management.
(10)
BUSINESS & ECONOMICS -- Management Science.
(10)
BUSINESS & ECONOMICS -- Management.
(10)
BUSINESS & ECONOMICS -- Organizational Behavior.
(10)
Metasploit (Electronic resource)
(10)
Privacy, Right of.
(10)
COMPUTERS -- Data Processing.
(9)
Computer Communication Networks
(9)
Computer software -- Development.
(9)
Guides et manuels.
(9)
Logiciels libres.
(9)
COMPUTERS -- Information Technology.
(8)
COMPUTERS -- Security -- Cryptography.
(8)
Computer science.
(8)
Cyber intelligence (Computer security)
(8)
Forensic sciences.
(8)
Java (Computer program language)
(8)
Livres audio.
(8)
Security systems.
(8)
Software engineering.
(8)
Bases de données -- Gestion.
(7)
Business -- Data processing -- Security measures.
(7)
COMPUTERS -- Networking -- General.
(7)
COMPUTERS -- Security -- Online Safety & Privacy.
(7)
COMPUTERS -- Security -- Viruses & Malware.
(7)
Computer security -- Congresses.
(7)
Computer security -- Examinations, questions, etc.
(7)
Computer viruses.
(7)
Computersicherheit
(7)
Conference papers and proceedings.
(7)
Coupe-feu (Sécurité informatique)
(7)
Criminalistique.
(7)
Cyberterrorism.
(7)
Database management.
(7)
Firewalls (Computer security)
(7)
Forensic Sciences
(7)
Génie logiciel.
(7)
Handbook
(7)
Java (Langage de programmation)
(7)
Risk management.
(7)
Sécurité informatique -- Congrès.
(7)
forensic science.
(7)
Artificial intelligence.
(6)
Bases de données -- Sécurité -- Mesures.
(6)
COMPUTERS -- Computer Literacy.
(6)
COMPUTERS -- Computer Science.
(6)
COMPUTERS -- Hardware -- General.
(6)
COMPUTERS -- Machine Theory.
(6)
COMPUTERS -- Reference.
(6)
Computer networking & communications.
(6)
Database security.
(6)
Datensicherung
(6)
Electronic data processing personnel -- Certification -- Study guides.
(6)
Electronic information resources -- Access control.
(6)
Gestion -- Informatique -- Sécurité -- Mesures.
(6)
Gestion du risque.
(6)
Informatique.
(6)
Intelligence artificielle.
(6)
Process control -- Security measures.
(6)
United States.
(6)
Virus informatiques.
(6)
z/OS.
(6)
Application software -- Development -- Automation.
(5)
Application software -- Security measures.
(5)
Applications Web -- Sécurité -- Mesures.
(5)
Artificial Intelligence
(5)
Big data.
(5)
Business enterprises -- Security measures.
(5)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(5)
Computer security -- Examinations.
(5)
Cyberspace -- Security measures.
(5)
Cyberterrorisme.
(5)
Debugging in computer science.
(5)
Débogage.
(5)
Entreprises -- Sécurité -- Mesures.
(5)
Fabrication -- Contrôle -- Sécurité -- Mesures.
(5)
Internet des objets.
(5)
Internet of things.
(5)
Logiciels d'application -- Sécurité -- Mesures.
(5)
Management information systems.
(5)
Operating systems.
(5)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Guides, manuels, etc.
(5)
Software.
(5)
Sources d'information électroniques -- Accès -- Contrôle.
(5)
Sécurité informatique -- Examens, questions, etc.
(5)
VMware vSphere.
(5)
Web applications -- Security measures.
(5)
Web sites -- Security measures.
(5)
Application program interfaces (Computer software)
(4)
COMPUTERS / Security / General.
(4)
Coding theory & cryptology.
(4)
Computer networks -- Security measures -- Examinations.
(4)
Computer security -- Examinations -- Study guides.
(4)
Computer security -- Law and legislation.
(4)
Computer security -- Software.
(4)
Computer software -- Reliability.
(4)
Computer software -- Testing.
(4)
Computer viruses, Trojans & worms.
(4)
Computers and IT.
(4)
Computers.
(4)
Corporate culture.
(4)
Data mining.
(4)
Data protection -- Handbooks, manuals, etc.
(4)
Directory services (Computer network technology)
(4)
Données volumineuses.
(4)
European Union countries.
(4)
IBM computers -- Security measures.
(4)
Information Systems
(4)
Information storage and retrieval systems.
(4)
Information technology: general issues.
(4)
Internet of things -- Security measures.
(4)
JavaScript (Computer program language)
(4)
JavaScript (Langage de programmation)
(4)
Logiciels -- Fiabilité.
(4)
Logiciels d'application -- Développement -- Automatisation.
(4)
Mac OS.
(4)
Management information systems -- Security measures.
(4)
Microsoft .NET Framework.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
More
View All
Fewer
Collapse All
Library
Include
Exclude
IYTE Library
(785)
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
No results found