Search Results for - Narrowed by: E-Book - O'reilly E-Books - Computer security.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dITYPE$002509Material$002bType$0025091$00253AE-BOOKS$002509E-Book$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AOREILLY$002509O$002527reilly$002bE-Books$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2024-09-27T09:44:15Z
Sustainably investing in digital assets globally
ent://SD_ILS/0/SD_ILS:2334066
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Ozelli, Selva, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119885627">https://learning.oreilly.com/library/view/~/9781119885627</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119885627/?ar">https://go.oreilly.com/library-access/library/view/-/9781119885627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119885627/?ar">https://learning.oreilly.com/library/view/~/9781119885627/?ar</a><br/>Format: Electronic Resources<br/>
The official (ISC)2 CCSP CBK reference
ent://SD_ILS/0/SD_ILS:2334919
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Kraus, Aaron, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119909019/?ar">https://go.oreilly.com/library-access/library/view/-/9781119909019/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119909019/?ar">https://learning.oreilly.com/library/view/~/9781119909019/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119909019">https://learning.oreilly.com/library/view/~/9781119909019</a><br/>Format: Electronic Resources<br/>
Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacks
ent://SD_ILS/0/SD_ILS:2329941
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Peiris, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119804062/?ar">https://learning.oreilly.com/library/view/~/9781119804062/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar">https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119804062">https://learning.oreilly.com/library/view/~/9781119804062</a><br/>Format: Electronic Resources<br/>
WIRELESS SECURITY ARCHITECTURE designing and maintaining secure wireless for enterprise.
ent://SD_ILS/0/SD_ILS:2331905
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by MINELLA, JENNIFER.<br/><a href="https://learning.oreilly.com/library/view/~/9781119883050">https://learning.oreilly.com/library/view/~/9781119883050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119883050/?ar">https://go.oreilly.com/library-access/library/view/-/9781119883050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119883050/?ar">https://learning.oreilly.com/library/view/~/9781119883050/?ar</a><br/>Format: Electronic Resources<br/>
Snowflake access control : mastering the features for data privacy and regulatory compliance
ent://SD_ILS/0/SD_ILS:2331907
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Larson, Jessica Megan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484280386">https://learning.oreilly.com/library/view/~/9781484280386</a>
<a href="https://learning.oreilly.com/library/view/~/9781484280386/?ar">https://learning.oreilly.com/library/view/~/9781484280386/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar">https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar</a><br/>Format: Electronic Resources<br/>
Designing secure software : a guide for developers
ent://SD_ILS/0/SD_ILS:2329594
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Kohnfelder, Loren, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129804/?ar">https://learning.oreilly.com/library/view/~/9781098129804/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129804">https://learning.oreilly.com/library/view/~/9781098129804</a><br/>Format: Electronic Resources<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:2330102
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Sharp, Matthew K., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar">https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119782483/?ar">https://learning.oreilly.com/library/view/~/9781119782483/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119782483">https://learning.oreilly.com/library/view/~/9781119782483</a><br/>Format: Electronic Resources<br/>
Building a Red Hat OpenShift environment on IBM Z
ent://SD_ILS/0/SD_ILS:2334093
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Parziale, Lydia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460741/?ar">https://learning.oreilly.com/library/view/~/9780738460741/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460741">https://learning.oreilly.com/library/view/~/9780738460741</a><br/>Format: Electronic Resources<br/>
Secret key cryptography : ciphers, from simple to unbreakable
ent://SD_ILS/0/SD_ILS:2334094
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Rubin, Frank (Cryptographer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781633439795">https://learning.oreilly.com/library/view/~/9781633439795</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar">https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781633439795/?ar">https://learning.oreilly.com/library/view/~/9781633439795/?ar</a><br/>Format: Electronic Resources<br/>
System and privacy data protection.
ent://SD_ILS/0/SD_ILS:2331777
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a>
<a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format: Video recording<br/>
Threat Intelligence and threat hunting
ent://SD_ILS/0/SD_ILS:2331779
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137896301/?ar">https://learning.oreilly.com/videos/~/9780137896301/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar">https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137896301">https://learning.oreilly.com/videos/~/9780137896301</a><br/>Format: Video recording<br/>
Cloud security for dummies
ent://SD_ILS/0/SD_ILS:2332497
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a>
<a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format: Electronic Resources<br/>
Offensive shellcode from scratch : get to grips with shellcode countermeasures and discover how to bypass them
ent://SD_ILS/0/SD_ILS:2332537
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Pillay, Rishalin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar">https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803247427">https://learning.oreilly.com/library/view/~/9781803247427</a>
<a href="https://learning.oreilly.com/library/view/~/9781803247427/?ar">https://learning.oreilly.com/library/view/~/9781803247427/?ar</a><br/>Format: Electronic Resources<br/>
Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadar
ent://SD_ILS/0/SD_ILS:2332057
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by IBM Storage Team, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260/?ar">https://learning.oreilly.com/library/view/~/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260">https://learning.oreilly.com/library/view/~/9780738460260</a><br/>Format: Electronic Resources<br/>
Cybersecurity leadership demystified : a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
ent://SD_ILS/0/SD_ILS:2334691
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781804619827/?ar">https://go.oreilly.com/library-access/library/view/-/9781804619827/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781804619827/?ar">https://learning.oreilly.com/library/view/~/9781804619827/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781804619827">https://learning.oreilly.com/library/view/~/9781804619827</a><br/>Format: Sound recording<br/>
Web hacker's toolbox : tools used by successful hackers.
ent://SD_ILS/0/SD_ILS:2335459
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Czagan, Dawid, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837632831/?ar">https://learning.oreilly.com/videos/~/9781837632831/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837632831">https://learning.oreilly.com/videos/~/9781837632831</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar</a><br/>Format: Video recording<br/>
Burp Suite unfiltered : go from a beginner to advanced.
ent://SD_ILS/0/SD_ILS:2335463
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Yadav, Avinash, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837639199">https://learning.oreilly.com/videos/~/9781837639199</a>
<a href="https://learning.oreilly.com/videos/~/9781837639199/?ar">https://learning.oreilly.com/videos/~/9781837639199/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837639199/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639199/?ar</a><br/>Format: Video recording<br/>
Red Hat OpenShift container platform for IBM zCX
ent://SD_ILS/0/SD_ILS:2334911
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Parziale, Lydia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460871/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460871/?ar">https://learning.oreilly.com/library/view/~/9780738460871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460871">https://learning.oreilly.com/library/view/~/9780738460871</a><br/>Format: Electronic Resources<br/>
Security superstream : security in the cloud.
ent://SD_ILS/0/SD_ILS:2334923
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Messdaghi, Chloé, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920835578/?ar">https://go.oreilly.com/library-access/library/view/-/0636920835578/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920835578/?ar">https://learning.oreilly.com/videos/~/0636920835578/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920835578">https://learning.oreilly.com/videos/~/0636920835578</a><br/>Format: Video recording<br/>
CEH Certified Ethical Hacker Cert guide
ent://SD_ILS/0/SD_ILS:2331621
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format: Electronic Resources<br/>
Hacking : der umfassende Praxis-Guide : inkl. Prüfungsvorbereitung zum CEHv11
ent://SD_ILS/0/SD_ILS:2331683
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Amberg, Eric, author<br/><a href="https://learning.oreilly.com/library/view/~/9783747504840">https://learning.oreilly.com/library/view/~/9783747504840</a>
<a href="https://learning.oreilly.com/library/view/~/9783747504840/?ar">https://learning.oreilly.com/library/view/~/9783747504840/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar">https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar</a><br/>Format: Electronic Resources<br/>
Practical fraud prevention : fraud and AML analytics for Fintech and eCommerce, using SQL and Python
ent://SD_ILS/0/SD_ILS:2332348
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Saporta, Gilit, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492093312/?ar">https://go.oreilly.com/library-access/library/view/-/9781492093312/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492093312/?ar">https://learning.oreilly.com/library/view/~/9781492093312/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492093312">https://learning.oreilly.com/library/view/~/9781492093312</a><br/>Format: Electronic Resources<br/>
Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory.
ent://SD_ILS/0/SD_ILS:2331787
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Ostrovskaya, Svetlana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070331">https://learning.oreilly.com/library/view/~/9781801070331</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070331/?ar">https://learning.oreilly.com/library/view/~/9781801070331/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar</a><br/>Format: Electronic Resources<br/>
Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linux
ent://SD_ILS/0/SD_ILS:2332265
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar">https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750/?ar">https://learning.oreilly.com/videos/~/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750">https://learning.oreilly.com/videos/~/9781803239750</a><br/>Format: Video recording<br/>
The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more
ent://SD_ILS/0/SD_ILS:2332630
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format: Electronic Resources<br/>
What is eBPF?
ent://SD_ILS/0/SD_ILS:2332631
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Rice, Liz (Open Source engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492097266/?ar">https://learning.oreilly.com/library/view/~/9781492097266/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492097266">https://learning.oreilly.com/library/view/~/9781492097266</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar">https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar</a><br/>Format: Electronic Resources<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:2332538
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Pramanik, Sabyasachi, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119812494">https://learning.oreilly.com/library/view/~/9781119812494</a>
<a href="https://learning.oreilly.com/library/view/~/9781119812494/?ar">https://learning.oreilly.com/library/view/~/9781119812494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar">https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar</a><br/>Format: Electronic Resources<br/>
Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response.
ent://SD_ILS/0/SD_ILS:2331491
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Hettema, Hinne.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512/?ar">https://learning.oreilly.com/library/view/~/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512">https://learning.oreilly.com/library/view/~/9781801815512</a><br/>Format: Electronic Resources<br/>
Operationalizing Threat Intelligence : a Guide to Developing and Operationalizing Cyber Threat Intelligence Programs.
ent://SD_ILS/0/SD_ILS:2333075
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Wilhoit, Kyle.<br/><a href="https://learning.oreilly.com/library/view/~/9781801814683">https://learning.oreilly.com/library/view/~/9781801814683</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801814683/?ar">https://go.oreilly.com/library-access/library/view/-/9781801814683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801814683/?ar">https://learning.oreilly.com/library/view/~/9781801814683/?ar</a><br/>Format: Electronic Resources<br/>
Infrastructure & ops hour with Sam Newman. eBPF with Liz Rice
ent://SD_ILS/0/SD_ILS:2334144
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Newman, Sam, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920788362/?ar">https://go.oreilly.com/library-access/library/view/-/0636920788362/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920788362">https://learning.oreilly.com/videos/~/0636920788362</a>
<a href="https://learning.oreilly.com/videos/~/0636920788362/?ar">https://learning.oreilly.com/videos/~/0636920788362/?ar</a><br/>Format: Video recording<br/>
Mastering malware analysis : a malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks
ent://SD_ILS/0/SD_ILS:2334733
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Kleymenov, Alexey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803240244/?ar">https://learning.oreilly.com/library/view/~/9781803240244/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240244">https://learning.oreilly.com/library/view/~/9781803240244</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar</a><br/>Format: Electronic Resources<br/>
Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence
ent://SD_ILS/0/SD_ILS:2335333
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Oettinger, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781837632503">https://learning.oreilly.com/library/view/~/9781837632503</a>
<a href="https://learning.oreilly.com/library/view/~/9781837632503/?ar">https://learning.oreilly.com/library/view/~/9781837632503/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837632503/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632503/?ar</a><br/>Format: Sound recording<br/>
Cyber security for absolute beginners, Part 01.
ent://SD_ILS/0/SD_ILS:2335525
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Oni, Alexander, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837630943/?ar">https://learning.oreilly.com/videos/~/9781837630943/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837630943">https://learning.oreilly.com/videos/~/9781837630943</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar">https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar</a><br/>Format: Video recording<br/>
Cyber security for absolute beginners. Part 02.
ent://SD_ILS/0/SD_ILS:2335513
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639403/?ar">https://learning.oreilly.com/videos/~/9781837639403/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639403">https://learning.oreilly.com/videos/~/9781837639403</a><br/>Format: Video recording<br/>
Practical cyber hacking skills for beginners.
ent://SD_ILS/0/SD_ILS:2335514
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar">https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181">https://learning.oreilly.com/videos/~/9781837636181</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181/?ar">https://learning.oreilly.com/videos/~/9781837636181/?ar</a><br/>Format: Video recording<br/>
The security culture playbook : an executive guide to reducing risk and developing your human defense layer
ent://SD_ILS/0/SD_ILS:2332410
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119875239/?ar">https://learning.oreilly.com/library/view/~/9781119875239/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119875239">https://learning.oreilly.com/library/view/~/9781119875239</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar">https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar</a><br/>Format: Electronic Resources<br/>
Getting started with IBM Hyper Protect Data Controller
ent://SD_ILS/0/SD_ILS:2331451
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format: Electronic Resources<br/>
Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them
ent://SD_ILS/0/SD_ILS:2332411
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format: Electronic Resources<br/>
IT security controls : a guide to corporate standards and frameworks
ent://SD_ILS/0/SD_ILS:2332412
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Viegas, Virgilio, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484277997/?ar">https://learning.oreilly.com/library/view/~/9781484277997/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277997">https://learning.oreilly.com/library/view/~/9781484277997</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar</a><br/>Format: Electronic Resources<br/>
The security culture playbook : an executive guide to reducing risk and developing your human defense layer
ent://SD_ILS/0/SD_ILS:2334218
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Carpenter, Perry, author, narrator.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar">https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781663720177">https://learning.oreilly.com/library/view/~/9781663720177</a>
<a href="https://learning.oreilly.com/library/view/~/9781663720177/?ar">https://learning.oreilly.com/library/view/~/9781663720177/?ar</a><br/>Format: Sound recording<br/>
Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict
ent://SD_ILS/0/SD_ILS:2334696
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Borges, Dan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818/?ar">https://learning.oreilly.com/library/view/~/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818">https://learning.oreilly.com/library/view/~/9781801812818</a><br/>Format: Sound recording<br/>
Cloud security for dummies
ent://SD_ILS/0/SD_ILS:2332936
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Coombs, Ted, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar">https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9798765008096/?ar">https://learning.oreilly.com/library/view/~/9798765008096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9798765008096">https://learning.oreilly.com/library/view/~/9798765008096</a><br/>Format: Sound recording<br/>
Security Observability with eBPF
ent://SD_ILS/0/SD_ILS:2332576
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Salazar, Jed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492096719">https://learning.oreilly.com/library/view/~/9781492096719</a>
<a href="https://learning.oreilly.com/library/view/~/9781492096719/?ar">https://learning.oreilly.com/library/view/~/9781492096719/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar">https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar</a><br/>Format: Electronic Resources<br/>
CYBERSECURITY IN SMART HOMES architectures, solutions and technologies.
ent://SD_ILS/0/SD_ILS:2333168
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by KHATOUN, RIDA.<br/><a href="https://learning.oreilly.com/library/view/~/9781789450866">https://learning.oreilly.com/library/view/~/9781789450866</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789450866/?ar">https://go.oreilly.com/library-access/library/view/-/9781789450866/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789450866/?ar">https://learning.oreilly.com/library/view/~/9781789450866/?ar</a><br/>Format: Electronic Resources<br/>
Single sign-on and passwordless authentication : an overview.
ent://SD_ILS/0/SD_ILS:2333558
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Ovcharov, Andrey, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202294">https://learning.oreilly.com/videos/~/10000MNHV202294</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202294/?ar">https://learning.oreilly.com/videos/~/10000MNHV202294/?ar</a><br/>Format: Video recording<br/>
The ransomware dilemma : the decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attack
ent://SD_ILS/0/SD_ILS:2333559
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Leo, Philipp, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63419">https://learning.oreilly.com/library/view/~/53863MIT63419</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT63419/?ar">https://learning.oreilly.com/library/view/~/53863MIT63419/?ar</a><br/>Format: Electronic Resources<br/>
CEH : Certified Ethical Hacker Practice Exams
ent://SD_ILS/0/SD_ILS:2333635
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Walker, Matthew.<br/><a href="https://learning.oreilly.com/library/view/~/9781264269976">https://learning.oreilly.com/library/view/~/9781264269976</a>
<a href="https://learning.oreilly.com/library/view/~/9781264269976/?ar">https://learning.oreilly.com/library/view/~/9781264269976/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar">https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar</a><br/>Format: Electronic Resources<br/>
The complete cybersecurity bootcamp
ent://SD_ILS/0/SD_ILS:2333407
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137949397">https://learning.oreilly.com/videos/~/9780137949397</a>
<a href="https://learning.oreilly.com/videos/~/9780137949397/?ar">https://learning.oreilly.com/videos/~/9780137949397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar">https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar</a><br/>Format: Video recording<br/>
The art of cyber security : a practical guide to winning the war on cyber crime
ent://SD_ILS/0/SD_ILS:2333417
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Hibberd, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783676">https://learning.oreilly.com/library/view/~/9781787783676</a>
<a href="https://learning.oreilly.com/library/view/~/9781787783676/?ar">https://learning.oreilly.com/library/view/~/9781787783676/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar</a><br/>Format: Electronic Resources<br/>
Penetration Testing mit Metasploit : Praxiswissen für mehr IT-Sicherheit
ent://SD_ILS/0/SD_ILS:2333963
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783747505649">https://learning.oreilly.com/library/view/~/9783747505649</a>
<a href="https://learning.oreilly.com/library/view/~/9783747505649/?ar">https://learning.oreilly.com/library/view/~/9783747505649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar">https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar</a><br/>Format: Electronic Resources<br/>
Deploying a modern security data lake
ent://SD_ILS/0/SD_ILS:2333965
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Baum, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098134983/?ar">https://learning.oreilly.com/library/view/~/9781098134983/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar">https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098134983">https://learning.oreilly.com/library/view/~/9781098134983</a><br/>Format: Electronic Resources<br/>
Purple team strategies : enhancing global security posture through uniting red and blue teams with adversary emulation
ent://SD_ILS/0/SD_ILS:2333493
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Routin, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801074292/?ar">https://learning.oreilly.com/library/view/~/9781801074292/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801074292">https://learning.oreilly.com/library/view/~/9781801074292</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801074292/?ar">https://go.oreilly.com/library-access/library/view/-/9781801074292/?ar</a><br/>Format: Electronic Resources<br/>
Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud
ent://SD_ILS/0/SD_ILS:2333792
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Berkouwer, Sander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar">https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242507/?ar">https://learning.oreilly.com/library/view/~/9781803242507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242507">https://learning.oreilly.com/library/view/~/9781803242507</a><br/>Format: Electronic Resources<br/>
Security superstream : zero trust
ent://SD_ILS/0/SD_ILS:2334748
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Messdaghi, Chloé, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920817680">https://learning.oreilly.com/videos/~/0636920817680</a>
<a href="https://learning.oreilly.com/videos/~/0636920817680/?ar">https://learning.oreilly.com/videos/~/0636920817680/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920817680/?ar">https://go.oreilly.com/library-access/library/view/-/0636920817680/?ar</a><br/>Format: Video recording<br/>
Making sense of cybersecurity
ent://SD_ILS/0/SD_ILS:2335000
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Kranz, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617298004/?ar">https://learning.oreilly.com/library/view/~/9781617298004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617298004">https://learning.oreilly.com/library/view/~/9781617298004</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar">https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar</a><br/>Format: Electronic Resources<br/>
Becoming a cyber security professional : a beginner's career guide.
ent://SD_ILS/0/SD_ILS:2335522
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837638321/?ar">https://go.oreilly.com/library-access/library/view/-/9781837638321/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837638321">https://learning.oreilly.com/videos/~/9781837638321</a>
<a href="https://learning.oreilly.com/videos/~/9781837638321/?ar">https://learning.oreilly.com/videos/~/9781837638321/?ar</a><br/>Format: Video recording<br/>
Risk management for cyber security managers.
ent://SD_ILS/0/SD_ILS:2335524
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Oni, Alexander, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837639878/?ar">https://learning.oreilly.com/videos/~/9781837639878/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837639878/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639878/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639878">https://learning.oreilly.com/videos/~/9781837639878</a><br/>Format: Video recording<br/>
Navigating the cybersecurity career path
ent://SD_ILS/0/SD_ILS:2330836
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Patton, Helen E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119833420">https://learning.oreilly.com/library/view/~/9781119833420</a>
<a href="https://learning.oreilly.com/library/view/~/9781119833420/?ar">https://learning.oreilly.com/library/view/~/9781119833420/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar">https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar</a><br/>Format: Electronic Resources<br/>
Mastering Defensive Security : Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure.
ent://SD_ILS/0/SD_ILS:2330841
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Bravo, Cesar.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar">https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800208162/?ar">https://learning.oreilly.com/library/view/~/9781800208162/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800208162">https://learning.oreilly.com/library/view/~/9781800208162</a><br/>Format: Electronic Resources<br/>
Fight fire with fire : proactive cybersecurity strategies for today's leaders
ent://SD_ILS/0/SD_ILS:2330914
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Tarun, Renee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119854265/?ar">https://learning.oreilly.com/library/view/~/9781119854265/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119854265">https://learning.oreilly.com/library/view/~/9781119854265</a><br/>Format: Electronic Resources<br/>
CEH v11 : certified ethical hacker version 11 practice tests
ent://SD_ILS/0/SD_ILS:2330385
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar">https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119824510/?ar">https://learning.oreilly.com/library/view/~/9781119824510/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119824510">https://learning.oreilly.com/library/view/~/9781119824510</a><br/>Format: Electronic Resources<br/>
Mastering Azure security : keeping your Microsoft Azure workloads safe
ent://SD_ILS/0/SD_ILS:2332927
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Toroman, Mustafa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803238555">https://learning.oreilly.com/library/view/~/9781803238555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238555/?ar">https://learning.oreilly.com/library/view/~/9781803238555/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity leadership demystified : a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
ent://SD_ILS/0/SD_ILS:2331468
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801819282/?ar">https://go.oreilly.com/library-access/library/view/-/9781801819282/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801819282/?ar">https://learning.oreilly.com/library/view/~/9781801819282/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801819282">https://learning.oreilly.com/library/view/~/9781801819282</a><br/>Format: Electronic Resources<br/>
Cybersecurity For Dummies
ent://SD_ILS/0/SD_ILS:2332872
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119867180">https://learning.oreilly.com/library/view/~/9781119867180</a>
<a href="https://learning.oreilly.com/library/view/~/9781119867180/?ar">https://learning.oreilly.com/library/view/~/9781119867180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar">https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar</a><br/>Format: Electronic Resources<br/>
Container storage and data protection for applications on Kubernetes
ent://SD_ILS/0/SD_ILS:2332574
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127022/?ar">https://learning.oreilly.com/library/view/~/9781098127022/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127022">https://learning.oreilly.com/library/view/~/9781098127022</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar</a><br/>Format: Electronic Resources<br/>
Shifting left for application security : bridging the divide between DevOps and security with the right security tools
ent://SD_ILS/0/SD_ILS:2332575
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format: Electronic Resources<br/>
Snowflake security : securing your Snowflake data cloud
ent://SD_ILS/0/SD_ILS:2330261
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Herzberg, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484273890">https://learning.oreilly.com/library/view/~/9781484273890</a>
<a href="https://learning.oreilly.com/library/view/~/9781484273890/?ar">https://learning.oreilly.com/library/view/~/9781484273890/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar">https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar</a><br/>Format: Electronic Resources<br/>
Python for cybersecurity : using Python for cyber offense and defense
ent://SD_ILS/0/SD_ILS:2331574
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Poston, Howard E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar">https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649/?ar">https://learning.oreilly.com/library/view/~/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649">https://learning.oreilly.com/library/view/~/9781119850649</a><br/>Format: Electronic Resources<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:2331694
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Harper, Allen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar">https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781264268955/?ar">https://learning.oreilly.com/library/view/~/9781264268955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781264268955">https://learning.oreilly.com/library/view/~/9781264268955</a><br/>Format: Electronic Resources<br/>
Making sense of application security.
ent://SD_ILS/0/SD_ILS:2332363
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Saikali, Adib, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202229">https://learning.oreilly.com/videos/~/10000MNHV202229</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202229/?ar">https://learning.oreilly.com/videos/~/10000MNHV202229/?ar</a><br/>Format: Video recording<br/>
Case study : how Tools & Solutions survived a ransomware attack.
ent://SD_ILS/0/SD_ILS:2332364
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Majumdar, Partha, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar">https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0636920673859">https://learning.oreilly.com/library/view/~/0636920673859</a>
<a href="https://learning.oreilly.com/library/view/~/0636920673859/?ar">https://learning.oreilly.com/library/view/~/0636920673859/?ar</a><br/>Format: Video recording<br/>
Hacking
ent://SD_ILS/0/SD_ILS:2332886
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Beaver, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119872191">https://learning.oreilly.com/library/view/~/9781119872191</a>
<a href="https://learning.oreilly.com/library/view/~/9781119872191/?ar">https://learning.oreilly.com/library/view/~/9781119872191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar">https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar</a><br/>Format: Electronic Resources<br/>
Digital Earth : cyber threats, privacy and ethics in an age of paranoia
ent://SD_ILS/0/SD_ILS:2332896
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Katz, Sarah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783614">https://learning.oreilly.com/library/view/~/9781787783614</a>
<a href="https://learning.oreilly.com/library/view/~/9781787783614/?ar">https://learning.oreilly.com/library/view/~/9781787783614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar</a><br/>Format: Electronic Resources<br/>
Threat modeling with Owasp Threat Dragon & risk rating a vulnerability.
ent://SD_ILS/0/SD_ILS:2332599
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Fisher, Derek, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202248/?ar">https://learning.oreilly.com/videos/~/10000MNHV202248/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202248">https://learning.oreilly.com/videos/~/10000MNHV202248</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar</a><br/>Format: Video recording<br/>
Finding your cyber security path.
ent://SD_ILS/0/SD_ILS:2332701
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Miller, Alyssa, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202258">https://learning.oreilly.com/videos/~/10000MNHV202258</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202258/?ar">https://learning.oreilly.com/videos/~/10000MNHV202258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar</a><br/>Format: Video recording<br/>
Learn computer forensics : your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
ent://SD_ILS/0/SD_ILS:2333947
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Oettinger, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803238302/?ar">https://learning.oreilly.com/library/view/~/9781803238302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238302">https://learning.oreilly.com/library/view/~/9781803238302</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803238302/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238302/?ar</a><br/>Format: Electronic Resources<br/>
The unbreakable one-time pad cipher.
ent://SD_ILS/0/SD_ILS:2333562
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Rubin, Frank (Cryptographer), presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202291/?ar">https://learning.oreilly.com/videos/~/10000MNHV202291/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202291">https://learning.oreilly.com/videos/~/10000MNHV202291</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202291/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202291/?ar</a><br/>Format: Video recording<br/>
AWS security : compliance and observability setup and AWS account bootstrap walkthrough.
ent://SD_ILS/0/SD_ILS:2334241
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Kascic, Eric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNCS2022141/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNCS2022141/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNCS2022141/?ar">https://learning.oreilly.com/videos/~/10000MNCS2022141/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNCS2022141">https://learning.oreilly.com/videos/~/10000MNCS2022141</a><br/>Format: Video recording<br/>
Mastering Windows security and hardening : secure and protect your Windows environment from cyber threats using zero-trust security principles
ent://SD_ILS/0/SD_ILS:2334156
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Dunkerley, Mark, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar">https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803236544/?ar">https://learning.oreilly.com/library/view/~/9781803236544/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803236544">https://learning.oreilly.com/library/view/~/9781803236544</a><br/>Format: Electronic Resources<br/>
Ransomware protection playbook
ent://SD_ILS/0/SD_ILS:2330090
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Grimes, Roger A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119849124">https://learning.oreilly.com/library/view/~/9781119849124</a>
<a href="https://learning.oreilly.com/library/view/~/9781119849124/?ar">https://learning.oreilly.com/library/view/~/9781119849124/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar">https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar</a><br/>Format: Electronic Resources<br/>
Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptions
ent://SD_ILS/0/SD_ILS:2329799
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format: Electronic Resources<br/>
Trust in computer systems and the cloud
ent://SD_ILS/0/SD_ILS:2330850
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Bursell, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119692324/?ar">https://learning.oreilly.com/library/view/~/9781119692324/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar">https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119692324">https://learning.oreilly.com/library/view/~/9781119692324</a><br/>Format: Electronic Resources<br/>
Phishing and communication channels a guide to identifying and mitigating phishing attacks
ent://SD_ILS/0/SD_ILS:2331058
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Sonowal, Gunikhan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277447/?ar">https://learning.oreilly.com/library/view/~/9781484277447/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277447">https://learning.oreilly.com/library/view/~/9781484277447</a><br/>Format: Electronic Resources<br/>
Computer science security : concepts and tools
ent://SD_ILS/0/SD_ILS:2334035
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Zaidoun, Ameur Salem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786307552/?ar">https://learning.oreilly.com/library/view/~/9781786307552/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar">https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786307552">https://learning.oreilly.com/library/view/~/9781786307552</a><br/>Format: Electronic Resources<br/>
Cybersecurity and local government
ent://SD_ILS/0/SD_ILS:2331746
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Norris, Donald F., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119788287/?ar">https://learning.oreilly.com/library/view/~/9781119788287/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119788287">https://learning.oreilly.com/library/view/~/9781119788287</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119788287/?ar">https://go.oreilly.com/library-access/library/view/-/9781119788287/?ar</a><br/>Format: Electronic Resources<br/>
A hybrid cloud cyber security solution using IBM Spectrum Virtualize for public cloud on Azure and IBM Spectrum Virtualize safeguarded copy.
ent://SD_ILS/0/SD_ILS:2331705
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
<a href="https://learning.oreilly.com/library/view/~/9780738460345/?ar">https://learning.oreilly.com/library/view/~/9780738460345/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460345">https://learning.oreilly.com/library/view/~/9780738460345</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar</a><br/>Format: Electronic Resources<br/>
IBM Spectrum Virtualize, IBM FlashSystem, and IBM SAN volume controller security feature checklist
ent://SD_ILS/0/SD_ILS:2332372
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Scales, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460437">https://learning.oreilly.com/library/view/~/9780738460437</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460437/?ar">https://learning.oreilly.com/library/view/~/9780738460437/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar</a><br/>Format: Electronic Resources<br/>
Learn man in the middle attacks from scratch.
ent://SD_ILS/0/SD_ILS:2332269
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar">https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245/?ar">https://learning.oreilly.com/videos/~/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245">https://learning.oreilly.com/videos/~/9781803243245</a><br/>Format: Video recording<br/>
Cloud security handbook : find out how to effectively secure cloud environments using AWS, Azure, and GCP
ent://SD_ILS/0/SD_ILS:2332481
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Estrin, Eyal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800569195">https://learning.oreilly.com/library/view/~/9781800569195</a>
<a href="https://learning.oreilly.com/library/view/~/9781800569195/?ar">https://learning.oreilly.com/library/view/~/9781800569195/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar">https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar</a><br/>Format: Electronic Resources<br/>
Cybercrime : protecting your business, your family and yourself
ent://SD_ILS/0/SD_ILS:2332545
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Wade, Todd author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175874/?ar">https://learning.oreilly.com/library/view/~/9781780175874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175874">https://learning.oreilly.com/library/view/~/9781780175874</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar</a><br/>Format: Electronic Resources<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:2332857
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Sharp, Matthew K., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663718556/?ar">https://go.oreilly.com/library-access/library/view/-/9781663718556/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781663718556">https://learning.oreilly.com/library/view/~/9781663718556</a>
<a href="https://learning.oreilly.com/library/view/~/9781663718556/?ar">https://learning.oreilly.com/library/view/~/9781663718556/?ar</a><br/>Format: Sound recording<br/>
Security awareness for dummies
ent://SD_ILS/0/SD_ILS:2332874
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Winkler, Ira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar">https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119720928">https://learning.oreilly.com/library/view/~/9781119720928</a>
<a href="https://learning.oreilly.com/library/view/~/9781119720928/?ar">https://learning.oreilly.com/library/view/~/9781119720928/?ar</a><br/>Format: Electronic Resources<br/>
ETHICAL GUIDE TO CYBER ANONYMITY concepts, tools,and techniques to be anonymous from criminals, unethical hackers, and governments
ent://SD_ILS/0/SD_ILS:2335153
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Gunawardana, Kushantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801810210">https://learning.oreilly.com/library/view/~/9781801810210</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801810210/?ar">https://go.oreilly.com/library-access/library/view/-/9781801810210/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801810210/?ar">https://learning.oreilly.com/library/view/~/9781801810210/?ar</a><br/>Format: Electronic Resources<br/>
PRACTICAL INDUSTRIAL CYBERSECURITY ICS, Industry 4.0, and IIoT
ent://SD_ILS/0/SD_ILS:2333070
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Brooks, Charles J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119883029/?ar">https://go.oreilly.com/library-access/library/view/-/9781119883029/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119883029/?ar">https://learning.oreilly.com/library/view/~/9781119883029/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119883029">https://learning.oreilly.com/library/view/~/9781119883029</a><br/>Format: Electronic Resources<br/>
The cybersecurity playbook for modern enterprises
ent://SD_ILS/0/SD_ILS:2332323
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Wittkop, Jeremy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639/?ar">https://learning.oreilly.com/library/view/~/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639">https://learning.oreilly.com/library/view/~/9781803248639</a><br/>Format: Electronic Resources<br/>
Ransomware
ent://SD_ILS/0/SD_ILS:2332705
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Messdaghi, Chloé, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar">https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641/?ar">https://learning.oreilly.com/videos/~/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641">https://learning.oreilly.com/videos/~/0636920702641</a><br/>Format: Video recording<br/>
Getting started with cybersecurity science
ent://SD_ILS/0/SD_ILS:2333381
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Dykstra, Josiah, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920670926">https://learning.oreilly.com/videos/~/0636920670926</a>
<a href="https://learning.oreilly.com/videos/~/0636920670926/?ar">https://learning.oreilly.com/videos/~/0636920670926/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar">https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar</a><br/>Format: Video recording<br/>
Microsoft Defender for Cloud Cookbook : Protect Multicloud and Hybrid Cloud Environments, Manage Compliance and Strengthen Security Posture
ent://SD_ILS/0/SD_ILS:2333592
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Kranjac, Sasha.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801076135/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076135/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076135">https://learning.oreilly.com/library/view/~/9781801076135</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076135/?ar">https://learning.oreilly.com/library/view/~/9781801076135/?ar</a><br/>Format: Electronic Resources<br/>
Identity and access management fundamentals.
ent://SD_ILS/0/SD_ILS:2335277
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Kohli, Harpreet, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671145/?ar">https://learning.oreilly.com/videos/~/0636920671145/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920671145">https://learning.oreilly.com/videos/~/0636920671145</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar</a><br/>Format: Video recording<br/>
Web hacking expert : full-stack exploitation mastery.
ent://SD_ILS/0/SD_ILS:2335278
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Czagan, Dawid, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717">https://learning.oreilly.com/videos/~/9781837639717</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717/?ar">https://learning.oreilly.com/videos/~/9781837639717/?ar</a><br/>Format: Video recording<br/>
Security awareness for dummies
ent://SD_ILS/0/SD_ILS:2333093
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666174175/?ar">https://learning.oreilly.com/library/view/~/9781666174175/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781666174175/?ar">https://go.oreilly.com/library-access/library/view/-/9781666174175/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781666174175">https://learning.oreilly.com/library/view/~/9781666174175</a><br/>Format: Sound recording<br/>
Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10
ent://SD_ILS/0/SD_ILS:2332617
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Nita, Stefania Loredana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484281055/?ar">https://learning.oreilly.com/library/view/~/9781484281055/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar">https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484281055">https://learning.oreilly.com/library/view/~/9781484281055</a><br/>Format: Electronic Resources<br/>
Cyber security : the complete guide to cyber threats and protection
ent://SD_ILS/0/SD_ILS:2335194
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Sutton, David (Information security practitioner), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175973">https://learning.oreilly.com/library/view/~/9781780175973</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175973/?ar">https://learning.oreilly.com/library/view/~/9781780175973/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar</a><br/>Format: Electronic Resources<br/>
Executive's guide to cyber risk : securing the future today
ent://SD_ILS/0/SD_ILS:2333211
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Moyo, Siegfried, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119863113">https://learning.oreilly.com/library/view/~/9781119863113</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar">https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119863113/?ar">https://learning.oreilly.com/library/view/~/9781119863113/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on threat modeling
ent://SD_ILS/0/SD_ILS:2333383
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Deleersnyder, Sebastien, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671268">https://learning.oreilly.com/videos/~/0636920671268</a>
<a href="https://learning.oreilly.com/videos/~/0636920671268/?ar">https://learning.oreilly.com/videos/~/0636920671268/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar</a><br/>Format: Video recording<br/>
Windows Network security fundamentals
ent://SD_ILS/0/SD_ILS:2333384
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Weadock, Glenn E., presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206">https://learning.oreilly.com/videos/~/0636920671206</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206/?ar">https://learning.oreilly.com/videos/~/0636920671206/?ar</a><br/>Format: Video recording<br/>
Building cyber resilience before the next attack occurs : companies that are most successful in responding to cyberattacks leverage distributed leadership, crisis experience, and consistent communication
ent://SD_ILS/0/SD_ILS:2333560
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Hepfer, Manuel, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63431/?ar">https://learning.oreilly.com/library/view/~/53863MIT63431/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT63431">https://learning.oreilly.com/library/view/~/53863MIT63431</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63431/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63431/?ar</a><br/>Format: Electronic Resources<br/>
Common types of attack
ent://SD_ILS/0/SD_ILS:2333855
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Assemble You, publisher.<br/><a href="https://learning.oreilly.com/library/view/~/125053AYPOD">https://learning.oreilly.com/library/view/~/125053AYPOD</a>
<a href="https://go.oreilly.com/library-access/library/view/-/125053AYPOD/?ar">https://go.oreilly.com/library-access/library/view/-/125053AYPOD/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/125053AYPOD/?ar">https://learning.oreilly.com/library/view/~/125053AYPOD/?ar</a><br/>Format: Sound recording<br/>
IF IT'S SMART, IT'S VULNERABLE
ent://SD_ILS/0/SD_ILS:2333601
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Hypponen, Mikko, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119895183/?ar">https://go.oreilly.com/library-access/library/view/-/9781119895183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119895183/?ar">https://learning.oreilly.com/library/view/~/9781119895183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119895183">https://learning.oreilly.com/library/view/~/9781119895183</a><br/>Format: Electronic Resources<br/>
Cybersecurity : attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system
ent://SD_ILS/0/SD_ILS:2334741
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803248776/?ar">https://learning.oreilly.com/library/view/~/9781803248776/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248776">https://learning.oreilly.com/library/view/~/9781803248776</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803248776/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248776/?ar</a><br/>Format: Electronic Resources<br/>
IoT system testing : an IoT journey from devices to analytics and the edge
ent://SD_ILS/0/SD_ILS:2334592
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Hagar, Jon Duncan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar">https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484282762/?ar">https://learning.oreilly.com/library/view/~/9781484282762/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484282762">https://learning.oreilly.com/library/view/~/9781484282762</a><br/>Format: Electronic Resources<br/>
Strategy, leadership, and AI in the cyber ecosystem : the role of digital societies in information governance and decision making
ent://SD_ILS/0/SD_ILS:2326455
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Jahankhani, Hamid.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128214596/?ar">https://go.oreilly.com/library-access/library/view/-/9780128214596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128214596/?ar">https://learning.oreilly.com/library/view/~/9780128214596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128214596">https://learning.oreilly.com/library/view/~/9780128214596</a><br/>Format: Electronic Resources<br/>
Artificial Intelligence, Cybersecurity and Cyber Defence
ent://SD_ILS/0/SD_ILS:2328358
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format: Electronic Resources<br/>
Start-up secure : baking cybersecurity into your company from founding to exit
ent://SD_ILS/0/SD_ILS:2327524
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Castaldo, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119700739">https://learning.oreilly.com/library/view/~/9781119700739</a>
<a href="https://learning.oreilly.com/library/view/~/9781119700739/?ar">https://learning.oreilly.com/library/view/~/9781119700739/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar">https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar</a><br/>Format: Electronic Resources<br/>
Threat hunting with elastic stack : solve complex security challenges with integrated prevention, detection, and response
ent://SD_ILS/0/SD_ILS:2329469
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Pease, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801073783/?ar">https://go.oreilly.com/library-access/library/view/-/9781801073783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801073783">https://learning.oreilly.com/library/view/~/9781801073783</a>
<a href="https://learning.oreilly.com/library/view/~/9781801073783/?ar">https://learning.oreilly.com/library/view/~/9781801073783/?ar</a><br/>Format: Electronic Resources<br/>
Self-sovereign identity : decentralized digital identity and verifiable credentials
ent://SD_ILS/0/SD_ILS:2330270
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format: Electronic Resources<br/>
Azure security handbook : a comprehensive guide for defending your enterprise environment
ent://SD_ILS/0/SD_ILS:2329802
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Ots, Karl.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272923">https://learning.oreilly.com/library/view/~/9781484272923</a>
<a href="https://learning.oreilly.com/library/view/~/9781484272923/?ar">https://learning.oreilly.com/library/view/~/9781484272923/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar</a><br/>Format: Electronic Resources<br/>
A complete guide to Burp Suite : learn to detect application vulnerabilities
ent://SD_ILS/0/SD_ILS:2326430
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484264027/?ar">https://learning.oreilly.com/library/view/~/9781484264027/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484264027/?ar">https://go.oreilly.com/library-access/library/view/-/9781484264027/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484264027">https://learning.oreilly.com/library/view/~/9781484264027</a><br/>Format: Electronic Resources<br/>
COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION EXAM GUIDE (EXAM CS0-002)
ent://SD_ILS/0/SD_ILS:2326516
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Chapman, Brent.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar">https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260464313">https://learning.oreilly.com/library/view/~/9781260464313</a>
<a href="https://learning.oreilly.com/library/view/~/9781260464313/?ar">https://learning.oreilly.com/library/view/~/9781260464313/?ar</a><br/>Format: Electronic Resources<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:2327053
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Moschovitis, Christos J. P., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119658740">https://learning.oreilly.com/library/view/~/9781119658740</a>
<a href="https://learning.oreilly.com/library/view/~/9781119658740/?ar">https://learning.oreilly.com/library/view/~/9781119658740/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar">https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar</a><br/>Format: Electronic Resources<br/>
Comptia security+ certification practice exams, (Exam SY0-601).
ent://SD_ILS/0/SD_ILS:2327137
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Lachance, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781260467987/?ar">https://learning.oreilly.com/library/view/~/9781260467987/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar">https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260467987">https://learning.oreilly.com/library/view/~/9781260467987</a><br/>Format: Electronic Resources<br/>
Secure edge computing : applications, techniques and challenges.
ent://SD_ILS/0/SD_ILS:2329288
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Ahmed, Mohiuddin (Computer scientist), editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000427325/?ar">https://learning.oreilly.com/library/view/~/9781000427325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000427325">https://learning.oreilly.com/library/view/~/9781000427325</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar">https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar</a><br/>Format: Electronic Resources<br/>
Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict
ent://SD_ILS/0/SD_ILS:2329079
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Borges, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781801076203/?ar">https://learning.oreilly.com/library/view/~/9781801076203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076203">https://learning.oreilly.com/library/view/~/9781801076203</a><br/>Format: Electronic Resources<br/>
Cybersecurity and Third-Party Risk : Third Party Threat Hunting
ent://SD_ILS/0/SD_ILS:2329000
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Rasner, Gregory C.<br/><a href="https://learning.oreilly.com/library/view/~/9781119809555">https://learning.oreilly.com/library/view/~/9781119809555</a>
<a href="https://learning.oreilly.com/library/view/~/9781119809555/?ar">https://learning.oreilly.com/library/view/~/9781119809555/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar">https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar</a><br/>Format: Electronic Resources<br/>
The official (ISC)2 CCSP CBK reference
ent://SD_ILS/0/SD_ILS:2329305
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Fife, Leslie, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119603436/?ar">https://go.oreilly.com/library-access/library/view/-/9781119603436/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119603436/?ar">https://learning.oreilly.com/library/view/~/9781119603436/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119603436">https://learning.oreilly.com/library/view/~/9781119603436</a><br/>Format: Electronic Resources<br/>
8 steps to better security : a simple cyber resilience guide for business
ent://SD_ILS/0/SD_ILS:2330835
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Crawley, Kim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119811237/?ar">https://learning.oreilly.com/library/view/~/9781119811237/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119811237">https://learning.oreilly.com/library/view/~/9781119811237</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar">https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar</a><br/>Format: Electronic Resources<br/>
Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environment
ent://SD_ILS/0/SD_ILS:2330315
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800202092/?ar">https://learning.oreilly.com/library/view/~/9781800202092/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202092">https://learning.oreilly.com/library/view/~/9781800202092</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar</a><br/>Format: Electronic Resources<br/>
Cyber Crisis
ent://SD_ILS/0/SD_ILS:2331316
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Cole, Eric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666125313">https://learning.oreilly.com/library/view/~/9781666125313</a>
<a href="https://learning.oreilly.com/library/view/~/9781666125313/?ar">https://learning.oreilly.com/library/view/~/9781666125313/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar">https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar</a><br/>Format: Electronic Resources<br/>
Securing AI.
ent://SD_ILS/0/SD_ILS:2332134
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Manjengwa, Shingai, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar">https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920672319/?ar">https://learning.oreilly.com/videos/~/0636920672319/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920672319">https://learning.oreilly.com/videos/~/0636920672319</a><br/>Format: Video recording<br/>
How cybersecurity really works : a hands-on guide for total beginners
ent://SD_ILS/0/SD_ILS:2328036
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Grubb, Sam (Cyber security consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999/?ar">https://learning.oreilly.com/library/view/~/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999">https://learning.oreilly.com/library/view/~/9781098128999</a><br/>Format: Electronic Resources<br/>
Big breaches : cybersecurity lessons for everyone
ent://SD_ILS/0/SD_ILS:2328126
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Daswani, Neil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484266557">https://learning.oreilly.com/library/view/~/9781484266557</a>
<a href="https://learning.oreilly.com/library/view/~/9781484266557/?ar">https://learning.oreilly.com/library/view/~/9781484266557/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar">https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar</a><br/>Format: Electronic Resources<br/>
Art of attack : attacker mindset for security professionals.
ent://SD_ILS/0/SD_ILS:2329433
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Reynolds, Maxie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119805465/?ar">https://learning.oreilly.com/library/view/~/9781119805465/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119805465">https://learning.oreilly.com/library/view/~/9781119805465</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar">https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar</a><br/>Format: Electronic Resources<br/>
CISSP (ISC)2 certification practice exams and tests : over 1000 practice questions and explanations covering all 8 CISSP domains for exam version May 2021
ent://SD_ILS/0/SD_ILS:2329634
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Jordan, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800561373">https://learning.oreilly.com/library/view/~/9781800561373</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800561373/?ar">https://go.oreilly.com/library-access/library/view/-/9781800561373/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800561373/?ar">https://learning.oreilly.com/library/view/~/9781800561373/?ar</a><br/>Format: Electronic Resources<br/>
Cyber threat intelligence : the no-nonsense guide for CISOs and Security Managers
ent://SD_ILS/0/SD_ILS:2329637
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Roberts, Aaron.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272206">https://learning.oreilly.com/library/view/~/9781484272206</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484272206/?ar">https://learning.oreilly.com/library/view/~/9781484272206/?ar</a><br/>Format: Electronic Resources<br/>
CYBER SECURITY AND DIGITAL FORENSICS
ent://SD_ILS/0/SD_ILS:2331441
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
<a href="https://learning.oreilly.com/library/view/~/9781119795636">https://learning.oreilly.com/library/view/~/9781119795636</a>
<a href="https://learning.oreilly.com/library/view/~/9781119795636/?ar">https://learning.oreilly.com/library/view/~/9781119795636/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar">https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar</a><br/>Format: Electronic Resources<br/>
Real-world cryptography
ent://SD_ILS/0/SD_ILS:2332808
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Wong, David (Cryptography engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617296710AU">https://learning.oreilly.com/library/view/~/9781617296710AU</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710AU/?ar">https://learning.oreilly.com/library/view/~/9781617296710AU/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar</a><br/>Format: Sound recording<br/>
Intro to secure application deployment with Istio on Kubernetes.
ent://SD_ILS/0/SD_ILS:2332181
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Poddar, Neeraj, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202219">https://learning.oreilly.com/videos/~/10000MNHV202219</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202219/?ar">https://learning.oreilly.com/videos/~/10000MNHV202219/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar</a><br/>Format: Video recording<br/>
Kubernetes security : attacking and defending Kubernetes
ent://SD_ILS/0/SD_ILS:2333386
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Martin, Andrew, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920668794/?ar">https://go.oreilly.com/library-access/library/view/-/0636920668794/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920668794/?ar">https://learning.oreilly.com/videos/~/0636920668794/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920668794">https://learning.oreilly.com/videos/~/0636920668794</a><br/>Format: Video recording<br/>
Cyber security on Azure : an it professional's guide to Microsoft Azure security
ent://SD_ILS/0/SD_ILS:2327167
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484265314/?ar">https://learning.oreilly.com/library/view/~/9781484265314/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265314">https://learning.oreilly.com/library/view/~/9781484265314</a><br/>Format: Electronic Resources<br/>
Protective security : creating military-grade defenses for your digital business
ent://SD_ILS/0/SD_ILS:2328579
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Seaman, Jim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484269084">https://learning.oreilly.com/library/view/~/9781484269084</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269084/?ar">https://learning.oreilly.com/library/view/~/9781484269084/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar</a><br/>Format: Electronic Resources<br/>
Malware Analysis Techniques : Tricks for the Triage of Adversarial Software.
ent://SD_ILS/0/SD_ILS:2329154
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Barker, Dylan.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212277">https://learning.oreilly.com/library/view/~/9781839212277</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212277/?ar">https://learning.oreilly.com/library/view/~/9781839212277/?ar</a><br/>Format: Electronic Resources<br/>
You can stop stupid : stopping losses from accidental and malicious actions
ent://SD_ILS/0/SD_ILS:2328968
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469078045">https://learning.oreilly.com/library/view/~/9781469078045</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469078045/?ar">https://go.oreilly.com/library-access/library/view/-/9781469078045/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469078045/?ar">https://learning.oreilly.com/library/view/~/9781469078045/?ar</a><br/>Format: Sound recording<br/>
Real-world cryptography
ent://SD_ILS/0/SD_ILS:2330383
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Wong, David (Cryptography engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710">https://learning.oreilly.com/library/view/~/9781617296710</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710/?ar">https://learning.oreilly.com/library/view/~/9781617296710/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity Manager's Guide
ent://SD_ILS/0/SD_ILS:2327020
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Barnum, Todd.<br/><a href="https://learning.oreilly.com/library/view/~/9781492076209">https://learning.oreilly.com/library/view/~/9781492076209</a>
<a href="https://learning.oreilly.com/library/view/~/9781492076209/?ar">https://learning.oreilly.com/library/view/~/9781492076209/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar">https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar</a><br/>Format: Electronic Resources<br/>
Red Hat and IT security : with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditing
ent://SD_ILS/0/SD_ILS:2326514
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Chatterjee, Rithik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484264348">https://learning.oreilly.com/library/view/~/9781484264348</a>
<a href="https://learning.oreilly.com/library/view/~/9781484264348/?ar">https://learning.oreilly.com/library/view/~/9781484264348/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar">https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar</a><br/>Format: Electronic Resources<br/>
Choose your InfoSec path : an interactive cybersecurity adventure for beginners
ent://SD_ILS/0/SD_ILS:2328990
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Roxon, Alexander J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484270363">https://learning.oreilly.com/library/view/~/9781484270363</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270363/?ar">https://learning.oreilly.com/library/view/~/9781484270363/?ar</a><br/>Format: Electronic Resources<br/>
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests.
ent://SD_ILS/0/SD_ILS:2329571
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Chapple, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781119787631">https://learning.oreilly.com/library/view/~/9781119787631</a>
<a href="https://learning.oreilly.com/library/view/~/9781119787631/?ar">https://learning.oreilly.com/library/view/~/9781119787631/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119787631/?ar">https://go.oreilly.com/library-access/library/view/-/9781119787631/?ar</a><br/>Format: Electronic Resources<br/>
Implementing identity management on AWS : a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments
ent://SD_ILS/0/SD_ILS:2330023
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Lehtinen, Jon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800562288">https://learning.oreilly.com/library/view/~/9781800562288</a>
<a href="https://learning.oreilly.com/library/view/~/9781800562288/?ar">https://learning.oreilly.com/library/view/~/9781800562288/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar">https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar</a><br/>Format: Electronic Resources<br/>
Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browser
ent://SD_ILS/0/SD_ILS:2331570
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Segala, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar">https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801075336/?ar">https://learning.oreilly.com/library/view/~/9781801075336/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801075336">https://learning.oreilly.com/library/view/~/9781801075336</a><br/>Format: Electronic Resources<br/>
Certified ethical hacker (CEH) complete video course
ent://SD_ILS/0/SD_ILS:2332146
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar">https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137446797/?ar">https://learning.oreilly.com/videos/~/9780137446797/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137446797">https://learning.oreilly.com/videos/~/9780137446797</a><br/>Format: Video recording<br/>
Real-world cryptography
ent://SD_ILS/0/SD_ILS:2332150
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Wong, David, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781617296710VE">https://learning.oreilly.com/videos/~/9781617296710VE</a>
<a href="https://learning.oreilly.com/videos/~/9781617296710VE/?ar">https://learning.oreilly.com/videos/~/9781617296710VE/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar</a><br/>Format: Video recording<br/>
Cybersecurity ABCs : delivering awareness, behaviours and culture change
ent://SD_ILS/0/SD_ILS:2333926
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Barker, Jessica (Cyber security), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780174266/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174266/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780174266/?ar">https://learning.oreilly.com/library/view/~/9781780174266/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780174266">https://learning.oreilly.com/library/view/~/9781780174266</a><br/>Format: Electronic Resources<br/>
Information Risk Management A practitioner's guide
ent://SD_ILS/0/SD_ILS:2330297
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Sutton, David author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175751">https://learning.oreilly.com/library/view/~/9781780175751</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175751/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175751/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175751/?ar">https://learning.oreilly.com/library/view/~/9781780175751/?ar</a><br/>Format: Electronic Resources<br/>
Threat modeling a practical guide for developing teams
ent://SD_ILS/0/SD_ILS:2331156
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Tarandach, Izar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056546/?ar">https://learning.oreilly.com/library/view/~/9781492056546/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492056546">https://learning.oreilly.com/library/view/~/9781492056546</a><br/>Format: Electronic Resources<br/>
Enterprise DevOps for Architects
ent://SD_ILS/0/SD_ILS:2330978
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Mulder, Jeroen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801812153">https://learning.oreilly.com/library/view/~/9781801812153</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812153/?ar">https://learning.oreilly.com/library/view/~/9781801812153/?ar</a><br/>Format: Electronic Resources<br/>
Getting Started with z/OS Data Set Encryption
ent://SD_ILS/0/SD_ILS:2331252
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format: Electronic Resources<br/>
Crypto
ent://SD_ILS/0/SD_ILS:2331323
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Levy, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar">https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781666117615">https://learning.oreilly.com/library/view/~/9781666117615</a>
<a href="https://learning.oreilly.com/library/view/~/9781666117615/?ar">https://learning.oreilly.com/library/view/~/9781666117615/?ar</a><br/>Format: Electronic Resources<br/>
Alice and Bob learn application security.
ent://SD_ILS/0/SD_ILS:2325958
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Janca, Tanya.<br/><a href="https://learning.oreilly.com/library/view/~/9781119687351">https://learning.oreilly.com/library/view/~/9781119687351</a>
<a href="https://learning.oreilly.com/library/view/~/9781119687351/?ar">https://learning.oreilly.com/library/view/~/9781119687351/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar">https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar</a><br/>Format: Electronic Resources<br/>
Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering (CCE)
ent://SD_ILS/0/SD_ILS:2326323
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Bochman, Andrew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781000292978/?ar">https://go.oreilly.com/library-access/library/view/-/9781000292978/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000292978/?ar">https://learning.oreilly.com/library/view/~/9781000292978/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000292978">https://learning.oreilly.com/library/view/~/9781000292978</a><br/>Format: Electronic Resources<br/>
Cyberjutsu : cybersecurity for the modern ninja
ent://SD_ILS/0/SD_ILS:2326541
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format: Electronic Resources<br/>
Android software internals quick reference : a field manual and security reference guide to Java-based Android components
ent://SD_ILS/0/SD_ILS:2328407
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Stevenson, James, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269145/?ar">https://learning.oreilly.com/library/view/~/9781484269145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269145">https://learning.oreilly.com/library/view/~/9781484269145</a><br/>Format: Electronic Resources<br/>
Cybersecurity in the COVID-19 pandemic
ent://SD_ILS/0/SD_ILS:2327730
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Okereafor, Kenneth, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781000357653/?ar">https://learning.oreilly.com/library/view/~/9781000357653/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar">https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000357653">https://learning.oreilly.com/library/view/~/9781000357653</a><br/>Format: Electronic Resources<br/>
Authentication and access control : practical cryptography methods and tools
ent://SD_ILS/0/SD_ILS:2327123
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Boonkrong, Sirapat, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265703">https://learning.oreilly.com/library/view/~/9781484265703</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265703/?ar">https://learning.oreilly.com/library/view/~/9781484265703/?ar</a><br/>Format: Electronic Resources<br/>
Demystifying Internet of Things security : successful IoT device/edge and platform security deployment
ent://SD_ILS/0/SD_ILS:2321696
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Cheruvu, Sunil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484228968/?ar">https://learning.oreilly.com/library/view/~/9781484228968/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228968">https://learning.oreilly.com/library/view/~/9781484228968</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484228968/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228968/?ar</a><br/>Format: Electronic Resources<br/>
Building secure firmware : armoring the foundation of the platform
ent://SD_ILS/0/SD_ILS:2326020
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Yao, Jiewen.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261064">https://learning.oreilly.com/library/view/~/9781484261064</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261064/?ar">https://learning.oreilly.com/library/view/~/9781484261064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar</a><br/>Format: Electronic Resources<br/>
Advanced API Security : OAuth 2. 0 and Beyond
ent://SD_ILS/0/SD_ILS:2322734
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Siriwardena, Prabath.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220504">https://learning.oreilly.com/library/view/~/9781484220504</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220504/?ar">https://learning.oreilly.com/library/view/~/9781484220504/?ar</a><br/>Format: Electronic Resources<br/>
Identity attack vectors : implementing an effective identity and access management solution
ent://SD_ILS/0/SD_ILS:2322737
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484251652/?ar">https://learning.oreilly.com/library/view/~/9781484251652/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484251652">https://learning.oreilly.com/library/view/~/9781484251652</a><br/>Format: Electronic Resources<br/>
Temenos on IBM LinuxONE Best Practices Guide
ent://SD_ILS/0/SD_ILS:2323440
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Coble, Deana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458458">https://learning.oreilly.com/library/view/~/9780738458458</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458458/?ar">https://learning.oreilly.com/library/view/~/9780738458458/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar</a><br/>Format: Electronic Resources<br/>
IBM Security Key Lifecycle Manager
ent://SD_ILS/0/SD_ILS:2323982
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Chen, An, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458786/?ar">https://learning.oreilly.com/library/view/~/9780738458786/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458786">https://learning.oreilly.com/library/view/~/9780738458786</a><br/>Format: Electronic Resources<br/>
PCI DSS : an integrated data security standard guide
ent://SD_ILS/0/SD_ILS:2324386
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Seaman, Jim.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258088">https://learning.oreilly.com/library/view/~/9781484258088</a>
<a href="https://learning.oreilly.com/library/view/~/9781484258088/?ar">https://learning.oreilly.com/library/view/~/9781484258088/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar</a><br/>Format: Electronic Resources<br/>
Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware
ent://SD_ILS/0/SD_ILS:2325847
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Mohanta, Abhijit.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261934">https://learning.oreilly.com/library/view/~/9781484261934</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261934/?ar">https://learning.oreilly.com/library/view/~/9781484261934/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar</a><br/>Format: Electronic Resources<br/>
Hacking : der umfassende Praxis-Guide: inkl. Prüfungsvorbereitung zum CEHv10
ent://SD_ILS/0/SD_ILS:2325946
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Amberg, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206/?ar">https://learning.oreilly.com/library/view/~/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206">https://learning.oreilly.com/library/view/~/9783958452206</a><br/>Format: Electronic Resources<br/>
CompTIA security+ certification study guide : network security essentials
ent://SD_ILS/0/SD_ILS:2325812
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Sheikh, Ahmed F.<br/><a href="https://learning.oreilly.com/library/view/~/9781484262344">https://learning.oreilly.com/library/view/~/9781484262344</a>
<a href="https://learning.oreilly.com/library/view/~/9781484262344/?ar">https://learning.oreilly.com/library/view/~/9781484262344/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484262344/?ar">https://go.oreilly.com/library-access/library/view/-/9781484262344/?ar</a><br/>Format: Electronic Resources<br/>
CCISO Certified Chief Information Security Officer All-In-One Exam Guide.
ent://SD_ILS/0/SD_ILS:2326527
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Bennett, Steve.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260463934/?ar">https://go.oreilly.com/library-access/library/view/-/9781260463934/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260463934/?ar">https://learning.oreilly.com/library/view/~/9781260463934/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260463934">https://learning.oreilly.com/library/view/~/9781260463934</a><br/>Format: Electronic Resources<br/>
Exposed : how revealing your data and eliminating privacy increases trust and liberates humanity
ent://SD_ILS/0/SD_ILS:2326413
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a>
<a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format: Electronic Resources<br/>
SECURING CLOUD SERVICES;A PRAGMATIC APPROACH, SECOND EDITION.
ent://SD_ILS/0/SD_ILS:2328081
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by LEE NEWCOMBE.<br/><a href="https://learning.oreilly.com/library/view/~/9781787782075">https://learning.oreilly.com/library/view/~/9781787782075</a>
<a href="https://learning.oreilly.com/library/view/~/9781787782075/?ar">https://learning.oreilly.com/library/view/~/9781787782075/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar">https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar</a><br/>Format: Electronic Resources<br/>
CompTIA Security+ SY0-601 Certification Guide - Second Edition
ent://SD_ILS/0/SD_ILS:2327971
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Neil, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781800564244">https://learning.oreilly.com/library/view/~/9781800564244</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar">https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800564244/?ar">https://learning.oreilly.com/library/view/~/9781800564244/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2322053
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity threats, malware trends, and strategies : mitigate exploits, malware, phishing, and other social engineering attacks
ent://SD_ILS/0/SD_ILS:2324609
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Rains, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800206014/?ar">https://learning.oreilly.com/library/view/~/9781800206014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800206014">https://learning.oreilly.com/library/view/~/9781800206014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar">https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar</a><br/>Format: Electronic Resources<br/>
DevSecOps for .NET core : securing modern software applications
ent://SD_ILS/0/SD_ILS:2324612
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Zeeshan, Afzaal Ahmad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258507/?ar">https://learning.oreilly.com/library/view/~/9781484258507/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484258507">https://learning.oreilly.com/library/view/~/9781484258507</a><br/>Format: Electronic Resources<br/>
Data privacy and GDPR handbook
ent://SD_ILS/0/SD_ILS:2322558
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Sharma, Sanjay (Financial executive), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119594246">https://learning.oreilly.com/library/view/~/9781119594246</a>
<a href="https://learning.oreilly.com/library/view/~/9781119594246/?ar">https://learning.oreilly.com/library/view/~/9781119594246/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar">https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar</a><br/>Format: Electronic Resources<br/>
Incident response primer : how to keep from getting pwned too hard
ent://SD_ILS/0/SD_ILS:2323316
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format: Electronic Resources<br/>
Mastering Linux Security and Hardening - Second Edition
ent://SD_ILS/0/SD_ILS:2324167
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Tevault, Donald A.<br/><a href="https://learning.oreilly.com/library/view/~/9781838981778/?ar">https://learning.oreilly.com/library/view/~/9781838981778/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar">https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838981778">https://learning.oreilly.com/library/view/~/9781838981778</a><br/>Format: Electronic Resources<br/>
PoC GTFO. Volume III
ent://SD_ILS/0/SD_ILS:2327149
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Laphroaig, Manul.<br/><a href="https://learning.oreilly.com/library/view/~/9781098125691/?ar">https://learning.oreilly.com/library/view/~/9781098125691/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125691">https://learning.oreilly.com/library/view/~/9781098125691</a><br/>Format: Electronic Resources<br/>
The Cyber Security Handbook - Prepare for, Respond to and Recover from Cyber Attacks
ent://SD_ILS/0/SD_ILS:2327150
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Calder, Alan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787782624/?ar">https://go.oreilly.com/library-access/library/view/-/9781787782624/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787782624">https://learning.oreilly.com/library/view/~/9781787782624</a>
<a href="https://learning.oreilly.com/library/view/~/9781787782624/?ar">https://learning.oreilly.com/library/view/~/9781787782624/?ar</a><br/>Format: Electronic Resources<br/>
Penetration Testing For Dummies
ent://SD_ILS/0/SD_ILS:2327218
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Shimonski, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119577485/?ar">https://learning.oreilly.com/library/view/~/9781119577485/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119577485/?ar">https://go.oreilly.com/library-access/library/view/-/9781119577485/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119577485">https://learning.oreilly.com/library/view/~/9781119577485</a><br/>Format: Electronic Resources<br/>
Cloud Computing Security, 2nd Edition
ent://SD_ILS/0/SD_ILS:2331101
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>
Designing a HIPAA-compliant security operations center : a guide to detecting and responding to healthcare breaches and events
ent://SD_ILS/0/SD_ILS:2323333
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Thompson, Eric C.<br/><a href="https://learning.oreilly.com/library/view/~/9781484256084">https://learning.oreilly.com/library/view/~/9781484256084</a>
<a href="https://learning.oreilly.com/library/view/~/9781484256084/?ar">https://learning.oreilly.com/library/view/~/9781484256084/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar</a><br/>Format: Electronic Resources<br/>
Build Your Own Cybersecurity Testing Lab : Low-cost Solutions for Testing in Virtual and Cloud-based Environments
ent://SD_ILS/0/SD_ILS:2323438
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260458329">https://learning.oreilly.com/library/view/~/9781260458329</a>
<a href="https://learning.oreilly.com/library/view/~/9781260458329/?ar">https://learning.oreilly.com/library/view/~/9781260458329/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar">https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar</a><br/>Format: Electronic Resources<br/>
Cyber Warfare - Truth, Tactics, and Strategies
ent://SD_ILS/0/SD_ILS:2323667
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format: Electronic Resources<br/>
Data breaches : crisis and opportunity
ent://SD_ILS/0/SD_ILS:2322222
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format: Electronic Resources<br/>
IT auditing : using controls to protect information assets
ent://SD_ILS/0/SD_ILS:2322126
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Kegerreis, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260453232/?ar">https://learning.oreilly.com/library/view/~/9781260453232/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar">https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar</a><br/>Format: Electronic Resources<br/>
Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu
ent://SD_ILS/0/SD_ILS:2332657
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format: Electronic Resources<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:2322826
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781119560265">https://learning.oreilly.com/library/view/~/9781119560265</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560265/?ar">https://learning.oreilly.com/library/view/~/9781119560265/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity for dummies
ent://SD_ILS/0/SD_ILS:2322839
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560326/?ar">https://learning.oreilly.com/library/view/~/9781119560326/?ar</a><br/>Format: Electronic Resources<br/>
Protecting Data Privacy Beyond the Trusted System of Record
ent://SD_ILS/0/SD_ILS:2323918
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format: Electronic Resources<br/>
Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
ent://SD_ILS/0/SD_ILS:2324802
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format: Electronic Resources<br/>
Generative malware outbreak detection
ent://SD_ILS/0/SD_ILS:2325158
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Park, Sean, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar">https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452/?ar">https://learning.oreilly.com/videos/~/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452">https://learning.oreilly.com/videos/~/0636920373452</a><br/>Format: Electronic Resources<br/>
Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity
ent://SD_ILS/0/SD_ILS:2325451
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Carey, Marcus J. (Cybersecurity professional)<br/><a href="https://learning.oreilly.com/library/view/~/9781119643418">https://learning.oreilly.com/library/view/~/9781119643418</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643418/?ar">https://learning.oreilly.com/library/view/~/9781119643418/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar</a><br/>Format: Electronic Resources<br/>
Hands on hacking
ent://SD_ILS/0/SD_ILS:2325452
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format: Electronic Resources<br/>
Decoding blockchain for business : understand the tech and prepare for the blockchain future
ent://SD_ILS/0/SD_ILS:2325462
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Hijfte, Stijn van, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261378/?ar">https://learning.oreilly.com/library/view/~/9781484261378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261378">https://learning.oreilly.com/library/view/~/9781484261378</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261378/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261378/?ar</a><br/>Format: Electronic Resources<br/>
Encryption for organizations and individuals : basics of contemporary and quantum cryptography
ent://SD_ILS/0/SD_ILS:2325463
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Ciesla, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260562">https://learning.oreilly.com/library/view/~/9781484260562</a>
<a href="https://learning.oreilly.com/library/view/~/9781484260562/?ar">https://learning.oreilly.com/library/view/~/9781484260562/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar</a><br/>Format: Electronic Resources<br/>
Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies
ent://SD_ILS/0/SD_ILS:2325773
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Parker, Carey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261897">https://learning.oreilly.com/library/view/~/9781484261897</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261897/?ar">https://learning.oreilly.com/library/view/~/9781484261897/?ar</a><br/>Format: Electronic Resources<br/>
Mastering Windows security and hardening : secure and protect your Windows environment from intruders, malware attacks, and other cyber threats.
ent://SD_ILS/0/SD_ILS:2325966
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Dunkerley, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216411">https://learning.oreilly.com/library/view/~/9781839216411</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216411/?ar">https://learning.oreilly.com/library/view/~/9781839216411/?ar</a><br/>Format: Electronic Resources<br/>
Learn Kubernetes security : securely orchestrate, scale, and manage your microservices in Kubernetes deployments
ent://SD_ILS/0/SD_ILS:2325970
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Huang, Kaizhe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216503">https://learning.oreilly.com/library/view/~/9781839216503</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839216503/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216503/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216503/?ar">https://learning.oreilly.com/library/view/~/9781839216503/?ar</a><br/>Format: Electronic Resources<br/>
Security operations in practice
ent://SD_ILS/0/SD_ILS:2333929
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175089/?ar">https://learning.oreilly.com/library/view/~/9781780175089/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175089">https://learning.oreilly.com/library/view/~/9781780175089</a><br/>Format: Electronic Resources<br/>
Mission impossible : DevSecOps.
ent://SD_ILS/0/SD_ILS:2333679
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Kuenzli, Stephen, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202146/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202146/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202146">https://learning.oreilly.com/videos/~/10000MNLV202146</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202146/?ar">https://learning.oreilly.com/videos/~/10000MNLV202146/?ar</a><br/>Format: Video recording<br/>
JSON web tokens and alternatives.
ent://SD_ILS/0/SD_ILS:2332693
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Madden, Neil, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202163/?ar">https://learning.oreilly.com/videos/~/10000MNLV202163/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202163">https://learning.oreilly.com/videos/~/10000MNLV202163</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar</a><br/>Format: Video recording<br/>
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership
ent://SD_ILS/0/SD_ILS:2323589
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format: Electronic Resources<br/>
Cybersecurity for space : protecting the final frontier
ent://SD_ILS/0/SD_ILS:2323781
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Oakley, Jacob G.<br/><a href="https://learning.oreilly.com/library/view/~/9781484257326/?ar">https://learning.oreilly.com/library/view/~/9781484257326/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484257326/?ar">https://go.oreilly.com/library-access/library/view/-/9781484257326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484257326">https://learning.oreilly.com/library/view/~/9781484257326</a><br/>Format: Electronic Resources<br/>
Security engineering 101 : when good design and security work together
ent://SD_ILS/0/SD_ILS:2324433
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Everette, Wendy Knox, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920342960/?ar">https://go.oreilly.com/library-access/library/view/-/0636920342960/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920342960/?ar">https://learning.oreilly.com/videos/~/0636920342960/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920342960">https://learning.oreilly.com/videos/~/0636920342960</a><br/>Format: Electronic Resources<br/>
Rational cybersecurity for business : the security leaders' guide to business alignment
ent://SD_ILS/0/SD_ILS:2325488
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Blum, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781484259528">https://learning.oreilly.com/library/view/~/9781484259528</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259528/?ar">https://learning.oreilly.com/library/view/~/9781484259528/?ar</a><br/>Format: Electronic Resources<br/>
Mastering VMware NSX for vSphere
ent://SD_ILS/0/SD_ILS:2327302
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119513544">https://learning.oreilly.com/library/view/~/9781119513544</a>
<a href="https://learning.oreilly.com/library/view/~/9781119513544/?ar">https://learning.oreilly.com/library/view/~/9781119513544/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar">https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar</a><br/>Format: Electronic Resources<br/>
Rootkits and bootkits : reversing modern malware and next generation threats
ent://SD_ILS/0/SD_ILS:2314357
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Matrosov, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492071259/?ar">https://learning.oreilly.com/library/view/~/9781492071259/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar">https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492071259">https://learning.oreilly.com/library/view/~/9781492071259</a><br/>Format: Electronic Resources<br/>
Securing your cloud : IBM security for LinuxONE
ent://SD_ILS/0/SD_ILS:2321597
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Alves, Edi Lopes, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457949/?ar">https://learning.oreilly.com/library/view/~/9780738457949/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar</a><br/>Format: Electronic Resources<br/>
Computer security : art and science
ent://SD_ILS/0/SD_ILS:2318452
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format: Electronic Resources<br/>
Dynamic SQL : applications, performance, and security in Microsoft SQL server
ent://SD_ILS/0/SD_ILS:2318295
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Pollack, Edward, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243183/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243183/?ar">https://learning.oreilly.com/library/view/~/9781484243183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243183">https://learning.oreilly.com/library/view/~/9781484243183</a><br/>Format: Electronic Resources<br/>
Threat and vulnerability assessment for enterprises
ent://SD_ILS/0/SD_ILS:2319277
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781838559205/?ar">https://learning.oreilly.com/videos/~/9781838559205/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar">https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar</a><br/>Format: Electronic Resources<br/>
Cyber operations : building, defending, and attacking modern computer networks
ent://SD_ILS/0/SD_ILS:2318914
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by O'Leary, Mike, 1968- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242940">https://learning.oreilly.com/library/view/~/9781484242940</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242940/?ar">https://learning.oreilly.com/library/view/~/9781484242940/?ar</a><br/>Format: Electronic Resources<br/>
Digital forensics basics : a practical guide using Windows OS
ent://SD_ILS/0/SD_ILS:2319813
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Hassan, Nihad A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238387/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238387/?ar">https://learning.oreilly.com/library/view/~/9781484238387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238387">https://learning.oreilly.com/library/view/~/9781484238387</a><br/>Format: Electronic Resources<br/>
Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity
ent://SD_ILS/0/SD_ILS:2321448
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643326">https://learning.oreilly.com/library/view/~/9781119643326</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643326/?ar">https://learning.oreilly.com/library/view/~/9781119643326/?ar</a><br/>Format: Electronic Resources<br/>
Exam ref MS-101 Microsoft 365 Mobility and Security
ent://SD_ILS/0/SD_ILS:2321271
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Svidergol, Brian, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135574843/?ar">https://go.oreilly.com/library-access/library/view/-/9780135574843/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135574843/?ar">https://learning.oreilly.com/library/view/~/9780135574843/?ar</a><br/>Format: Electronic Resources<br/>
Tribe of hackers : cybersecurity advice from the best hackers in the world
ent://SD_ILS/0/SD_ILS:2321452
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format: Electronic Resources<br/>
Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessons
ent://SD_ILS/0/SD_ILS:2321550
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity for dummies
ent://SD_ILS/0/SD_ILS:2322747
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781494542450">https://learning.oreilly.com/library/view/~/9781494542450</a>
<a href="https://learning.oreilly.com/library/view/~/9781494542450/?ar">https://learning.oreilly.com/library/view/~/9781494542450/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar">https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar</a><br/>Format: Electronic Resources<br/>
System administration ethics : ten commandments for security and compliance in a modern cyber world
ent://SD_ILS/0/SD_ILS:2322866
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Ljubuncic, Igor, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249888/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249888/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484249888/?ar">https://learning.oreilly.com/library/view/~/9781484249888/?ar</a><br/>Format: Electronic Resources<br/>
Security principles for the working architect
ent://SD_ILS/0/SD_ILS:2322691
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Woods, Eoin, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338215/?ar">https://learning.oreilly.com/videos/~/0636920338215/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920338215">https://learning.oreilly.com/videos/~/0636920338215</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar</a><br/>Format: Electronic Resources<br/>
Practical cyber forensics : an incident-based approach to forensic investigations
ent://SD_ILS/0/SD_ILS:2321521
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format: Electronic Resources<br/>
Foundations of information security : a straightforward introduction
ent://SD_ILS/0/SD_ILS:2322313
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098122546/?ar">https://learning.oreilly.com/library/view/~/9781098122546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122546">https://learning.oreilly.com/library/view/~/9781098122546</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar</a><br/>Format: Electronic Resources<br/>
Oracle cloud user security : providing for separation of duties and appropriate access by job function.
ent://SD_ILS/0/SD_ILS:2322966
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Malcher, Michelle, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar">https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484255643/?ar">https://learning.oreilly.com/videos/~/9781484255643/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484255643">https://learning.oreilly.com/videos/~/9781484255643</a><br/>Format: Electronic Resources<br/>
Linux troubleshooting course with real life examples
ent://SD_ILS/0/SD_ILS:2323238
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format: Electronic Resources<br/>
Cyber-Vigilance and Digital Trust
ent://SD_ILS/0/SD_ILS:2324869
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Tounsi, Wiem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786304483">https://learning.oreilly.com/library/view/~/9781786304483</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304483/?ar">https://learning.oreilly.com/library/view/~/9781786304483/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar</a><br/>Format: Electronic Resources<br/>
Getting started with Linux on Z Encryption for data at-rest
ent://SD_ILS/0/SD_ILS:2321973
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738457468/?ar">https://learning.oreilly.com/library/view/~/9780738457468/?ar</a><br/>Format: Electronic Resources<br/>
Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments
ent://SD_ILS/0/SD_ILS:2322055
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format: Electronic Resources<br/>
Fraud detection without feature engineering
ent://SD_ILS/0/SD_ILS:2322434
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Vagata, Pamela, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540/?ar">https://learning.oreilly.com/videos/~/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540">https://learning.oreilly.com/videos/~/0636920339540</a><br/>Format: Electronic Resources<br/>
Penetration testing : a guide for business and it managers.
ent://SD_ILS/0/SD_ILS:2321708
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
<a href="https://learning.oreilly.com/library/view/~/9781780174082/?ar">https://learning.oreilly.com/library/view/~/9781780174082/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780174082/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174082/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780174082">https://learning.oreilly.com/library/view/~/9781780174082</a><br/>Format: Electronic Resources<br/>
Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
ent://SD_ILS/0/SD_ILS:2321510
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Parisi, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789804027/?ar">https://go.oreilly.com/library-access/library/view/-/9781789804027/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789804027">https://learning.oreilly.com/library/view/~/9781789804027</a>
<a href="https://learning.oreilly.com/library/view/~/9781789804027/?ar">https://learning.oreilly.com/library/view/~/9781789804027/?ar</a><br/>Format: Electronic Resources<br/>
Solving identity management in modern applications : demystifying OAuth 2.0, OpenID Connect, and SAML 2.0
ent://SD_ILS/0/SD_ILS:2322723
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Wilson, Yvonne.<br/><a href="https://learning.oreilly.com/library/view/~/9781484250952/?ar">https://learning.oreilly.com/library/view/~/9781484250952/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484250952">https://learning.oreilly.com/library/view/~/9781484250952</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar</a><br/>Format: Electronic Resources<br/>
How to build privacy and security into deep learning models
ent://SD_ILS/0/SD_ILS:2322791
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format: Electronic Resources<br/>
Serverless security : protect functions using the CLAD security model
ent://SD_ILS/0/SD_ILS:2323066
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar">https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538/?ar">https://learning.oreilly.com/library/view/~/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538">https://learning.oreilly.com/library/view/~/9781492082538</a><br/>Format: Electronic Resources<br/>
Cybersecurity - Attack and Defense Strategies - Second Edition
ent://SD_ILS/0/SD_ILS:2323102
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar">https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838827793/?ar">https://learning.oreilly.com/library/view/~/9781838827793/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838827793">https://learning.oreilly.com/library/view/~/9781838827793</a><br/>Format: Electronic Resources<br/>
Cyber smart : five habits to protect your family, money, and identity from cyber criminals
ent://SD_ILS/0/SD_ILS:2318868
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by McDonough, Bart R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469071503/?ar">https://learning.oreilly.com/library/view/~/9781469071503/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar">https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469071503">https://learning.oreilly.com/library/view/~/9781469071503</a><br/>Format: Sound recording<br/>
Informationssicherheit und Datenschutz : Handbuch für Praktiker und Begleitbuch zum T.I.S.P.
ent://SD_ILS/0/SD_ILS:2322189
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Domnick, André, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar">https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098123659/?ar">https://learning.oreilly.com/library/view/~/9781098123659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098123659">https://learning.oreilly.com/library/view/~/9781098123659</a><br/>Format: Electronic Resources<br/>
Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your data
ent://SD_ILS/0/SD_ILS:2322204
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Chakrabarty, Boudhayan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458014/?ar">https://learning.oreilly.com/library/view/~/9780738458014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458014">https://learning.oreilly.com/library/view/~/9780738458014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar</a><br/>Format: Electronic Resources<br/>
Mastering Malware Analysis : the Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks.
ent://SD_ILS/0/SD_ILS:2320922
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Kleymenov, Alexey.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar">https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789610789">https://learning.oreilly.com/library/view/~/9781789610789</a>
<a href="https://learning.oreilly.com/library/view/~/9781789610789/?ar">https://learning.oreilly.com/library/view/~/9781789610789/?ar</a><br/>Format: Electronic Resources<br/>
The cybersecurity playbook : how every leader and employee can contribute to a culture of security
ent://SD_ILS/0/SD_ILS:2321568
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Cerra, Allison, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar">https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196/?ar">https://learning.oreilly.com/library/view/~/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196">https://learning.oreilly.com/library/view/~/9781119442196</a><br/>Format: Electronic Resources<br/>
Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud
ent://SD_ILS/0/SD_ILS:2321488
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Berkouwer, Sander, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806984">https://learning.oreilly.com/library/view/~/9781789806984</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806984/?ar">https://learning.oreilly.com/library/view/~/9781789806984/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar</a><br/>Format: Electronic Resources<br/>
Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing
ent://SD_ILS/0/SD_ILS:2319847
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format: Electronic Resources<br/>
The art of hacking (video collection)
ent://SD_ILS/0/SD_ILS:2319884
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar">https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780135767849/?ar">https://learning.oreilly.com/videos/~/9780135767849/?ar</a><br/>Format: Electronic Resources<br/>
Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization
ent://SD_ILS/0/SD_ILS:2318938
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134807614/?ar">https://learning.oreilly.com/library/view/~/9780134807614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807614">https://learning.oreilly.com/library/view/~/9780134807614</a><br/>Format: Electronic Resources<br/>
Professional Red teaming : conducting successful cybersecurity engagements
ent://SD_ILS/0/SD_ILS:2318977
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Oakley, Jacob G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243091/?ar">https://learning.oreilly.com/library/view/~/9781484243091/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243091">https://learning.oreilly.com/library/view/~/9781484243091</a><br/>Format: Electronic Resources<br/>
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
ent://SD_ILS/0/SD_ILS:2319534
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a>
<a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Enterprise Mobility and Security training
ent://SD_ILS/0/SD_ILS:2319556
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format: Electronic Resources<br/>
Cyber resiliency solution for IBM Spectrum Scale
ent://SD_ILS/0/SD_ILS:2322145
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by IBM Storage Team, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457963/?ar">https://learning.oreilly.com/library/view/~/9780738457963/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on cryptography with Java
ent://SD_ILS/0/SD_ILS:2319124
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Costlow, Erik, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar">https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838554972/?ar">https://learning.oreilly.com/videos/~/9781838554972/?ar</a><br/>Format: Electronic Resources<br/>
Digital asset valuation and cyber risk measurement : principles of cybernomics
ent://SD_ILS/0/SD_ILS:2320462
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Ruan, Keyun, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128123287">https://learning.oreilly.com/library/view/~/9780128123287</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128123287/?ar">https://go.oreilly.com/library-access/library/view/-/9780128123287/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128123287/?ar">https://learning.oreilly.com/library/view/~/9780128123287/?ar</a><br/>Format: Electronic Resources<br/>
Penetration Testing mit mimikatz : Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführen
ent://SD_ILS/0/SD_ILS:2321348
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958459700">https://learning.oreilly.com/library/view/~/9783958459700</a>
<a href="https://learning.oreilly.com/library/view/~/9783958459700/?ar">https://learning.oreilly.com/library/view/~/9783958459700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar">https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar</a><br/>Format: Electronic Resources<br/>
Becoming the hacker : the playbook for getting inside the mind of an attacker
ent://SD_ILS/0/SD_ILS:2319129
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Electronic Resources<br/>
PowerShell and Python together : targeting digital investigations
ent://SD_ILS/0/SD_ILS:2319183
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Hosmer, Chet, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484245040/?ar">https://learning.oreilly.com/library/view/~/9781484245040/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484245040">https://learning.oreilly.com/library/view/~/9781484245040</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484245040/?ar">https://go.oreilly.com/library-access/library/view/-/9781484245040/?ar</a><br/>Format: Electronic Resources<br/>
Linux essentials for cybersecurity lab manual
ent://SD_ILS/0/SD_ILS:2317558
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format: Electronic Resources<br/>
Data analytics for IT networks : developing innovative use cases
ent://SD_ILS/0/SD_ILS:2317559
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format: Electronic Resources<br/>
Security with AI and machine learning : using advanced tools to improve application security at the edge
ent://SD_ILS/0/SD_ILS:2319058
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format: Electronic Resources<br/>
Cybersecurity Ops with bash : attack, defend, and analyze from the command line
ent://SD_ILS/0/SD_ILS:2319252
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format: Electronic Resources<br/>
Practical security : simple practices for defending your systems
ent://SD_ILS/0/SD_ILS:2319402
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Zabicki, Roman, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar">https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679">https://learning.oreilly.com/library/view/~/9781680506679</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679/?ar">https://learning.oreilly.com/library/view/~/9781680506679/?ar</a><br/>Format: Electronic Resources<br/>
Learning Python for forensics : leverage the power of Python in forensic investigations
ent://SD_ILS/0/SD_ILS:2319116
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format: Electronic Resources<br/>
Linux basics for hackers : getting started with networking, scripting, and security in Kali
ent://SD_ILS/0/SD_ILS:2318554
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by OccupyTheWeb, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492069485/?ar">https://learning.oreilly.com/library/view/~/9781492069485/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492069485">https://learning.oreilly.com/library/view/~/9781492069485</a><br/>Format: Electronic Resources<br/>
The Iot hacker's handbook : a practical guide to hacking the internet of things
ent://SD_ILS/0/SD_ILS:2319197
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Gupta, Aditya.<br/><a href="https://learning.oreilly.com/library/view/~/9781484243008">https://learning.oreilly.com/library/view/~/9781484243008</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243008/?ar">https://learning.oreilly.com/library/view/~/9781484243008/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243008/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243008/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:2319220
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Tanner, Nadean H., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar">https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119552932/?ar">https://learning.oreilly.com/library/view/~/9781119552932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119552932">https://learning.oreilly.com/library/view/~/9781119552932</a><br/>Format: Electronic Resources<br/>
Web hacking : become a professional web pentester
ent://SD_ILS/0/SD_ILS:2319831
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format: Electronic Resources<br/>
Zabbix 4 network monitoring : monitor the performance of your network devices and applications using the all-new Zabbix 4.0
ent://SD_ILS/0/SD_ILS:2319010
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Uytterhoeven, Patrik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340266/?ar">https://learning.oreilly.com/library/view/~/9781789340266/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar</a><br/>Format: Electronic Resources<br/>
My online privacy for seniors
ent://SD_ILS/0/SD_ILS:2319412
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Rich, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135381281/?ar">https://learning.oreilly.com/library/view/~/9780135381281/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar">https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on Spring security 5.1.1
ent://SD_ILS/0/SD_ILS:2319110
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Lelek, Tomasz, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789802931/?ar">https://learning.oreilly.com/videos/~/9781789802931/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789802931/?ar">https://go.oreilly.com/library-access/library/view/-/9781789802931/?ar</a><br/>Format: Electronic Resources<br/>
Practical cloud security.
ent://SD_ILS/0/SD_ILS:2334616
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Dotson, Chris, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar">https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727">https://learning.oreilly.com/videos/~/9781492060727</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727/?ar">https://learning.oreilly.com/videos/~/9781492060727/?ar</a><br/>Format: Video recording<br/>
Qi ye shen tou ce shi he chi xu jian kong.
ent://SD_ILS/0/SD_ILS:2332289
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format: Video recording<br/>
We have root : even more advice from Schneier on security
ent://SD_ILS/0/SD_ILS:2321573
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643012">https://learning.oreilly.com/library/view/~/9781119643012</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643012/?ar">https://learning.oreilly.com/library/view/~/9781119643012/?ar</a><br/>Format: Electronic Resources<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:2321574
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Quade, Phil.<br/><a href="https://learning.oreilly.com/library/view/~/9781119617365">https://learning.oreilly.com/library/view/~/9781119617365</a>
<a href="https://learning.oreilly.com/library/view/~/9781119617365/?ar">https://learning.oreilly.com/library/view/~/9781119617365/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar">https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar</a><br/>Format: Electronic Resources<br/>
Beginning security with Microsoft technologies : protecting Office 365, devices, and data
ent://SD_ILS/0/SD_ILS:2322123
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Lakshmi, Vasantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484248539/?ar">https://learning.oreilly.com/library/view/~/9781484248539/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar">https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar</a><br/>Format: Electronic Resources<br/>
How cyber security can protect your business : a guide for all stakeholders
ent://SD_ILS/0/SD_ILS:2323060
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Wright, Christopher, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781979/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781979/?ar">https://learning.oreilly.com/library/view/~/9781787781979/?ar</a><br/>Format: Electronic Resources<br/>
Getting Started with Ghidra
ent://SD_ILS/0/SD_ILS:2322605
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar">https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265/?ar">https://learning.oreilly.com/library/view/~/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265">https://learning.oreilly.com/library/view/~/9781098115265</a><br/>Format: Electronic Resources<br/>
Getting Started with HashiCorp Vault
ent://SD_ILS/0/SD_ILS:2324062
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Krausen, Bryan, speaker.<br/><a href="https://learning.oreilly.com/videos/~/1018947658">https://learning.oreilly.com/videos/~/1018947658</a>
<a href="https://learning.oreilly.com/videos/~/1018947658/?ar">https://learning.oreilly.com/videos/~/1018947658/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1018947658/?ar">https://go.oreilly.com/library-access/library/view/-/1018947658/?ar</a><br/>Format: Electronic Resources<br/>
Machine Learning et sécurité
ent://SD_ILS/0/SD_ILS:2326075
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar">https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9782412043561">https://learning.oreilly.com/library/view/~/9782412043561</a>
<a href="https://learning.oreilly.com/library/view/~/9782412043561/?ar">https://learning.oreilly.com/library/view/~/9782412043561/?ar</a><br/>Format: Electronic Resources<br/>
Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacks
ent://SD_ILS/0/SD_ILS:2322400
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242551/?ar">https://learning.oreilly.com/library/view/~/9781484242551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242551">https://learning.oreilly.com/library/view/~/9781484242551</a><br/>Format: Electronic Resources<br/>
The Complete Ethical Hacking Course
ent://SD_ILS/0/SD_ILS:2323185
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format: Electronic Resources<br/>
Investigating Cryptocurrencies : Understanding, Extracting, and Analyzing Blockchain Evidence
ent://SD_ILS/0/SD_ILS:2325578
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Furneaux, Nick.<br/><a href="https://learning.oreilly.com/library/view/~/9781469076607/?ar">https://learning.oreilly.com/library/view/~/9781469076607/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469076607/?ar">https://go.oreilly.com/library-access/library/view/-/9781469076607/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469076607">https://learning.oreilly.com/library/view/~/9781469076607</a><br/>Format: Sound recording<br/>
The complete Metasploit guide : explore effective penetration testing techniques with Metasploit
ent://SD_ILS/0/SD_ILS:2327077
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477">https://learning.oreilly.com/library/view/~/9781838822477</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477/?ar">https://learning.oreilly.com/library/view/~/9781838822477/?ar</a><br/>Format: Electronic Resources<br/>
Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus
ent://SD_ILS/0/SD_ILS:2316700
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format: Electronic Resources<br/>
Cybersecurity essentials
ent://SD_ILS/0/SD_ILS:2322482
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Brooks, Charles J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119362395/?ar">https://learning.oreilly.com/library/view/~/9781119362395/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar">https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar</a><br/>Format: Electronic Resources<br/>
CompTIA security+ practice tests, exam SY0-501
ent://SD_ILS/0/SD_ILS:2322488
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Christy, S. Russell, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119416920/?ar">https://go.oreilly.com/library-access/library/view/-/9781119416920/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119416920/?ar">https://learning.oreilly.com/library/view/~/9781119416920/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119416920">https://learning.oreilly.com/library/view/~/9781119416920</a><br/>Format: Electronic Resources<br/>
Digital forensics and cyber crime with Kali Linux fundamentals
ent://SD_ILS/0/SD_ILS:2314043
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Muniz, Joseph, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar">https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134693644/?ar">https://learning.oreilly.com/videos/~/9780134693644/?ar</a><br/>Format: Electronic Resources<br/>
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
ent://SD_ILS/0/SD_ILS:2315032
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Wallace, Michael, 1960- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814438770/?ar">https://learning.oreilly.com/library/view/~/9780814438770/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar">https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar</a><br/>Format: Electronic Resources<br/>
Privileged attack vectors : building effective cyber-defense strategies to protect organizations
ent://SD_ILS/0/SD_ILS:2314870
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format: Electronic Resources<br/>
Security and privacy in cyber-physical systems : foundations, principles, and applications
ent://SD_ILS/0/SD_ILS:2316152
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format: Electronic Resources<br/>
Distributed Denial of Service (DDoS) : practical detection and defense
ent://SD_ILS/0/SD_ILS:2318176
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Chou, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar">https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492026181">https://learning.oreilly.com/library/view/~/9781492026181</a>
<a href="https://learning.oreilly.com/library/view/~/9781492026181/?ar">https://learning.oreilly.com/library/view/~/9781492026181/?ar</a><br/>Format: Electronic Resources<br/>
Ethical hacking : orchestrating attacks
ent://SD_ILS/0/SD_ILS:2318510
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Gupta, Sunil, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484243404/?ar">https://learning.oreilly.com/videos/~/9781484243404/?ar</a><br/>Format: Electronic Resources<br/>
Ethical hacking : networks and websites
ent://SD_ILS/0/SD_ILS:2318511
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243411/?ar">https://learning.oreilly.com/videos/~/9781484243411/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar</a><br/>Format: Electronic Resources<br/>
Threat hunting : a guide to proactive network defense
ent://SD_ILS/0/SD_ILS:2318444
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Collins, Michael (Michael Patrick), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028260/?ar">https://learning.oreilly.com/library/view/~/9781492028260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028260">https://learning.oreilly.com/library/view/~/9781492028260</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar</a><br/>Format: Electronic Resources<br/>
Network scanning cookbook : practical network security using Nmap and Nessus 7
ent://SD_ILS/0/SD_ILS:2317776
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format: Electronic Resources<br/>
Solving Cyber Risk : Protecting Your Company and Society.
ent://SD_ILS/0/SD_ILS:2318282
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Coburn, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781119490937">https://learning.oreilly.com/library/view/~/9781119490937</a>
<a href="https://learning.oreilly.com/library/view/~/9781119490937/?ar">https://learning.oreilly.com/library/view/~/9781119490937/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar">https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar</a><br/>Format: Electronic Resources<br/>
Practical internet of things security : design a security framework for an Internet connected ecosystem
ent://SD_ILS/0/SD_ILS:2318628
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625821/?ar">https://learning.oreilly.com/library/view/~/9781788625821/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar</a><br/>Format: Electronic Resources<br/>
Securing Office 365 : masterminding MDM and compliance in the cloud
ent://SD_ILS/0/SD_ILS:2318564
2024-09-27T09:44:15Z
2024-09-27T09:44:15Z
by Katzer, Matthew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484242308/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242308/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242308/?ar">https://learning.oreilly.com/library/view/~/9781484242308/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242308">https://learning.oreilly.com/library/view/~/9781484242308</a><br/>Format: Electronic Resources<br/>