Search Results for - Narrowed by: E-Book - 2014 - COMPUTERS -- Security -- General.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dITYPE$002509Material$002bType$0025091$00253AE-BOOKS$002509E-Book$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$0026ps$003d300?2024-06-25T21:27:59ZThe state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:23022342024-06-25T21:27:59Z2024-06-25T21:27:59Zby Pathan, Al-Sakib Khan, editor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482203523">https://learning.oreilly.com/library/view/~/9781482203523</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar">https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482203523/?ar">https://learning.oreilly.com/library/view/~/9781482203523/?ar</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:23032942024-06-25T21:27:59Z2024-06-25T21:27:59Zby Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format: Electronic Resources<br/>Advanced API security : securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWEent://SD_ILS/0/SD_ILS:23042762024-06-25T21:27:59Z2024-06-25T21:27:59Zby Siriwardena, Prabath, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430268178">https://learning.oreilly.com/library/view/~/9781430268178</a>
<a href="https://learning.oreilly.com/library/view/~/9781430268178/?ar">https://learning.oreilly.com/library/view/~/9781430268178/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430268178/?ar">https://go.oreilly.com/library-access/library/view/-/9781430268178/?ar</a><br/>Format: Electronic Resources<br/>Anti-hacker tool kit.ent://SD_ILS/0/SD_ILS:23036302024-06-25T21:27:59Z2024-06-25T21:27:59Zby Shema, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar">https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071800143/?ar">https://learning.oreilly.com/library/view/~/9780071800143/?ar</a><br/>Format: Electronic Resources<br/>Black hat Python : Python programming for hackers and pentestersent://SD_ILS/0/SD_ILS:23056592024-06-25T21:27:59Z2024-06-25T21:27:59Zby Seitz, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar">https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457189807/?ar">https://learning.oreilly.com/library/view/~/9781457189807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457189807">https://learning.oreilly.com/library/view/~/9781457189807</a><br/>Format: Electronic Resources<br/>RESTful Java web services security : secure your RESTful applications against common vulnerabilitiesent://SD_ILS/0/SD_ILS:23040942024-06-25T21:27:59Z2024-06-25T21:27:59Zby Enríquez, René.<br/><a href="https://learning.oreilly.com/library/view/~/9781783980109/?ar">https://learning.oreilly.com/library/view/~/9781783980109/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783980109/?ar">https://go.oreilly.com/library-access/library/view/-/9781783980109/?ar</a><br/>Format: Electronic Resources<br/>Social engineering in IT security : tools, tactics, and techniquesent://SD_ILS/0/SD_ILS:23048992024-06-25T21:27:59Z2024-06-25T21:27:59Zby Conheady, Sharon.<br/><a href="https://learning.oreilly.com/library/view/~/9780071818469">https://learning.oreilly.com/library/view/~/9780071818469</a>
<a href="https://learning.oreilly.com/library/view/~/9780071818469/?ar">https://learning.oreilly.com/library/view/~/9780071818469/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071818469/?ar">https://go.oreilly.com/library-access/library/view/-/9780071818469/?ar</a><br/>Format: Electronic Resources<br/>Managing information securityent://SD_ILS/0/SD_ILS:23005372024-06-25T21:27:59Z2024-06-25T21:27:59Zby Vacca, John R., editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166882/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166882/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124166882/?ar">https://learning.oreilly.com/library/view/~/9780124166882/?ar</a><br/>Format: Electronic Resources<br/>Hacking exposed : unified communications & VoIP security secrets & solutionsent://SD_ILS/0/SD_ILS:23019982024-06-25T21:27:59Z2024-06-25T21:27:59Zby Collier, Mark D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071798761">https://learning.oreilly.com/library/view/~/9780071798761</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071798761/?ar">https://go.oreilly.com/library-access/library/view/-/9780071798761/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071798761/?ar">https://learning.oreilly.com/library/view/~/9780071798761/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux - Assuring Security by Penetration Testing : Master the Art of Penetration Testing with Kali Linuxent://SD_ILS/0/SD_ILS:23030672024-06-25T21:27:59Z2024-06-25T21:27:59Zby Allen, Lee (Information security specialist)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519489/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519489/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519489/?ar">https://learning.oreilly.com/library/view/~/9781849519489/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519489">https://learning.oreilly.com/library/view/~/9781849519489</a><br/>Format: Electronic Resources<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:23032672024-06-25T21:27:59Z2024-06-25T21:27:59Zby Stapleton, Jeffrey James.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592155">https://learning.oreilly.com/library/view/~/9781466592155</a>
<a href="https://learning.oreilly.com/library/view/~/9781466592155/?ar">https://learning.oreilly.com/library/view/~/9781466592155/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar</a><br/>Format: Electronic Resources<br/>Conducting network penetration and espionage in a global environmentent://SD_ILS/0/SD_ILS:23030922024-06-25T21:27:59Z2024-06-25T21:27:59Zby Middleton, Bruce, 1953- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482206470">https://learning.oreilly.com/library/view/~/9781482206470</a>
<a href="https://learning.oreilly.com/library/view/~/9781482206470/?ar">https://learning.oreilly.com/library/view/~/9781482206470/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar">https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approachent://SD_ILS/0/SD_ILS:23034752024-06-25T21:27:59Z2024-06-25T21:27:59Zby Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar">https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782162223/?ar">https://learning.oreilly.com/library/view/~/9781782162223/?ar</a><br/>Format: Electronic Resources<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:23014742024-06-25T21:27:59Z2024-06-25T21:27:59Zby DeFranco, Joanna F.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564527/?ar">https://learning.oreilly.com/library/view/~/9781466564527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564527">https://learning.oreilly.com/library/view/~/9781466564527</a><br/>Format: Electronic Resources<br/>Hacking with Kali : practical penetration testing techniquesent://SD_ILS/0/SD_ILS:23019462024-06-25T21:27:59Z2024-06-25T21:27:59Zby Broad, James.<br/><a href="https://learning.oreilly.com/library/view/~/9780124077492">https://learning.oreilly.com/library/view/~/9780124077492</a>
<a href="https://learning.oreilly.com/library/view/~/9780124077492/?ar">https://learning.oreilly.com/library/view/~/9780124077492/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar">https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar</a><br/>Format: Electronic Resources<br/>Burp Suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the jobent://SD_ILS/0/SD_ILS:23057382024-06-25T21:27:59Z2024-06-25T21:27:59Zby Mahajan, Akash, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783550111">https://learning.oreilly.com/library/view/~/9781783550111</a>
<a href="https://learning.oreilly.com/library/view/~/9781783550111/?ar">https://learning.oreilly.com/library/view/~/9781783550111/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783550111/?ar">https://go.oreilly.com/library-access/library/view/-/9781783550111/?ar</a><br/>Format: Electronic Resources<br/>Computer forensics and digital investigation with EnCase Forensic v7ent://SD_ILS/0/SD_ILS:23048302024-06-25T21:27:59Z2024-06-25T21:27:59Zby Widup, Suzanne.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071807913/?ar">https://go.oreilly.com/library-access/library/view/-/9780071807913/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071807913/?ar">https://learning.oreilly.com/library/view/~/9780071807913/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071807913">https://learning.oreilly.com/library/view/~/9780071807913</a><br/>Format: Electronic Resources<br/>Practical Hadoop securityent://SD_ILS/0/SD_ILS:23054222024-06-25T21:27:59Z2024-06-25T21:27:59Zby Lakhe, Bhushan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265450">https://learning.oreilly.com/library/view/~/9781430265450</a>
<a href="https://learning.oreilly.com/library/view/~/9781430265450/?ar">https://learning.oreilly.com/library/view/~/9781430265450/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar</a><br/>Format: Electronic Resources<br/>Software test attacks to break mobile and embedded devicesent://SD_ILS/0/SD_ILS:23007192024-06-25T21:27:59Z2024-06-25T21:27:59Zby Hagar, Jon Duncan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466575318/?ar">https://go.oreilly.com/library-access/library/view/-/9781466575318/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466575318/?ar">https://learning.oreilly.com/library/view/~/9781466575318/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466575318">https://learning.oreilly.com/library/view/~/9781466575318</a><br/>Format: Electronic Resources<br/>Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscationent://SD_ILS/0/SD_ILS:23026252024-06-25T21:27:59Z2024-06-25T21:27:59Zby Dang, Bruce, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118787397/?ar">https://learning.oreilly.com/library/view/~/9781118787397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar">https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118787397">https://learning.oreilly.com/library/view/~/9781118787397</a><br/>Format: Electronic Resources<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:23026262024-06-25T21:27:59Z2024-06-25T21:27:59Zby Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format: Electronic Resources<br/>Information security breaches : avoidance treatment based on ISO27001ent://SD_ILS/0/SD_ILS:23040412024-06-25T21:27:59Z2024-06-25T21:27:59Zby Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285841/?ar">https://learning.oreilly.com/library/view/~/9781849285841/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing services procurement guide. Version 1.ent://SD_ILS/0/SD_ILS:23040372024-06-25T21:27:59Z2024-06-25T21:27:59Zby Creasey, Jason.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285803/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285803/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285803/?ar">https://learning.oreilly.com/library/view/~/9781849285803/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285803">https://learning.oreilly.com/library/view/~/9781849285803</a><br/>Format: Electronic Resources<br/>Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environmentent://SD_ILS/0/SD_ILS:23040392024-06-25T21:27:59Z2024-06-25T21:27:59Zby Mehan, Julie E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285728/?ar">https://learning.oreilly.com/library/view/~/9781849285728/?ar</a><br/>Format: Electronic Resources<br/>Procuring penetration testing services.ent://SD_ILS/0/SD_ILS:23040402024-06-25T21:27:59Z2024-06-25T21:27:59Zby Crest.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285766/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285766/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285766/?ar">https://learning.oreilly.com/library/view/~/9781849285766/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285766">https://learning.oreilly.com/library/view/~/9781849285766</a><br/>Format: Electronic Resources<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:23034122024-06-25T21:27:59Z2024-06-25T21:27:59Zby Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment toolsent://SD_ILS/0/SD_ILS:23033122024-06-25T21:27:59Z2024-06-25T21:27:59Zby Makan, Keith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar">https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849695107/?ar">https://learning.oreilly.com/library/view/~/9781849695107/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849695107">https://learning.oreilly.com/library/view/~/9781849695107</a><br/>Format: Electronic Resources<br/>10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacyent://SD_ILS/0/SD_ILS:23048612024-06-25T21:27:59Z2024-06-25T21:27:59Zby Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format: Electronic Resources<br/>Penetration testing : a hands-on introduction to hackingent://SD_ILS/0/SD_ILS:23044112024-06-25T21:27:59Z2024-06-25T21:27:59Zby Weidman, Georgia, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457185342/?ar">https://learning.oreilly.com/library/view/~/9781457185342/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457185342/?ar">https://go.oreilly.com/library-access/library/view/-/9781457185342/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457185342">https://learning.oreilly.com/library/view/~/9781457185342</a><br/>Format: Electronic Resources<br/>Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFWent://SD_ILS/0/SD_ILS:23051632024-06-25T21:27:59Z2024-06-25T21:27:59Zby El-Bawab, Abd El-Monem A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849517720">https://learning.oreilly.com/library/view/~/9781849517720</a>
<a href="https://learning.oreilly.com/library/view/~/9781849517720/?ar">https://learning.oreilly.com/library/view/~/9781849517720/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849517720/?ar">https://go.oreilly.com/library-access/library/view/-/9781849517720/?ar</a><br/>Format: Electronic Resources<br/>Enterprise architecture and information assurance : developing a secure foundationent://SD_ILS/0/SD_ILS:22992792024-06-25T21:27:59Z2024-06-25T21:27:59Zby Scholz, James A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar">https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439841594/?ar">https://learning.oreilly.com/library/view/~/9781439841594/?ar</a><br/>Format: Electronic Resources<br/>Official (ISC)2 guide to the CSSLP CBKent://SD_ILS/0/SD_ILS:23003032024-06-25T21:27:59Z2024-06-25T21:27:59Zby Paul, Mano.<br/><a href="https://learning.oreilly.com/library/view/~/9781466571273">https://learning.oreilly.com/library/view/~/9781466571273</a>
<a href="https://learning.oreilly.com/library/view/~/9781466571273/?ar">https://learning.oreilly.com/library/view/~/9781466571273/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar">https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar</a><br/>Format: Electronic Resources<br/>Intrusion detection networks : a key to collaborative securityent://SD_ILS/0/SD_ILS:23011122024-06-25T21:27:59Z2024-06-25T21:27:59Zby Fung, Carol, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564121/?ar">https://learning.oreilly.com/library/view/~/9781466564121/?ar</a><br/>Format: Electronic Resources<br/>Information security management handbook . Volume 7ent://SD_ILS/0/SD_ILS:23002992024-06-25T21:27:59Z2024-06-25T21:27:59Zby O'Hanley, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar">https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466567498">https://learning.oreilly.com/library/view/~/9781466567498</a>
<a href="https://learning.oreilly.com/library/view/~/9781466567498/?ar">https://learning.oreilly.com/library/view/~/9781466567498/?ar</a><br/>Format: Electronic Resources<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:23011502024-06-25T21:27:59Z2024-06-25T21:27:59Zby Cherry, Denny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113/?ar">https://learning.oreilly.com/library/view/~/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113">https://learning.oreilly.com/library/view/~/9780128000113</a><br/>Format: Electronic Resources<br/>Intrusion detection in wireless ad-hoc networksent://SD_ILS/0/SD_ILS:23012842024-06-25T21:27:59Z2024-06-25T21:27:59Zby Chaki, Nabendu, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466515673/?ar">https://go.oreilly.com/library-access/library/view/-/9781466515673/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466515673">https://learning.oreilly.com/library/view/~/9781466515673</a>
<a href="https://learning.oreilly.com/library/view/~/9781466515673/?ar">https://learning.oreilly.com/library/view/~/9781466515673/?ar</a><br/>Format: Electronic Resources<br/>Core software security : security at the sourceent://SD_ILS/0/SD_ILS:23016412024-06-25T21:27:59Z2024-06-25T21:27:59Zby Ransome, James F., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466560963">https://learning.oreilly.com/library/view/~/9781466560963</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar">https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466560963/?ar">https://learning.oreilly.com/library/view/~/9781466560963/?ar</a><br/>Format: Electronic Resources<br/>Data-Driven Security : Analysis, Visualization and Dashboards.ent://SD_ILS/0/SD_ILS:23015562024-06-25T21:27:59Z2024-06-25T21:27:59Zby Jacobs, Jay (Data analyst)<br/><a href="https://learning.oreilly.com/library/view/~/9781118793824">https://learning.oreilly.com/library/view/~/9781118793824</a>
<a href="https://learning.oreilly.com/library/view/~/9781118793824/?ar">https://learning.oreilly.com/library/view/~/9781118793824/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar">https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar</a><br/>Format: Electronic Resources<br/>The Browser Hacker's Handbookent://SD_ILS/0/SD_ILS:23023472024-06-25T21:27:59Z2024-06-25T21:27:59Zby Alcorn, Wade.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118662090/?ar">https://go.oreilly.com/library-access/library/view/-/9781118662090/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118662090/?ar">https://learning.oreilly.com/library/view/~/9781118662090/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118662090">https://learning.oreilly.com/library/view/~/9781118662090</a><br/>Format: Electronic Resources<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:23001802024-06-25T21:27:59Z2024-06-25T21:27:59Zby Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format: Electronic Resources<br/>Physical layer security in wireless communicationsent://SD_ILS/0/SD_ILS:23008342024-06-25T21:27:59Z2024-06-25T21:27:59Zby Zhou, Xiangyun Sean, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781466567016">https://learning.oreilly.com/library/view/~/9781466567016</a>
<a href="https://learning.oreilly.com/library/view/~/9781466567016/?ar">https://learning.oreilly.com/library/view/~/9781466567016/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466567016/?ar">https://go.oreilly.com/library-access/library/view/-/9781466567016/?ar</a><br/>Format: Electronic Resources<br/>Cyber-physical systems : integrated computing and engineering designent://SD_ILS/0/SD_ILS:22999442024-06-25T21:27:59Z2024-06-25T21:27:59Zby Hu, Fei, 1972- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466577015/?ar">https://learning.oreilly.com/library/view/~/9781466577015/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466577015/?ar">https://go.oreilly.com/library-access/library/view/-/9781466577015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466577015">https://learning.oreilly.com/library/view/~/9781466577015</a><br/>Format: Electronic Resources<br/>