Search Results for - Narrowed by: E-Book - 2014 - COMPUTERS -- Security -- General. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dITYPE$002509Material$002bType$0025091$00253AE-BOOKS$002509E-Book$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$0026ps$003d300? 2024-06-25T21:27:59Z The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:2302234 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Pathan, Al-Sakib Khan, editor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482203523">https://learning.oreilly.com/library/view/~/9781482203523</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar">https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482203523/?ar">https://learning.oreilly.com/library/view/~/9781482203523/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:2303294 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced API security : securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE ent://SD_ILS/0/SD_ILS:2304276 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Siriwardena, Prabath, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430268178">https://learning.oreilly.com/library/view/~/9781430268178</a> <a href="https://learning.oreilly.com/library/view/~/9781430268178/?ar">https://learning.oreilly.com/library/view/~/9781430268178/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430268178/?ar">https://go.oreilly.com/library-access/library/view/-/9781430268178/?ar</a><br/>Format:&#160;Electronic Resources<br/> Anti-hacker tool kit. ent://SD_ILS/0/SD_ILS:2303630 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Shema, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar">https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071800143/?ar">https://learning.oreilly.com/library/view/~/9780071800143/?ar</a><br/>Format:&#160;Electronic Resources<br/> Black hat Python : Python programming for hackers and pentesters ent://SD_ILS/0/SD_ILS:2305659 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Seitz, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar">https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457189807/?ar">https://learning.oreilly.com/library/view/~/9781457189807/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457189807">https://learning.oreilly.com/library/view/~/9781457189807</a><br/>Format:&#160;Electronic Resources<br/> RESTful Java web services security : secure your RESTful applications against common vulnerabilities ent://SD_ILS/0/SD_ILS:2304094 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Enr&iacute;quez, Ren&eacute;.<br/><a href="https://learning.oreilly.com/library/view/~/9781783980109/?ar">https://learning.oreilly.com/library/view/~/9781783980109/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783980109/?ar">https://go.oreilly.com/library-access/library/view/-/9781783980109/?ar</a><br/>Format:&#160;Electronic Resources<br/> Social engineering in IT security : tools, tactics, and techniques ent://SD_ILS/0/SD_ILS:2304899 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Conheady, Sharon.<br/><a href="https://learning.oreilly.com/library/view/~/9780071818469">https://learning.oreilly.com/library/view/~/9780071818469</a> <a href="https://learning.oreilly.com/library/view/~/9780071818469/?ar">https://learning.oreilly.com/library/view/~/9780071818469/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071818469/?ar">https://go.oreilly.com/library-access/library/view/-/9780071818469/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing information security ent://SD_ILS/0/SD_ILS:2300537 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Vacca, John R., editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166882/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166882/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124166882/?ar">https://learning.oreilly.com/library/view/~/9780124166882/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed : unified communications &amp; VoIP security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2301998 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Collier, Mark D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071798761">https://learning.oreilly.com/library/view/~/9780071798761</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071798761/?ar">https://go.oreilly.com/library-access/library/view/-/9780071798761/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071798761/?ar">https://learning.oreilly.com/library/view/~/9780071798761/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux - Assuring Security by Penetration Testing : Master the Art of Penetration Testing with Kali Linux ent://SD_ILS/0/SD_ILS:2303067 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Allen, Lee (Information security specialist)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519489/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519489/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519489/?ar">https://learning.oreilly.com/library/view/~/9781849519489/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519489">https://learning.oreilly.com/library/view/~/9781849519489</a><br/>Format:&#160;Electronic Resources<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:2303267 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Stapleton, Jeffrey James.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592155">https://learning.oreilly.com/library/view/~/9781466592155</a> <a href="https://learning.oreilly.com/library/view/~/9781466592155/?ar">https://learning.oreilly.com/library/view/~/9781466592155/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar</a><br/>Format:&#160;Electronic Resources<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:2303092 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Middleton, Bruce, 1953- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482206470">https://learning.oreilly.com/library/view/~/9781482206470</a> <a href="https://learning.oreilly.com/library/view/~/9781482206470/?ar">https://learning.oreilly.com/library/view/~/9781482206470/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar">https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach ent://SD_ILS/0/SD_ILS:2303475 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar">https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782162223/?ar">https://learning.oreilly.com/library/view/~/9781782162223/?ar</a><br/>Format:&#160;Electronic Resources<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:2301474 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;DeFranco, Joanna F.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466564527/?ar">https://learning.oreilly.com/library/view/~/9781466564527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466564527">https://learning.oreilly.com/library/view/~/9781466564527</a><br/>Format:&#160;Electronic Resources<br/> Hacking with Kali : practical penetration testing techniques ent://SD_ILS/0/SD_ILS:2301946 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Broad, James.<br/><a href="https://learning.oreilly.com/library/view/~/9780124077492">https://learning.oreilly.com/library/view/~/9780124077492</a> <a href="https://learning.oreilly.com/library/view/~/9780124077492/?ar">https://learning.oreilly.com/library/view/~/9780124077492/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar">https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar</a><br/>Format:&#160;Electronic Resources<br/> Burp Suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the job ent://SD_ILS/0/SD_ILS:2305738 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Mahajan, Akash, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783550111">https://learning.oreilly.com/library/view/~/9781783550111</a> <a href="https://learning.oreilly.com/library/view/~/9781783550111/?ar">https://learning.oreilly.com/library/view/~/9781783550111/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783550111/?ar">https://go.oreilly.com/library-access/library/view/-/9781783550111/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics and digital investigation with EnCase Forensic v7 ent://SD_ILS/0/SD_ILS:2304830 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Widup, Suzanne.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071807913/?ar">https://go.oreilly.com/library-access/library/view/-/9780071807913/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071807913/?ar">https://learning.oreilly.com/library/view/~/9780071807913/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071807913">https://learning.oreilly.com/library/view/~/9780071807913</a><br/>Format:&#160;Electronic Resources<br/> Practical Hadoop security ent://SD_ILS/0/SD_ILS:2305422 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Lakhe, Bhushan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265450">https://learning.oreilly.com/library/view/~/9781430265450</a> <a href="https://learning.oreilly.com/library/view/~/9781430265450/?ar">https://learning.oreilly.com/library/view/~/9781430265450/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar</a><br/>Format:&#160;Electronic Resources<br/> Software test attacks to break mobile and embedded devices ent://SD_ILS/0/SD_ILS:2300719 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Hagar, Jon Duncan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466575318/?ar">https://go.oreilly.com/library-access/library/view/-/9781466575318/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466575318/?ar">https://learning.oreilly.com/library/view/~/9781466575318/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466575318">https://learning.oreilly.com/library/view/~/9781466575318</a><br/>Format:&#160;Electronic Resources<br/> Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation ent://SD_ILS/0/SD_ILS:2302625 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Dang, Bruce, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118787397/?ar">https://learning.oreilly.com/library/view/~/9781118787397/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar">https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118787397">https://learning.oreilly.com/library/view/~/9781118787397</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:2302626 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format:&#160;Electronic Resources<br/> Information security breaches : avoidance treatment based on ISO27001 ent://SD_ILS/0/SD_ILS:2304041 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285841/?ar">https://learning.oreilly.com/library/view/~/9781849285841/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing services procurement guide. Version 1. ent://SD_ILS/0/SD_ILS:2304037 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Creasey, Jason.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285803/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285803/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285803/?ar">https://learning.oreilly.com/library/view/~/9781849285803/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285803">https://learning.oreilly.com/library/view/~/9781849285803</a><br/>Format:&#160;Electronic Resources<br/> Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environment ent://SD_ILS/0/SD_ILS:2304039 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Mehan, Julie E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285728/?ar">https://learning.oreilly.com/library/view/~/9781849285728/?ar</a><br/>Format:&#160;Electronic Resources<br/> Procuring penetration testing services. ent://SD_ILS/0/SD_ILS:2304040 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Crest.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285766/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285766/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285766/?ar">https://learning.oreilly.com/library/view/~/9781849285766/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285766">https://learning.oreilly.com/library/view/~/9781849285766</a><br/>Format:&#160;Electronic Resources<br/> Information security : principles and practices ent://SD_ILS/0/SD_ILS:2303412 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools ent://SD_ILS/0/SD_ILS:2303312 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Makan, Keith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar">https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849695107/?ar">https://learning.oreilly.com/library/view/~/9781849695107/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849695107">https://learning.oreilly.com/library/view/~/9781849695107</a><br/>Format:&#160;Electronic Resources<br/> 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy ent://SD_ILS/0/SD_ILS:2304861 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing : a hands-on introduction to hacking ent://SD_ILS/0/SD_ILS:2304411 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Weidman, Georgia, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457185342/?ar">https://learning.oreilly.com/library/view/~/9781457185342/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457185342/?ar">https://go.oreilly.com/library-access/library/view/-/9781457185342/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457185342">https://learning.oreilly.com/library/view/~/9781457185342</a><br/>Format:&#160;Electronic Resources<br/> Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW ent://SD_ILS/0/SD_ILS:2305163 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;El-Bawab, Abd El-Monem A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849517720">https://learning.oreilly.com/library/view/~/9781849517720</a> <a href="https://learning.oreilly.com/library/view/~/9781849517720/?ar">https://learning.oreilly.com/library/view/~/9781849517720/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849517720/?ar">https://go.oreilly.com/library-access/library/view/-/9781849517720/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:2299279 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Scholz, James A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar">https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439841594/?ar">https://learning.oreilly.com/library/view/~/9781439841594/?ar</a><br/>Format:&#160;Electronic Resources<br/> Official (ISC)2 guide to the CSSLP CBK ent://SD_ILS/0/SD_ILS:2300303 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Paul, Mano.<br/><a href="https://learning.oreilly.com/library/view/~/9781466571273">https://learning.oreilly.com/library/view/~/9781466571273</a> <a href="https://learning.oreilly.com/library/view/~/9781466571273/?ar">https://learning.oreilly.com/library/view/~/9781466571273/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar">https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar</a><br/>Format:&#160;Electronic Resources<br/> Intrusion detection networks : a key to collaborative security ent://SD_ILS/0/SD_ILS:2301112 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Fung, Carol, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466564121/?ar">https://learning.oreilly.com/library/view/~/9781466564121/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security management handbook . Volume 7 ent://SD_ILS/0/SD_ILS:2300299 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;O'Hanley, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar">https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466567498">https://learning.oreilly.com/library/view/~/9781466567498</a> <a href="https://learning.oreilly.com/library/view/~/9781466567498/?ar">https://learning.oreilly.com/library/view/~/9781466567498/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:2301150 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Cherry, Denny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000113/?ar">https://learning.oreilly.com/library/view/~/9780128000113/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000113">https://learning.oreilly.com/library/view/~/9780128000113</a><br/>Format:&#160;Electronic Resources<br/> Intrusion detection in wireless ad-hoc networks ent://SD_ILS/0/SD_ILS:2301284 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Chaki, Nabendu, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466515673/?ar">https://go.oreilly.com/library-access/library/view/-/9781466515673/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466515673">https://learning.oreilly.com/library/view/~/9781466515673</a> <a href="https://learning.oreilly.com/library/view/~/9781466515673/?ar">https://learning.oreilly.com/library/view/~/9781466515673/?ar</a><br/>Format:&#160;Electronic Resources<br/> Core software security : security at the source ent://SD_ILS/0/SD_ILS:2301641 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Ransome, James F., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466560963">https://learning.oreilly.com/library/view/~/9781466560963</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar">https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466560963/?ar">https://learning.oreilly.com/library/view/~/9781466560963/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data-Driven Security : Analysis, Visualization and Dashboards. ent://SD_ILS/0/SD_ILS:2301556 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Jacobs, Jay (Data analyst)<br/><a href="https://learning.oreilly.com/library/view/~/9781118793824">https://learning.oreilly.com/library/view/~/9781118793824</a> <a href="https://learning.oreilly.com/library/view/~/9781118793824/?ar">https://learning.oreilly.com/library/view/~/9781118793824/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar">https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Browser Hacker's Handbook ent://SD_ILS/0/SD_ILS:2302347 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Alcorn, Wade.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118662090/?ar">https://go.oreilly.com/library-access/library/view/-/9781118662090/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118662090/?ar">https://learning.oreilly.com/library/view/~/9781118662090/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118662090">https://learning.oreilly.com/library/view/~/9781118662090</a><br/>Format:&#160;Electronic Resources<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:2300180 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format:&#160;Electronic Resources<br/> Physical layer security in wireless communications ent://SD_ILS/0/SD_ILS:2300834 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Zhou, Xiangyun Sean, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781466567016">https://learning.oreilly.com/library/view/~/9781466567016</a> <a href="https://learning.oreilly.com/library/view/~/9781466567016/?ar">https://learning.oreilly.com/library/view/~/9781466567016/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466567016/?ar">https://go.oreilly.com/library-access/library/view/-/9781466567016/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber-physical systems : integrated computing and engineering design ent://SD_ILS/0/SD_ILS:2299944 2024-06-25T21:27:59Z 2024-06-25T21:27:59Z by&#160;Hu, Fei, 1972- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466577015/?ar">https://learning.oreilly.com/library/view/~/9781466577015/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466577015/?ar">https://go.oreilly.com/library-access/library/view/-/9781466577015/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466577015">https://learning.oreilly.com/library/view/~/9781466577015</a><br/>Format:&#160;Electronic Resources<br/>