Logging in...
User ID
:
Password
:
Register
Forgot your PIN?
Forgot my PIN
Enter your username and a recovery link will be emailed to the email address on file at your library.
User ID
:
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
All Fields
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
To enable accessibility mode, return to the beginning of the page and use the link in the menu bar.
Advanced Search
Home Room
Book Collection
E-Book Collection
Multimedia Collection
Thesis Collection
Transportation Engineering Collection
Periodicals Collections
Green Campus
811 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Select All
1
..
64
65
66
67
68
0000000
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
805.
Microsoft Windows 2000 security handbook
Microsoft Windows 2000 security handbook
by
Schmidt, Jeff, MCSE.
https://learning.oreilly.com/library/view/~/0789719991
https://learning.oreilly.com/library/view/~/0789719991/?ar
https://go.oreilly.com/library-access/library/view/-/0789719991/?ar
Format:
Electronic Resources
806.
Java security handbook
Java security handbook
by
Jaworski, Jamie.
https://go.oreilly.com/library-access/library/view/-/0672316021/?ar
https://learning.oreilly.com/library/view/~/0672316021
https://learning.oreilly.com/library/view/~/0672316021/?ar
Format:
Electronic Resources
807.
Maximum Linux security : a hacker's guide to protecting your Linux server and workstation
Maximum Linux security : a hacker's guide to protecting your Linux server and workstation
https://learning.oreilly.com/library/view/~/0672316706/?ar
https://go.oreilly.com/library-access/library/view/-/0672316706/?ar
https://learning.oreilly.com/library/view/~/0672316706
Format:
Electronic Resources
808.
Java security
Java security
by
Oaks, Scott.
https://go.oreilly.com/library-access/library/view/-/1565924037/?ar
https://learning.oreilly.com/library/view/~/1565924037
https://learning.oreilly.com/library/view/~/1565924037/?ar
Format:
Electronic Resources
809.
Applied cryptography : protocols, algorithms, and source code in C
Applied cryptography : protocols, algorithms, and source code in C
by
Schneier, Bruce, 1963-
https://go.oreilly.com/library-access/library/view/-/9780471117094/?ar
https://learning.oreilly.com/library/view/~/9780471117094/?ar
Format:
Electronic Resources
810.
Computer-related risks
Computer-related risks
by
Neumann, Peter, 1932-
https://go.oreilly.com/library-access/library/view/-/9780321703187/?ar
https://learning.oreilly.com/library/view/~/9780321703187/?ar
Format:
Electronic Resources
811.
Enterprise-wide security solutions presentation guide
Enterprise-wide security solutions presentation guide
by
Kigma, Cees.
https://go.oreilly.com/library-access/library/view/-/0738402087/?ar
https://learning.oreilly.com/library/view/~/0738402087/?ar
Format:
Electronic Resources
Select All
1
..
64
65
66
67
68
811 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Limit Search Results
Narrowed by:
Included
Subject: Sécurité informatique.
Author
Include
Exclude
Safari, an O'Reilly Media Company.
(23)
International Business Machines Corporation. International Technical Support Organization.
(19)
Bücker, Axel.
(7)
Manning (Firm), publisher.
(6)
Gupta, Sunil, speaker.
(5)
International Business Machines Corporation. International Technical Support Organization, issuing body.
(5)
O'Reilly for Higher Education (Firm), distributor.
(5)
Viega, John.
(5)
Diogenes, Yuri, author.
(4)
Hassan, Nihad A., author.
(4)
Moskowitz, Jeremy.
(4)
Rahalkar, Sagar, author.
(4)
Santos, Omar, on-screen presenter.
(4)
Santos, Omar, presenter.
(4)
Seacord, Robert C.
(4)
Beaver, Kevin.
(3)
Carey, Marcus J. (Cybersecurity professional), author.
(3)
Carvey, Harlan A.
(3)
Carvey, Harlan A., author.
(3)
Casey, Eoghan.
(3)
Clarke, Justin.
(3)
Cole, Eric.
(3)
Cross, Michael, 1965-
(3)
Dalziel, Henry, author.
(3)
Dion, Jason, on-screen presenter.
(3)
Jaswal, Nipun, author.
(3)
Klein, Tobias.
(3)
Krutz, Ronald L., 1938-
(3)
Lockhart, Andrew.
(3)
Long, Johnny.
(3)
Messier, Ric, author.
(3)
Messier, Ric.
(3)
Mitnick, Kevin D. (Kevin David), 1963-
(3)
Ozkaya, Erdal, author.
(3)
Packt Publishing, publisher.
(3)
Pearson (Firm), publisher.
(3)
Potter, Bruce.
(3)
Sharma, Himanshu, author.
(3)
White, Bill, author.
(3)
Ackerman, Pascal, author.
(2)
Albing, Carl, author.
(2)
Andress, Jason, author.
(2)
Anonymous, author.
(2)
Anson, Steve.
(2)
Aquilina, James M.
(2)
Aslam, Abdul, author.
(2)
Ayala, Luis, author.
(2)
Barker, William.
(2)
Beale, Jay.
(2)
Beaver, Kevin, author.
(2)
Bertocci, Vittorio.
(2)
Bishop, Matt (Matthew A.), author.
(2)
Brabetz, Sebastian, author.
(2)
Bücker, Axel, author.
(2)
Calder, Alan, 1957-
(2)
Calder, Alan, 1957- author.
(2)
Carpenter, Perry, author.
(2)
Cerra, Allison, author.
(2)
Cherry, Denny.
(2)
Chio, Clarence.
(2)
Cole, Eric, author.
(2)
Conrad, Peter, author.
(2)
Copeland, Marshall.
(2)
Dhanjani, Nitesh.
(2)
Donaldson, Scott E., author.
(2)
Edge, Charles S., Jr.
(2)
Elisan, Christopher C., author.
(2)
Foster, James C.
(2)
Freeman, David, 1979- author.
(2)
Gangemi, G. T.
(2)
Garfinkel, Simson.
(2)
Grimes, Roger A.
(2)
Grimes, Roger A., author.
(2)
Grove, Christopher, narrator.
(2)
Gupta, Ajay.
(2)
Haber, Morey J.
(2)
Hijazi, Rami, author.
(2)
Howard, Michael, 1965-
(2)
Hurley, Chris.
(2)
Jaswal, Nipun.
(2)
Jin, Jennifer, author.
(2)
Jin, Jennifer.
(2)
Johansson, Jesper M.
(2)
Kalsi, Tajinder, author.
(2)
Kleiman, Dave.
(2)
Knox, David (David C.)
(2)
Konheim, Alan G., 1934-
(2)
Koziol, Jack.
(2)
Krausz, Michael.
(2)
Lakhani, Aamir, presenter.
(2)
Laliberte, Scott.
(2)
Lambros, Kyriakos P., author.
(2)
Lehtinen, Rick.
(2)
Ligh, Michael Hale.
(2)
Liska, Allan, author.
(2)
Loshin, Peter.
(2)
Malin, Cameron H.
(2)
McCoy, Chris, on-screen presenter.
(2)
McGraw, Gary, 1966-
(2)
Merkow, Mark S.
(2)
Mitnick, Kevin D. (Kevin David), 1963- author.
(2)
Morrissey, Sean.
(2)
O'Reilly & Associates, publisher.
(2)
O'Reilly (Firm)
(2)
O'Reilly (Firm), publisher.
(2)
Oaks, Scott.
(2)
Olups, Rihards, author.
(2)
Parker, Carey, author.
(2)
Paul, Mano.
(2)
Pinto, Marcus, 1978-
(2)
Podjarny, Guy, author.
(2)
Pollack, Edward, author.
(2)
Rayns, Chris.
(2)
Richard, Philippe, author.
(2)
Ring, Sandra.
(2)
Rogers, Russ.
(2)
Russell, Brian, author.
(2)
Russell, Deborah.
(2)
Sabih, Zaid, on-screen presenter.
(2)
Sanbower, Jamie, author.
(2)
Santuka, Vivek, author.
(2)
Sarraj, Saad, presenter.
(2)
Scambray, Joel.
(2)
Schneier, Bruce, 1963- author.
(2)
Seitz, Justin, author.
(2)
Sharp, Matthew K., author.
(2)
Shinder, Thomas W., author.
(2)
Siegel, Stanley G., author.
(2)
Simon, William L., 1930-
(2)
Singer, Bryan L., author.
(2)
Sletten, Brian, on-screen presenter.
(2)
Steinberg, Joseph (Cybersecurity expert), author.
(2)
Sternstein, Jon, on-screen presenter.
(2)
Stuttard, Dafydd, 1972-
(2)
Taylor, Ron, on-screen presenter.
(2)
Troncone, Paul, author.
(2)
Van Duren, Drew, author.
(2)
Varsalone, Jesse.
(2)
White, Bill (Telecommunications engineer), author.
(2)
Wiles, Jack.
(2)
Williams, Chris K., author.
(2)
Winkler, Ira, author.
(2)
Woland, Aaron T., author.
(2)
Wong, David (Cryptography engineer), author.
(2)
Wotring, Brian.
(2)
Yan, Eva, author.
(2)
Zdziarski, Jonathan A.
(2)
Abbadi, Imad M., author.
(1)
Addison-Wesley Professional (Firm), publisher.
(1)
Addison-Wesley Professional (Firm), publisher. )
(1)
Afzal, Imran, speaker.
(1)
Ahmad, David R. Mirza.
(1)
Ahmed, Mohiuddin (Computer scientist), editor.
(1)
Akanbi, Oluwatobi Ayodeji, author.
(1)
Alani, Mohammed M., author.
(1)
Alder, Raven.
(1)
Ali, Shakeel, author.
(1)
Ali, Shakeel.
(1)
Allen, Christopher, contributor.
(1)
Allen, Julia H.
(1)
Allen, Lee (Information security specialist), author.
(1)
Allsopp, John, on-screen presenter.
(1)
Alvarado, Ellen.
(1)
Alves, Edi Lopes, author.
(1)
Amberg, Eric, author
(1)
Amberg, Eric, author.
(1)
Amini, Rob.
(1)
Amiri, Iraj Sadegh, 1977- author.
(1)
Anbalahan, Siddharth, author.
(1)
Anderson, Brian (Brian James)
(1)
Anderson, Brian.
(1)
Anderson, Ross, 1956-
(1)
Andress, Jason.
(1)
Anley, Chris.
(1)
Anzaldua, Reynaldo.
(1)
Arcuri, Jennifer, author.
(1)
Arnold, Isabel, author.
(1)
Arthur, Will, author.
(1)
Asher, J. A. (Jeffrey Allen)
(1)
August, Thomas, author.
(1)
Aumasson, Jean-Philippe, author.
(1)
Aurnou, Scott, on-screen presenter.
(1)
Babbin, Jacob.
(1)
Baca, Steve, author.
(1)
Baccas, Paul.
(1)
Bachaalany, Elias, author.
(1)
Bachrach, Daniel G., author.
(1)
Bahadur, Gary.
(1)
Bahi, Jacques Mohcine, author.
(1)
Bailey, Tucker, author.
(1)
Bais, Teo, author.
(1)
Baker, Andrew R.
(1)
Baker, Caleb, 1974-
(1)
Barker, Dylan.
(1)
Barlow, Mike (Michael Alan), author.
(1)
Barnett, Ryan C.
(1)
Barnum, Todd.
(1)
Barrett, Diane.
(1)
Baskin, Brian, author.
(1)
Baskin, Brian.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
(811)
Language
Include
Exclude
English
(781)
German
(17)
Chinese
(4)
Undetermined
(4)
Polish
(3)
French
(1)
Japanese
(1)
More
View All
Fewer
Collapse All
Publication Date
Include
Exclude
This graph shows the distribution of publication dates for use with a date range slider. Switch to Years view for a more detailed breakdown of search results by year.
From Publication Year
-
To Publication Year
2019
(67)
2018
(62)
2015
(58)
2016
(57)
2014
(49)
2022
(48)
2021
(43)
2008
(42)
2017
(41)
2020
(40)
2011
(39)
2013
(39)
2012
(38)
2010
(34)
2005
(32)
2009
(26)
2007
(24)
2006
(23)
2003
(18)
2004
(17)
2002
(15)
2001
(8)
2000
(3)
1995
(2)
3
(1)
1996
(1)
1998
(1)
1999
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer security.
(807)
Computer Security
(494)
Electronic books.
(375)
Computer networks -- Security measures.
(281)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(279)
COMPUTERS -- Security -- General.
(179)
COMPUTERS -- Networking -- Security.
(119)
COMPUTERS -- Internet -- Security.
(115)
Data protection.
(66)
Protection de l'information (Informatique)
(66)
Penetration testing (Computer security)
(44)
Tests d'intrusion.
(43)
Microsoft Windows (Computer file)
(42)
Engineering & Applied Sciences.
(41)
Pirates informatiques.
(40)
Hackers.
(39)
Computers -- Access control.
(38)
Computer Science.
(37)
Ordinateurs -- Accès -- Contrôle.
(37)
Computer crimes -- Investigation.
(35)
Criminalité informatique -- Enquêtes.
(35)
Internet -- Security measures.
(35)
Internet -- Sécurité -- Mesures.
(35)
Hacking.
(31)
Chiffrement (Informatique)
(29)
Computer crimes -- Prevention.
(29)
Data encryption (Computer science)
(29)
Piratage informatique.
(29)
Electronic videos.
(28)
Logiciels malveillants.
(28)
Malware (Computer software)
(28)
Operating systems (Computers)
(25)
Computer crimes.
(24)
Systèmes d'exploitation (Ordinateurs)
(24)
operating systems.
(24)
Computersicherheit
(23)
Criminalité informatique.
(22)
Business enterprises -- Computer networks -- Security measures.
(21)
Information technology -- Security measures.
(21)
Technologie de l'information -- Sécurité -- Mesures.
(21)
Cloud computing -- Security measures.
(19)
Computer networks -- Access control.
(19)
Cryptographie.
(19)
Cryptography.
(19)
Infonuagique -- Sécurité -- Mesures.
(19)
Linux.
(19)
Films de formation.
(18)
Instructional films.
(18)
Cloud computing.
(17)
Films autres que de fiction.
(17)
Infonuagique.
(17)
Internet videos.
(17)
Nonfiction films.
(17)
Vidéos sur Internet.
(17)
Webcast
(17)
Application software -- Development.
(16)
Kali Linux.
(16)
Logiciels d'application -- Développement.
(16)
Computer networks.
(15)
Réseaux d'ordinateurs.
(15)
COMPUTERS -- Security -- Networking.
(13)
Information technology -- Management.
(13)
Java (Computer program language)
(13)
Java (Langage de programmation)
(13)
Technologie de l'information -- Gestion.
(13)
Computer software -- Development.
(12)
Datensicherung
(12)
Architecture client-serveur (Informatique)
(11)
Bases de données -- Sécurité -- Mesures.
(11)
Client/server computing.
(11)
Database security.
(11)
Apprentissage automatique.
(10)
BUSINESS & ECONOMICS -- Industrial Management.
(10)
BUSINESS & ECONOMICS -- Management Science.
(10)
BUSINESS & ECONOMICS -- Management.
(10)
BUSINESS & ECONOMICS -- Organizational Behavior.
(10)
Computer Communication Networks
(10)
Computer hackers.
(10)
Computer viruses.
(10)
Computerbeveiliging.
(10)
Computers -- Security -- General.
(10)
Criminalistique.
(10)
Forensic Sciences
(10)
Forensic sciences.
(10)
Mac OS.
(10)
Machine learning.
(10)
Systèmes virtuels (Informatique)
(10)
Virtual computer systems.
(10)
forensic science.
(10)
COMPUTERS -- Data Processing.
(9)
COMPUTERS -- Security -- Cryptography.
(9)
Coupe-feu (Sécurité informatique)
(9)
Firewalls (Computer security)
(9)
Génie logiciel.
(9)
Informatique.
(9)
Logiciels libres.
(9)
Metasploit (Electronic resource)
(9)
Network security.
(9)
Open source software.
(9)
Software engineering.
(9)
Virus informatiques.
(9)
Audiobooks.
(8)
Business -- Data processing -- Security measures.
(8)
COMPUTERS -- Information Technology.
(8)
Downloadable audio books.
(8)
Electronic data processing personnel -- Certification.
(8)
Gestion -- Informatique -- Sécurité -- Mesures.
(8)
Livres audio.
(8)
Privacy, Right of.
(8)
Python (Computer program language)
(8)
Python (Langage de programmation)
(8)
Security systems.
(8)
Study guides.
(8)
Bases de données -- Gestion.
(7)
COMPUTERS -- Networking -- General.
(7)
COMPUTERS -- Security -- Online Safety & Privacy.
(7)
COMPUTERS -- Security -- Viruses & Malware.
(7)
Database management.
(7)
Electrical & Computer Engineering.
(7)
Telecommunications.
(7)
z/OS.
(7)
Artificial intelligence.
(6)
C (Computer program language)
(6)
C (Langage de programmation)
(6)
COMPUTERS -- Computer Literacy.
(6)
COMPUTERS -- Computer Science.
(6)
COMPUTERS -- Hardware -- General.
(6)
COMPUTERS -- Machine Theory.
(6)
COMPUTERS -- Reference.
(6)
Computer science.
(6)
Debugging in computer science.
(6)
Débogage.
(6)
Gestion du risque.
(6)
Intelligence artificielle.
(6)
LAW -- Forensic Science.
(6)
Microsoft Windows server.
(6)
Oracle (Computer file)
(6)
Risk assessment.
(6)
Risk management.
(6)
Web sites -- Security measures.
(6)
Évaluation du risque.
(6)
Application software -- Security measures.
(5)
Applications Web -- Sécurité -- Mesures.
(5)
Business enterprises -- Security measures.
(5)
Computer networking & communications.
(5)
Computer software -- Reliability.
(5)
Computers and IT.
(5)
Computers.
(5)
Cyberspace -- Security measures.
(5)
Cyberterrorism.
(5)
Cyberterrorisme.
(5)
Electronic information resources -- Access control.
(5)
Entreprises -- Sécurité -- Mesures.
(5)
Fabrication -- Contrôle -- Sécurité -- Mesures.
(5)
IBM computers -- Security measures.
(5)
Internet
(5)
Internet des objets.
(5)
Internet of things.
(5)
Logiciels -- Fiabilité.
(5)
Logiciels d'application -- Sécurité -- Mesures.
(5)
Microsoft .NET Framework.
(5)
Ordinateurs.
(5)
Process control -- Security measures.
(5)
Rechnernetz
(5)
Risk Assessment
(5)
Sites Web -- Sécurité -- Mesures.
(5)
Sources d'information électroniques -- Accès -- Contrôle.
(5)
Transmission sans fil -- Sécurité -- Mesures.
(5)
United States.
(5)
VMware vSphere.
(5)
Web applications -- Security measures.
(5)
Wireless communication systems -- Security measures.
(5)
Application software -- Development -- Automation.
(4)
Architecture client-serveur (Informatique) -- Sécurité -- Mesures.
(4)
Artificial Intelligence
(4)
BUSINESS & ECONOMICS -- Corporate Governance.
(4)
Big data.
(4)
C++ (Computer program language)
(4)
C++ (Langage de programmation)
(4)
COMPUTERS -- Programming Languages -- Java.
(4)
COMPUTERS -- Security -- Viruses.
(4)
Client/server computing -- Security measures.
(4)
Computer crimes -- Investigation -- Methodology.
(4)
Computer software -- Testing.
(4)
Criminalité informatique -- Enquêtes -- Méthodologie.
(4)
Cyber intelligence (Computer security)
(4)
Data recovery (Computer science)
(4)
Données volumineuses.
(4)
Electronic commerce -- Security measures.
(4)
Electronic digital computers.
(4)
Fenêtres (Informatique)
(4)
IBM (Ordinateurs)
(4)
IBM computers.
(4)
Information Systems
(4)
Information storage and retrieval systems.
(4)
JavaScript (Computer program language)
(4)
JavaScript (Langage de programmation)
(4)
Logiciels d'application -- Développement -- Automatisation.
(4)
Management information systems -- Security measures.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
O'reilly E-Books
(810)
Online
(1)
Library
Include
Exclude
IYTE Library
(811)
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}