Search Results for - Narrowed by: English - O'reilly E-Books - Computer networks -- Security measures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AOREILLY$002509O$002527reilly$002bE-Books$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?
2024-06-21T01:49:01Z
Wireshark for network forensics : an essential guide for IT and cloud professionals
ent://SD_ILS/0/SD_ILS:2335445
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Nainar, Nagendra Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484290019/?ar">https://learning.oreilly.com/library/view/~/9781484290019/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484290019/?ar">https://go.oreilly.com/library-access/library/view/-/9781484290019/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484290019">https://learning.oreilly.com/library/view/~/9781484290019</a><br/>Format: Electronic Resources<br/>
Winning the national security AI competition : a practical guide for government and industry leaders
ent://SD_ILS/0/SD_ILS:2335230
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Whitlock, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484288146">https://learning.oreilly.com/library/view/~/9781484288146</a>
<a href="https://learning.oreilly.com/library/view/~/9781484288146/?ar">https://learning.oreilly.com/library/view/~/9781484288146/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484288146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484288146/?ar</a><br/>Format: Electronic Resources<br/>
Learning digital identity : design, deploy, and manage identity architectures
ent://SD_ILS/0/SD_ILS:2334739
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Windley, Phillip J., 1958- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098117689/?ar">https://learning.oreilly.com/library/view/~/9781098117689/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098117689">https://learning.oreilly.com/library/view/~/9781098117689</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar">https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar</a><br/>Format: Electronic Resources<br/>
Exam MS-100 Microsoft 365 identity and services.
ent://SD_ILS/0/SD_ILS:2335515
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Costello, Dan, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137648689/?ar">https://learning.oreilly.com/videos/~/9780137648689/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137648689">https://learning.oreilly.com/videos/~/9780137648689</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137648689/?ar">https://go.oreilly.com/library-access/library/view/-/9780137648689/?ar</a><br/>Format: Video recording<br/>
Cybersecurity For Dummies
ent://SD_ILS/0/SD_ILS:2332872
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119867180">https://learning.oreilly.com/library/view/~/9781119867180</a>
<a href="https://learning.oreilly.com/library/view/~/9781119867180/?ar">https://learning.oreilly.com/library/view/~/9781119867180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar">https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity pevention and detection (Video collection).
ent://SD_ILS/0/SD_ILS:2332252
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137929351">https://learning.oreilly.com/videos/~/9780137929351</a>
<a href="https://learning.oreilly.com/videos/~/9780137929351/?ar">https://learning.oreilly.com/videos/~/9780137929351/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137929351/?ar">https://go.oreilly.com/library-access/library/view/-/9780137929351/?ar</a><br/>Format: Video recording<br/>
Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadar
ent://SD_ILS/0/SD_ILS:2332057
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by IBM Storage Team, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260/?ar">https://learning.oreilly.com/library/view/~/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260">https://learning.oreilly.com/library/view/~/9780738460260</a><br/>Format: Electronic Resources<br/>
Single sign-on and passwordless authentication : an overview.
ent://SD_ILS/0/SD_ILS:2333558
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Ovcharov, Andrey, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202294">https://learning.oreilly.com/videos/~/10000MNHV202294</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202294/?ar">https://learning.oreilly.com/videos/~/10000MNHV202294/?ar</a><br/>Format: Video recording<br/>
Threat modeling with Owasp Threat Dragon & risk rating a vulnerability.
ent://SD_ILS/0/SD_ILS:2332599
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Fisher, Derek, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202248/?ar">https://learning.oreilly.com/videos/~/10000MNHV202248/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202248">https://learning.oreilly.com/videos/~/10000MNHV202248</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar</a><br/>Format: Video recording<br/>
Finding your cyber security path.
ent://SD_ILS/0/SD_ILS:2332701
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Miller, Alyssa, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202258">https://learning.oreilly.com/videos/~/10000MNHV202258</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202258/?ar">https://learning.oreilly.com/videos/~/10000MNHV202258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar</a><br/>Format: Video recording<br/>
Hacking
ent://SD_ILS/0/SD_ILS:2332886
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Beaver, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119872191">https://learning.oreilly.com/library/view/~/9781119872191</a>
<a href="https://learning.oreilly.com/library/view/~/9781119872191/?ar">https://learning.oreilly.com/library/view/~/9781119872191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar">https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar</a><br/>Format: Electronic Resources<br/>
Defensive cybersecurity fundamentals
ent://SD_ILS/0/SD_ILS:2333379
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Berlin, Amanda, author.<br/><a href="https://learning.oreilly.com/videos/~/0636920670896/?ar">https://learning.oreilly.com/videos/~/0636920670896/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920670896/?ar">https://go.oreilly.com/library-access/library/view/-/0636920670896/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920670896">https://learning.oreilly.com/videos/~/0636920670896</a><br/>Format: Video recording<br/>
Mastering Palo Alto networks : build, configure and deploy network solutions for your infrastructure using features of PAN-OS
ent://SD_ILS/0/SD_ILS:2333518
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Piens, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803241418/?ar">https://go.oreilly.com/library-access/library/view/-/9781803241418/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803241418/?ar">https://learning.oreilly.com/library/view/~/9781803241418/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803241418">https://learning.oreilly.com/library/view/~/9781803241418</a><br/>Format: Electronic Resources<br/>
The complete cybersecurity bootcamp
ent://SD_ILS/0/SD_ILS:2333407
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137949397">https://learning.oreilly.com/videos/~/9780137949397</a>
<a href="https://learning.oreilly.com/videos/~/9780137949397/?ar">https://learning.oreilly.com/videos/~/9780137949397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar">https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar</a><br/>Format: Video recording<br/>
Cyber resiliency with IBM QRadar and IBM Spectrum Virtualize for Public Cloud on Azure with IBM Copy Services Manager for Safeguarded Copy
ent://SD_ILS/0/SD_ILS:2333811
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by International Business Machines Corporation, issuing body.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460628">https://learning.oreilly.com/library/view/~/9780738460628</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460628/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460628/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460628/?ar">https://learning.oreilly.com/library/view/~/9780738460628/?ar</a><br/>Format: Electronic Resources<br/>
The security culture playbook : an executive guide to reducing risk and developing your human defense layer
ent://SD_ILS/0/SD_ILS:2334218
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Carpenter, Perry, author, narrator.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar">https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781663720177">https://learning.oreilly.com/library/view/~/9781663720177</a>
<a href="https://learning.oreilly.com/library/view/~/9781663720177/?ar">https://learning.oreilly.com/library/view/~/9781663720177/?ar</a><br/>Format: Sound recording<br/>
Apache essentials : install, configure, maintain
ent://SD_ILS/0/SD_ILS:2334281
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Harkness, Darren James, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484283240/?ar">https://go.oreilly.com/library-access/library/view/-/9781484283240/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484283240/?ar">https://learning.oreilly.com/library/view/~/9781484283240/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484283240">https://learning.oreilly.com/library/view/~/9781484283240</a><br/>Format: Electronic Resources<br/>
Network security : private communications in a public world
ent://SD_ILS/0/SD_ILS:2334128
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Kaufman, Charlie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780136643531">https://learning.oreilly.com/library/view/~/9780136643531</a>
<a href="https://learning.oreilly.com/library/view/~/9780136643531/?ar">https://learning.oreilly.com/library/view/~/9780136643531/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780136643531/?ar">https://go.oreilly.com/library-access/library/view/-/9780136643531/?ar</a><br/>Format: Electronic Resources<br/>
Transitioning to quantum-safe cryptography on IBM Z
ent://SD_ILS/0/SD_ILS:2333933
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by White, Bill (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460680">https://learning.oreilly.com/library/view/~/9780738460680</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460680/?ar">https://learning.oreilly.com/library/view/~/9780738460680/?ar</a><br/>Format: Electronic Resources<br/>
Network protocols for security professionals : probe and identify network-based vulnerabilities and safeguard against network protocol breaches
ent://SD_ILS/0/SD_ILS:2334886
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Orzach, Yoram.<br/><a href="https://learning.oreilly.com/library/view/~/9781789953480">https://learning.oreilly.com/library/view/~/9781789953480</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789953480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789953480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789953480/?ar">https://learning.oreilly.com/library/view/~/9781789953480/?ar</a><br/>Format: Electronic Resources<br/>
Diving into secure access service Edge : a technical leadership guide to achieving success with sase at market speed
ent://SD_ILS/0/SD_ILS:2335081
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Ginn, Jeremiah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803242170/?ar">https://go.oreilly.com/library-access/library/view/-/9781803242170/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242170">https://learning.oreilly.com/library/view/~/9781803242170</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242170/?ar">https://learning.oreilly.com/library/view/~/9781803242170/?ar</a><br/>Format: Electronic Resources<br/>
Secure web application development : a hands-on guide with Python and Django
ent://SD_ILS/0/SD_ILS:2334906
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Baker, Matthew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484285961">https://learning.oreilly.com/library/view/~/9781484285961</a>
<a href="https://learning.oreilly.com/library/view/~/9781484285961/?ar">https://learning.oreilly.com/library/view/~/9781484285961/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484285961/?ar">https://go.oreilly.com/library-access/library/view/-/9781484285961/?ar</a><br/>Format: Electronic Resources<br/>
Information security handbook
ent://SD_ILS/0/SD_ILS:2330245
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Jhanjhi, Noor Zaman, 1972- editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000540567">https://learning.oreilly.com/library/view/~/9781000540567</a>
<a href="https://learning.oreilly.com/library/view/~/9781000540567/?ar">https://learning.oreilly.com/library/view/~/9781000540567/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000540567/?ar">https://go.oreilly.com/library-access/library/view/-/9781000540567/?ar</a><br/>Format: Electronic Resources<br/>
SC-300 : Microsoft Identity and Access Administrator.
ent://SD_ILS/0/SD_ILS:2331717
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Nednur, Anand Rao, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803238043/?ar">https://learning.oreilly.com/videos/~/9781803238043/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803238043">https://learning.oreilly.com/videos/~/9781803238043</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803238043/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238043/?ar</a><br/>Format: Video recording<br/>
Mastering Kali Linux for advanced penetration testing : apply a proactive approach to secure your cyber infrastructure and enchance your pentesting skills
ent://SD_ILS/0/SD_ILS:2332062
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801819770">https://learning.oreilly.com/library/view/~/9781801819770</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801819770/?ar">https://go.oreilly.com/library-access/library/view/-/9781801819770/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801819770/?ar">https://learning.oreilly.com/library/view/~/9781801819770/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security for dummies
ent://SD_ILS/0/SD_ILS:2332936
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Coombs, Ted, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar">https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9798765008096/?ar">https://learning.oreilly.com/library/view/~/9798765008096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9798765008096">https://learning.oreilly.com/library/view/~/9798765008096</a><br/>Format: Sound recording<br/>
Understand, manage, and measure cyber risk : practical solutions for creating a sustainable cyber program
ent://SD_ILS/0/SD_ILS:2331428
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Leirvik, Ryan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484278215/?ar">https://go.oreilly.com/library-access/library/view/-/9781484278215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484278215/?ar">https://learning.oreilly.com/library/view/~/9781484278215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484278215">https://learning.oreilly.com/library/view/~/9781484278215</a><br/>Format: Electronic Resources<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:2332538
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Pramanik, Sabyasachi, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119812494">https://learning.oreilly.com/library/view/~/9781119812494</a>
<a href="https://learning.oreilly.com/library/view/~/9781119812494/?ar">https://learning.oreilly.com/library/view/~/9781119812494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar">https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar</a><br/>Format: Electronic Resources<br/>
The security culture playbook : an executive guide to reducing risk and developing your human defense layer
ent://SD_ILS/0/SD_ILS:2332410
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119875239/?ar">https://learning.oreilly.com/library/view/~/9781119875239/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119875239">https://learning.oreilly.com/library/view/~/9781119875239</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar">https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar</a><br/>Format: Electronic Resources<br/>
Breached! : why data security law fails and how to improve it
ent://SD_ILS/0/SD_ILS:2332956
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Solove, Daniel J., 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781705056271/?ar">https://go.oreilly.com/library-access/library/view/-/9781705056271/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781705056271/?ar">https://learning.oreilly.com/library/view/~/9781705056271/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781705056271">https://learning.oreilly.com/library/view/~/9781705056271</a><br/>Format: Sound recording<br/>
Hands-on threat modeling
ent://SD_ILS/0/SD_ILS:2333383
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Deleersnyder, Sebastien, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671268">https://learning.oreilly.com/videos/~/0636920671268</a>
<a href="https://learning.oreilly.com/videos/~/0636920671268/?ar">https://learning.oreilly.com/videos/~/0636920671268/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar</a><br/>Format: Video recording<br/>
Windows Network security fundamentals
ent://SD_ILS/0/SD_ILS:2333384
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Weadock, Glenn E., presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206">https://learning.oreilly.com/videos/~/0636920671206</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206/?ar">https://learning.oreilly.com/videos/~/0636920671206/?ar</a><br/>Format: Video recording<br/>
Introduction to social engineering
ent://SD_ILS/0/SD_ILS:2333857
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Assemble You, publisher.<br/><a href="https://go.oreilly.com/library-access/library/view/-/125051AYPOD/?ar">https://go.oreilly.com/library-access/library/view/-/125051AYPOD/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/125051AYPOD">https://learning.oreilly.com/library/view/~/125051AYPOD</a>
<a href="https://learning.oreilly.com/library/view/~/125051AYPOD/?ar">https://learning.oreilly.com/library/view/~/125051AYPOD/?ar</a><br/>Format: Sound recording<br/>
Offensive hacking unfolded. Become a pro Pentester.
ent://SD_ILS/0/SD_ILS:2334688
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Yadav, Avinash, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar">https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781804615294/?ar">https://learning.oreilly.com/videos/~/9781804615294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781804615294">https://learning.oreilly.com/videos/~/9781804615294</a><br/>Format: Video recording<br/>
Identity and access management fundamentals.
ent://SD_ILS/0/SD_ILS:2335277
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Kohli, Harpreet, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671145/?ar">https://learning.oreilly.com/videos/~/0636920671145/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920671145">https://learning.oreilly.com/videos/~/0636920671145</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar</a><br/>Format: Video recording<br/>
Web hacking expert : full-stack exploitation mastery.
ent://SD_ILS/0/SD_ILS:2335278
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Czagan, Dawid, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717">https://learning.oreilly.com/videos/~/9781837639717</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717/?ar">https://learning.oreilly.com/videos/~/9781837639717/?ar</a><br/>Format: Video recording<br/>
Web hacker's toolbox : tools used by successful hackers.
ent://SD_ILS/0/SD_ILS:2335459
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Czagan, Dawid, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837632831/?ar">https://learning.oreilly.com/videos/~/9781837632831/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837632831">https://learning.oreilly.com/videos/~/9781837632831</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar</a><br/>Format: Video recording<br/>
Digital forensics and incident response : incident response tools and techniques for effective cyber threat response
ent://SD_ILS/0/SD_ILS:2335361
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Johansen, Gerard, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803238678/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238678/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238678/?ar">https://learning.oreilly.com/library/view/~/9781803238678/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238678">https://learning.oreilly.com/library/view/~/9781803238678</a><br/>Format: Electronic Resources<br/>
Getting started with IBM Hyper Protect Data Controller
ent://SD_ILS/0/SD_ILS:2331451
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format: Electronic Resources<br/>
Python for cybersecurity : using Python for cyber offense and defense
ent://SD_ILS/0/SD_ILS:2331574
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Poston, Howard E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar">https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649/?ar">https://learning.oreilly.com/library/view/~/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649">https://learning.oreilly.com/library/view/~/9781119850649</a><br/>Format: Electronic Resources<br/>
Navigating the cybersecurity career path
ent://SD_ILS/0/SD_ILS:2330836
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Patton, Helen E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119833420">https://learning.oreilly.com/library/view/~/9781119833420</a>
<a href="https://learning.oreilly.com/library/view/~/9781119833420/?ar">https://learning.oreilly.com/library/view/~/9781119833420/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar">https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar</a><br/>Format: Electronic Resources<br/>
Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy
ent://SD_ILS/0/SD_ILS:2333950
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Shingornikar, Shashank, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460710/?ar">https://learning.oreilly.com/library/view/~/9780738460710/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460710">https://learning.oreilly.com/library/view/~/9780738460710</a><br/>Format: Electronic Resources<br/>
Cyber warfare : truth, tactics, and strategies : strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
ent://SD_ILS/0/SD_ILS:2334694
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Cunningham, Chase, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801076876">https://learning.oreilly.com/library/view/~/9781801076876</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076876/?ar">https://learning.oreilly.com/library/view/~/9781801076876/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801076876/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076876/?ar</a><br/>Format: Sound recording<br/>
Making sense of cybersecurity
ent://SD_ILS/0/SD_ILS:2335000
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Kranz, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617298004/?ar">https://learning.oreilly.com/library/view/~/9781617298004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617298004">https://learning.oreilly.com/library/view/~/9781617298004</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar">https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar</a><br/>Format: Electronic Resources<br/>
OPNsense Beginner to Professional : Protect Networks and Build Next-Generation Firewalls Easily with OPNsense
ent://SD_ILS/0/SD_ILS:2333204
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Camargo, Julio Cesar Bueno de.<br/><a href="https://learning.oreilly.com/library/view/~/9781801816878/?ar">https://learning.oreilly.com/library/view/~/9781801816878/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801816878">https://learning.oreilly.com/library/view/~/9781801816878</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801816878/?ar">https://go.oreilly.com/library-access/library/view/-/9781801816878/?ar</a><br/>Format: Electronic Resources<br/>
Executive's guide to cyber risk : securing the future today
ent://SD_ILS/0/SD_ILS:2333211
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Moyo, Siegfried, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119863113">https://learning.oreilly.com/library/view/~/9781119863113</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar">https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119863113/?ar">https://learning.oreilly.com/library/view/~/9781119863113/?ar</a><br/>Format: Electronic Resources<br/>
Mastering Azure security : keeping your Microsoft Azure workloads safe
ent://SD_ILS/0/SD_ILS:2332927
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Toroman, Mustafa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803238555">https://learning.oreilly.com/library/view/~/9781803238555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238555/?ar">https://learning.oreilly.com/library/view/~/9781803238555/?ar</a><br/>Format: Electronic Resources<br/>
Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud
ent://SD_ILS/0/SD_ILS:2333792
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Berkouwer, Sander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar">https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242507/?ar">https://learning.oreilly.com/library/view/~/9781803242507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242507">https://learning.oreilly.com/library/view/~/9781803242507</a><br/>Format: Electronic Resources<br/>
How to hack like a legend : breaking windows
ent://SD_ILS/0/SD_ILS:2334190
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098141431/?ar">https://learning.oreilly.com/library/view/~/9781098141431/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar">https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098141431">https://learning.oreilly.com/library/view/~/9781098141431</a><br/>Format: Electronic Resources<br/>
Learn Wireshark : a definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark
ent://SD_ILS/0/SD_ILS:2334004
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Bock, Lisa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803231679/?ar">https://learning.oreilly.com/library/view/~/9781803231679/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803231679/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803231679">https://learning.oreilly.com/library/view/~/9781803231679</a><br/>Format: Electronic Resources<br/>
Practical cyber hacking skills for beginners.
ent://SD_ILS/0/SD_ILS:2335514
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar">https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181">https://learning.oreilly.com/videos/~/9781837636181</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181/?ar">https://learning.oreilly.com/videos/~/9781837636181/?ar</a><br/>Format: Video recording<br/>
Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000
ent://SD_ILS/0/SD_ILS:2332067
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by International Business Machines Corporation, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406/?ar">https://learning.oreilly.com/library/view/~/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406">https://learning.oreilly.com/library/view/~/9780738460406</a><br/>Format: Electronic Resources<br/>
Shifting left for application security : bridging the divide between DevOps and security with the right security tools
ent://SD_ILS/0/SD_ILS:2332575
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security for dummies
ent://SD_ILS/0/SD_ILS:2332497
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a>
<a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format: Electronic Resources<br/>
How cybersecurity really works : a hands-on guide for total beginners
ent://SD_ILS/0/SD_ILS:2328036
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Grubb, Sam (Cyber security consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999/?ar">https://learning.oreilly.com/library/view/~/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999">https://learning.oreilly.com/library/view/~/9781098128999</a><br/>Format: Electronic Resources<br/>
Artificial Intelligence, Cybersecurity and Cyber Defence
ent://SD_ILS/0/SD_ILS:2328358
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format: Electronic Resources<br/>
Pentesting Industrial Control Systems : an Ethical Hacker's Guide to Analyzing, Compromising, Mitigating, and Securing Industrial Processes.
ent://SD_ILS/0/SD_ILS:2330864
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Smith, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202382/?ar">https://learning.oreilly.com/library/view/~/9781800202382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202382">https://learning.oreilly.com/library/view/~/9781800202382</a><br/>Format: Electronic Resources<br/>
Multi-site network and security services with NSX-T : implement network security, stateful services, and operations
ent://SD_ILS/0/SD_ILS:2328881
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Hoogendoorn, Iwan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484270837/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270837/?ar">https://learning.oreilly.com/library/view/~/9781484270837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270837">https://learning.oreilly.com/library/view/~/9781484270837</a><br/>Format: Electronic Resources<br/>
Zero Trust security : an enterprise guide
ent://SD_ILS/0/SD_ILS:2328396
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Garbis, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484267028">https://learning.oreilly.com/library/view/~/9781484267028</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484267028/?ar">https://go.oreilly.com/library-access/library/view/-/9781484267028/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484267028/?ar">https://learning.oreilly.com/library/view/~/9781484267028/?ar</a><br/>Format: Electronic Resources<br/>
Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade antivirus software
ent://SD_ILS/0/SD_ILS:2329434
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Yehoshua, Nir, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801079747/?ar">https://learning.oreilly.com/library/view/~/9781801079747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar">https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801079747">https://learning.oreilly.com/library/view/~/9781801079747</a><br/>Format: Electronic Resources<br/>
Cyberjutsu : cybersecurity for the modern ninja
ent://SD_ILS/0/SD_ILS:2326541
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format: Electronic Resources<br/>
CEH v11 certified ethical hacker study guide
ent://SD_ILS/0/SD_ILS:2329776
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119800286/?ar">https://learning.oreilly.com/library/view/~/9781119800286/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar">https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119800286">https://learning.oreilly.com/library/view/~/9781119800286</a><br/>Format: Electronic Resources<br/>
Penetration Testing Azure for Ethical Hackers
ent://SD_ILS/0/SD_ILS:2331077
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Okeyode, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212932/?ar">https://learning.oreilly.com/library/view/~/9781839212932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212932">https://learning.oreilly.com/library/view/~/9781839212932</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar</a><br/>Format: Electronic Resources<br/>
8 steps to better security : a simple cyber resilience guide for business
ent://SD_ILS/0/SD_ILS:2330835
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Crawley, Kim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119811237/?ar">https://learning.oreilly.com/library/view/~/9781119811237/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119811237">https://learning.oreilly.com/library/view/~/9781119811237</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar">https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar</a><br/>Format: Electronic Resources<br/>
Digital forensics for pentesters : hands-on learning.
ent://SD_ILS/0/SD_ILS:2331969
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Krahenbill, Cliff, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803231969">https://learning.oreilly.com/videos/~/9781803231969</a>
<a href="https://learning.oreilly.com/videos/~/9781803231969/?ar">https://learning.oreilly.com/videos/~/9781803231969/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar</a><br/>Format: Video recording<br/>
Secure operations and protections
ent://SD_ILS/0/SD_ILS:2332092
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format: Video recording<br/>
How to hack like a ghost
ent://SD_ILS/0/SD_ILS:2326507
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format: Electronic Resources<br/>
Comptia security+ certification practice exams, (Exam SY0-601).
ent://SD_ILS/0/SD_ILS:2327137
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Lachance, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781260467987/?ar">https://learning.oreilly.com/library/view/~/9781260467987/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar">https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260467987">https://learning.oreilly.com/library/view/~/9781260467987</a><br/>Format: Electronic Resources<br/>
Threat modeling a practical guide for developing teams
ent://SD_ILS/0/SD_ILS:2331156
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Tarandach, Izar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056546/?ar">https://learning.oreilly.com/library/view/~/9781492056546/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492056546">https://learning.oreilly.com/library/view/~/9781492056546</a><br/>Format: Electronic Resources<br/>
Mastering Active Directory - Third Edition
ent://SD_ILS/0/SD_ILS:2331105
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format: Electronic Resources<br/>
CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide
ent://SD_ILS/0/SD_ILS:2330975
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar">https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780136634829/?ar">https://learning.oreilly.com/library/view/~/9780136634829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780136634829">https://learning.oreilly.com/library/view/~/9780136634829</a><br/>Format: Electronic Resources<br/>
Certified ethical hacker v11
ent://SD_ILS/0/SD_ILS:2333423
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Bushmiller, Dean, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780996619158/?ar">https://learning.oreilly.com/videos/~/9780996619158/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780996619158">https://learning.oreilly.com/videos/~/9780996619158</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780996619158/?ar">https://go.oreilly.com/library-access/library/view/-/9780996619158/?ar</a><br/>Format: Video recording<br/>
Privileged attack vectors : building effective cyber-defense strategies to protect organizations
ent://SD_ILS/0/SD_ILS:2324664
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146/?ar">https://learning.oreilly.com/library/view/~/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146">https://learning.oreilly.com/library/view/~/9781484259146</a><br/>Format: Electronic Resources<br/>
Designing a HIPAA-compliant security operations center : a guide to detecting and responding to healthcare breaches and events
ent://SD_ILS/0/SD_ILS:2323333
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Thompson, Eric C.<br/><a href="https://learning.oreilly.com/library/view/~/9781484256084">https://learning.oreilly.com/library/view/~/9781484256084</a>
<a href="https://learning.oreilly.com/library/view/~/9781484256084/?ar">https://learning.oreilly.com/library/view/~/9781484256084/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar</a><br/>Format: Electronic Resources<br/>
Computer Network Security
ent://SD_ILS/0/SD_ILS:2323627
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Sadiqui, Ali, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar">https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786305275">https://learning.oreilly.com/library/view/~/9781786305275</a>
<a href="https://learning.oreilly.com/library/view/~/9781786305275/?ar">https://learning.oreilly.com/library/view/~/9781786305275/?ar</a><br/>Format: Electronic Resources<br/>
Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
ent://SD_ILS/0/SD_ILS:2324802
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format: Electronic Resources<br/>
AWS SECURITY COOKBOOK;PRACTICAL SOLUTIONS FOR MANAGING SECURITY POLICIES, MONITORING, AUDITING, AND COMPLIANCE WITH AWS
ent://SD_ILS/0/SD_ILS:2323340
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by HEARTIN KANIKATHOTTU.<br/><a href="https://learning.oreilly.com/library/view/~/9781838826253">https://learning.oreilly.com/library/view/~/9781838826253</a>
<a href="https://learning.oreilly.com/library/view/~/9781838826253/?ar">https://learning.oreilly.com/library/view/~/9781838826253/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar">https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar</a><br/>Format: Electronic Resources<br/>
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership
ent://SD_ILS/0/SD_ILS:2323589
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format: Electronic Resources<br/>
Incident response primer : how to keep from getting pwned too hard
ent://SD_ILS/0/SD_ILS:2323316
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format: Electronic Resources<br/>
IT auditing : using controls to protect information assets
ent://SD_ILS/0/SD_ILS:2322126
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Kegerreis, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260453232/?ar">https://learning.oreilly.com/library/view/~/9781260453232/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar">https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar</a><br/>Format: Electronic Resources<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:2322826
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781119560265">https://learning.oreilly.com/library/view/~/9781119560265</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560265/?ar">https://learning.oreilly.com/library/view/~/9781119560265/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar</a><br/>Format: Electronic Resources<br/>
Web application security : exploitation and countermeasures for modern web applications
ent://SD_ILS/0/SD_ILS:2323527
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Hoffman, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492053101/?ar">https://learning.oreilly.com/library/view/~/9781492053101/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492053101/?ar">https://go.oreilly.com/library-access/library/view/-/9781492053101/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492053101">https://learning.oreilly.com/library/view/~/9781492053101</a><br/>Format: Electronic Resources<br/>
Cyber Warfare - Truth, Tactics, and Strategies
ent://SD_ILS/0/SD_ILS:2323667
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity for dummies
ent://SD_ILS/0/SD_ILS:2322839
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560326/?ar">https://learning.oreilly.com/library/view/~/9781119560326/?ar</a><br/>Format: Electronic Resources<br/>
IBM DS8000 Encryption for data at rest, Transparent Cloud Tiering, and Endpoint Security (DS8000 Release 9.0)
ent://SD_ILS/0/SD_ILS:2323373
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Dufrasne, Bertrand, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738458427/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458427/?ar">https://learning.oreilly.com/library/view/~/9780738458427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458427">https://learning.oreilly.com/library/view/~/9780738458427</a><br/>Format: Electronic Resources<br/>
Rational cybersecurity for business : the security leaders' guide to business alignment
ent://SD_ILS/0/SD_ILS:2325488
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Blum, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781484259528">https://learning.oreilly.com/library/view/~/9781484259528</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259528/?ar">https://learning.oreilly.com/library/view/~/9781484259528/?ar</a><br/>Format: Electronic Resources<br/>
The Complete 2020 Ethereum and Solidity Developer Bootcamp
ent://SD_ILS/0/SD_ILS:2323478
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Wiesner, Thomas, author.<br/><a href="https://learning.oreilly.com/videos/~/9781800201019/?ar">https://learning.oreilly.com/videos/~/9781800201019/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar">https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781800201019">https://learning.oreilly.com/videos/~/9781800201019</a><br/>Format: Electronic Resources<br/>
Learning node embeddings in transaction networks
ent://SD_ILS/0/SD_ILS:2326362
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Barbour, Jesse, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/00000HQHJ2T3KE2A/?ar">https://go.oreilly.com/library-access/library/view/-/00000HQHJ2T3KE2A/?ar</a>
<a href="https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A/?ar">https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A/?ar</a>
<a href="https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A">https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A</a><br/>Format: Electronic Resources<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2322053
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format: Electronic Resources<br/>
Data breaches : crisis and opportunity
ent://SD_ILS/0/SD_ILS:2322222
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format: Electronic Resources<br/>
Web security for developers
ent://SD_ILS/0/SD_ILS:2324422
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by McDonald, Malcolm (Computer programmer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122683/?ar">https://learning.oreilly.com/library/view/~/9781098122683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122683">https://learning.oreilly.com/library/view/~/9781098122683</a><br/>Format: Electronic Resources<br/>
Container security : fundamental technology concepts that protect containerized applications
ent://SD_ILS/0/SD_ILS:2323879
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Rice, Liz, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056690/?ar">https://learning.oreilly.com/library/view/~/9781492056690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492056690/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056690/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492056690">https://learning.oreilly.com/library/view/~/9781492056690</a><br/>Format: Electronic Resources<br/>
Practical vulnerability management : a strategic approach to managing cyber risk
ent://SD_ILS/0/SD_ILS:2325867
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Magnusson, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125707/?ar">https://learning.oreilly.com/library/view/~/9781098125707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125707">https://learning.oreilly.com/library/view/~/9781098125707</a><br/>Format: Electronic Resources<br/>
Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud
ent://SD_ILS/0/SD_ILS:2326395
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Calles, Miguel A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002/?ar">https://learning.oreilly.com/library/view/~/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002">https://learning.oreilly.com/library/view/~/9781484261002</a><br/>Format: Electronic Resources<br/>
Cloud Computing Security, 2nd Edition
ent://SD_ILS/0/SD_ILS:2331101
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>
Secrets management with Terraform
ent://SD_ILS/0/SD_ILS:2331925
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Winkler, Scott, author, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202178">https://learning.oreilly.com/videos/~/10000MNLV202178</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202178/?ar">https://learning.oreilly.com/videos/~/10000MNLV202178/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202178/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202178/?ar</a><br/>Format: Video recording<br/>
Security operations in practice
ent://SD_ILS/0/SD_ILS:2333929
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175089/?ar">https://learning.oreilly.com/library/view/~/9781780175089/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175089">https://learning.oreilly.com/library/view/~/9781780175089</a><br/>Format: Electronic Resources<br/>
Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.
ent://SD_ILS/0/SD_ILS:2326028
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Mukherjee, Aditya.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789806298/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806298/?ar">https://learning.oreilly.com/library/view/~/9781789806298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806298">https://learning.oreilly.com/library/view/~/9781789806298</a><br/>Format: Electronic Resources<br/>
Securing microservices with Istio Service Mesh
ent://SD_ILS/0/SD_ILS:2331950
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Siriwardena, Prabath, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202172">https://learning.oreilly.com/videos/~/10000MNLV202172</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202172/?ar">https://learning.oreilly.com/videos/~/10000MNLV202172/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar</a><br/>Format: Video recording<br/>
Linux essentials for cybersecurity lab manual
ent://SD_ILS/0/SD_ILS:2317558
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format: Electronic Resources<br/>
Data analytics for IT networks : developing innovative use cases
ent://SD_ILS/0/SD_ILS:2317559
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format: Electronic Resources<br/>
Spring security : LiveLessons
ent://SD_ILS/0/SD_ILS:2318493
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Long, Josh, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar">https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780135415054/?ar">https://learning.oreilly.com/videos/~/9780135415054/?ar</a><br/>Format: Electronic Resources<br/>
Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization
ent://SD_ILS/0/SD_ILS:2318938
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134807614/?ar">https://learning.oreilly.com/library/view/~/9780134807614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807614">https://learning.oreilly.com/library/view/~/9780134807614</a><br/>Format: Electronic Resources<br/>
Threat and vulnerability assessment for enterprises
ent://SD_ILS/0/SD_ILS:2319277
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781838559205/?ar">https://learning.oreilly.com/videos/~/9781838559205/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar">https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on network forensics : investigate network attacks and find evidence using common network forensic tools
ent://SD_ILS/0/SD_ILS:2319836
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789344523/?ar">https://learning.oreilly.com/library/view/~/9781789344523/?ar</a><br/>Format: Electronic Resources<br/>
Cyber smart : five habits to protect your family, money, and identity from cyber criminals
ent://SD_ILS/0/SD_ILS:2318868
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by McDonough, Bart R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469071503/?ar">https://learning.oreilly.com/library/view/~/9781469071503/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar">https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469071503">https://learning.oreilly.com/library/view/~/9781469071503</a><br/>Format: Sound recording<br/>
Cybersecurity Ops with bash : attack, defend, and analyze from the command line
ent://SD_ILS/0/SD_ILS:2319252
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format: Electronic Resources<br/>
Practical cloud security : a guide for secure design and deployment
ent://SD_ILS/0/SD_ILS:2319005
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Dotson, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492037507">https://learning.oreilly.com/library/view/~/9781492037507</a>
<a href="https://learning.oreilly.com/library/view/~/9781492037507/?ar">https://learning.oreilly.com/library/view/~/9781492037507/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar</a><br/>Format: Electronic Resources<br/>
Practical security automation and testing : tools and techniques for automated security scanning and testing in DevSecOps
ent://SD_ILS/0/SD_ILS:2319096
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Hsu, Tony Hsiang-Chih, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789802023/?ar">https://learning.oreilly.com/library/view/~/9781789802023/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789802023/?ar">https://go.oreilly.com/library-access/library/view/-/9781789802023/?ar</a><br/>Format: Electronic Resources<br/>
Becoming the hacker : the playbook for getting inside the mind of an attacker
ent://SD_ILS/0/SD_ILS:2319129
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Electronic Resources<br/>
Tribe of hackers : cybersecurity advice from the best hackers in the world
ent://SD_ILS/0/SD_ILS:2321452
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format: Electronic Resources<br/>
Fraud detection without feature engineering
ent://SD_ILS/0/SD_ILS:2322434
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Vagata, Pamela, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540/?ar">https://learning.oreilly.com/videos/~/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540">https://learning.oreilly.com/videos/~/0636920339540</a><br/>Format: Electronic Resources<br/>
The Complete Ethical Hacking Course
ent://SD_ILS/0/SD_ILS:2323185
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format: Electronic Resources<br/>
Foundations of information security : a straightforward introduction
ent://SD_ILS/0/SD_ILS:2322313
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098122546/?ar">https://learning.oreilly.com/library/view/~/9781098122546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122546">https://learning.oreilly.com/library/view/~/9781098122546</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar</a><br/>Format: Electronic Resources<br/>
Learn Kali Linux 2019 : perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
ent://SD_ILS/0/SD_ILS:2323768
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789611809/?ar">https://learning.oreilly.com/library/view/~/9781789611809/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789611809">https://learning.oreilly.com/library/view/~/9781789611809</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar">https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar</a><br/>Format: Electronic Resources<br/>
Security with AI and machine learning : using advanced tools to improve application security at the edge
ent://SD_ILS/0/SD_ILS:2319058
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format: Electronic Resources<br/>
Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data
ent://SD_ILS/0/SD_ILS:2319238
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Nickel, Jochen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789132304/?ar">https://learning.oreilly.com/library/view/~/9781789132304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar">https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar</a><br/>Format: Electronic Resources<br/>
Zabbix 4 network monitoring : monitor the performance of your network devices and applications using the all-new Zabbix 4.0
ent://SD_ILS/0/SD_ILS:2319010
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Uytterhoeven, Patrik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340266/?ar">https://learning.oreilly.com/library/view/~/9781789340266/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Enterprise Mobility and Security training
ent://SD_ILS/0/SD_ILS:2319556
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on application penetration testing with Burp Suite : use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
ent://SD_ILS/0/SD_ILS:2319360
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Lozano, Carlos A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788994064/?ar">https://learning.oreilly.com/library/view/~/9781788994064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar">https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788994064">https://learning.oreilly.com/library/view/~/9781788994064</a><br/>Format: Electronic Resources<br/>
Hands-on penetration testing with Kali NetHunter : spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
ent://SD_ILS/0/SD_ILS:2319361
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Singh, Glen D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995177/?ar">https://learning.oreilly.com/library/view/~/9781788995177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995177">https://learning.oreilly.com/library/view/~/9781788995177</a><br/>Format: Electronic Resources<br/>
Cyber operations : building, defending, and attacking modern computer networks
ent://SD_ILS/0/SD_ILS:2318914
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by O'Leary, Mike, 1968- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242940">https://learning.oreilly.com/library/view/~/9781484242940</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242940/?ar">https://learning.oreilly.com/library/view/~/9781484242940/?ar</a><br/>Format: Electronic Resources<br/>
Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing
ent://SD_ILS/0/SD_ILS:2319847
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format: Electronic Resources<br/>
Practical security : simple practices for defending your systems
ent://SD_ILS/0/SD_ILS:2319402
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Zabicki, Roman, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar">https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679">https://learning.oreilly.com/library/view/~/9781680506679</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679/?ar">https://learning.oreilly.com/library/view/~/9781680506679/?ar</a><br/>Format: Electronic Resources<br/>
Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud
ent://SD_ILS/0/SD_ILS:2321488
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Berkouwer, Sander, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806984">https://learning.oreilly.com/library/view/~/9781789806984</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806984/?ar">https://learning.oreilly.com/library/view/~/9781789806984/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar</a><br/>Format: Electronic Resources<br/>
Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessons
ent://SD_ILS/0/SD_ILS:2321550
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format: Electronic Resources<br/>
The cybersecurity playbook : how every leader and employee can contribute to a culture of security
ent://SD_ILS/0/SD_ILS:2321568
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Cerra, Allison, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar">https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196/?ar">https://learning.oreilly.com/library/view/~/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196">https://learning.oreilly.com/library/view/~/9781119442196</a><br/>Format: Electronic Resources<br/>
Cybersecurity of industrial systems
ent://SD_ILS/0/SD_ILS:2321293
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Flaus, Jean-Marie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786304216/?ar">https://learning.oreilly.com/library/view/~/9781786304216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304216">https://learning.oreilly.com/library/view/~/9781786304216</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786304216/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304216/?ar</a><br/>Format: Electronic Resources<br/>
Practical cyber forensics : an incident-based approach to forensic investigations
ent://SD_ILS/0/SD_ILS:2321521
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format: Electronic Resources<br/>
Learn Wireshark : Confidently Navigate the Wireshark Interface and Solve Real-World Networking Problems.
ent://SD_ILS/0/SD_ILS:2321701
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Bock, Lisa.<br/><a href="https://learning.oreilly.com/library/view/~/9781789134506">https://learning.oreilly.com/library/view/~/9781789134506</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789134506/?ar">https://go.oreilly.com/library-access/library/view/-/9781789134506/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789134506/?ar">https://learning.oreilly.com/library/view/~/9781789134506/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity for dummies
ent://SD_ILS/0/SD_ILS:2322747
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781494542450">https://learning.oreilly.com/library/view/~/9781494542450</a>
<a href="https://learning.oreilly.com/library/view/~/9781494542450/?ar">https://learning.oreilly.com/library/view/~/9781494542450/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar">https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar</a><br/>Format: Electronic Resources<br/>
Linux troubleshooting course with real life examples
ent://SD_ILS/0/SD_ILS:2323238
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format: Electronic Resources<br/>
How Lyft migrated to a service mesh with Envoy
ent://SD_ILS/0/SD_ILS:2323296
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Hochman, Daniel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338390/?ar">https://learning.oreilly.com/videos/~/0636920338390/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920338390">https://learning.oreilly.com/videos/~/0636920338390</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar</a><br/>Format: Electronic Resources<br/>
IBM Spectrum Protect Plus : practical guidance for deployment, configuration, and usage
ent://SD_ILS/0/SD_ILS:2323017
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Gaschler, Andre, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738458045/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458045/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458045/?ar">https://learning.oreilly.com/library/view/~/9780738458045/?ar</a><br/>Format: Electronic Resources<br/>
My online privacy for seniors
ent://SD_ILS/0/SD_ILS:2319412
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Rich, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135381281/?ar">https://learning.oreilly.com/library/view/~/9780135381281/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar">https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar</a><br/>Format: Electronic Resources<br/>
Web hacking : become a professional web pentester
ent://SD_ILS/0/SD_ILS:2319831
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format: Electronic Resources<br/>
Protecting your web applications : solutions and strategies to combat cybersecurity threats
ent://SD_ILS/0/SD_ILS:2321166
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Sloper, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492052791">https://learning.oreilly.com/library/view/~/9781492052791</a>
<a href="https://learning.oreilly.com/library/view/~/9781492052791/?ar">https://learning.oreilly.com/library/view/~/9781492052791/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft AZ-301 certification : Azure architect design
ent://SD_ILS/0/SD_ILS:2320826
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Colyer, Nick, speaker.<br/><a href="https://learning.oreilly.com/videos/~/1018947653/?ar">https://learning.oreilly.com/videos/~/1018947653/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1018947653/?ar">https://go.oreilly.com/library-access/library/view/-/1018947653/?ar</a>
<a href="https://learning.oreilly.com/videos/~/1018947653">https://learning.oreilly.com/videos/~/1018947653</a><br/>Format: Electronic Resources<br/>
Cyber resiliency solution for IBM Spectrum Scale
ent://SD_ILS/0/SD_ILS:2322145
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by IBM Storage Team, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457963/?ar">https://learning.oreilly.com/library/view/~/9780738457963/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar</a><br/>Format: Electronic Resources<br/>
Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risks
ent://SD_ILS/0/SD_ILS:2321954
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Born, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789807608/?ar">https://learning.oreilly.com/library/view/~/9781789807608/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807608">https://learning.oreilly.com/library/view/~/9781789807608</a><br/>Format: Electronic Resources<br/>
Zero trust networks with VMware NSX : build highly secure network architectures for your data centers
ent://SD_ILS/0/SD_ILS:2322659
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Keeriyattil, Sreejith, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484254318">https://learning.oreilly.com/library/view/~/9781484254318</a>
<a href="https://learning.oreilly.com/library/view/~/9781484254318/?ar">https://learning.oreilly.com/library/view/~/9781484254318/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484254318/?ar">https://go.oreilly.com/library-access/library/view/-/9781484254318/?ar</a><br/>Format: Electronic Resources<br/>
Security principles for the working architect
ent://SD_ILS/0/SD_ILS:2322691
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Woods, Eoin, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338215/?ar">https://learning.oreilly.com/videos/~/0636920338215/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920338215">https://learning.oreilly.com/videos/~/0636920338215</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar</a><br/>Format: Electronic Resources<br/>
Bug bounty hunting for web security : find and exploit vulnerabilities in web sites and applications
ent://SD_ILS/0/SD_ILS:2323037
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Sinha, Sanjib, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484253915/?ar">https://learning.oreilly.com/library/view/~/9781484253915/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484253915/?ar">https://go.oreilly.com/library-access/library/view/-/9781484253915/?ar</a><br/>Format: Electronic Resources<br/>
Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux 2019.1, the ultimate white hat hackers' toolkit
ent://SD_ILS/0/SD_ILS:2319114
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340563/?ar">https://learning.oreilly.com/library/view/~/9781789340563/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar</a><br/>Format: Electronic Resources<br/>
Learning Python for forensics : leverage the power of Python in forensic investigations
ent://SD_ILS/0/SD_ILS:2319116
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on AWS penetration testing with Kali Linux : set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation
ent://SD_ILS/0/SD_ILS:2321409
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Gilbert, Karl, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789136722">https://learning.oreilly.com/library/view/~/9781789136722</a>
<a href="https://learning.oreilly.com/library/view/~/9781789136722/?ar">https://learning.oreilly.com/library/view/~/9781789136722/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar">https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar</a><br/>Format: Electronic Resources<br/>
O'Reilly Velocity Conference 2019, San Jose, California.
ent://SD_ILS/0/SD_ILS:2322886
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by O'Reilly Velocity Conference (2019 : San Jose, Calif.) issuing body.<br/><a href="https://learning.oreilly.com/videos/~/9781492050582/?ar">https://learning.oreilly.com/videos/~/9781492050582/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492050582/?ar">https://go.oreilly.com/library-access/library/view/-/9781492050582/?ar</a><br/>Format: Electronic Resources<br/>
Pro Spring security : securing Spring Framework 5 and Boot 2-based Java applications
ent://SD_ILS/0/SD_ILS:2323072
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Scarioni, Carlo, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484250525/?ar">https://learning.oreilly.com/library/view/~/9781484250525/?ar</a><br/>Format: Electronic Resources<br/>
PCI DSS : a pocket guide
ent://SD_ILS/0/SD_ILS:2322160
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781641/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781641/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781641/?ar">https://learning.oreilly.com/library/view/~/9781787781641/?ar</a><br/>Format: Electronic Resources<br/>
Computer security : art and science
ent://SD_ILS/0/SD_ILS:2318452
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on pfSense 2.x for firewalls and routers
ent://SD_ILS/0/SD_ILS:2319334
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by White, Jason, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789805017/?ar">https://go.oreilly.com/library-access/library/view/-/9781789805017/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789805017/?ar">https://learning.oreilly.com/videos/~/9781789805017/?ar</a><br/>Format: Electronic Resources<br/>
Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments
ent://SD_ILS/0/SD_ILS:2322055
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format: Electronic Resources<br/>
Waging cyber war : technical challenges and operational constraints
ent://SD_ILS/0/SD_ILS:2321908
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Oakley, Jacob G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249505/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249505/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484249505/?ar">https://learning.oreilly.com/library/view/~/9781484249505/?ar</a><br/>Format: Electronic Resources<br/>
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
ent://SD_ILS/0/SD_ILS:2319534
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a>
<a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format: Electronic Resources<br/>
Mastering Active Directory - Second Edition
ent://SD_ILS/0/SD_ILS:2323979
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789800203/?ar">https://learning.oreilly.com/library/view/~/9781789800203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar">https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789800203">https://learning.oreilly.com/library/view/~/9781789800203</a><br/>Format: Electronic Resources<br/>
Implementing Cisco network security, Part 2.
ent://SD_ILS/0/SD_ILS:2334801
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Pickard, John, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar">https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920303213">https://learning.oreilly.com/videos/~/0636920303213</a>
<a href="https://learning.oreilly.com/videos/~/0636920303213/?ar">https://learning.oreilly.com/videos/~/0636920303213/?ar</a><br/>Format: Video recording<br/>
Practical cloud security.
ent://SD_ILS/0/SD_ILS:2334616
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Dotson, Chris, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar">https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727">https://learning.oreilly.com/videos/~/9781492060727</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727/?ar">https://learning.oreilly.com/videos/~/9781492060727/?ar</a><br/>Format: Video recording<br/>
Engineering trustworthy systems : get cybersecurity design right the first time
ent://SD_ILS/0/SD_ILS:2316316
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Saydjari, O. Sami, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260118186/?ar">https://go.oreilly.com/library-access/library/view/-/9781260118186/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260118186/?ar">https://learning.oreilly.com/library/view/~/9781260118186/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260118186">https://learning.oreilly.com/library/view/~/9781260118186</a><br/>Format: Electronic Resources<br/>
Digital resilience : is your company ready for the next cyber threat?
ent://SD_ILS/0/SD_ILS:2314734
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Rothrock, Ray A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814439258">https://learning.oreilly.com/library/view/~/9780814439258</a>
<a href="https://learning.oreilly.com/library/view/~/9780814439258/?ar">https://learning.oreilly.com/library/view/~/9780814439258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar">https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar</a><br/>Format: Electronic Resources<br/>
Integrated security technologies and solutions. Volume I, Cisco Security Solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content security
ent://SD_ILS/0/SD_ILS:2316388
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Woland, Aaron T., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807577/?ar">https://learning.oreilly.com/library/view/~/9780134807577/?ar</a><br/>Format: Electronic Resources<br/>
Hacking web performance : moving beyond the basics of web performance optimization
ent://SD_ILS/0/SD_ILS:2316902
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Firtman, Maximiliano R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039426/?ar">https://learning.oreilly.com/library/view/~/9781492039426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039426">https://learning.oreilly.com/library/view/~/9781492039426</a><br/>Format: Electronic Resources<br/>
Learn ethical hacking from scratch
ent://SD_ILS/0/SD_ILS:2316923
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789340297/?ar">https://learning.oreilly.com/videos/~/9781789340297/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics
ent://SD_ILS/0/SD_ILS:2315706
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format: Electronic Resources<br/>
Learn ethical hacking from scratch : your stepping stone to penetration testing
ent://SD_ILS/0/SD_ILS:2317259
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Sabih, Zaid, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar">https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788622059">https://learning.oreilly.com/library/view/~/9781788622059</a>
<a href="https://learning.oreilly.com/library/view/~/9781788622059/?ar">https://learning.oreilly.com/library/view/~/9781788622059/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOps
ent://SD_ILS/0/SD_ILS:2317298
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Hsu, Tony, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788995504/?ar">https://learning.oreilly.com/library/view/~/9781788995504/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995504">https://learning.oreilly.com/library/view/~/9781788995504</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar</a><br/>Format: Electronic Resources<br/>
IBM QRadar Version 7.3 : planning and installation guide
ent://SD_ILS/0/SD_ILS:2315474
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Carabaguiaz, Elias, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442877/?ar">https://learning.oreilly.com/library/view/~/9780738442877/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar</a><br/>Format: Electronic Resources<br/>
Learn social engineering : learn the art of human hacking with an internationally renowned expert
ent://SD_ILS/0/SD_ILS:2316546
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar">https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788837927/?ar">https://learning.oreilly.com/library/view/~/9781788837927/?ar</a><br/>Format: Electronic Resources<br/>
Risk management for cybersecurity and IT managers
ent://SD_ILS/0/SD_ILS:2316845
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Dion, Jason, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789531992/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531992/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789531992/?ar">https://learning.oreilly.com/videos/~/9781789531992/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for Dummies.
ent://SD_ILS/0/SD_ILS:2316883
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119485476/?ar">https://go.oreilly.com/library-access/library/view/-/9781119485476/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119485476/?ar">https://learning.oreilly.com/library/view/~/9781119485476/?ar</a><br/>Format: Electronic Resources<br/>
Fixing an insecure software life cycle : practical techniques for building security into existing software development programs
ent://SD_ILS/0/SD_ILS:2316498
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Wright, April C., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028222">https://learning.oreilly.com/library/view/~/9781492028222</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028222/?ar">https://learning.oreilly.com/library/view/~/9781492028222/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492028222/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028222/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on red team tactics : a practical guide to mastering red team operations
ent://SD_ILS/0/SD_ILS:2317792
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Sharma, Himanshu, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995238">https://learning.oreilly.com/library/view/~/9781788995238</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995238/?ar">https://learning.oreilly.com/library/view/~/9781788995238/?ar</a><br/>Format: Electronic Resources<br/>
Ansible quick start guide : Control and monitor infrastructures of any size, physical or virtual
ent://SD_ILS/0/SD_ILS:2317798
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Alibi, Mohamed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789532937">https://learning.oreilly.com/library/view/~/9781789532937</a>
<a href="https://learning.oreilly.com/library/view/~/9781789532937/?ar">https://learning.oreilly.com/library/view/~/9781789532937/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789532937/?ar">https://go.oreilly.com/library-access/library/view/-/9781789532937/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on bug hunting for penetration testers : a practical guide to help ethical hackers discover web application security flaws
ent://SD_ILS/0/SD_ILS:2317823
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Marshall, Joseph, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789344202">https://learning.oreilly.com/library/view/~/9781789344202</a>
<a href="https://learning.oreilly.com/library/view/~/9781789344202/?ar">https://learning.oreilly.com/library/view/~/9781789344202/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar</a><br/>Format: Electronic Resources<br/>
Web application firewalls : securing modern web applications
ent://SD_ILS/0/SD_ILS:2318497
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Russell, Chad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492032311">https://learning.oreilly.com/library/view/~/9781492032311</a>
<a href="https://learning.oreilly.com/library/view/~/9781492032311/?ar">https://learning.oreilly.com/library/view/~/9781492032311/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar</a><br/>Format: Electronic Resources<br/>
Kubernetes security : operating Kubernetes clusters and applications safely
ent://SD_ILS/0/SD_ILS:2318519
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Rice, Liz, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492039075">https://learning.oreilly.com/library/view/~/9781492039075</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039075/?ar">https://learning.oreilly.com/library/view/~/9781492039075/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar</a><br/>Format: Electronic Resources<br/>
Ethical hacking : learning the basics
ent://SD_ILS/0/SD_ILS:2318527
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243480/?ar">https://learning.oreilly.com/videos/~/9781484243480/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar</a><br/>Format: Electronic Resources<br/>
Burp Suite cookbook : practical recipes to help you master web penetration testing with Burp Suite
ent://SD_ILS/0/SD_ILS:2317723
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Wear, Sunny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789531732">https://learning.oreilly.com/library/view/~/9781789531732</a>
<a href="https://learning.oreilly.com/library/view/~/9781789531732/?ar">https://learning.oreilly.com/library/view/~/9781789531732/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar</a><br/>Format: Electronic Resources<br/>
Take Control of 1Password, 4th Edition
ent://SD_ILS/0/SD_ILS:2319474
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format: Electronic Resources<br/>
Cisco Firepower Threat Defense (FTD) : configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP)
ent://SD_ILS/0/SD_ILS:2314393
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Rajib, Nazmul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134679471">https://learning.oreilly.com/library/view/~/9780134679471</a>
<a href="https://learning.oreilly.com/library/view/~/9780134679471/?ar">https://learning.oreilly.com/library/view/~/9780134679471/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar">https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity attacks (Red Team activity)
ent://SD_ILS/0/SD_ILS:2315986
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Nesterenko, Sergii, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781788478878/?ar">https://learning.oreilly.com/videos/~/9781788478878/?ar</a><br/>Format: Electronic Resources<br/>
Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linux
ent://SD_ILS/0/SD_ILS:2315998
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Najera-Gutierrez, Gilberto, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar">https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788623377/?ar">https://learning.oreilly.com/library/view/~/9781788623377/?ar</a><br/>Format: Electronic Resources<br/>
CCSP Certified Cloud Security Professional practice exams
ent://SD_ILS/0/SD_ILS:2316001
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Carter, Daniel, CISSP, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260031362">https://learning.oreilly.com/library/view/~/9781260031362</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260031362/?ar">https://go.oreilly.com/library-access/library/view/-/9781260031362/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260031362/?ar">https://learning.oreilly.com/library/view/~/9781260031362/?ar</a><br/>Format: Electronic Resources<br/>
Orchestrating and automating security for the Internet of Things : delivering advanced security capabilities from Edge to Cloud for IoT
ent://SD_ILS/0/SD_ILS:2316233
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Sabella, Anthony, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134756936/?ar">https://go.oreilly.com/library-access/library/view/-/9780134756936/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134756936/?ar">https://learning.oreilly.com/library/view/~/9780134756936/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134756936">https://learning.oreilly.com/library/view/~/9780134756936</a><br/>Format: Electronic Resources<br/>
Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers
ent://SD_ILS/0/SD_ILS:2316089
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format: Electronic Resources<br/>
Building a modern security program : adapting security for DevOps and cloud
ent://SD_ILS/0/SD_ILS:2317166
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Lackey, Zane, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492044680/?ar">https://learning.oreilly.com/library/view/~/9781492044680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492044680">https://learning.oreilly.com/library/view/~/9781492044680</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492044680/?ar">https://go.oreilly.com/library-access/library/view/-/9781492044680/?ar</a><br/>Format: Electronic Resources<br/>
Learning Kali Linux : security testing, penetration testing, and ethical hacking
ent://SD_ILS/0/SD_ILS:2316978
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028680/?ar">https://learning.oreilly.com/library/view/~/9781492028680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028680">https://learning.oreilly.com/library/view/~/9781492028680</a><br/>Format: Electronic Resources<br/>
Practical web penetration testing : secure web applications using Burp Suite, Nmap, Metasploit, and more
ent://SD_ILS/0/SD_ILS:2317003
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Khawaja, Gus, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624039/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624039/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788624039/?ar">https://learning.oreilly.com/library/view/~/9781788624039/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
ent://SD_ILS/0/SD_ILS:2317092
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Gupta, Rajneesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990189">https://learning.oreilly.com/library/view/~/9781788990189</a>
<a href="https://learning.oreilly.com/library/view/~/9781788990189/?ar">https://learning.oreilly.com/library/view/~/9781788990189/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar</a><br/>Format: Electronic Resources<br/>
Ethical hacking masterclass
ent://SD_ILS/0/SD_ILS:2317748
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789530018/?ar">https://learning.oreilly.com/videos/~/9781789530018/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar</a><br/>Format: Electronic Resources<br/>
Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus
ent://SD_ILS/0/SD_ILS:2316700
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format: Electronic Resources<br/>
Network scanning cookbook : practical network security using Nmap and Nessus 7
ent://SD_ILS/0/SD_ILS:2317776
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format: Electronic Resources<br/>
Modernizing cybersecurity operations with machine intelligence : advanced threat detection, hunting, and analysis
ent://SD_ILS/0/SD_ILS:2318456
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Guerra, Peter, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar">https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492035992/?ar">https://learning.oreilly.com/library/view/~/9781492035992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492035992">https://learning.oreilly.com/library/view/~/9781492035992</a><br/>Format: Electronic Resources<br/>
Securing microservice APIs : sustainable and scalable access control
ent://SD_ILS/0/SD_ILS:2318425
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by McLarty, Matt, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492027140">https://learning.oreilly.com/library/view/~/9781492027140</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492027140/?ar">https://go.oreilly.com/library-access/library/view/-/9781492027140/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492027140/?ar">https://learning.oreilly.com/library/view/~/9781492027140/?ar</a><br/>Format: Electronic Resources<br/>
Mastering reverse engineering : re-engineer your ethical hacking skills
ent://SD_ILS/0/SD_ILS:2319089
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Wong, Reginald, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788838849/?ar">https://learning.oreilly.com/library/view/~/9781788838849/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar">https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar</a><br/>Format: Electronic Resources<br/>
Kali Linux tutorial for beginners
ent://SD_ILS/0/SD_ILS:2317579
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Naja, Tarek, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar">https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789615173/?ar">https://learning.oreilly.com/videos/~/9781789615173/?ar</a><br/>Format: Electronic Resources<br/>
Security and privacy in cyber-physical systems : foundations, principles, and applications
ent://SD_ILS/0/SD_ILS:2316152
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security automation : get to grips with automating your cloud security on AWS and OpenStack
ent://SD_ILS/0/SD_ILS:2316344
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Priyam, Prashant, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627863/?ar">https://learning.oreilly.com/library/view/~/9781788627863/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar</a><br/>Format: Electronic Resources<br/>
Practical cyber intelligence : how action-based intelligence can be an effective response to incidents
ent://SD_ILS/0/SD_ILS:2316348
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Bautista, Wilson, Jr., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788625562">https://learning.oreilly.com/library/view/~/9781788625562</a>
<a href="https://learning.oreilly.com/library/view/~/9781788625562/?ar">https://learning.oreilly.com/library/view/~/9781788625562/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity program development for business : the essential planning guide
ent://SD_ILS/0/SD_ILS:2316874
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Moschovitis, Christos J. P.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781469098753/?ar">https://go.oreilly.com/library-access/library/view/-/9781469098753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469098753/?ar">https://learning.oreilly.com/library/view/~/9781469098753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469098753">https://learning.oreilly.com/library/view/~/9781469098753</a><br/>Format: Sound recording<br/>
Cybersecurity program development for business : the essential planning guide
ent://SD_ILS/0/SD_ILS:2316100
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Moschovitis, Christos J. P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119429517/?ar">https://go.oreilly.com/library-access/library/view/-/9781119429517/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119429517/?ar">https://learning.oreilly.com/library/view/~/9781119429517/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119429517">https://learning.oreilly.com/library/view/~/9781119429517</a><br/>Format: Electronic Resources<br/>
The art of hacking : self paced traning kit for cyber security professionals
ent://SD_ILS/0/SD_ILS:2315658
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854632/?ar">https://learning.oreilly.com/videos/~/9780134854632/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134854632/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854632/?ar</a><br/>Format: Electronic Resources<br/>
Cyber security : endpoint defense
ent://SD_ILS/0/SD_ILS:2316613
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Dewey, Gary, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788990981/?ar">https://learning.oreilly.com/videos/~/9781788990981/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar</a><br/>Format: Electronic Resources<br/>
Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threats
ent://SD_ILS/0/SD_ILS:2316833
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Crouthamel, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788626521/?ar">https://learning.oreilly.com/library/view/~/9781788626521/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar">https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar</a><br/>Format: Electronic Resources<br/>
Privileged attack vectors : building effective cyber-defense strategies to protect organizations
ent://SD_ILS/0/SD_ILS:2314870
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format: Electronic Resources<br/>
Investigating the Cyber Breach : the digital forensics guide for the network engineer
ent://SD_ILS/0/SD_ILS:2315345
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar">https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134755885/?ar">https://learning.oreilly.com/library/view/~/9780134755885/?ar</a><br/>Format: Electronic Resources<br/>
Practical monitoring : effective strategies for the real world
ent://SD_ILS/0/SD_ILS:2314748
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Julian, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491957349/?ar">https://go.oreilly.com/library-access/library/view/-/9781491957349/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491957349/?ar">https://learning.oreilly.com/library/view/~/9781491957349/?ar</a><br/>Format: Electronic Resources<br/>
Linux® hardening in hostile networks : server security from TLS to TOR
ent://SD_ILS/0/SD_ILS:2314177
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format: Electronic Resources<br/>
Digital forensics and cyber crime with Kali Linux fundamentals
ent://SD_ILS/0/SD_ILS:2314043
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Muniz, Joseph, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar">https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134693644/?ar">https://learning.oreilly.com/videos/~/9780134693644/?ar</a><br/>Format: Electronic Resources<br/>
WiFi hacking : wireless penetration testing for beginners
ent://SD_ILS/0/SD_ILS:2316772
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530193/?ar">https://learning.oreilly.com/videos/~/9781789530193/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2316778
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format: Electronic Resources<br/>
Learn website hacking : penetration testing from scratch
ent://SD_ILS/0/SD_ILS:2316434
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789346145/?ar">https://learning.oreilly.com/videos/~/9781789346145/?ar</a><br/>Format: Electronic Resources<br/>
Monitoring anti-patterns
ent://SD_ILS/0/SD_ILS:2315680
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Julian, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492036791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492036791/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492036791/?ar">https://learning.oreilly.com/library/view/~/9781492036791/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492036791">https://learning.oreilly.com/library/view/~/9781492036791</a><br/>Format: Electronic Resources<br/>
Open source intelligence methods and tools : a practical guide to online intelligence
ent://SD_ILS/0/SD_ILS:2316916
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232132">https://learning.oreilly.com/library/view/~/9781484232132</a>
<a href="https://learning.oreilly.com/library/view/~/9781484232132/?ar">https://learning.oreilly.com/library/view/~/9781484232132/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on incident response and digital forensics
ent://SD_ILS/0/SD_ILS:2317114
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780174204/?ar">https://learning.oreilly.com/library/view/~/9781780174204/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780174204">https://learning.oreilly.com/library/view/~/9781780174204</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780174204/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174204/?ar</a><br/>Format: Electronic Resources<br/>
Linux security and hardening : the practical security guide
ent://SD_ILS/0/SD_ILS:2317860
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Cannon, Jason, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789612820/?ar">https://learning.oreilly.com/videos/~/9781789612820/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789612820/?ar">https://go.oreilly.com/library-access/library/view/-/9781789612820/?ar</a><br/>Format: Electronic Resources<br/>
Practical Industrial Internet of Things security : a practitioner's guide to securing connected industries
ent://SD_ILS/0/SD_ILS:2317285
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Bhattacharjee, Sravani, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788832687/?ar">https://learning.oreilly.com/library/view/~/9781788832687/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788832687">https://learning.oreilly.com/library/view/~/9781788832687</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar">https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar</a><br/>Format: Electronic Resources<br/>
Network security with pfSense : architect, deploy, and operate enterprise-grade firewalls
ent://SD_ILS/0/SD_ILS:2317295
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Aggarwal, Manuj, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789532975">https://learning.oreilly.com/library/view/~/9781789532975</a>
<a href="https://learning.oreilly.com/library/view/~/9781789532975/?ar">https://learning.oreilly.com/library/view/~/9781789532975/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789532975/?ar">https://go.oreilly.com/library-access/library/view/-/9781789532975/?ar</a><br/>Format: Electronic Resources<br/>
Threat hunting : a guide to proactive network defense
ent://SD_ILS/0/SD_ILS:2318444
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Collins, Michael (Michael Patrick), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028260/?ar">https://learning.oreilly.com/library/view/~/9781492028260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028260">https://learning.oreilly.com/library/view/~/9781492028260</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar</a><br/>Format: Electronic Resources<br/>
Ethical hacking : orchestrating attacks
ent://SD_ILS/0/SD_ILS:2318510
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Gupta, Sunil, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484243404/?ar">https://learning.oreilly.com/videos/~/9781484243404/?ar</a><br/>Format: Electronic Resources<br/>
Ethical hacking : networks and websites
ent://SD_ILS/0/SD_ILS:2318511
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243411/?ar">https://learning.oreilly.com/videos/~/9781484243411/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar</a><br/>Format: Electronic Resources<br/>
Practical internet of things security : design a security framework for an Internet connected ecosystem
ent://SD_ILS/0/SD_ILS:2318628
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625821/?ar">https://learning.oreilly.com/library/view/~/9781788625821/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar</a><br/>Format: Electronic Resources<br/>
The Board's Role in Managing Cybersecurity Risks
ent://SD_ILS/0/SD_ILS:2320749
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Rothrock, Ray, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221/?ar">https://learning.oreilly.com/library/view/~/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221">https://learning.oreilly.com/library/view/~/53863MIT59221</a><br/>Format: Electronic Resources<br/>
Velocity Conference - London, UK 2018
ent://SD_ILS/0/SD_ILS:2321191
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by O'Reilly (Firm), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492025931/?ar">https://go.oreilly.com/library-access/library/view/-/9781492025931/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492025931">https://learning.oreilly.com/videos/~/9781492025931</a>
<a href="https://learning.oreilly.com/videos/~/9781492025931/?ar">https://learning.oreilly.com/videos/~/9781492025931/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity essentials
ent://SD_ILS/0/SD_ILS:2322482
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Brooks, Charles J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119362395/?ar">https://learning.oreilly.com/library/view/~/9781119362395/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar">https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar</a><br/>Format: Electronic Resources<br/>
Threat intelligence in practice : a practical guide to threat intelligence from successful organizations
ent://SD_ILS/0/SD_ILS:2318435
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Liska, Allan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar">https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492049302/?ar">https://learning.oreilly.com/library/view/~/9781492049302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492049302">https://learning.oreilly.com/library/view/~/9781492049302</a><br/>Format: Electronic Resources<br/>
Cybersecurity incident response : how to contain, eradicate, and recover from incidents
ent://SD_ILS/0/SD_ILS:2317670
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Thompson, Eric C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238707/?ar">https://learning.oreilly.com/library/view/~/9781484238707/?ar</a><br/>Format: Electronic Resources<br/>
Learn social engineering from scratch
ent://SD_ILS/0/SD_ILS:2316600
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Sabih, Zaid, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789341584/?ar">https://learning.oreilly.com/videos/~/9781789341584/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789341584/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341584/?ar</a><br/>Format: Electronic Resources<br/>
EVPN in the data center
ent://SD_ILS/0/SD_ILS:2317148
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Dutt, Dinesh G., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492029045">https://learning.oreilly.com/library/view/~/9781492029045</a>
<a href="https://learning.oreilly.com/library/view/~/9781492029045/?ar">https://learning.oreilly.com/library/view/~/9781492029045/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492029045/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029045/?ar</a><br/>Format: Electronic Resources<br/>
Learning Python web penetration testing : automate web penetration testing activities using Python
ent://SD_ILS/0/SD_ILS:2317026
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Martorella, Christian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789533972/?ar">https://learning.oreilly.com/library/view/~/9781789533972/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789533972/?ar">https://go.oreilly.com/library-access/library/view/-/9781789533972/?ar</a><br/>Format: Electronic Resources<br/>
Mastering machine learning for penetration testing : develop an extensive skill set to break self-learning systems using Python
ent://SD_ILS/0/SD_ILS:2317035
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788997409/?ar">https://go.oreilly.com/library-access/library/view/-/9781788997409/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788997409/?ar">https://learning.oreilly.com/library/view/~/9781788997409/?ar</a><br/>Format: Electronic Resources<br/>
Supervised machine learning in security applications.
ent://SD_ILS/0/SD_ILS:2334773
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032410">https://learning.oreilly.com/videos/~/9781492032410</a>
<a href="https://learning.oreilly.com/videos/~/9781492032410/?ar">https://learning.oreilly.com/videos/~/9781492032410/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar</a><br/>Format: Video recording<br/>
Unsupervised machine learning in security applications.
ent://SD_ILS/0/SD_ILS:2334784
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032373">https://learning.oreilly.com/videos/~/9781492032373</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492032373/?ar">https://learning.oreilly.com/videos/~/9781492032373/?ar</a><br/>Format: Video recording<br/>
Securing microservices : protect sensitive data in transit and at rest.
ent://SD_ILS/0/SD_ILS:2334787
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Newman, Sam, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar">https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492038986/?ar">https://learning.oreilly.com/videos/~/9781492038986/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492038986">https://learning.oreilly.com/videos/~/9781492038986</a><br/>Format: Video recording<br/>
Preparing and exploring security data for machine learning.
ent://SD_ILS/0/SD_ILS:2334770
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032335">https://learning.oreilly.com/videos/~/9781492032335</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492032335/?ar">https://learning.oreilly.com/videos/~/9781492032335/?ar</a><br/>Format: Video recording<br/>
Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions
ent://SD_ILS/0/SD_ILS:2314683
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a>
<a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format: Electronic Resources<br/>
Information security handbook : develop a threat model and incident response strategy to build a strong information security framework
ent://SD_ILS/0/SD_ILS:2315319
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Death, Darren, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788478830">https://learning.oreilly.com/library/view/~/9781788478830</a>
<a href="https://learning.oreilly.com/library/view/~/9781788478830/?ar">https://learning.oreilly.com/library/view/~/9781788478830/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788478830/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478830/?ar</a><br/>Format: Electronic Resources<br/>
Security from first principles : a practical guide to the information security practice principles
ent://SD_ILS/0/SD_ILS:2314425
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Jackson, Craig, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996911/?ar">https://learning.oreilly.com/library/view/~/9781491996911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996911">https://learning.oreilly.com/library/view/~/9781491996911</a><br/>Format: Electronic Resources<br/>
Learning network penetration testing with Kali Linux
ent://SD_ILS/0/SD_ILS:2317102
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Gradisteanu, Cristian, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781787129481/?ar">https://learning.oreilly.com/videos/~/9781787129481/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787129481/?ar">https://go.oreilly.com/library-access/library/view/-/9781787129481/?ar</a><br/>Format: Electronic Resources<br/>
Windows forensics cookbook : 61 recipes to help you analyze Windows systems
ent://SD_ILS/0/SD_ILS:2313990
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Sulkin, Oleg, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495/?ar">https://learning.oreilly.com/library/view/~/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495">https://learning.oreilly.com/library/view/~/9781784390495</a><br/>Format: Electronic Resources<br/>
Post-incident reviews : learning from failure for improved incident response
ent://SD_ILS/0/SD_ILS:2318499
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Hand, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar">https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491986998">https://learning.oreilly.com/library/view/~/9781491986998</a>
<a href="https://learning.oreilly.com/library/view/~/9781491986998/?ar">https://learning.oreilly.com/library/view/~/9781491986998/?ar</a><br/>Format: Electronic Resources<br/>
ISO 37001 : an Introduction to Anti-Bribery Management Systems.
ent://SD_ILS/0/SD_ILS:2315020
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Field, Alan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559">https://learning.oreilly.com/library/view/~/9781849289559</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559/?ar">https://learning.oreilly.com/library/view/~/9781849289559/?ar</a><br/>Format: Electronic Resources<br/>
IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices
ent://SD_ILS/0/SD_ILS:2315099
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Guzman, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787280571/?ar">https://learning.oreilly.com/library/view/~/9781787280571/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787280571">https://learning.oreilly.com/library/view/~/9781787280571</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar">https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar</a><br/>Format: Electronic Resources<br/>
Guide: Reporting on an Entity's Cyberse.
ent://SD_ILS/0/SD_ILS:2316756
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by AICPA Staff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781943546725/?ar">https://learning.oreilly.com/library/view/~/9781943546725/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar">https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781943546725">https://learning.oreilly.com/library/view/~/9781943546725</a><br/>Format: Electronic Resources<br/>
Penetration testing bootcamp : quickly get up and running with pentesting techniques
ent://SD_ILS/0/SD_ILS:2313746
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Beltrame, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787288744/?ar">https://go.oreilly.com/library-access/library/view/-/9781787288744/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787288744/?ar">https://learning.oreilly.com/library/view/~/9781787288744/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787288744">https://learning.oreilly.com/library/view/~/9781787288744</a><br/>Format: Electronic Resources<br/>
Building a computer network : LiveLessons
ent://SD_ILS/0/SD_ILS:2313848
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Prowse, David L., on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134783277/?ar">https://learning.oreilly.com/videos/~/9780134783277/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134783277/?ar">https://go.oreilly.com/library-access/library/view/-/9780134783277/?ar</a><br/>Format: Electronic Resources<br/>
Cisco ISE for BYOD and secure unified access
ent://SD_ILS/0/SD_ILS:2313856
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134586656/?ar">https://learning.oreilly.com/library/view/~/9780134586656/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134586656/?ar">https://go.oreilly.com/library-access/library/view/-/9780134586656/?ar</a><br/>Format: Electronic Resources<br/>
What are the common challenges to adopting a zero trust network model?
ent://SD_ILS/0/SD_ILS:2314069
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Barth, Doug, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491998939/?ar">https://go.oreilly.com/library-access/library/view/-/9781491998939/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491998939/?ar">https://learning.oreilly.com/videos/~/9781491998939/?ar</a><br/>Format: Electronic Resources<br/>
Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
ent://SD_ILS/0/SD_ILS:2315386
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Parasram, Shiva V. N., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625005">https://learning.oreilly.com/library/view/~/9781788625005</a>
<a href="https://learning.oreilly.com/library/view/~/9781788625005/?ar">https://learning.oreilly.com/library/view/~/9781788625005/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788625005/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625005/?ar</a><br/>Format: Electronic Resources<br/>
Enterprise cloud security and governance : efficiently set data protection and privacy principles
ent://SD_ILS/0/SD_ILS:2315410
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Vora, Zeal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788299558/?ar">https://learning.oreilly.com/library/view/~/9781788299558/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788299558/?ar">https://go.oreilly.com/library-access/library/view/-/9781788299558/?ar</a><br/>Format: Electronic Resources<br/>
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
ent://SD_ILS/0/SD_ILS:2311609
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Griffor, Edward R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128038383/?ar">https://learning.oreilly.com/library/view/~/9780128038383/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar">https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128038383">https://learning.oreilly.com/library/view/~/9780128038383</a><br/>Format: Electronic Resources<br/>
Securing the internet of things
ent://SD_ILS/0/SD_ILS:2312348
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Li, Shancang, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045053">https://learning.oreilly.com/library/view/~/9780128045053</a>
<a href="https://learning.oreilly.com/library/view/~/9780128045053/?ar">https://learning.oreilly.com/library/view/~/9780128045053/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar</a><br/>Format: Electronic Resources<br/>
Hacking exposed : malware and rootkits : security secrets & solutions
ent://SD_ILS/0/SD_ILS:2312362
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Davis, Michael, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071825757">https://learning.oreilly.com/library/view/~/9780071825757</a>
<a href="https://learning.oreilly.com/library/view/~/9780071825757/?ar">https://learning.oreilly.com/library/view/~/9780071825757/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar">https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar</a><br/>Format: Electronic Resources<br/>
Testing practitioner handbook : gain insights into the latest technology and business trends within testing domains
ent://SD_ILS/0/SD_ILS:2313029
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Rajani, Renu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788299541/?ar">https://learning.oreilly.com/library/view/~/9781788299541/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar">https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar</a><br/>Format: Electronic Resources<br/>
Security and frontend performance : breaking the conundrum
ent://SD_ILS/0/SD_ILS:2314781
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Burney, Sabrina, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492030157">https://learning.oreilly.com/library/view/~/9781492030157</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492030157/?ar">https://go.oreilly.com/library-access/library/view/-/9781492030157/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492030157/?ar">https://learning.oreilly.com/library/view/~/9781492030157/?ar</a><br/>Format: Electronic Resources<br/>
Security automation with Ansible 2 : leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
ent://SD_ILS/0/SD_ILS:2315483
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Akula, Madhu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788394512">https://learning.oreilly.com/library/view/~/9781788394512</a>
<a href="https://learning.oreilly.com/library/view/~/9781788394512/?ar">https://learning.oreilly.com/library/view/~/9781788394512/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788394512/?ar">https://go.oreilly.com/library-access/library/view/-/9781788394512/?ar</a><br/>Format: Electronic Resources<br/>
Network and data security for non-engineers
ent://SD_ILS/0/SD_ILS:2316046
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Groom, Frank M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781315350219/?ar">https://go.oreilly.com/library-access/library/view/-/9781315350219/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315350219/?ar">https://learning.oreilly.com/library/view/~/9781315350219/?ar</a><br/>Format: Electronic Resources<br/>
Network functions virtualization (NFV) with a touch of SDN
ent://SD_ILS/0/SD_ILS:2311983
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Chayapathi, Rajendra, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134464312">https://learning.oreilly.com/library/view/~/9780134464312</a>
<a href="https://learning.oreilly.com/library/view/~/9780134464312/?ar">https://learning.oreilly.com/library/view/~/9780134464312/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134464312/?ar">https://go.oreilly.com/library-access/library/view/-/9780134464312/?ar</a><br/>Format: Electronic Resources<br/>
Large scale network design : LiveLessons
ent://SD_ILS/0/SD_ILS:2312598
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by White, Russ, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134686547/?ar">https://go.oreilly.com/library-access/library/view/-/9780134686547/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134686547/?ar">https://learning.oreilly.com/videos/~/9780134686547/?ar</a><br/>Format: Electronic Resources<br/>
Applied network security : master the art of detecting and averting advanced network security attacks and techniques
ent://SD_ILS/0/SD_ILS:2313288
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Salmon, Arthur, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786466273/?ar">https://learning.oreilly.com/library/view/~/9781786466273/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar">https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786466273">https://learning.oreilly.com/library/view/~/9781786466273</a><br/>Format: Electronic Resources<br/>
What is a zero trust network?
ent://SD_ILS/0/SD_ILS:2314041
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Barth, Doug, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781491998892/?ar">https://learning.oreilly.com/videos/~/9781491998892/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491998892/?ar">https://go.oreilly.com/library-access/library/view/-/9781491998892/?ar</a><br/>Format: Electronic Resources<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:2313301
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128039298">https://learning.oreilly.com/library/view/~/9780128039298</a>
<a href="https://learning.oreilly.com/library/view/~/9780128039298/?ar">https://learning.oreilly.com/library/view/~/9780128039298/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar">https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar</a><br/>Format: Electronic Resources<br/>
Advanced persistent training : take your security awareness program to the next level
ent://SD_ILS/0/SD_ILS:2313452
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Schroeder, Jordan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228357/?ar">https://learning.oreilly.com/library/view/~/9781484228357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228357">https://learning.oreilly.com/library/view/~/9781484228357</a><br/>Format: Electronic Resources<br/>
Network forensics
ent://SD_ILS/0/SD_ILS:2313739
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119328285">https://learning.oreilly.com/library/view/~/9781119328285</a>
<a href="https://learning.oreilly.com/library/view/~/9781119328285/?ar">https://learning.oreilly.com/library/view/~/9781119328285/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119328285/?ar">https://go.oreilly.com/library-access/library/view/-/9781119328285/?ar</a><br/>Format: Electronic Resources<br/>
Mastering Kali Linux for Web penetration testing : test and evaluate all aspects of the design and implementation
ent://SD_ILS/0/SD_ILS:2313741
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by McPhee, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784395070">https://learning.oreilly.com/library/view/~/9781784395070</a>
<a href="https://learning.oreilly.com/library/view/~/9781784395070/?ar">https://learning.oreilly.com/library/view/~/9781784395070/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781784395070/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395070/?ar</a><br/>Format: Electronic Resources<br/>
The Internet of risky things : trusting devices that surround us
ent://SD_ILS/0/SD_ILS:2312464
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Smith, Sean, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491963616/?ar">https://go.oreilly.com/library-access/library/view/-/9781491963616/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491963616/?ar">https://learning.oreilly.com/library/view/~/9781491963616/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491963616">https://learning.oreilly.com/library/view/~/9781491963616</a><br/>Format: Electronic Resources<br/>
Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux, the ultimate hackers' arsenal
ent://SD_ILS/0/SD_ILS:2313803
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787120235/?ar">https://learning.oreilly.com/library/view/~/9781787120235/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar">https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar</a><br/>Format: Electronic Resources<br/>
Mastering Active Directory : automate tasks by leveraging PowerShell for Active Directory Domain Services 2016
ent://SD_ILS/0/SD_ILS:2313809
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787289352">https://learning.oreilly.com/library/view/~/9781787289352</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar">https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787289352/?ar">https://learning.oreilly.com/library/view/~/9781787289352/?ar</a><br/>Format: Electronic Resources<br/>
Network security through data analysis : from data to action
ent://SD_ILS/0/SD_ILS:2314146
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Collins, Michael (Michael Patrick), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491962831/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962831/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491962831/?ar">https://learning.oreilly.com/library/view/~/9781491962831/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491962831">https://learning.oreilly.com/library/view/~/9781491962831</a><br/>Format: Electronic Resources<br/>
Digital forensics and incident response : an intelligent way to respond to attacks
ent://SD_ILS/0/SD_ILS:2313915
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Johansen, Gerard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787288683">https://learning.oreilly.com/library/view/~/9781787288683</a>
<a href="https://learning.oreilly.com/library/view/~/9781787288683/?ar">https://learning.oreilly.com/library/view/~/9781787288683/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787288683/?ar">https://go.oreilly.com/library-access/library/view/-/9781787288683/?ar</a><br/>Format: Electronic Resources<br/>
Industrial cybersecurity : efficiently secure critical infrastructure systems
ent://SD_ILS/0/SD_ILS:2314674
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788395151/?ar">https://learning.oreilly.com/library/view/~/9781788395151/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar">https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788395151">https://learning.oreilly.com/library/view/~/9781788395151</a><br/>Format: Electronic Resources<br/>
Cisco next-generation security solutions : all-in-one Cisco ASA FirePOWER services, NGIPS, and AMP
ent://SD_ILS/0/SD_ILS:2311054
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Santos, Omar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134213071/?ar">https://go.oreilly.com/library-access/library/view/-/9780134213071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134213071/?ar">https://learning.oreilly.com/library/view/~/9780134213071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134213071">https://learning.oreilly.com/library/view/~/9780134213071</a><br/>Format: Electronic Resources<br/>
Cisco FirePOWER and Advanced Malware Protection : LiveLessons
ent://SD_ILS/0/SD_ILS:2311063
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134468709/?ar">https://go.oreilly.com/library-access/library/view/-/9780134468709/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134468709/?ar">https://learning.oreilly.com/videos/~/9780134468709/?ar</a><br/>Format: Electronic Resources<br/>
Cisco Intelligent WAN (IWAN)
ent://SD_ILS/0/SD_ILS:2311998
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Edgeworth, Brad, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar">https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134423760/?ar">https://learning.oreilly.com/library/view/~/9780134423760/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134423760">https://learning.oreilly.com/library/view/~/9780134423760</a><br/>Format: Electronic Resources<br/>
Defensive security handbook : best practices for securing infrastructure
ent://SD_ILS/0/SD_ILS:2312983
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Brotherston, Lee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491960370/?ar">https://learning.oreilly.com/library/view/~/9781491960370/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491960370/?ar">https://go.oreilly.com/library-access/library/view/-/9781491960370/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491960370">https://learning.oreilly.com/library/view/~/9781491960370</a><br/>Format: Electronic Resources<br/>
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
ent://SD_ILS/0/SD_ILS:2311833
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128093658/?ar">https://learning.oreilly.com/library/view/~/9780128093658/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar">https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128093658">https://learning.oreilly.com/library/view/~/9780128093658</a><br/>Format: Electronic Resources<br/>
Kali Linux network scanning cookbook : take your penetration-testing skills to the next level
ent://SD_ILS/0/SD_ILS:2313499
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format: Electronic Resources<br/>
Cyber security on Azure : an IT professionals guide to Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2313788
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484227404/?ar">https://learning.oreilly.com/library/view/~/9781484227404/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484227404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484227404/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484227404">https://learning.oreilly.com/library/view/~/9781484227404</a><br/>Format: Electronic Resources<br/>
Zero trust networks : building secure systems in untrusted networks
ent://SD_ILS/0/SD_ILS:2313595
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Gilman, Evan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491962183/?ar">https://learning.oreilly.com/library/view/~/9781491962183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491962183">https://learning.oreilly.com/library/view/~/9781491962183</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491962183/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962183/?ar</a><br/>Format: Electronic Resources<br/>
What are the advantages and disadvantages of a zero trust model?
ent://SD_ILS/0/SD_ILS:2314049
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Barth, Doug, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491998915/?ar">https://go.oreilly.com/library-access/library/view/-/9781491998915/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491998915/?ar">https://learning.oreilly.com/videos/~/9781491998915/?ar</a><br/>Format: Electronic Resources<br/>
Capture and analysis of network-based evidence.
ent://SD_ILS/0/SD_ILS:2334767
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Messier, Ric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492029182">https://learning.oreilly.com/videos/~/9781492029182</a>
<a href="https://learning.oreilly.com/videos/~/9781492029182/?ar">https://learning.oreilly.com/videos/~/9781492029182/?ar</a><br/>Format: Video recording<br/>
Forensic analysis of computer memory.
ent://SD_ILS/0/SD_ILS:2334797
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029144">https://learning.oreilly.com/videos/~/9781492029144</a>
<a href="https://learning.oreilly.com/videos/~/9781492029144/?ar">https://learning.oreilly.com/videos/~/9781492029144/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar</a><br/>Format: Video recording<br/>
Distributed Networks
ent://SD_ILS/0/SD_ILS:2319907
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format: Electronic Resources<br/>
O'Reilly Security Conference 2017, New York, NY.
ent://SD_ILS/0/SD_ILS:2315710
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by O'Reilly Security Conference (2017 : New York, N.Y.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491985359/?ar">https://go.oreilly.com/library-access/library/view/-/9781491985359/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491985359/?ar">https://learning.oreilly.com/videos/~/9781491985359/?ar</a><br/>Format: Electronic Resources<br/>
Cloud computing security : foundations and challenges
ent://SD_ILS/0/SD_ILS:2311524
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format: Electronic Resources<br/>
Managing SSH clients and servers.
ent://SD_ILS/0/SD_ILS:2334344
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Wallen, Jack, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar">https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492031666">https://learning.oreilly.com/videos/~/9781492031666</a>
<a href="https://learning.oreilly.com/videos/~/9781492031666/?ar">https://learning.oreilly.com/videos/~/9781492031666/?ar</a><br/>Format: Video recording<br/>
CCSP Certified Cloud Security Professional exam guide
ent://SD_ILS/0/SD_ILS:2312248
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Carter, Daniel, CISSP.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781259835452/?ar">https://go.oreilly.com/library-access/library/view/-/9781259835452/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781259835452/?ar">https://learning.oreilly.com/library/view/~/9781259835452/?ar</a><br/>Format: Electronic Resources<br/>
Zabbix : enterprise network montioring [sic] made easy : learn how to gather detailed statistics and data with this one-stop, comprehensive course along with hands-on recipes to get your infrasturcture up and running with Zabbix : a course in three modules.
ent://SD_ILS/0/SD_ILS:2312746
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Olups, Rihards, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787129047">https://learning.oreilly.com/library/view/~/9781787129047</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787129047/?ar">https://go.oreilly.com/library-access/library/view/-/9781787129047/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787129047/?ar">https://learning.oreilly.com/library/view/~/9781787129047/?ar</a><br/>Format: Electronic Resources<br/>
Google hacking for penetration testers
ent://SD_ILS/0/SD_ILS:2309293
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Long, Johnny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029824/?ar">https://learning.oreilly.com/library/view/~/9780128029824/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar</a><br/>Format: Electronic Resources<br/>
Dissecting the hack : the V3rb0ten network
ent://SD_ILS/0/SD_ILS:2309296
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format: Electronic Resources<br/>
The Complete Guide to Cybersecurity Risks and Controls
ent://SD_ILS/0/SD_ILS:2324524
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Kohnke, Anne, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar">https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579/?ar">https://learning.oreilly.com/library/view/~/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579">https://learning.oreilly.com/library/view/~/9781498740579</a><br/>Format: Electronic Resources<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:2314416
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Bose, S., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789332579125/?ar">https://learning.oreilly.com/library/view/~/9789332579125/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar">https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9789332579125">https://learning.oreilly.com/library/view/~/9789332579125</a><br/>Format: Electronic Resources<br/>
Information theft prevention : theory and practice
ent://SD_ILS/0/SD_ILS:2315550
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format: Electronic Resources<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:2313484
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format: Electronic Resources<br/>
Secure your Node.js web application : keep attackers out and users happy
ent://SD_ILS/0/SD_ILS:2309949
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Düüna, Karl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar">https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680501780/?ar">https://learning.oreilly.com/library/view/~/9781680501780/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680501780">https://learning.oreilly.com/library/view/~/9781680501780</a><br/>Format: Electronic Resources<br/>
Identity and data security for web development : best practices
ent://SD_ILS/0/SD_ILS:2310821
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by LeBlanc, Jonathan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491937006">https://learning.oreilly.com/library/view/~/9781491937006</a>
<a href="https://learning.oreilly.com/library/view/~/9781491937006/?ar">https://learning.oreilly.com/library/view/~/9781491937006/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491937006/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937006/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices
ent://SD_ILS/0/SD_ILS:2311174
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Steadman, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785283925/?ar">https://learning.oreilly.com/library/view/~/9781785283925/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785283925">https://learning.oreilly.com/library/view/~/9781785283925</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785283925/?ar">https://go.oreilly.com/library-access/library/view/-/9781785283925/?ar</a><br/>Format: Electronic Resources<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:2310991
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format: Electronic Resources<br/>
The O'Reilly Security Conference, New York, NY, 2016.
ent://SD_ILS/0/SD_ILS:2311881
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Adkins, Heather, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491960035/?ar">https://go.oreilly.com/library-access/library/view/-/9781491960035/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491960035/?ar">https://learning.oreilly.com/videos/~/9781491960035/?ar</a><br/>Format: Electronic Resources<br/>
Malware diffusion models for modern complex networks : theory and applications
ent://SD_ILS/0/SD_ILS:2313869
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Karyotis, Vasileios, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027165/?ar">https://learning.oreilly.com/library/view/~/9780128027165/?ar</a><br/>Format: Electronic Resources<br/>
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
ent://SD_ILS/0/SD_ILS:2311529
2024-06-21T01:49:01Z
2024-06-21T01:49:01Z
by Cardwell, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar">https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785883491/?ar">https://learning.oreilly.com/library/view/~/9781785883491/?ar</a><br/>Format: Electronic Resources<br/>