Search Results for - Narrowed by: E-Book - Computer networks -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dITYPE$002509Material$002bType$0025091$00253AE-BOOKS$002509E-Book$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-09-27T01:13:52ZExam MS-100 Microsoft 365 identity and services.ent://SD_ILS/0/SD_ILS:23355152024-09-27T01:13:52Z2024-09-27T01:13:52Zby Costello, Dan, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137648689/?ar">https://learning.oreilly.com/videos/~/9780137648689/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137648689">https://learning.oreilly.com/videos/~/9780137648689</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137648689/?ar">https://go.oreilly.com/library-access/library/view/-/9780137648689/?ar</a><br/>Format: Video recording<br/>Wireshark for network forensics : an essential guide for IT and cloud professionalsent://SD_ILS/0/SD_ILS:23354452024-09-27T01:13:52Z2024-09-27T01:13:52Zby Nainar, Nagendra Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484290019/?ar">https://learning.oreilly.com/library/view/~/9781484290019/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484290019/?ar">https://go.oreilly.com/library-access/library/view/-/9781484290019/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484290019">https://learning.oreilly.com/library/view/~/9781484290019</a><br/>Format: Electronic Resources<br/>Winning the national security AI competition : a practical guide for government and industry leadersent://SD_ILS/0/SD_ILS:23352302024-09-27T01:13:52Z2024-09-27T01:13:52Zby Whitlock, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484288146">https://learning.oreilly.com/library/view/~/9781484288146</a>
<a href="https://learning.oreilly.com/library/view/~/9781484288146/?ar">https://learning.oreilly.com/library/view/~/9781484288146/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484288146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484288146/?ar</a><br/>Format: Electronic Resources<br/>Learning digital identity : design, deploy, and manage identity architecturesent://SD_ILS/0/SD_ILS:23347392024-09-27T01:13:52Z2024-09-27T01:13:52Zby Windley, Phillip J., 1958- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098117689/?ar">https://learning.oreilly.com/library/view/~/9781098117689/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098117689">https://learning.oreilly.com/library/view/~/9781098117689</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar">https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar</a><br/>Format: Electronic Resources<br/>How to hack like a legend : breaking windowsent://SD_ILS/0/SD_ILS:23341902024-09-27T01:13:52Z2024-09-27T01:13:52Zby Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098141431/?ar">https://learning.oreilly.com/library/view/~/9781098141431/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar">https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098141431">https://learning.oreilly.com/library/view/~/9781098141431</a><br/>Format: Electronic Resources<br/>Mastering Azure security : keeping your Microsoft Azure workloads safeent://SD_ILS/0/SD_ILS:23329272024-09-27T01:13:52Z2024-09-27T01:13:52Zby Toroman, Mustafa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803238555">https://learning.oreilly.com/library/view/~/9781803238555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238555/?ar">https://learning.oreilly.com/library/view/~/9781803238555/?ar</a><br/>Format: Electronic Resources<br/>Learn Wireshark : a definitive guide to expertly analyzing protocols and troubleshooting networks using Wiresharkent://SD_ILS/0/SD_ILS:23340042024-09-27T01:13:52Z2024-09-27T01:13:52Zby Bock, Lisa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803231679/?ar">https://learning.oreilly.com/library/view/~/9781803231679/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803231679/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803231679">https://learning.oreilly.com/library/view/~/9781803231679</a><br/>Format: Electronic Resources<br/>Cyber resiliency with IBM QRadar and IBM Spectrum Virtualize for Public Cloud on Azure with IBM Copy Services Manager for Safeguarded Copyent://SD_ILS/0/SD_ILS:23338112024-09-27T01:13:52Z2024-09-27T01:13:52Zby International Business Machines Corporation, issuing body.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460628">https://learning.oreilly.com/library/view/~/9780738460628</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460628/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460628/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460628/?ar">https://learning.oreilly.com/library/view/~/9780738460628/?ar</a><br/>Format: Electronic Resources<br/>Secure web application development : a hands-on guide with Python and Djangoent://SD_ILS/0/SD_ILS:23349062024-09-27T01:13:52Z2024-09-27T01:13:52Zby Baker, Matthew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484285961">https://learning.oreilly.com/library/view/~/9781484285961</a>
<a href="https://learning.oreilly.com/library/view/~/9781484285961/?ar">https://learning.oreilly.com/library/view/~/9781484285961/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484285961/?ar">https://go.oreilly.com/library-access/library/view/-/9781484285961/?ar</a><br/>Format: Electronic Resources<br/>Identity and access management fundamentals.ent://SD_ILS/0/SD_ILS:23352772024-09-27T01:13:52Z2024-09-27T01:13:52Zby Kohli, Harpreet, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671145/?ar">https://learning.oreilly.com/videos/~/0636920671145/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920671145">https://learning.oreilly.com/videos/~/0636920671145</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar</a><br/>Format: Video recording<br/>Web hacker's toolbox : tools used by successful hackers.ent://SD_ILS/0/SD_ILS:23354592024-09-27T01:13:52Z2024-09-27T01:13:52Zby Czagan, Dawid, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837632831/?ar">https://learning.oreilly.com/videos/~/9781837632831/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837632831">https://learning.oreilly.com/videos/~/9781837632831</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar</a><br/>Format: Video recording<br/>Practical cyber hacking skills for beginners.ent://SD_ILS/0/SD_ILS:23355142024-09-27T01:13:52Z2024-09-27T01:13:52Zby Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar">https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181">https://learning.oreilly.com/videos/~/9781837636181</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181/?ar">https://learning.oreilly.com/videos/~/9781837636181/?ar</a><br/>Format: Video recording<br/>Mastering Kali Linux for advanced penetration testing : apply a proactive approach to secure your cyber infrastructure and enchance your pentesting skillsent://SD_ILS/0/SD_ILS:23320622024-09-27T01:13:52Z2024-09-27T01:13:52Zby Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801819770">https://learning.oreilly.com/library/view/~/9781801819770</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801819770/?ar">https://go.oreilly.com/library-access/library/view/-/9781801819770/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801819770/?ar">https://learning.oreilly.com/library/view/~/9781801819770/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity pevention and detection (Video collection).ent://SD_ILS/0/SD_ILS:23322522024-09-27T01:13:52Z2024-09-27T01:13:52Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137929351">https://learning.oreilly.com/videos/~/9780137929351</a>
<a href="https://learning.oreilly.com/videos/~/9780137929351/?ar">https://learning.oreilly.com/videos/~/9780137929351/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137929351/?ar">https://go.oreilly.com/library-access/library/view/-/9780137929351/?ar</a><br/>Format: Video recording<br/>Breached! : why data security law fails and how to improve itent://SD_ILS/0/SD_ILS:23329562024-09-27T01:13:52Z2024-09-27T01:13:52Zby Solove, Daniel J., 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781705056271/?ar">https://go.oreilly.com/library-access/library/view/-/9781705056271/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781705056271/?ar">https://learning.oreilly.com/library/view/~/9781705056271/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781705056271">https://learning.oreilly.com/library/view/~/9781705056271</a><br/>Format: Sound recording<br/>The complete cybersecurity bootcampent://SD_ILS/0/SD_ILS:23334072024-09-27T01:13:52Z2024-09-27T01:13:52Zby Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137949397">https://learning.oreilly.com/videos/~/9780137949397</a>
<a href="https://learning.oreilly.com/videos/~/9780137949397/?ar">https://learning.oreilly.com/videos/~/9780137949397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar">https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar</a><br/>Format: Video recording<br/>Apache essentials : install, configure, maintainent://SD_ILS/0/SD_ILS:23342812024-09-27T01:13:52Z2024-09-27T01:13:52Zby Harkness, Darren James, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484283240/?ar">https://go.oreilly.com/library-access/library/view/-/9781484283240/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484283240/?ar">https://learning.oreilly.com/library/view/~/9781484283240/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484283240">https://learning.oreilly.com/library/view/~/9781484283240</a><br/>Format: Electronic Resources<br/>Network protocols for security professionals : probe and identify network-based vulnerabilities and safeguard against network protocol breachesent://SD_ILS/0/SD_ILS:23348862024-09-27T01:13:52Z2024-09-27T01:13:52Zby Orzach, Yoram.<br/><a href="https://learning.oreilly.com/library/view/~/9781789953480">https://learning.oreilly.com/library/view/~/9781789953480</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789953480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789953480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789953480/?ar">https://learning.oreilly.com/library/view/~/9781789953480/?ar</a><br/>Format: Electronic Resources<br/>Hacking : der umfassende Praxis-Guide : inkl. Prüfungsvorbereitung zum CEHv11ent://SD_ILS/0/SD_ILS:23316832024-09-27T01:13:52Z2024-09-27T01:13:52Zby Amberg, Eric, author<br/><a href="https://learning.oreilly.com/library/view/~/9783747504840">https://learning.oreilly.com/library/view/~/9783747504840</a>
<a href="https://learning.oreilly.com/library/view/~/9783747504840/?ar">https://learning.oreilly.com/library/view/~/9783747504840/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar">https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar</a><br/>Format: Electronic Resources<br/>Finding your cyber security path.ent://SD_ILS/0/SD_ILS:23327012024-09-27T01:13:52Z2024-09-27T01:13:52Zby Miller, Alyssa, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202258">https://learning.oreilly.com/videos/~/10000MNHV202258</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202258/?ar">https://learning.oreilly.com/videos/~/10000MNHV202258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar</a><br/>Format: Video recording<br/>Transitioning to quantum-safe cryptography on IBM Zent://SD_ILS/0/SD_ILS:23339332024-09-27T01:13:52Z2024-09-27T01:13:52Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460680">https://learning.oreilly.com/library/view/~/9780738460680</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460680/?ar">https://learning.oreilly.com/library/view/~/9780738460680/?ar</a><br/>Format: Electronic Resources<br/>CIBERSEGURIDAD PARA DIRECTIVOS riesgos, control y eficiencia de las tecnologías de la informacionent://SD_ILS/0/SD_ILS:23337672024-09-27T01:13:52Z2024-09-27T01:13:52Zby DEUTSCH, VICTOR EDUARDO.<br/><a href="https://learning.oreilly.com/library/view/~/9788411312585">https://learning.oreilly.com/library/view/~/9788411312585</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788411312585/?ar">https://go.oreilly.com/library-access/library/view/-/9788411312585/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788411312585/?ar">https://learning.oreilly.com/library/view/~/9788411312585/?ar</a><br/>Format: Electronic Resources<br/>Making sense of cybersecurityent://SD_ILS/0/SD_ILS:23350002024-09-27T01:13:52Z2024-09-27T01:13:52Zby Kranz, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617298004/?ar">https://learning.oreilly.com/library/view/~/9781617298004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617298004">https://learning.oreilly.com/library/view/~/9781617298004</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar">https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar</a><br/>Format: Electronic Resources<br/>Web hacking expert : full-stack exploitation mastery.ent://SD_ILS/0/SD_ILS:23352782024-09-27T01:13:52Z2024-09-27T01:13:52Zby Czagan, Dawid, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717">https://learning.oreilly.com/videos/~/9781837639717</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717/?ar">https://learning.oreilly.com/videos/~/9781837639717/?ar</a><br/>Format: Video recording<br/>Cyber security and network securityent://SD_ILS/0/SD_ILS:23325382024-09-27T01:13:52Z2024-09-27T01:13:52Zby Pramanik, Sabyasachi, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119812494">https://learning.oreilly.com/library/view/~/9781119812494</a>
<a href="https://learning.oreilly.com/library/view/~/9781119812494/?ar">https://learning.oreilly.com/library/view/~/9781119812494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar">https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity For Dummiesent://SD_ILS/0/SD_ILS:23328722024-09-27T01:13:52Z2024-09-27T01:13:52Zby Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119867180">https://learning.oreilly.com/library/view/~/9781119867180</a>
<a href="https://learning.oreilly.com/library/view/~/9781119867180/?ar">https://learning.oreilly.com/library/view/~/9781119867180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar">https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar</a><br/>Format: Electronic Resources<br/>Defensive cybersecurity fundamentalsent://SD_ILS/0/SD_ILS:23333792024-09-27T01:13:52Z2024-09-27T01:13:52Zby Berlin, Amanda, author.<br/><a href="https://learning.oreilly.com/videos/~/0636920670896/?ar">https://learning.oreilly.com/videos/~/0636920670896/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920670896/?ar">https://go.oreilly.com/library-access/library/view/-/0636920670896/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920670896">https://learning.oreilly.com/videos/~/0636920670896</a><br/>Format: Video recording<br/>Mastering Palo Alto networks : build, configure and deploy network solutions for your infrastructure using features of PAN-OSent://SD_ILS/0/SD_ILS:23335182024-09-27T01:13:52Z2024-09-27T01:13:52Zby Piens, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803241418/?ar">https://go.oreilly.com/library-access/library/view/-/9781803241418/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803241418/?ar">https://learning.oreilly.com/library/view/~/9781803241418/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803241418">https://learning.oreilly.com/library/view/~/9781803241418</a><br/>Format: Electronic Resources<br/>Introduction to social engineeringent://SD_ILS/0/SD_ILS:23338572024-09-27T01:13:52Z2024-09-27T01:13:52Zby Assemble You, publisher.<br/><a href="https://go.oreilly.com/library-access/library/view/-/125051AYPOD/?ar">https://go.oreilly.com/library-access/library/view/-/125051AYPOD/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/125051AYPOD">https://learning.oreilly.com/library/view/~/125051AYPOD</a>
<a href="https://learning.oreilly.com/library/view/~/125051AYPOD/?ar">https://learning.oreilly.com/library/view/~/125051AYPOD/?ar</a><br/>Format: Sound recording<br/>Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloudent://SD_ILS/0/SD_ILS:23337922024-09-27T01:13:52Z2024-09-27T01:13:52Zby Berkouwer, Sander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar">https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242507/?ar">https://learning.oreilly.com/library/view/~/9781803242507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242507">https://learning.oreilly.com/library/view/~/9781803242507</a><br/>Format: Electronic Resources<br/>Offensive hacking unfolded. Become a pro Pentester.ent://SD_ILS/0/SD_ILS:23346882024-09-27T01:13:52Z2024-09-27T01:13:52Zby Yadav, Avinash, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar">https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781804615294/?ar">https://learning.oreilly.com/videos/~/9781804615294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781804615294">https://learning.oreilly.com/videos/~/9781804615294</a><br/>Format: Video recording<br/>Getting started with IBM Hyper Protect Data Controllerent://SD_ILS/0/SD_ILS:23314512024-09-27T01:13:52Z2024-09-27T01:13:52Zby White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format: Electronic Resources<br/>Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadarent://SD_ILS/0/SD_ILS:23320572024-09-27T01:13:52Z2024-09-27T01:13:52Zby IBM Storage Team, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260/?ar">https://learning.oreilly.com/library/view/~/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260">https://learning.oreilly.com/library/view/~/9780738460260</a><br/>Format: Electronic Resources<br/>Shifting left for application security : bridging the divide between DevOps and security with the right security toolsent://SD_ILS/0/SD_ILS:23325752024-09-27T01:13:52Z2024-09-27T01:13:52Zby Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format: Electronic Resources<br/>Cloud security for dummiesent://SD_ILS/0/SD_ILS:23329362024-09-27T01:13:52Z2024-09-27T01:13:52Zby Coombs, Ted, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar">https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9798765008096/?ar">https://learning.oreilly.com/library/view/~/9798765008096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9798765008096">https://learning.oreilly.com/library/view/~/9798765008096</a><br/>Format: Sound recording<br/>Information security handbookent://SD_ILS/0/SD_ILS:23302452024-09-27T01:13:52Z2024-09-27T01:13:52Zby Jhanjhi, Noor Zaman, 1972- editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000540567">https://learning.oreilly.com/library/view/~/9781000540567</a>
<a href="https://learning.oreilly.com/library/view/~/9781000540567/?ar">https://learning.oreilly.com/library/view/~/9781000540567/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000540567/?ar">https://go.oreilly.com/library-access/library/view/-/9781000540567/?ar</a><br/>Format: Electronic Resources<br/>Network security : private communications in a public worldent://SD_ILS/0/SD_ILS:23341282024-09-27T01:13:52Z2024-09-27T01:13:52Zby Kaufman, Charlie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780136643531">https://learning.oreilly.com/library/view/~/9780136643531</a>
<a href="https://learning.oreilly.com/library/view/~/9780136643531/?ar">https://learning.oreilly.com/library/view/~/9780136643531/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780136643531/?ar">https://go.oreilly.com/library-access/library/view/-/9780136643531/?ar</a><br/>Format: Electronic Resources<br/>Kerberos : Single Sign-on in gemischten Linux/Windows-Umgebungen.ent://SD_ILS/0/SD_ILS:23326702024-09-27T01:13:52Z2024-09-27T01:13:52Zby Pröhl, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9781098141059/?ar">https://learning.oreilly.com/library/view/~/9781098141059/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098141059/?ar">https://go.oreilly.com/library-access/library/view/-/9781098141059/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098141059">https://learning.oreilly.com/library/view/~/9781098141059</a><br/>Format: Electronic Resources<br/>Hackingent://SD_ILS/0/SD_ILS:23328862024-09-27T01:13:52Z2024-09-27T01:13:52Zby Beaver, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119872191">https://learning.oreilly.com/library/view/~/9781119872191</a>
<a href="https://learning.oreilly.com/library/view/~/9781119872191/?ar">https://learning.oreilly.com/library/view/~/9781119872191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar">https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar</a><br/>Format: Electronic Resources<br/>Navigating the cybersecurity career pathent://SD_ILS/0/SD_ILS:23308362024-09-27T01:13:52Z2024-09-27T01:13:52Zby Patton, Helen E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119833420">https://learning.oreilly.com/library/view/~/9781119833420</a>
<a href="https://learning.oreilly.com/library/view/~/9781119833420/?ar">https://learning.oreilly.com/library/view/~/9781119833420/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar">https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar</a><br/>Format: Electronic Resources<br/>Cloud security for dummiesent://SD_ILS/0/SD_ILS:23324972024-09-27T01:13:52Z2024-09-27T01:13:52Zby Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a>
<a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format: Electronic Resources<br/>Understand, manage, and measure cyber risk : practical solutions for creating a sustainable cyber programent://SD_ILS/0/SD_ILS:23314282024-09-27T01:13:52Z2024-09-27T01:13:52Zby Leirvik, Ryan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484278215/?ar">https://go.oreilly.com/library-access/library/view/-/9781484278215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484278215/?ar">https://learning.oreilly.com/library/view/~/9781484278215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484278215">https://learning.oreilly.com/library/view/~/9781484278215</a><br/>Format: Electronic Resources<br/>SC-300 : Microsoft Identity and Access Administrator.ent://SD_ILS/0/SD_ILS:23317172024-09-27T01:13:52Z2024-09-27T01:13:52Zby Nednur, Anand Rao, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803238043/?ar">https://learning.oreilly.com/videos/~/9781803238043/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803238043">https://learning.oreilly.com/videos/~/9781803238043</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803238043/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238043/?ar</a><br/>Format: Video recording<br/>Python for cybersecurity : using Python for cyber offense and defenseent://SD_ILS/0/SD_ILS:23315742024-09-27T01:13:52Z2024-09-27T01:13:52Zby Poston, Howard E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar">https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649/?ar">https://learning.oreilly.com/library/view/~/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649">https://learning.oreilly.com/library/view/~/9781119850649</a><br/>Format: Electronic Resources<br/>Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000ent://SD_ILS/0/SD_ILS:23320672024-09-27T01:13:52Z2024-09-27T01:13:52Zby International Business Machines Corporation, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406/?ar">https://learning.oreilly.com/library/view/~/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406">https://learning.oreilly.com/library/view/~/9780738460406</a><br/>Format: Electronic Resources<br/>The security culture playbook : an executive guide to reducing risk and developing your human defense layerent://SD_ILS/0/SD_ILS:23324102024-09-27T01:13:52Z2024-09-27T01:13:52Zby Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119875239/?ar">https://learning.oreilly.com/library/view/~/9781119875239/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119875239">https://learning.oreilly.com/library/view/~/9781119875239</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar">https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar</a><br/>Format: Electronic Resources<br/>Threat modeling with Owasp Threat Dragon & risk rating a vulnerability.ent://SD_ILS/0/SD_ILS:23325992024-09-27T01:13:52Z2024-09-27T01:13:52Zby Fisher, Derek, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202248/?ar">https://learning.oreilly.com/videos/~/10000MNHV202248/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202248">https://learning.oreilly.com/videos/~/10000MNHV202248</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar</a><br/>Format: Video recording<br/>Hands-on threat modelingent://SD_ILS/0/SD_ILS:23333832024-09-27T01:13:52Z2024-09-27T01:13:52Zby Deleersnyder, Sebastien, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671268">https://learning.oreilly.com/videos/~/0636920671268</a>
<a href="https://learning.oreilly.com/videos/~/0636920671268/?ar">https://learning.oreilly.com/videos/~/0636920671268/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar</a><br/>Format: Video recording<br/>Windows Network security fundamentalsent://SD_ILS/0/SD_ILS:23333842024-09-27T01:13:52Z2024-09-27T01:13:52Zby Weadock, Glenn E., presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206">https://learning.oreilly.com/videos/~/0636920671206</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206/?ar">https://learning.oreilly.com/videos/~/0636920671206/?ar</a><br/>Format: Video recording<br/>OPNsense Beginner to Professional : Protect Networks and Build Next-Generation Firewalls Easily with OPNsenseent://SD_ILS/0/SD_ILS:23332042024-09-27T01:13:52Z2024-09-27T01:13:52Zby Camargo, Julio Cesar Bueno de.<br/><a href="https://learning.oreilly.com/library/view/~/9781801816878/?ar">https://learning.oreilly.com/library/view/~/9781801816878/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801816878">https://learning.oreilly.com/library/view/~/9781801816878</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801816878/?ar">https://go.oreilly.com/library-access/library/view/-/9781801816878/?ar</a><br/>Format: Electronic Resources<br/>Executive's guide to cyber risk : securing the future todayent://SD_ILS/0/SD_ILS:23332112024-09-27T01:13:52Z2024-09-27T01:13:52Zby Moyo, Siegfried, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119863113">https://learning.oreilly.com/library/view/~/9781119863113</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar">https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119863113/?ar">https://learning.oreilly.com/library/view/~/9781119863113/?ar</a><br/>Format: Electronic Resources<br/>The security culture playbook : an executive guide to reducing risk and developing your human defense layerent://SD_ILS/0/SD_ILS:23342182024-09-27T01:13:52Z2024-09-27T01:13:52Zby Carpenter, Perry, author, narrator.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar">https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781663720177">https://learning.oreilly.com/library/view/~/9781663720177</a>
<a href="https://learning.oreilly.com/library/view/~/9781663720177/?ar">https://learning.oreilly.com/library/view/~/9781663720177/?ar</a><br/>Format: Sound recording<br/>Single sign-on and passwordless authentication : an overview.ent://SD_ILS/0/SD_ILS:23335582024-09-27T01:13:52Z2024-09-27T01:13:52Zby Ovcharov, Andrey, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202294">https://learning.oreilly.com/videos/~/10000MNHV202294</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202294/?ar">https://learning.oreilly.com/videos/~/10000MNHV202294/?ar</a><br/>Format: Video recording<br/>Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copyent://SD_ILS/0/SD_ILS:23339502024-09-27T01:13:52Z2024-09-27T01:13:52Zby Shingornikar, Shashank, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460710/?ar">https://learning.oreilly.com/library/view/~/9780738460710/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460710">https://learning.oreilly.com/library/view/~/9780738460710</a><br/>Format: Electronic Resources<br/>Cyber warfare : truth, tactics, and strategies : strategic concepts and truths to help you and your organization survive on the battleground of cyber warfareent://SD_ILS/0/SD_ILS:23346942024-09-27T01:13:52Z2024-09-27T01:13:52Zby Cunningham, Chase, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801076876">https://learning.oreilly.com/library/view/~/9781801076876</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076876/?ar">https://learning.oreilly.com/library/view/~/9781801076876/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801076876/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076876/?ar</a><br/>Format: Sound recording<br/>Diving into secure access service Edge : a technical leadership guide to achieving success with sase at market speedent://SD_ILS/0/SD_ILS:23350812024-09-27T01:13:52Z2024-09-27T01:13:52Zby Ginn, Jeremiah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803242170/?ar">https://go.oreilly.com/library-access/library/view/-/9781803242170/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242170">https://learning.oreilly.com/library/view/~/9781803242170</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242170/?ar">https://learning.oreilly.com/library/view/~/9781803242170/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics and incident response : incident response tools and techniques for effective cyber threat responseent://SD_ILS/0/SD_ILS:23353612024-09-27T01:13:52Z2024-09-27T01:13:52Zby Johansen, Gerard, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803238678/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238678/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238678/?ar">https://learning.oreilly.com/library/view/~/9781803238678/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238678">https://learning.oreilly.com/library/view/~/9781803238678</a><br/>Format: Electronic Resources<br/>Cyber security : the complete guide to cyber threats and protectionent://SD_ILS/0/SD_ILS:23569992024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sutton, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=7146447">Click to View</a><br/>Format: Electronic Resources<br/>Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade antivirus softwareent://SD_ILS/0/SD_ILS:23294342024-09-27T01:13:52Z2024-09-27T01:13:52Zby Yehoshua, Nir, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801079747/?ar">https://learning.oreilly.com/library/view/~/9781801079747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar">https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801079747">https://learning.oreilly.com/library/view/~/9781801079747</a><br/>Format: Electronic Resources<br/>Certified ethical hacker v11ent://SD_ILS/0/SD_ILS:23334232024-09-27T01:13:52Z2024-09-27T01:13:52Zby Bushmiller, Dean, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780996619158/?ar">https://learning.oreilly.com/videos/~/9780996619158/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780996619158">https://learning.oreilly.com/videos/~/9780996619158</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780996619158/?ar">https://go.oreilly.com/library-access/library/view/-/9780996619158/?ar</a><br/>Format: Video recording<br/>How cybersecurity really works : a hands-on guide for total beginnersent://SD_ILS/0/SD_ILS:23280362024-09-27T01:13:52Z2024-09-27T01:13:52Zby Grubb, Sam (Cyber security consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999/?ar">https://learning.oreilly.com/library/view/~/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999">https://learning.oreilly.com/library/view/~/9781098128999</a><br/>Format: Electronic Resources<br/>Cyberjutsu : cybersecurity for the modern ninjaent://SD_ILS/0/SD_ILS:23265412024-09-27T01:13:52Z2024-09-27T01:13:52Zby McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format: Electronic Resources<br/>Comptia security+ certification practice exams, (Exam SY0-601).ent://SD_ILS/0/SD_ILS:23271372024-09-27T01:13:52Z2024-09-27T01:13:52Zby Lachance, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781260467987/?ar">https://learning.oreilly.com/library/view/~/9781260467987/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar">https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260467987">https://learning.oreilly.com/library/view/~/9781260467987</a><br/>Format: Electronic Resources<br/>How to hack like a ghostent://SD_ILS/0/SD_ILS:23265072024-09-27T01:13:52Z2024-09-27T01:13:52Zby Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format: Electronic Resources<br/>Google xi tong jia gou jie mi : gou jian an quan ke kao de xi tong = Building secure and reliable systemsent://SD_ILS/0/SD_ILS:23329282024-09-27T01:13:52Z2024-09-27T01:13:52Zby Adkins, Heather, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar">https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9787115569257/?ar">https://learning.oreilly.com/library/view/~/9787115569257/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9787115569257">https://learning.oreilly.com/library/view/~/9787115569257</a><br/>Format: Electronic Resources<br/>Aan quan fang yu ru men shou ce = Defensive security handbookent://SD_ILS/0/SD_ILS:23336482024-09-27T01:13:52Z2024-09-27T01:13:52Zby Brotherston, Lee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9787115577955/?ar">https://learning.oreilly.com/library/view/~/9787115577955/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9787115577955/?ar">https://go.oreilly.com/library-access/library/view/-/9787115577955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9787115577955">https://learning.oreilly.com/library/view/~/9787115577955</a><br/>Format: Electronic Resources<br/>Zero Trust security : an enterprise guideent://SD_ILS/0/SD_ILS:23283962024-09-27T01:13:52Z2024-09-27T01:13:52Zby Garbis, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484267028">https://learning.oreilly.com/library/view/~/9781484267028</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484267028/?ar">https://go.oreilly.com/library-access/library/view/-/9781484267028/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484267028/?ar">https://learning.oreilly.com/library/view/~/9781484267028/?ar</a><br/>Format: Electronic Resources<br/>Multi-site network and security services with NSX-T : implement network security, stateful services, and operationsent://SD_ILS/0/SD_ILS:23288812024-09-27T01:13:52Z2024-09-27T01:13:52Zby Hoogendoorn, Iwan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484270837/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270837/?ar">https://learning.oreilly.com/library/view/~/9781484270837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270837">https://learning.oreilly.com/library/view/~/9781484270837</a><br/>Format: Electronic Resources<br/>Penetration Testing Azure for Ethical Hackersent://SD_ILS/0/SD_ILS:23310772024-09-27T01:13:52Z2024-09-27T01:13:52Zby Okeyode, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212932/?ar">https://learning.oreilly.com/library/view/~/9781839212932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212932">https://learning.oreilly.com/library/view/~/9781839212932</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar</a><br/>Format: Electronic Resources<br/>CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guideent://SD_ILS/0/SD_ILS:23309752024-09-27T01:13:52Z2024-09-27T01:13:52Zby Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar">https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780136634829/?ar">https://learning.oreilly.com/library/view/~/9780136634829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780136634829">https://learning.oreilly.com/library/view/~/9780136634829</a><br/>Format: Electronic Resources<br/>Threat modeling a practical guide for developing teamsent://SD_ILS/0/SD_ILS:23311562024-09-27T01:13:52Z2024-09-27T01:13:52Zby Tarandach, Izar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056546/?ar">https://learning.oreilly.com/library/view/~/9781492056546/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492056546">https://learning.oreilly.com/library/view/~/9781492056546</a><br/>Format: Electronic Resources<br/>Digital forensics for pentesters : hands-on learning.ent://SD_ILS/0/SD_ILS:23319692024-09-27T01:13:52Z2024-09-27T01:13:52Zby Krahenbill, Cliff, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803231969">https://learning.oreilly.com/videos/~/9781803231969</a>
<a href="https://learning.oreilly.com/videos/~/9781803231969/?ar">https://learning.oreilly.com/videos/~/9781803231969/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar</a><br/>Format: Video recording<br/>Secure operations and protectionsent://SD_ILS/0/SD_ILS:23320922024-09-27T01:13:52Z2024-09-27T01:13:52Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format: Video recording<br/>CEH v11 certified ethical hacker study guideent://SD_ILS/0/SD_ILS:23297762024-09-27T01:13:52Z2024-09-27T01:13:52Zby Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119800286/?ar">https://learning.oreilly.com/library/view/~/9781119800286/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar">https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119800286">https://learning.oreilly.com/library/view/~/9781119800286</a><br/>Format: Electronic Resources<br/>Pentesting Industrial Control Systems : an Ethical Hacker's Guide to Analyzing, Compromising, Mitigating, and Securing Industrial Processes.ent://SD_ILS/0/SD_ILS:23308642024-09-27T01:13:52Z2024-09-27T01:13:52Zby Smith, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202382/?ar">https://learning.oreilly.com/library/view/~/9781800202382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202382">https://learning.oreilly.com/library/view/~/9781800202382</a><br/>Format: Electronic Resources<br/>Mastering Active Directory - Third Editionent://SD_ILS/0/SD_ILS:23311052024-09-27T01:13:52Z2024-09-27T01:13:52Zby Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format: Electronic Resources<br/>Artificial Intelligence, Cybersecurity and Cyber Defenceent://SD_ILS/0/SD_ILS:23283582024-09-27T01:13:52Z2024-09-27T01:13:52Zby Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format: Electronic Resources<br/>8 steps to better security : a simple cyber resilience guide for businessent://SD_ILS/0/SD_ILS:23308352024-09-27T01:13:52Z2024-09-27T01:13:52Zby Crawley, Kim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119811237/?ar">https://learning.oreilly.com/library/view/~/9781119811237/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119811237">https://learning.oreilly.com/library/view/~/9781119811237</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar">https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security and Assuranceent://SD_ILS/0/SD_ILS:23417222024-09-27T01:13:52Z2024-09-27T01:13:52Zby Clarke, Nathan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6870870">Click to View</a><br/>Format: Electronic Resources<br/>Hands on hackingent://SD_ILS/0/SD_ILS:22746992024-09-27T01:13:52Z2024-09-27T01:13:52Zby Hickey, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6301556">Click to View</a><br/>Format: Electronic Resources<br/>Design and analysis of security protocol for communicationent://SD_ILS/0/SD_ILS:22741662024-09-27T01:13:52Z2024-09-27T01:13:52Zby Goyal, Dinesh, 1976- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6040173">Click to View</a><br/>Format: Electronic Resources<br/>Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safeent://SD_ILS/0/SD_ILS:22686392024-09-27T01:13:52Z2024-09-27T01:13:52Zby Rubinoff, Shira, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6020320">Click to View</a><br/>Format: Electronic Resources<br/>Computer security and encryption : an introductionent://SD_ILS/0/SD_ILS:22376602024-09-27T01:13:52Z2024-09-27T01:13:52Zby Chauhan, S. R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6404902">Click to View</a><br/>Format: Electronic Resources<br/>Practical vulnerability management : a strategic approach to managing cyber riskent://SD_ILS/0/SD_ILS:23258672024-09-27T01:13:52Z2024-09-27T01:13:52Zby Magnusson, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125707/?ar">https://learning.oreilly.com/library/view/~/9781098125707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125707">https://learning.oreilly.com/library/view/~/9781098125707</a><br/>Format: Electronic Resources<br/>Security operations in practiceent://SD_ILS/0/SD_ILS:23339292024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175089/?ar">https://learning.oreilly.com/library/view/~/9781780175089/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175089">https://learning.oreilly.com/library/view/~/9781780175089</a><br/>Format: Electronic Resources<br/>Cybersecurity attacks - red team strategies : a practical guide to building a penetration testing program having homefield advantageent://SD_ILS/0/SD_ILS:23510052024-09-27T01:13:52Z2024-09-27T01:13:52Zby Rehberger, Johann, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6155204">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity fundamentals : a real-world perspectiveent://SD_ILS/0/SD_ILS:23562652024-09-27T01:13:52Z2024-09-27T01:13:52Zby Thakur, Kutub, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6186711">Click to View</a><br/>Format: Electronic Resources<br/>Intelligent network management and control : intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radioent://SD_ILS/0/SD_ILS:23580962024-09-27T01:13:52Z2024-09-27T01:13:52Zby Benmammar, Badr, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6522998">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Azure security centerent://SD_ILS/0/SD_ILS:23220532024-09-27T01:13:52Z2024-09-27T01:13:52Zby Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format: Electronic Resources<br/>Web application security : exploitation and countermeasures for modern web applicationsent://SD_ILS/0/SD_ILS:23235272024-09-27T01:13:52Z2024-09-27T01:13:52Zby Hoffman, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492053101/?ar">https://learning.oreilly.com/library/view/~/9781492053101/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492053101/?ar">https://go.oreilly.com/library-access/library/view/-/9781492053101/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492053101">https://learning.oreilly.com/library/view/~/9781492053101</a><br/>Format: Electronic Resources<br/>AWS SECURITY COOKBOOK;PRACTICAL SOLUTIONS FOR MANAGING SECURITY POLICIES, MONITORING, AUDITING, AND COMPLIANCE WITH AWSent://SD_ILS/0/SD_ILS:23233402024-09-27T01:13:52Z2024-09-27T01:13:52Zby HEARTIN KANIKATHOTTU.<br/><a href="https://learning.oreilly.com/library/view/~/9781838826253">https://learning.oreilly.com/library/view/~/9781838826253</a>
<a href="https://learning.oreilly.com/library/view/~/9781838826253/?ar">https://learning.oreilly.com/library/view/~/9781838826253/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar">https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar</a><br/>Format: Electronic Resources<br/>IBM DS8000 Encryption for data at rest, Transparent Cloud Tiering, and Endpoint Security (DS8000 Release 9.0)ent://SD_ILS/0/SD_ILS:23233732024-09-27T01:13:52Z2024-09-27T01:13:52Zby Dufrasne, Bertrand, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738458427/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458427/?ar">https://learning.oreilly.com/library/view/~/9780738458427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458427">https://learning.oreilly.com/library/view/~/9780738458427</a><br/>Format: Electronic Resources<br/>Applied incident responseent://SD_ILS/0/SD_ILS:23228262024-09-27T01:13:52Z2024-09-27T01:13:52Zby Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781119560265">https://learning.oreilly.com/library/view/~/9781119560265</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560265/?ar">https://learning.oreilly.com/library/view/~/9781119560265/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar</a><br/>Format: Electronic Resources<br/>Web security for developersent://SD_ILS/0/SD_ILS:23244222024-09-27T01:13:52Z2024-09-27T01:13:52Zby McDonald, Malcolm (Computer programmer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122683/?ar">https://learning.oreilly.com/library/view/~/9781098122683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122683">https://learning.oreilly.com/library/view/~/9781098122683</a><br/>Format: Electronic Resources<br/>Hacking : der umfassende Praxis-Guide: inkl. Prüfungsvorbereitung zum CEHv10ent://SD_ILS/0/SD_ILS:23259462024-09-27T01:13:52Z2024-09-27T01:13:52Zby Amberg, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206/?ar">https://learning.oreilly.com/library/view/~/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206">https://learning.oreilly.com/library/view/~/9783958452206</a><br/>Format: Electronic Resources<br/>Data breaches : crisis and opportunityent://SD_ILS/0/SD_ILS:23222222024-09-27T01:13:52Z2024-09-27T01:13:52Zby Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format: Electronic Resources<br/>Incident response primer : how to keep from getting pwned too hardent://SD_ILS/0/SD_ILS:23233162024-09-27T01:13:52Z2024-09-27T01:13:52Zby Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format: Electronic Resources<br/>IT auditing : using controls to protect information assetsent://SD_ILS/0/SD_ILS:23221262024-09-27T01:13:52Z2024-09-27T01:13:52Zby Kegerreis, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260453232/?ar">https://learning.oreilly.com/library/view/~/9781260453232/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar">https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar</a><br/>Format: Electronic Resources<br/>Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safeent://SD_ILS/0/SD_ILS:23248022024-09-27T01:13:52Z2024-09-27T01:13:52Zby Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format: Electronic Resources<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:23236272024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sadiqui, Ali, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar">https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786305275">https://learning.oreilly.com/library/view/~/9781786305275</a>
<a href="https://learning.oreilly.com/library/view/~/9781786305275/?ar">https://learning.oreilly.com/library/view/~/9781786305275/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadershipent://SD_ILS/0/SD_ILS:23235892024-09-27T01:13:52Z2024-09-27T01:13:52Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format: Electronic Resources<br/>The Complete 2020 Ethereum and Solidity Developer Bootcampent://SD_ILS/0/SD_ILS:23234782024-09-27T01:13:52Z2024-09-27T01:13:52Zby Wiesner, Thomas, author.<br/><a href="https://learning.oreilly.com/videos/~/9781800201019/?ar">https://learning.oreilly.com/videos/~/9781800201019/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar">https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781800201019">https://learning.oreilly.com/videos/~/9781800201019</a><br/>Format: Electronic Resources<br/>Designing a HIPAA-compliant security operations center : a guide to detecting and responding to healthcare breaches and eventsent://SD_ILS/0/SD_ILS:23233332024-09-27T01:13:52Z2024-09-27T01:13:52Zby Thompson, Eric C.<br/><a href="https://learning.oreilly.com/library/view/~/9781484256084">https://learning.oreilly.com/library/view/~/9781484256084</a>
<a href="https://learning.oreilly.com/library/view/~/9781484256084/?ar">https://learning.oreilly.com/library/view/~/9781484256084/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar</a><br/>Format: Electronic Resources<br/>Cyber Warfare - Truth, Tactics, and Strategiesent://SD_ILS/0/SD_ILS:23236672024-09-27T01:13:52Z2024-09-27T01:13:52Zby Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format: Electronic Resources<br/>Container security : fundamental technology concepts that protect containerized applicationsent://SD_ILS/0/SD_ILS:23238792024-09-27T01:13:52Z2024-09-27T01:13:52Zby Rice, Liz, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056690/?ar">https://learning.oreilly.com/library/view/~/9781492056690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492056690/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056690/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492056690">https://learning.oreilly.com/library/view/~/9781492056690</a><br/>Format: Electronic Resources<br/>Privileged attack vectors : building effective cyber-defense strategies to protect organizationsent://SD_ILS/0/SD_ILS:23246642024-09-27T01:13:52Z2024-09-27T01:13:52Zby Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146/?ar">https://learning.oreilly.com/library/view/~/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146">https://learning.oreilly.com/library/view/~/9781484259146</a><br/>Format: Electronic Resources<br/>Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloudent://SD_ILS/0/SD_ILS:23263952024-09-27T01:13:52Z2024-09-27T01:13:52Zby Calles, Miguel A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002/?ar">https://learning.oreilly.com/library/view/~/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002">https://learning.oreilly.com/library/view/~/9781484261002</a><br/>Format: Electronic Resources<br/>Rational cybersecurity for business : the security leaders' guide to business alignmentent://SD_ILS/0/SD_ILS:23254882024-09-27T01:13:52Z2024-09-27T01:13:52Zby Blum, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781484259528">https://learning.oreilly.com/library/view/~/9781484259528</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259528/?ar">https://learning.oreilly.com/library/view/~/9781484259528/?ar</a><br/>Format: Electronic Resources<br/>Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.ent://SD_ILS/0/SD_ILS:23260282024-09-27T01:13:52Z2024-09-27T01:13:52Zby Mukherjee, Aditya.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789806298/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806298/?ar">https://learning.oreilly.com/library/view/~/9781789806298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806298">https://learning.oreilly.com/library/view/~/9781789806298</a><br/>Format: Electronic Resources<br/>Learning node embeddings in transaction networksent://SD_ILS/0/SD_ILS:23263622024-09-27T01:13:52Z2024-09-27T01:13:52Zby Barbour, Jesse, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/00000HQHJ2T3KE2A/?ar">https://go.oreilly.com/library-access/library/view/-/00000HQHJ2T3KE2A/?ar</a>
<a href="https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A/?ar">https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A/?ar</a>
<a href="https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A">https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A</a><br/>Format: Electronic Resources<br/>Artificial intelligence, cybersecurity and cyber defenseent://SD_ILS/0/SD_ILS:22748782024-09-27T01:13:52Z2024-09-27T01:13:52Zby Ventre, Daniel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6384365">Click to View</a><br/>Format: Electronic Resources<br/>Computer network securityent://SD_ILS/0/SD_ILS:22742112024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sadiqui, Ali, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6123268">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity for dummiesent://SD_ILS/0/SD_ILS:23228392024-09-27T01:13:52Z2024-09-27T01:13:52Zby Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560326/?ar">https://learning.oreilly.com/library/view/~/9781119560326/?ar</a><br/>Format: Electronic Resources<br/>Securing microservices with Istio Service Meshent://SD_ILS/0/SD_ILS:23319502024-09-27T01:13:52Z2024-09-27T01:13:52Zby Siriwardena, Prabath, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202172">https://learning.oreilly.com/videos/~/10000MNLV202172</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202172/?ar">https://learning.oreilly.com/videos/~/10000MNLV202172/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar</a><br/>Format: Video recording<br/>Cloud Computing Security, 2nd Editionent://SD_ILS/0/SD_ILS:23311012024-09-27T01:13:52Z2024-09-27T01:13:52Zby Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>Secrets management with Terraforment://SD_ILS/0/SD_ILS:23319252024-09-27T01:13:52Z2024-09-27T01:13:52Zby Winkler, Scott, author, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202178">https://learning.oreilly.com/videos/~/10000MNLV202178</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202178/?ar">https://learning.oreilly.com/videos/~/10000MNLV202178/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202178/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202178/?ar</a><br/>Format: Video recording<br/>Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsuent://SD_ILS/0/SD_ILS:23326572024-09-27T01:13:52Z2024-09-27T01:13:52Zby Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format: Electronic Resources<br/>Rewired cybersecurity governanceent://SD_ILS/0/SD_ILS:22734242024-09-27T01:13:52Z2024-09-27T01:13:52Zby Ellis, Ryan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5761058">Click to View</a><br/>Format: Electronic Resources<br/>The complete Metasploit guide : explore effective penetration testing techniques with Metasploitent://SD_ILS/0/SD_ILS:22682362024-09-27T01:13:52Z2024-09-27T01:13:52Zby Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5802136">Click to View</a><br/>Format: Electronic Resources<br/>Security within Conasense Paragonent://SD_ILS/0/SD_ILS:22324832024-09-27T01:13:52Z2024-09-27T01:13:52Zby Prasad, Ramjee, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5829254">Click to View</a><br/>Format: Electronic Resources<br/>Smart cities cybersecurity and privacyent://SD_ILS/0/SD_ILS:22158832024-09-27T01:13:52Z2024-09-27T01:13:52Zby Kayhan Zrar Ghafoor, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5609779">Click to View</a><br/>Format: Electronic Resources<br/>Cyber and you : the impact of technology on our livesent://SD_ILS/0/SD_ILS:22170812024-09-27T01:13:52Z2024-09-27T01:13:52Zby Kendal, Maureen, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5811334">Click to View</a><br/>Format: Electronic Resources<br/>Qi ye shen tou ce shi he chi xu jian kong.ent://SD_ILS/0/SD_ILS:23322892024-09-27T01:13:52Z2024-09-27T01:13:52Zby Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format: Video recording<br/>Hands-on AWS penetration testing with Kali Linux : set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormationent://SD_ILS/0/SD_ILS:23214092024-09-27T01:13:52Z2024-09-27T01:13:52Zby Gilbert, Karl, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789136722">https://learning.oreilly.com/library/view/~/9781789136722</a>
<a href="https://learning.oreilly.com/library/view/~/9781789136722/?ar">https://learning.oreilly.com/library/view/~/9781789136722/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar">https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar</a><br/>Format: Electronic Resources<br/>Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environmentsent://SD_ILS/0/SD_ILS:23220552024-09-27T01:13:52Z2024-09-27T01:13:52Zby Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format: Electronic Resources<br/>Foundations of information security : a straightforward introductionent://SD_ILS/0/SD_ILS:23223132024-09-27T01:13:52Z2024-09-27T01:13:52Zby Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098122546/?ar">https://learning.oreilly.com/library/view/~/9781098122546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122546">https://learning.oreilly.com/library/view/~/9781098122546</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar</a><br/>Format: Electronic Resources<br/>IBM Spectrum Protect Plus : practical guidance for deployment, configuration, and usageent://SD_ILS/0/SD_ILS:23230172024-09-27T01:13:52Z2024-09-27T01:13:52Zby Gaschler, Andre, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738458045/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458045/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458045/?ar">https://learning.oreilly.com/library/view/~/9780738458045/?ar</a><br/>Format: Electronic Resources<br/>O'Reilly Velocity Conference 2019, San Jose, California.ent://SD_ILS/0/SD_ILS:23228862024-09-27T01:13:52Z2024-09-27T01:13:52Zby O'Reilly Velocity Conference (2019 : San Jose, Calif.) issuing body.<br/><a href="https://learning.oreilly.com/videos/~/9781492050582/?ar">https://learning.oreilly.com/videos/~/9781492050582/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492050582/?ar">https://go.oreilly.com/library-access/library/view/-/9781492050582/?ar</a><br/>Format: Electronic Resources<br/>Practical cloud security : a guide for secure design and deploymentent://SD_ILS/0/SD_ILS:23190052024-09-27T01:13:52Z2024-09-27T01:13:52Zby Dotson, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492037507">https://learning.oreilly.com/library/view/~/9781492037507</a>
<a href="https://learning.oreilly.com/library/view/~/9781492037507/?ar">https://learning.oreilly.com/library/view/~/9781492037507/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar</a><br/>Format: Electronic Resources<br/>Zabbix 4 network monitoring : monitor the performance of your network devices and applications using the all-new Zabbix 4.0ent://SD_ILS/0/SD_ILS:23190102024-09-27T01:13:52Z2024-09-27T01:13:52Zby Uytterhoeven, Patrik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340266/?ar">https://learning.oreilly.com/library/view/~/9781789340266/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar</a><br/>Format: Electronic Resources<br/>Fraud detection without feature engineeringent://SD_ILS/0/SD_ILS:23224342024-09-27T01:13:52Z2024-09-27T01:13:52Zby Vagata, Pamela, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540/?ar">https://learning.oreilly.com/videos/~/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540">https://learning.oreilly.com/videos/~/0636920339540</a><br/>Format: Electronic Resources<br/>Cybersecurity for dummiesent://SD_ILS/0/SD_ILS:23227472024-09-27T01:13:52Z2024-09-27T01:13:52Zby Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781494542450">https://learning.oreilly.com/library/view/~/9781494542450</a>
<a href="https://learning.oreilly.com/library/view/~/9781494542450/?ar">https://learning.oreilly.com/library/view/~/9781494542450/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar">https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar</a><br/>Format: Electronic Resources<br/>Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risksent://SD_ILS/0/SD_ILS:23219542024-09-27T01:13:52Z2024-09-27T01:13:52Zby Born, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789807608/?ar">https://learning.oreilly.com/library/view/~/9781789807608/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807608">https://learning.oreilly.com/library/view/~/9781789807608</a><br/>Format: Electronic Resources<br/>Waging cyber war : technical challenges and operational constraintsent://SD_ILS/0/SD_ILS:23219082024-09-27T01:13:52Z2024-09-27T01:13:52Zby Oakley, Jacob G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249505/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249505/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484249505/?ar">https://learning.oreilly.com/library/view/~/9781484249505/?ar</a><br/>Format: Electronic Resources<br/>The cybersecurity playbook : how every leader and employee can contribute to a culture of securityent://SD_ILS/0/SD_ILS:23215682024-09-27T01:13:52Z2024-09-27T01:13:52Zby Cerra, Allison, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar">https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196/?ar">https://learning.oreilly.com/library/view/~/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196">https://learning.oreilly.com/library/view/~/9781119442196</a><br/>Format: Electronic Resources<br/>Learn Wireshark : Confidently Navigate the Wireshark Interface and Solve Real-World Networking Problems.ent://SD_ILS/0/SD_ILS:23217012024-09-27T01:13:52Z2024-09-27T01:13:52Zby Bock, Lisa.<br/><a href="https://learning.oreilly.com/library/view/~/9781789134506">https://learning.oreilly.com/library/view/~/9781789134506</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789134506/?ar">https://go.oreilly.com/library-access/library/view/-/9781789134506/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789134506/?ar">https://learning.oreilly.com/library/view/~/9781789134506/?ar</a><br/>Format: Electronic Resources<br/>Pro Spring security : securing Spring Framework 5 and Boot 2-based Java applicationsent://SD_ILS/0/SD_ILS:23230722024-09-27T01:13:52Z2024-09-27T01:13:52Zby Scarioni, Carlo, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484250525/?ar">https://learning.oreilly.com/library/view/~/9781484250525/?ar</a><br/>Format: Electronic Resources<br/>Mastering Active Directory - Second Editionent://SD_ILS/0/SD_ILS:23239792024-09-27T01:13:52Z2024-09-27T01:13:52Zby Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789800203/?ar">https://learning.oreilly.com/library/view/~/9781789800203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar">https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789800203">https://learning.oreilly.com/library/view/~/9781789800203</a><br/>Format: Electronic Resources<br/>Protecting your web applications : solutions and strategies to combat cybersecurity threatsent://SD_ILS/0/SD_ILS:23211662024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sloper, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492052791">https://learning.oreilly.com/library/view/~/9781492052791</a>
<a href="https://learning.oreilly.com/library/view/~/9781492052791/?ar">https://learning.oreilly.com/library/view/~/9781492052791/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar</a><br/>Format: Electronic Resources<br/>Security principles for the working architectent://SD_ILS/0/SD_ILS:23226912024-09-27T01:13:52Z2024-09-27T01:13:52Zby Woods, Eoin, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338215/?ar">https://learning.oreilly.com/videos/~/0636920338215/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920338215">https://learning.oreilly.com/videos/~/0636920338215</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity of industrial systemsent://SD_ILS/0/SD_ILS:23212932024-09-27T01:13:52Z2024-09-27T01:13:52Zby Flaus, Jean-Marie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786304216/?ar">https://learning.oreilly.com/library/view/~/9781786304216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304216">https://learning.oreilly.com/library/view/~/9781786304216</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786304216/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304216/?ar</a><br/>Format: Electronic Resources<br/>Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessonsent://SD_ILS/0/SD_ILS:23215502024-09-27T01:13:52Z2024-09-27T01:13:52Zby Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format: Electronic Resources<br/>Linux troubleshooting course with real life examplesent://SD_ILS/0/SD_ILS:23232382024-09-27T01:13:52Z2024-09-27T01:13:52Zby Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format: Electronic Resources<br/>Learn Kali Linux 2019 : perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wiresharkent://SD_ILS/0/SD_ILS:23237682024-09-27T01:13:52Z2024-09-27T01:13:52Zby Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789611809/?ar">https://learning.oreilly.com/library/view/~/9781789611809/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789611809">https://learning.oreilly.com/library/view/~/9781789611809</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar">https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar</a><br/>Format: Electronic Resources<br/>The Complete Ethical Hacking Courseent://SD_ILS/0/SD_ILS:23231852024-09-27T01:13:52Z2024-09-27T01:13:52Zby Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format: Electronic Resources<br/>How Lyft migrated to a service mesh with Envoyent://SD_ILS/0/SD_ILS:23232962024-09-27T01:13:52Z2024-09-27T01:13:52Zby Hochman, Daniel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338390/?ar">https://learning.oreilly.com/videos/~/0636920338390/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920338390">https://learning.oreilly.com/videos/~/0636920338390</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity of industrial systemsent://SD_ILS/0/SD_ILS:22735712024-09-27T01:13:52Z2024-09-27T01:13:52Zby Flaus, Jean-Marie, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5813671">Click to View</a><br/>Format: Electronic Resources<br/>Computer security : art and scienceent://SD_ILS/0/SD_ILS:23184522024-09-27T01:13:52Z2024-09-27T01:13:52Zby Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format: Electronic Resources<br/>Learning Python for forensics : leverage the power of Python in forensic investigationsent://SD_ILS/0/SD_ILS:23191162024-09-27T01:13:52Z2024-09-27T01:13:52Zby Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format: Electronic Resources<br/>Becoming the hacker : the playbook for getting inside the mind of an attackerent://SD_ILS/0/SD_ILS:23191292024-09-27T01:13:52Z2024-09-27T01:13:52Zby Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Electronic Resources<br/>Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualizationent://SD_ILS/0/SD_ILS:23189382024-09-27T01:13:52Z2024-09-27T01:13:52Zby Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134807614/?ar">https://learning.oreilly.com/library/view/~/9780134807614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807614">https://learning.oreilly.com/library/view/~/9780134807614</a><br/>Format: Electronic Resources<br/>Cyber smart : five habits to protect your family, money, and identity from cyber criminalsent://SD_ILS/0/SD_ILS:23188682024-09-27T01:13:52Z2024-09-27T01:13:52Zby McDonough, Bart R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469071503/?ar">https://learning.oreilly.com/library/view/~/9781469071503/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar">https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469071503">https://learning.oreilly.com/library/view/~/9781469071503</a><br/>Format: Sound recording<br/>Practical security automation and testing : tools and techniques for automated security scanning and testing in DevSecOpsent://SD_ILS/0/SD_ILS:23190962024-09-27T01:13:52Z2024-09-27T01:13:52Zby Hsu, Tony Hsiang-Chih, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789802023/?ar">https://learning.oreilly.com/library/view/~/9781789802023/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789802023/?ar">https://go.oreilly.com/library-access/library/view/-/9781789802023/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Enterprise Mobility and Security trainingent://SD_ILS/0/SD_ILS:23195562024-09-27T01:13:52Z2024-09-27T01:13:52Zby Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format: Electronic Resources<br/>Practical security : simple practices for defending your systemsent://SD_ILS/0/SD_ILS:23194022024-09-27T01:13:52Z2024-09-27T01:13:52Zby Zabicki, Roman, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar">https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679">https://learning.oreilly.com/library/view/~/9781680506679</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679/?ar">https://learning.oreilly.com/library/view/~/9781680506679/?ar</a><br/>Format: Electronic Resources<br/>Practical cyber forensics : an incident-based approach to forensic investigationsent://SD_ILS/0/SD_ILS:23215212024-09-27T01:13:52Z2024-09-27T01:13:52Zby Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format: Electronic Resources<br/>Cyber resiliency solution for IBM Spectrum Scaleent://SD_ILS/0/SD_ILS:23221452024-09-27T01:13:52Z2024-09-27T01:13:52Zby IBM Storage Team, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457963/?ar">https://learning.oreilly.com/library/view/~/9780738457963/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar</a><br/>Format: Electronic Resources<br/>PCI DSS : a pocket guideent://SD_ILS/0/SD_ILS:23221602024-09-27T01:13:52Z2024-09-27T01:13:52Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781641/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781641/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781641/?ar">https://learning.oreilly.com/library/view/~/9781787781641/?ar</a><br/>Format: Electronic Resources<br/>Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloudent://SD_ILS/0/SD_ILS:23214882024-09-27T01:13:52Z2024-09-27T01:13:52Zby Berkouwer, Sander, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806984">https://learning.oreilly.com/library/view/~/9781789806984</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806984/?ar">https://learning.oreilly.com/library/view/~/9781789806984/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar</a><br/>Format: Electronic Resources<br/>Bug bounty hunting for web security : find and exploit vulnerabilities in web sites and applicationsent://SD_ILS/0/SD_ILS:23230372024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sinha, Sanjib, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484253915/?ar">https://learning.oreilly.com/library/view/~/9781484253915/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484253915/?ar">https://go.oreilly.com/library-access/library/view/-/9781484253915/?ar</a><br/>Format: Electronic Resources<br/>Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and dataent://SD_ILS/0/SD_ILS:23192382024-09-27T01:13:52Z2024-09-27T01:13:52Zby Nickel, Jochen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789132304/?ar">https://learning.oreilly.com/library/view/~/9781789132304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar">https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar</a><br/>Format: Electronic Resources<br/>Threat and vulnerability assessment for enterprisesent://SD_ILS/0/SD_ILS:23192772024-09-27T01:13:52Z2024-09-27T01:13:52Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781838559205/?ar">https://learning.oreilly.com/videos/~/9781838559205/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar">https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar</a><br/>Format: Electronic Resources<br/>Spring security : LiveLessonsent://SD_ILS/0/SD_ILS:23184932024-09-27T01:13:52Z2024-09-27T01:13:52Zby Long, Josh, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar">https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780135415054/?ar">https://learning.oreilly.com/videos/~/9780135415054/?ar</a><br/>Format: Electronic Resources<br/>Hands-on network forensics : investigate network attacks and find evidence using common network forensic toolsent://SD_ILS/0/SD_ILS:23198362024-09-27T01:13:52Z2024-09-27T01:13:52Zby Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789344523/?ar">https://learning.oreilly.com/library/view/~/9781789344523/?ar</a><br/>Format: Electronic Resources<br/>My online privacy for seniorsent://SD_ILS/0/SD_ILS:23194122024-09-27T01:13:52Z2024-09-27T01:13:52Zby Rich, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135381281/?ar">https://learning.oreilly.com/library/view/~/9780135381281/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar">https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar</a><br/>Format: Electronic Resources<br/>Linux essentials for cybersecurity lab manualent://SD_ILS/0/SD_ILS:23175582024-09-27T01:13:52Z2024-09-27T01:13:52Zby Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format: Electronic Resources<br/>Data analytics for IT networks : developing innovative use casesent://SD_ILS/0/SD_ILS:23175592024-09-27T01:13:52Z2024-09-27T01:13:52Zby Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testingent://SD_ILS/0/SD_ILS:23198472024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format: Electronic Resources<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:23195342024-09-27T01:13:52Z2024-09-27T01:13:52Zby Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a>
<a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format: Electronic Resources<br/>Hands-on application penetration testing with Burp Suite : use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applicationsent://SD_ILS/0/SD_ILS:23193602024-09-27T01:13:52Z2024-09-27T01:13:52Zby Lozano, Carlos A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788994064/?ar">https://learning.oreilly.com/library/view/~/9781788994064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar">https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788994064">https://learning.oreilly.com/library/view/~/9781788994064</a><br/>Format: Electronic Resources<br/>Hands-on penetration testing with Kali NetHunter : spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the goent://SD_ILS/0/SD_ILS:23193612024-09-27T01:13:52Z2024-09-27T01:13:52Zby Singh, Glen D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995177/?ar">https://learning.oreilly.com/library/view/~/9781788995177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995177">https://learning.oreilly.com/library/view/~/9781788995177</a><br/>Format: Electronic Resources<br/>Web hacking : become a professional web pentesterent://SD_ILS/0/SD_ILS:23198312024-09-27T01:13:52Z2024-09-27T01:13:52Zby Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux 2019.1, the ultimate white hat hackers' toolkitent://SD_ILS/0/SD_ILS:23191142024-09-27T01:13:52Z2024-09-27T01:13:52Zby Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340563/?ar">https://learning.oreilly.com/library/view/~/9781789340563/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity Ops with bash : attack, defend, and analyze from the command lineent://SD_ILS/0/SD_ILS:23192522024-09-27T01:13:52Z2024-09-27T01:13:52Zby Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format: Electronic Resources<br/>Security with AI and machine learning : using advanced tools to improve application security at the edgeent://SD_ILS/0/SD_ILS:23190582024-09-27T01:13:52Z2024-09-27T01:13:52Zby Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format: Electronic Resources<br/>Cyber operations : building, defending, and attacking modern computer networksent://SD_ILS/0/SD_ILS:23189142024-09-27T01:13:52Z2024-09-27T01:13:52Zby O'Leary, Mike, 1968- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242940">https://learning.oreilly.com/library/view/~/9781484242940</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242940/?ar">https://learning.oreilly.com/library/view/~/9781484242940/?ar</a><br/>Format: Electronic Resources<br/>Hands-on pfSense 2.x for firewalls and routersent://SD_ILS/0/SD_ILS:23193342024-09-27T01:13:52Z2024-09-27T01:13:52Zby White, Jason, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789805017/?ar">https://go.oreilly.com/library-access/library/view/-/9781789805017/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789805017/?ar">https://learning.oreilly.com/videos/~/9781789805017/?ar</a><br/>Format: Electronic Resources<br/>Microsoft AZ-301 certification : Azure architect designent://SD_ILS/0/SD_ILS:23208262024-09-27T01:13:52Z2024-09-27T01:13:52Zby Colyer, Nick, speaker.<br/><a href="https://learning.oreilly.com/videos/~/1018947653/?ar">https://learning.oreilly.com/videos/~/1018947653/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1018947653/?ar">https://go.oreilly.com/library-access/library/view/-/1018947653/?ar</a>
<a href="https://learning.oreilly.com/videos/~/1018947653">https://learning.oreilly.com/videos/~/1018947653</a><br/>Format: Electronic Resources<br/>Zero trust networks with VMware NSX : build highly secure network architectures for your data centersent://SD_ILS/0/SD_ILS:23226592024-09-27T01:13:52Z2024-09-27T01:13:52Zby Keeriyattil, Sreejith, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484254318">https://learning.oreilly.com/library/view/~/9781484254318</a>
<a href="https://learning.oreilly.com/library/view/~/9781484254318/?ar">https://learning.oreilly.com/library/view/~/9781484254318/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484254318/?ar">https://go.oreilly.com/library-access/library/view/-/9781484254318/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers : cybersecurity advice from the best hackers in the worldent://SD_ILS/0/SD_ILS:23214522024-09-27T01:13:52Z2024-09-27T01:13:52Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format: Electronic Resources<br/>Practical cloud security.ent://SD_ILS/0/SD_ILS:23346162024-09-27T01:13:52Z2024-09-27T01:13:52Zby Dotson, Chris, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar">https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727">https://learning.oreilly.com/videos/~/9781492060727</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727/?ar">https://learning.oreilly.com/videos/~/9781492060727/?ar</a><br/>Format: Video recording<br/>Implementing Cisco network security, Part 2.ent://SD_ILS/0/SD_ILS:23348012024-09-27T01:13:52Z2024-09-27T01:13:52Zby Pickard, John, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar">https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920303213">https://learning.oreilly.com/videos/~/0636920303213</a>
<a href="https://learning.oreilly.com/videos/~/0636920303213/?ar">https://learning.oreilly.com/videos/~/0636920303213/?ar</a><br/>Format: Video recording<br/>The business of cybersecurity : foundations and ideologiesent://SD_ILS/0/SD_ILS:21569012024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5770273">Click to View</a><br/>Format: Electronic Resources<br/>Understanding security issuesent://SD_ILS/0/SD_ILS:21445942024-09-27T01:13:52Z2024-09-27T01:13:52Zby Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157542">Click to View</a><br/>Format: Electronic Resources<br/>Insider threatsent://SD_ILS/0/SD_ILS:22726222024-09-27T01:13:52Z2024-09-27T01:13:52Zby Arduin, Pierre-Emmanuel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5323674">Click to View</a><br/>Format: Electronic Resources<br/>Hands-on incident response and digital forensicsent://SD_ILS/0/SD_ILS:22678472024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sheward, Mike, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5614288">Click to View</a><br/>Format: Electronic Resources<br/>Internet of things security : fundamentals, techniques and applicationsent://SD_ILS/0/SD_ILS:22310652024-09-27T01:13:52Z2024-09-27T01:13:52Zby Shandilya, Shishir K., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5493971">Click to View</a><br/>Format: Electronic Resources<br/>Network vulnerability assessment : identify security loopholes in your network's infrastructureent://SD_ILS/0/SD_ILS:22151062024-09-27T01:13:52Z2024-09-27T01:13:52Zby Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5507753">Click to View</a><br/>Format: Electronic Resources<br/>Network security and cryptography : a self-teaching introductionent://SD_ILS/0/SD_ILS:22144602024-09-27T01:13:52Z2024-09-27T01:13:52Zby Musa, Sarhan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5389089">Click to View</a><br/>Format: Electronic Resources<br/>Mobilita, sicurezza e nuove frontiere tecnologicheent://SD_ILS/0/SD_ILS:22411882024-09-27T01:13:52Z2024-09-27T01:13:52Zby Militello, Vincenzo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5662503">Click to View</a><br/>Format: Electronic Resources<br/>Security and resilience in intelligent data-centric systems and communication networksent://SD_ILS/0/SD_ILS:22131042024-09-27T01:13:52Z2024-09-27T01:13:52Zby Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5090270">Click to View</a><br/>Format: Electronic Resources<br/>The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical securityent://SD_ILS/0/SD_ILS:22128452024-09-27T01:13:52Z2024-09-27T01:13:52Zby Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4981408">Click to View</a><br/>Format: Electronic Resources<br/>Hei ke wang luo ying yong : wang luo qin ru ying yong.ent://SD_ILS/0/SD_ILS:23322882024-09-27T01:13:52Z2024-09-27T01:13:52Zby Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a>
<a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format: Video recording<br/>Unsupervised machine learning in security applications.ent://SD_ILS/0/SD_ILS:23347842024-09-27T01:13:52Z2024-09-27T01:13:52Zby Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032373">https://learning.oreilly.com/videos/~/9781492032373</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492032373/?ar">https://learning.oreilly.com/videos/~/9781492032373/?ar</a><br/>Format: Video recording<br/>Securing microservices : protect sensitive data in transit and at rest.ent://SD_ILS/0/SD_ILS:23347872024-09-27T01:13:52Z2024-09-27T01:13:52Zby Newman, Sam, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar">https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492038986/?ar">https://learning.oreilly.com/videos/~/9781492038986/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492038986">https://learning.oreilly.com/videos/~/9781492038986</a><br/>Format: Video recording<br/>Digital forensics and cyber crime with Kali Linux fundamentalsent://SD_ILS/0/SD_ILS:23140432024-09-27T01:13:52Z2024-09-27T01:13:52Zby Muniz, Joseph, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar">https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134693644/?ar">https://learning.oreilly.com/videos/~/9780134693644/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity attacks (Red Team activity)ent://SD_ILS/0/SD_ILS:23159862024-09-27T01:13:52Z2024-09-27T01:13:52Zby Nesterenko, Sergii, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781788478878/?ar">https://learning.oreilly.com/videos/~/9781788478878/?ar</a><br/>Format: Electronic Resources<br/>Empirical research for software security : foundations and experienceent://SD_ILS/0/SD_ILS:21086702024-09-27T01:13:52Z2024-09-27T01:13:52Zby ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5164090">Click to View</a><br/>Format: Electronic Resources<br/>IT-Sicherheit : Eine Einführungent://SD_ILS/0/SD_ILS:21225202024-09-27T01:13:52Z2024-09-27T01:13:52Zby Hellmann, Roland, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157634">Click to View</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855042024-09-27T01:13:52Z2024-09-27T01:13:52Zby Chowdhury, Kaushik Roy. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02931-9">https://doi.org/10.1007/978-3-030-02931-9</a><br/>Format: Electronic Resources<br/>Smart Computing and Communication Third International Conference, SmartCom 2018, Tokyo, Japan, December 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853942024-09-27T01:13:52Z2024-09-27T01:13:52Zby Qiu, Meikang. editor. (orcid)0000-0002-1004-0140<br/><a href="https://doi.org/10.1007/978-3-030-05755-8">https://doi.org/10.1007/978-3-030-05755-8</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20855512024-09-27T01:13:52Z2024-09-27T01:13:52Zby Budaghyan, Lilya. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format: Electronic Resources<br/>Cyberspace and cybersecurityent://SD_ILS/0/SD_ILS:22607692024-09-27T01:13:52Z2024-09-27T01:13:52Zby Kostopoulos, George K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5110029">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity essentialsent://SD_ILS/0/SD_ILS:23224822024-09-27T01:13:52Z2024-09-27T01:13:52Zby Brooks, Charles J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119362395/?ar">https://learning.oreilly.com/library/view/~/9781119362395/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar">https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking : orchestrating attacksent://SD_ILS/0/SD_ILS:23185102024-09-27T01:13:52Z2024-09-27T01:13:52Zby Gupta, Sunil, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484243404/?ar">https://learning.oreilly.com/videos/~/9781484243404/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking : networks and websitesent://SD_ILS/0/SD_ILS:23185112024-09-27T01:13:52Z2024-09-27T01:13:52Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243411/?ar">https://learning.oreilly.com/videos/~/9781484243411/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar</a><br/>Format: Electronic Resources<br/>Velocity Conference - London, UK 2018ent://SD_ILS/0/SD_ILS:23211912024-09-27T01:13:52Z2024-09-27T01:13:52Zby O'Reilly (Firm), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492025931/?ar">https://go.oreilly.com/library-access/library/view/-/9781492025931/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492025931">https://learning.oreilly.com/videos/~/9781492025931</a>
<a href="https://learning.oreilly.com/videos/~/9781492025931/?ar">https://learning.oreilly.com/videos/~/9781492025931/?ar</a><br/>Format: Electronic Resources<br/>The Board's Role in Managing Cybersecurity Risksent://SD_ILS/0/SD_ILS:23207492024-09-27T01:13:52Z2024-09-27T01:13:52Zby Rothrock, Ray, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221/?ar">https://learning.oreilly.com/library/view/~/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221">https://learning.oreilly.com/library/view/~/53863MIT59221</a><br/>Format: Electronic Resources<br/>Threat hunting : a guide to proactive network defenseent://SD_ILS/0/SD_ILS:23184442024-09-27T01:13:52Z2024-09-27T01:13:52Zby Collins, Michael (Michael Patrick), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028260/?ar">https://learning.oreilly.com/library/view/~/9781492028260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028260">https://learning.oreilly.com/library/view/~/9781492028260</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar</a><br/>Format: Electronic Resources<br/>Modernizing cybersecurity operations with machine intelligence : advanced threat detection, hunting, and analysisent://SD_ILS/0/SD_ILS:23184562024-09-27T01:13:52Z2024-09-27T01:13:52Zby Guerra, Peter, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar">https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492035992/?ar">https://learning.oreilly.com/library/view/~/9781492035992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492035992">https://learning.oreilly.com/library/view/~/9781492035992</a><br/>Format: Electronic Resources<br/>Practical internet of things security : design a security framework for an Internet connected ecosystement://SD_ILS/0/SD_ILS:23186282024-09-27T01:13:52Z2024-09-27T01:13:52Zby Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625821/?ar">https://learning.oreilly.com/library/view/~/9781788625821/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar</a><br/>Format: Electronic Resources<br/>Digital resilience : is your company ready for the next cyber threat?ent://SD_ILS/0/SD_ILS:23147342024-09-27T01:13:52Z2024-09-27T01:13:52Zby Rothrock, Ray A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814439258">https://learning.oreilly.com/library/view/~/9780814439258</a>
<a href="https://learning.oreilly.com/library/view/~/9780814439258/?ar">https://learning.oreilly.com/library/view/~/9780814439258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar">https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar</a><br/>Format: Electronic Resources<br/>Learning Python web penetration testing : automate web penetration testing activities using Pythonent://SD_ILS/0/SD_ILS:23170262024-09-27T01:13:52Z2024-09-27T01:13:52Zby Martorella, Christian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789533972/?ar">https://learning.oreilly.com/library/view/~/9781789533972/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789533972/?ar">https://go.oreilly.com/library-access/library/view/-/9781789533972/?ar</a><br/>Format: Electronic Resources<br/>Learn ethical hacking from scratchent://SD_ILS/0/SD_ILS:23169232024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789340297/?ar">https://learning.oreilly.com/videos/~/9781789340297/?ar</a><br/>Format: Electronic Resources<br/>Integrated security technologies and solutions. Volume I, Cisco Security Solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content securityent://SD_ILS/0/SD_ILS:23163882024-09-27T01:13:52Z2024-09-27T01:13:52Zby Woland, Aaron T., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807577/?ar">https://learning.oreilly.com/library/view/~/9780134807577/?ar</a><br/>Format: Electronic Resources<br/>WiFi hacking : wireless penetration testing for beginnersent://SD_ILS/0/SD_ILS:23167722024-09-27T01:13:52Z2024-09-27T01:13:52Zby Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530193/?ar">https://learning.oreilly.com/videos/~/9781789530193/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Azure security centerent://SD_ILS/0/SD_ILS:23167782024-09-27T01:13:52Z2024-09-27T01:13:52Zby Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format: Electronic Resources<br/>Hands-on incident response and digital forensicsent://SD_ILS/0/SD_ILS:23171142024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780174204/?ar">https://learning.oreilly.com/library/view/~/9781780174204/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780174204">https://learning.oreilly.com/library/view/~/9781780174204</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780174204/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174204/?ar</a><br/>Format: Electronic Resources<br/>Practical web penetration testing : secure web applications using Burp Suite, Nmap, Metasploit, and moreent://SD_ILS/0/SD_ILS:23170032024-09-27T01:13:52Z2024-09-27T01:13:52Zby Khawaja, Gus, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624039/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624039/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788624039/?ar">https://learning.oreilly.com/library/view/~/9781788624039/?ar</a><br/>Format: Electronic Resources<br/>Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessusent://SD_ILS/0/SD_ILS:23167002024-09-27T01:13:52Z2024-09-27T01:13:52Zby Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format: Electronic Resources<br/>Linux security and hardening : the practical security guideent://SD_ILS/0/SD_ILS:23178602024-09-27T01:13:52Z2024-09-27T01:13:52Zby Cannon, Jason, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789612820/?ar">https://learning.oreilly.com/videos/~/9781789612820/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789612820/?ar">https://go.oreilly.com/library-access/library/view/-/9781789612820/?ar</a><br/>Format: Electronic Resources<br/>Web application firewalls : securing modern web applicationsent://SD_ILS/0/SD_ILS:23184972024-09-27T01:13:52Z2024-09-27T01:13:52Zby Russell, Chad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492032311">https://learning.oreilly.com/library/view/~/9781492032311</a>
<a href="https://learning.oreilly.com/library/view/~/9781492032311/?ar">https://learning.oreilly.com/library/view/~/9781492032311/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar</a><br/>Format: Electronic Resources<br/>Cisco Firepower Threat Defense (FTD) : configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP)ent://SD_ILS/0/SD_ILS:23143932024-09-27T01:13:52Z2024-09-27T01:13:52Zby Rajib, Nazmul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134679471">https://learning.oreilly.com/library/view/~/9780134679471</a>
<a href="https://learning.oreilly.com/library/view/~/9780134679471/?ar">https://learning.oreilly.com/library/view/~/9780134679471/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar">https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar</a><br/>Format: Electronic Resources<br/>Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threatsent://SD_ILS/0/SD_ILS:23168332024-09-27T01:13:52Z2024-09-27T01:13:52Zby Crouthamel, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788626521/?ar">https://learning.oreilly.com/library/view/~/9781788626521/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar">https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar</a><br/>Format: Electronic Resources<br/>Mastering machine learning for penetration testing : develop an extensive skill set to break self-learning systems using Pythonent://SD_ILS/0/SD_ILS:23170352024-09-27T01:13:52Z2024-09-27T01:13:52Zby Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788997409/?ar">https://go.oreilly.com/library-access/library/view/-/9781788997409/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788997409/?ar">https://learning.oreilly.com/library/view/~/9781788997409/?ar</a><br/>Format: Electronic Resources<br/>Hacking for Dummies.ent://SD_ILS/0/SD_ILS:23168832024-09-27T01:13:52Z2024-09-27T01:13:52Zby Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119485476/?ar">https://go.oreilly.com/library-access/library/view/-/9781119485476/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119485476/?ar">https://learning.oreilly.com/library/view/~/9781119485476/?ar</a><br/>Format: Electronic Resources<br/>Hacking web performance : moving beyond the basics of web performance optimizationent://SD_ILS/0/SD_ILS:23169022024-09-27T01:13:52Z2024-09-27T01:13:52Zby Firtman, Maximiliano R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039426/?ar">https://learning.oreilly.com/library/view/~/9781492039426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039426">https://learning.oreilly.com/library/view/~/9781492039426</a><br/>Format: Electronic Resources<br/>Learn ethical hacking from scratch : your stepping stone to penetration testingent://SD_ILS/0/SD_ILS:23172592024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sabih, Zaid, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar">https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788622059">https://learning.oreilly.com/library/view/~/9781788622059</a>
<a href="https://learning.oreilly.com/library/view/~/9781788622059/?ar">https://learning.oreilly.com/library/view/~/9781788622059/?ar</a><br/>Format: Electronic Resources<br/>Learning Kali Linux : security testing, penetration testing, and ethical hackingent://SD_ILS/0/SD_ILS:23169782024-09-27T01:13:52Z2024-09-27T01:13:52Zby Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028680/?ar">https://learning.oreilly.com/library/view/~/9781492028680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028680">https://learning.oreilly.com/library/view/~/9781492028680</a><br/>Format: Electronic Resources<br/>Practical Industrial Internet of Things security : a practitioner's guide to securing connected industriesent://SD_ILS/0/SD_ILS:23172852024-09-27T01:13:52Z2024-09-27T01:13:52Zby Bhattacharjee, Sravani, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788832687/?ar">https://learning.oreilly.com/library/view/~/9781788832687/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788832687">https://learning.oreilly.com/library/view/~/9781788832687</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar">https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar</a><br/>Format: Electronic Resources<br/>Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOpsent://SD_ILS/0/SD_ILS:23172982024-09-27T01:13:52Z2024-09-27T01:13:52Zby Hsu, Tony, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788995504/?ar">https://learning.oreilly.com/library/view/~/9781788995504/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995504">https://learning.oreilly.com/library/view/~/9781788995504</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity incident response : how to contain, eradicate, and recover from incidentsent://SD_ILS/0/SD_ILS:23176702024-09-27T01:13:52Z2024-09-27T01:13:52Zby Thompson, Eric C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238707/?ar">https://learning.oreilly.com/library/view/~/9781484238707/?ar</a><br/>Format: Electronic Resources<br/>Hands-on red team tactics : a practical guide to mastering red team operationsent://SD_ILS/0/SD_ILS:23177922024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sharma, Himanshu, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995238">https://learning.oreilly.com/library/view/~/9781788995238</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995238/?ar">https://learning.oreilly.com/library/view/~/9781788995238/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking : learning the basicsent://SD_ILS/0/SD_ILS:23185272024-09-27T01:13:52Z2024-09-27T01:13:52Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243480/?ar">https://learning.oreilly.com/videos/~/9781484243480/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar</a><br/>Format: Electronic Resources<br/>Threat intelligence in practice : a practical guide to threat intelligence from successful organizationsent://SD_ILS/0/SD_ILS:23184352024-09-27T01:13:52Z2024-09-27T01:13:52Zby Liska, Allan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar">https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492049302/?ar">https://learning.oreilly.com/library/view/~/9781492049302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492049302">https://learning.oreilly.com/library/view/~/9781492049302</a><br/>Format: Electronic Resources<br/>Linux® hardening in hostile networks : server security from TLS to TORent://SD_ILS/0/SD_ILS:23141772024-09-27T01:13:52Z2024-09-27T01:13:52Zby Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format: Electronic Resources<br/>The art of hacking : self paced traning kit for cyber security professionalsent://SD_ILS/0/SD_ILS:23156582024-09-27T01:13:52Z2024-09-27T01:13:52Zby Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854632/?ar">https://learning.oreilly.com/videos/~/9780134854632/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134854632/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854632/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity program development for business : the essential planning guideent://SD_ILS/0/SD_ILS:23161002024-09-27T01:13:52Z2024-09-27T01:13:52Zby Moschovitis, Christos J. P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119429517/?ar">https://go.oreilly.com/library-access/library/view/-/9781119429517/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119429517/?ar">https://learning.oreilly.com/library/view/~/9781119429517/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119429517">https://learning.oreilly.com/library/view/~/9781119429517</a><br/>Format: Electronic Resources<br/>Orchestrating and automating security for the Internet of Things : delivering advanced security capabilities from Edge to Cloud for IoTent://SD_ILS/0/SD_ILS:23162332024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sabella, Anthony, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134756936/?ar">https://go.oreilly.com/library-access/library/view/-/9780134756936/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134756936/?ar">https://learning.oreilly.com/library/view/~/9780134756936/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134756936">https://learning.oreilly.com/library/view/~/9780134756936</a><br/>Format: Electronic Resources<br/>IBM QRadar Version 7.3 : planning and installation guideent://SD_ILS/0/SD_ILS:23154742024-09-27T01:13:52Z2024-09-27T01:13:52Zby Carabaguiaz, Elias, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442877/?ar">https://learning.oreilly.com/library/view/~/9780738442877/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar</a><br/>Format: Electronic Resources<br/>Mastering reverse engineering : re-engineer your ethical hacking skillsent://SD_ILS/0/SD_ILS:23190892024-09-27T01:13:52Z2024-09-27T01:13:52Zby Wong, Reginald, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788838849/?ar">https://learning.oreilly.com/library/view/~/9781788838849/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar">https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar</a><br/>Format: Electronic Resources<br/>Take Control of 1Password, 4th Editionent://SD_ILS/0/SD_ILS:23194742024-09-27T01:13:52Z2024-09-27T01:13:52Zby Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format: Electronic Resources<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:23161522024-09-27T01:13:52Z2024-09-27T01:13:52Zby Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format: Electronic Resources<br/>Monitoring anti-patternsent://SD_ILS/0/SD_ILS:23156802024-09-27T01:13:52Z2024-09-27T01:13:52Zby Julian, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492036791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492036791/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492036791/?ar">https://learning.oreilly.com/library/view/~/9781492036791/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492036791">https://learning.oreilly.com/library/view/~/9781492036791</a><br/>Format: Electronic Resources<br/>Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackersent://SD_ILS/0/SD_ILS:23160892024-09-27T01:13:52Z2024-09-27T01:13:52Zby Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tacticsent://SD_ILS/0/SD_ILS:23157062024-09-27T01:13:52Z2024-09-27T01:13:52Zby Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format: Electronic Resources<br/>Engineering trustworthy systems : get cybersecurity design right the first timeent://SD_ILS/0/SD_ILS:23163162024-09-27T01:13:52Z2024-09-27T01:13:52Zby Saydjari, O. Sami, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260118186/?ar">https://go.oreilly.com/library-access/library/view/-/9781260118186/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260118186/?ar">https://learning.oreilly.com/library/view/~/9781260118186/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260118186">https://learning.oreilly.com/library/view/~/9781260118186</a><br/>Format: Electronic Resources<br/>Building a modern security program : adapting security for DevOps and cloudent://SD_ILS/0/SD_ILS:23171662024-09-27T01:13:52Z2024-09-27T01:13:52Zby Lackey, Zane, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492044680/?ar">https://learning.oreilly.com/library/view/~/9781492044680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492044680">https://learning.oreilly.com/library/view/~/9781492044680</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492044680/?ar">https://go.oreilly.com/library-access/library/view/-/9781492044680/?ar</a><br/>Format: Electronic Resources<br/>Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchainent://SD_ILS/0/SD_ILS:23170922024-09-27T01:13:52Z2024-09-27T01:13:52Zby Gupta, Rajneesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990189">https://learning.oreilly.com/library/view/~/9781788990189</a>
<a href="https://learning.oreilly.com/library/view/~/9781788990189/?ar">https://learning.oreilly.com/library/view/~/9781788990189/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar</a><br/>Format: Electronic Resources<br/>Learn social engineering from scratchent://SD_ILS/0/SD_ILS:23166002024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sabih, Zaid, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789341584/?ar">https://learning.oreilly.com/videos/~/9781789341584/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789341584/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341584/?ar</a><br/>Format: Electronic Resources<br/>Cyber security : endpoint defenseent://SD_ILS/0/SD_ILS:23166132024-09-27T01:13:52Z2024-09-27T01:13:52Zby Dewey, Gary, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788990981/?ar">https://learning.oreilly.com/videos/~/9781788990981/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar</a><br/>Format: Electronic Resources<br/>Burp Suite cookbook : practical recipes to help you master web penetration testing with Burp Suiteent://SD_ILS/0/SD_ILS:23177232024-09-27T01:13:52Z2024-09-27T01:13:52Zby Wear, Sunny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789531732">https://learning.oreilly.com/library/view/~/9781789531732</a>
<a href="https://learning.oreilly.com/library/view/~/9781789531732/?ar">https://learning.oreilly.com/library/view/~/9781789531732/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar</a><br/>Format: Electronic Resources<br/>Hands-on bug hunting for penetration testers : a practical guide to help ethical hackers discover web application security flawsent://SD_ILS/0/SD_ILS:23178232024-09-27T01:13:52Z2024-09-27T01:13:52Zby Marshall, Joseph, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789344202">https://learning.oreilly.com/library/view/~/9781789344202</a>
<a href="https://learning.oreilly.com/library/view/~/9781789344202/?ar">https://learning.oreilly.com/library/view/~/9781789344202/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking masterclassent://SD_ILS/0/SD_ILS:23177482024-09-27T01:13:52Z2024-09-27T01:13:52Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789530018/?ar">https://learning.oreilly.com/videos/~/9781789530018/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar</a><br/>Format: Electronic Resources<br/>Network security with pfSense : architect, deploy, and operate enterprise-grade firewallsent://SD_ILS/0/SD_ILS:23172952024-09-27T01:13:52Z2024-09-27T01:13:52Zby Aggarwal, Manuj, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789532975">https://learning.oreilly.com/library/view/~/9781789532975</a>
<a href="https://learning.oreilly.com/library/view/~/9781789532975/?ar">https://learning.oreilly.com/library/view/~/9781789532975/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789532975/?ar">https://go.oreilly.com/library-access/library/view/-/9781789532975/?ar</a><br/>Format: Electronic Resources<br/>Ansible quick start guide : Control and monitor infrastructures of any size, physical or virtualent://SD_ILS/0/SD_ILS:23177982024-09-27T01:13:52Z2024-09-27T01:13:52Zby Alibi, Mohamed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789532937">https://learning.oreilly.com/library/view/~/9781789532937</a>
<a href="https://learning.oreilly.com/library/view/~/9781789532937/?ar">https://learning.oreilly.com/library/view/~/9781789532937/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789532937/?ar">https://go.oreilly.com/library-access/library/view/-/9781789532937/?ar</a><br/>Format: Electronic Resources<br/>Kubernetes security : operating Kubernetes clusters and applications safelyent://SD_ILS/0/SD_ILS:23185192024-09-27T01:13:52Z2024-09-27T01:13:52Zby Rice, Liz, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492039075">https://learning.oreilly.com/library/view/~/9781492039075</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039075/?ar">https://learning.oreilly.com/library/view/~/9781492039075/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar</a><br/>Format: Electronic Resources<br/>Practical monitoring : effective strategies for the real worldent://SD_ILS/0/SD_ILS:23147482024-09-27T01:13:52Z2024-09-27T01:13:52Zby Julian, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491957349/?ar">https://go.oreilly.com/library-access/library/view/-/9781491957349/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491957349/?ar">https://learning.oreilly.com/library/view/~/9781491957349/?ar</a><br/>Format: Electronic Resources<br/>Privileged attack vectors : building effective cyber-defense strategies to protect organizationsent://SD_ILS/0/SD_ILS:23148702024-09-27T01:13:52Z2024-09-27T01:13:52Zby Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format: Electronic Resources<br/>Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linuxent://SD_ILS/0/SD_ILS:23159982024-09-27T01:13:52Z2024-09-27T01:13:52Zby Najera-Gutierrez, Gilberto, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar">https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788623377/?ar">https://learning.oreilly.com/library/view/~/9781788623377/?ar</a><br/>Format: Electronic Resources<br/>CCSP Certified Cloud Security Professional practice examsent://SD_ILS/0/SD_ILS:23160012024-09-27T01:13:52Z2024-09-27T01:13:52Zby Carter, Daniel, CISSP, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260031362">https://learning.oreilly.com/library/view/~/9781260031362</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260031362/?ar">https://go.oreilly.com/library-access/library/view/-/9781260031362/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260031362/?ar">https://learning.oreilly.com/library/view/~/9781260031362/?ar</a><br/>Format: Electronic Resources<br/>Learn website hacking : penetration testing from scratchent://SD_ILS/0/SD_ILS:23164342024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789346145/?ar">https://learning.oreilly.com/videos/~/9781789346145/?ar</a><br/>Format: Electronic Resources<br/>Cloud security automation : get to grips with automating your cloud security on AWS and OpenStackent://SD_ILS/0/SD_ILS:23163442024-09-27T01:13:52Z2024-09-27T01:13:52Zby Priyam, Prashant, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627863/?ar">https://learning.oreilly.com/library/view/~/9781788627863/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar</a><br/>Format: Electronic Resources<br/>Practical cyber intelligence : how action-based intelligence can be an effective response to incidentsent://SD_ILS/0/SD_ILS:23163482024-09-27T01:13:52Z2024-09-27T01:13:52Zby Bautista, Wilson, Jr., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788625562">https://learning.oreilly.com/library/view/~/9781788625562</a>
<a href="https://learning.oreilly.com/library/view/~/9781788625562/?ar">https://learning.oreilly.com/library/view/~/9781788625562/?ar</a><br/>Format: Electronic Resources<br/>Open source intelligence methods and tools : a practical guide to online intelligenceent://SD_ILS/0/SD_ILS:23169162024-09-27T01:13:52Z2024-09-27T01:13:52Zby Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232132">https://learning.oreilly.com/library/view/~/9781484232132</a>
<a href="https://learning.oreilly.com/library/view/~/9781484232132/?ar">https://learning.oreilly.com/library/view/~/9781484232132/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar</a><br/>Format: Electronic Resources<br/>EVPN in the data centerent://SD_ILS/0/SD_ILS:23171482024-09-27T01:13:52Z2024-09-27T01:13:52Zby Dutt, Dinesh G., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492029045">https://learning.oreilly.com/library/view/~/9781492029045</a>
<a href="https://learning.oreilly.com/library/view/~/9781492029045/?ar">https://learning.oreilly.com/library/view/~/9781492029045/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492029045/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029045/?ar</a><br/>Format: Electronic Resources<br/>Fixing an insecure software life cycle : practical techniques for building security into existing software development programsent://SD_ILS/0/SD_ILS:23164982024-09-27T01:13:52Z2024-09-27T01:13:52Zby Wright, April C., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028222">https://learning.oreilly.com/library/view/~/9781492028222</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028222/?ar">https://learning.oreilly.com/library/view/~/9781492028222/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492028222/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028222/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity program development for business : the essential planning guideent://SD_ILS/0/SD_ILS:23168742024-09-27T01:13:52Z2024-09-27T01:13:52Zby Moschovitis, Christos J. P.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781469098753/?ar">https://go.oreilly.com/library-access/library/view/-/9781469098753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469098753/?ar">https://learning.oreilly.com/library/view/~/9781469098753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469098753">https://learning.oreilly.com/library/view/~/9781469098753</a><br/>Format: Sound recording<br/>Kali Linux tutorial for beginnersent://SD_ILS/0/SD_ILS:23175792024-09-27T01:13:52Z2024-09-27T01:13:52Zby Naja, Tarek, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar">https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789615173/?ar">https://learning.oreilly.com/videos/~/9781789615173/?ar</a><br/>Format: Electronic Resources<br/>Supervised machine learning in security applications.ent://SD_ILS/0/SD_ILS:23347732024-09-27T01:13:52Z2024-09-27T01:13:52Zby Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032410">https://learning.oreilly.com/videos/~/9781492032410</a>
<a href="https://learning.oreilly.com/videos/~/9781492032410/?ar">https://learning.oreilly.com/videos/~/9781492032410/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar</a><br/>Format: Video recording<br/>Network scanning cookbook : practical network security using Nmap and Nessus 7ent://SD_ILS/0/SD_ILS:23177762024-09-27T01:13:52Z2024-09-27T01:13:52Zby Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format: Electronic Resources<br/>Securing microservice APIs : sustainable and scalable access controlent://SD_ILS/0/SD_ILS:23184252024-09-27T01:13:52Z2024-09-27T01:13:52Zby McLarty, Matt, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492027140">https://learning.oreilly.com/library/view/~/9781492027140</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492027140/?ar">https://go.oreilly.com/library-access/library/view/-/9781492027140/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492027140/?ar">https://learning.oreilly.com/library/view/~/9781492027140/?ar</a><br/>Format: Electronic Resources<br/>IT-Sicherheitsmanagement - Praxiswissen für IT Security Manager, 2. Auflageent://SD_ILS/0/SD_ILS:23201052024-09-27T01:13:52Z2024-09-27T01:13:52Zby Harich, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9783958452756/?ar">https://learning.oreilly.com/library/view/~/9783958452756/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452756">https://learning.oreilly.com/library/view/~/9783958452756</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar</a><br/>Format: Electronic Resources<br/>Investigating the Cyber Breach : the digital forensics guide for the network engineerent://SD_ILS/0/SD_ILS:23153452024-09-27T01:13:52Z2024-09-27T01:13:52Zby Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar">https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134755885/?ar">https://learning.oreilly.com/library/view/~/9780134755885/?ar</a><br/>Format: Electronic Resources<br/>Learn social engineering : learn the art of human hacking with an internationally renowned expertent://SD_ILS/0/SD_ILS:23165462024-09-27T01:13:52Z2024-09-27T01:13:52Zby Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar">https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788837927/?ar">https://learning.oreilly.com/library/view/~/9781788837927/?ar</a><br/>Format: Electronic Resources<br/>Netzwerkprotokolle hacken : Sicherheislücken verstehen, analysieren und schützenent://SD_ILS/0/SD_ILS:23171212024-09-27T01:13:52Z2024-09-27T01:13:52Zby Forshaw, James, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492068631/?ar">https://learning.oreilly.com/library/view/~/9781492068631/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492068631/?ar">https://go.oreilly.com/library-access/library/view/-/9781492068631/?ar</a><br/>Format: Electronic Resources<br/>Risk management for cybersecurity and IT managersent://SD_ILS/0/SD_ILS:23168452024-09-27T01:13:52Z2024-09-27T01:13:52Zby Dion, Jason, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789531992/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531992/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789531992/?ar">https://learning.oreilly.com/videos/~/9781789531992/?ar</a><br/>Format: Electronic Resources<br/>Preparing and exploring security data for machine learning.ent://SD_ILS/0/SD_ILS:23347702024-09-27T01:13:52Z2024-09-27T01:13:52Zby Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032335">https://learning.oreilly.com/videos/~/9781492032335</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492032335/?ar">https://learning.oreilly.com/videos/~/9781492032335/?ar</a><br/>Format: Video recording<br/>Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tacticsent://SD_ILS/0/SD_ILS:23401592024-09-27T01:13:52Z2024-09-27T01:13:52Zby Diogenes, Yuri, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5259454">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity program development for business : the essential planning guideent://SD_ILS/0/SD_ILS:21124732024-09-27T01:13:52Z2024-09-27T01:13:52Zby Moschovitis, Christos J. P., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5342325">Click to View</a><br/>Format: Electronic Resources<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:21329282024-09-27T01:13:52Z2024-09-27T01:13:52Zby Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4987646">Click to View</a><br/>Format: Electronic Resources<br/>Fuzzing for software security testing and quality assuranceent://SD_ILS/0/SD_ILS:21564652024-09-27T01:13:52Z2024-09-27T01:13:52Zby Takanen, Ari, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5430720">Click to View</a><br/>Format: Electronic Resources<br/>Penetration testing bootcamp : quickly get up and running with pentesting techniquesent://SD_ILS/0/SD_ILS:22722242024-09-27T01:13:52Z2024-09-27T01:13:52Zby Beltrame, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4891268">Click to View</a><br/>Format: Electronic Resources<br/>Security automation with ansible 2 : leverage ansible 2 to automate complex security tasks like application security, network security, and malware analysisent://SD_ILS/0/SD_ILS:22724572024-09-27T01:13:52Z2024-09-27T01:13:52Zby Akula, Madhu, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5188229">Click to View</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:22123012024-09-27T01:13:52Z2024-09-27T01:13:52Zby Vacca, John R., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4858374">Click to View</a><br/>Format: Electronic Resources<br/>Security operations center guidebook : a practical guide for a successful SOCent://SD_ILS/0/SD_ILS:22123322024-09-27T01:13:52Z2024-09-27T01:13:52Zby Jarpey, Gregory , author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4862661">Click to View</a><br/>Format: Electronic Resources<br/>Advanced persistent threat : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategiesent://SD_ILS/0/SD_ILS:22111592024-09-27T01:13:52Z2024-09-27T01:13:52Zby Winkler, Ira, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4730826">Click to View</a><br/>Format: Electronic Resources<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:22112802024-09-27T01:13:52Z2024-09-27T01:13:52Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4743573">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux - the ultimate hackers' arsenalent://SD_ILS/0/SD_ILS:22666852024-09-27T01:13:52Z2024-09-27T01:13:52Zby Velu, Vijay Kumar, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4898742">Click to View</a><br/>Format: Electronic Resources<br/>Metasploit bootcamp : a fast-paced guide to enhance your pentesting skills.ent://SD_ILS/0/SD_ILS:22357402024-09-27T01:13:52Z2024-09-27T01:13:52Zby Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4866345">Click to View</a><br/>Format: Electronic Resources<br/>Spring security : secure your web applications, RESTful services, and microservice architecturesent://SD_ILS/0/SD_ILS:22301482024-09-27T01:13:52Z2024-09-27T01:13:52Zby Knutson, Mick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5165113">Click to View</a><br/>Format: Electronic Resources<br/>Industrial cybersecurity : efficiently secure critical infrastructure systemsent://SD_ILS/0/SD_ILS:22300282024-09-27T01:13:52Z2024-09-27T01:13:52Zby Ackerman, Pascal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5110693">Click to View</a><br/>Format: Electronic Resources<br/>New solutions for cybersecurityent://SD_ILS/0/SD_ILS:22201952024-09-27T01:13:52Z2024-09-27T01:13:52Zby Shrobe, Howard E., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5240456">Click to View</a><br/>Format: Electronic Resources<br/>Cybercrime and business : strategies for global corporate securityent://SD_ILS/0/SD_ILS:22123622024-09-27T01:13:52Z2024-09-27T01:13:52Zby Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4863624">Click to View</a><br/>Format: Electronic Resources<br/>Safety of web applications : risks, encryption and handling vulnerabilities with PHPent://SD_ILS/0/SD_ILS:22121092024-09-27T01:13:52Z2024-09-27T01:13:52Zby Quinton, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4840953">Click to View</a><br/>Format: Electronic Resources<br/>Security in network functions virtualizationent://SD_ILS/0/SD_ILS:22134702024-09-27T01:13:52Z2024-09-27T01:13:52Zby Zhang, Zonghua, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5152998">Click to View</a><br/>Format: Electronic Resources<br/>Mobile security and privacy : advances, challenges and future research directionsent://SD_ILS/0/SD_ILS:22107842024-09-27T01:13:52Z2024-09-27T01:13:52Zby Au, Man-Ho, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4689767">Click to View</a><br/>Format: Electronic Resources<br/>Forensic analysis of computer memory.ent://SD_ILS/0/SD_ILS:23347972024-09-27T01:13:52Z2024-09-27T01:13:52Zby Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029144">https://learning.oreilly.com/videos/~/9781492029144</a>
<a href="https://learning.oreilly.com/videos/~/9781492029144/?ar">https://learning.oreilly.com/videos/~/9781492029144/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar</a><br/>Format: Video recording<br/>Managing SSH clients and servers.ent://SD_ILS/0/SD_ILS:23343442024-09-27T01:13:52Z2024-09-27T01:13:52Zby Wallen, Jack, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar">https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492031666">https://learning.oreilly.com/videos/~/9781492031666</a>
<a href="https://learning.oreilly.com/videos/~/9781492031666/?ar">https://learning.oreilly.com/videos/~/9781492031666/?ar</a><br/>Format: Video recording<br/>CCSP Certified Cloud Security Professional exam guideent://SD_ILS/0/SD_ILS:23122482024-09-27T01:13:52Z2024-09-27T01:13:52Zby Carter, Daniel, CISSP.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781259835452/?ar">https://go.oreilly.com/library-access/library/view/-/9781259835452/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781259835452/?ar">https://learning.oreilly.com/library/view/~/9781259835452/?ar</a><br/>Format: Electronic Resources<br/>