Search Results for - Narrowed by: English - 2013 - Computer networks -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300? 2024-06-21T12:03:09Z Hacking with Kali : Practical Penetration Testing Techniques. ent://SD_ILS/0/SD_ILS:1253497 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Broad, James.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115177">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Instant Spring Security Starter. ent://SD_ILS/0/SD_ILS:1260143 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Jagielski, Piotr.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1274894">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital Whoness : Identity, Privacy and Freedom in the Cyberworld. ent://SD_ILS/0/SD_ILS:1259308 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Capurro, Rafael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1215540">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Patterns in Practice : Designing Secure Architectures Using Software Patterns. ent://SD_ILS/0/SD_ILS:1259817 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Fernandez-Buglioni, Eduardo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1245159">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Business Continuity and Disaster Recovery Planning for IT Professionals. ent://SD_ILS/0/SD_ILS:1253498 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Snedaker, Susan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115178">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infrastructure. ent://SD_ILS/0/SD_ILS:1253499 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Knapp, Eric D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115187">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber Conflict : Competing National Perspectives. ent://SD_ILS/0/SD_ILS:1254259 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1124641">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Professional Penetration Testing : Creating and Learning in a Hacking Lab. ent://SD_ILS/0/SD_ILS:1253494 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Wilhelm, Thomas.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115172">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Basics of Web Hacking : Tools and Techniques to Attack the Web. ent://SD_ILS/0/SD_ILS:1259696 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Pauli, Josh.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1222592">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web Application Defender's Cookbook : Battling Hackers and Protecting Users. ent://SD_ILS/0/SD_ILS:1252873 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Barnett, Ryan C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in cyber security : technology, operations, and experiences ent://SD_ILS/0/SD_ILS:1388405 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Hsu, D. Frank (Derbiau Frank), 1948- editor.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4803841">Click to View</a><br/>Format:&#160;Electronic Resources<br/> UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:478805 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Tam, Kenneth.<br/>Knovel <a href="http://app.knovel.com/hotlink/toc/id:kpUTMSFMF4/utm-security-with">http://app.knovel.com/hotlink/toc/id:kpUTMSFMF4/utm-security-with</a><br/>Format:&#160;Electronic Resources<br/> Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipes ent://SD_ILS/0/SD_ILS:475425 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Fadyushin, Vyacheslav.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format:&#160;Electronic Resources<br/> Group key establishment protocols: Pairing cryptography and verifiable secret sharing scheme ent://SD_ILS/0/SD_ILS:409009 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Aslanoğlu, Rabia.<br/><a href="http://hdl.handle.net/11147/3614">Access to Electronic Versiyon.</a><br/>Format:&#160;Manuscript<br/> Developing and evaluating security-aware software systems ent://SD_ILS/0/SD_ILS:476373 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Khan, Khaled M., 1959- editor.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/</a><br/>Format:&#160;Electronic Resources<br/> Web Penetration Testing with Kali Linux. ent://SD_ILS/0/SD_ILS:1262746 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Muniz, Joseph.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1420531">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and IT Infrastructure Protection. ent://SD_ILS/0/SD_ILS:1261962 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1377640">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM Mainframe Security : Beyond the Basics—A Practical Guide from a z/OS and RACF Perspective. ent://SD_ILS/0/SD_ILS:1262591 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Dattani, Dinesh D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1411689">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity : Managing Systems, Conducting Testing, and Investigating Intrusions. ent://SD_ILS/0/SD_ILS:1263596 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Mowbray, Thomas J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1481185">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practice of Network Security Monitoring : Understanding Incident Detection and Response. ent://SD_ILS/0/SD_ILS:1264995 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Bejtlich, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572876">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security. ent://SD_ILS/0/SD_ILS:1261560 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1357643">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Basics of IT Audit : Purposes, Processes, and Practical Information. ent://SD_ILS/0/SD_ILS:1264247 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Gantz, Stephen D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1550527">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft DirectAccess Best Practices and Troubleshooting. ent://SD_ILS/0/SD_ILS:1262213 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Krause, Jordan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1389355">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security. ent://SD_ILS/0/SD_ILS:1261682 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1364061">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data Visualization, Part 2 : New Directions for Evaluation, Number 140. ent://SD_ILS/0/SD_ILS:1265488 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Azzam, Tarek.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1579356">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SolarWinds Server &amp; Application Monitor : Deployment and Administration. ent://SD_ILS/0/SD_ILS:1265747 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Brant, Justin M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1582950">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Biohackers : The Politics of Open Science. ent://SD_ILS/0/SD_ILS:1322996 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Delfanti, Alessandro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3386719">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:2206071 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1081145">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The benefits and security risks of web-based applications for business trend report ent://SD_ILS/0/SD_ILS:2206375 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Kotwica, Kathleen.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1210948">Click to View</a><br/>Format:&#160;Electronic Resources<br/> What should go on the internet? : privacy, freedom, and security online ent://SD_ILS/0/SD_ILS:2098875 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Engel, Mary, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4533280">Click to View</a><br/>Format:&#160;Electronic Resources<br/> American exceptionalism, the French exception, and digital media law ent://SD_ILS/0/SD_ILS:2053010 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Eko, Lyombe.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1358660">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Spring Security 3.x cookbook ent://SD_ILS/0/SD_ILS:2154923 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Mankale, Anjana.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1532014">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Iris biometric model for secured network access ent://SD_ILS/0/SD_ILS:2130126 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Khoury, Franjieh El.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1177222">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows 2012 server network security securing your windows network systems and infrastructure ent://SD_ILS/0/SD_ILS:2206163 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115160">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:2206583 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418381">Click to View</a><br/>Format:&#160;Electronic Resources<br/> UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:2206032 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Tam, Kenneth.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1068442">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent threat understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:2206046 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073020">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:2206165 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:2206025 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1058152">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Automatic defense against zero-day polymorphic worms in communication networks ent://SD_ILS/0/SD_ILS:2130551 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Mohammed, Mohssen, 1982- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1220106">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security risks in social media technologies : safe practices in public service applications ent://SD_ILS/0/SD_ILS:2206842 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Oxley, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1574994">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:2297537 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Radvanovsky, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502260/?ar">https://learning.oreilly.com/library/view/~/9781466502260/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466502260">https://learning.oreilly.com/library/view/~/9781466502260</a><br/>Format:&#160;Electronic Resources<br/> Learning computer forensics ent://SD_ILS/0/SD_ILS:2298554 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Messier, Ric.<br/><a href="https://learning.oreilly.com/videos/~/9781771370615/?ar">https://learning.oreilly.com/videos/~/9781771370615/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent threat : understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:2296845 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499491">https://learning.oreilly.com/library/view/~/9781597499491</a> <a href="https://learning.oreilly.com/library/view/~/9781597499491/?ar">https://learning.oreilly.com/library/view/~/9781597499491/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499491/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499491/?ar</a><br/>Format:&#160;Electronic Resources<br/> FISMA and the risk management framework : the new practice of federal cyber security ent://SD_ILS/0/SD_ILS:2296615 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Gantz, Stephen D.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496414">https://learning.oreilly.com/library/view/~/9781597496414</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496414/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496414/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496414/?ar">https://learning.oreilly.com/library/view/~/9781597496414/?ar</a><br/>Format:&#160;Electronic Resources<br/> UTM security with Fortinet : Mastering FortiOS ent://SD_ILS/0/SD_ILS:2296617 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Tam, Kenneth.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497473/?ar">https://learning.oreilly.com/library/view/~/9781597497473/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497473">https://learning.oreilly.com/library/view/~/9781597497473</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2298336 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar">https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118380956/?ar">https://learning.oreilly.com/library/view/~/9781118380956/?ar</a><br/>Format:&#160;Electronic Resources<br/> Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day ent://SD_ILS/0/SD_ILS:2298053 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Yerrid, K. C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519960/?ar">https://learning.oreilly.com/library/view/~/9781849519960/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519960">https://learning.oreilly.com/library/view/~/9781849519960</a><br/>Format:&#160;Electronic Resources<br/> Iris biometric model for secured network access ent://SD_ILS/0/SD_ILS:2298466 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;El Khoury, Franjieh.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502147/?ar">https://learning.oreilly.com/library/view/~/9781466502147/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466502147">https://learning.oreilly.com/library/view/~/9781466502147</a><br/>Format:&#160;Electronic Resources<br/> Professional penetration testing : creating and learning in a hacking lab ent://SD_ILS/0/SD_ILS:2299483 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Wilhelm, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499934/?ar">https://learning.oreilly.com/library/view/~/9781597499934/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical anonymity : hiding in plain sight online ent://SD_ILS/0/SD_ILS:2299515 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Loshin, Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar">https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124104044/?ar">https://learning.oreilly.com/library/view/~/9780124104044/?ar</a><br/>Format:&#160;Electronic Resources<br/> Pro Spring security ent://SD_ILS/0/SD_ILS:2298698 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Scarioni, Carlo.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430248187/?ar">https://go.oreilly.com/library-access/library/view/-/9781430248187/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430248187/?ar">https://learning.oreilly.com/library/view/~/9781430248187/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430248187">https://learning.oreilly.com/library/view/~/9781430248187</a><br/>Format:&#160;Electronic Resources<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:2297534 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Yang, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047020">https://learning.oreilly.com/library/view/~/9780124047020</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124047020/?ar">https://learning.oreilly.com/library/view/~/9780124047020/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web Application Defender's Cookbook : Battling Hackers and Protecting Users. ent://SD_ILS/0/SD_ILS:2298453 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Barnett, Ryan C.<br/><a href="https://learning.oreilly.com/library/view/~/9781118417058/?ar">https://learning.oreilly.com/library/view/~/9781118417058/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar">https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118417058">https://learning.oreilly.com/library/view/~/9781118417058</a><br/>Format:&#160;Electronic Resources<br/> Windows 2012 server network security : securing your windows network systems and infrastructure ent://SD_ILS/0/SD_ILS:2298494 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Rountree, Derrick.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499583/?ar">https://learning.oreilly.com/library/view/~/9781597499583/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499583/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499583/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499583">https://learning.oreilly.com/library/view/~/9781597499583</a><br/>Format:&#160;Electronic Resources<br/> Learning PHP security ent://SD_ILS/0/SD_ILS:2301438 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Bierer, Doug.<br/><a href="https://learning.oreilly.com/videos/~/9781771371636/?ar">https://learning.oreilly.com/videos/~/9781771371636/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781771371636/?ar">https://go.oreilly.com/library-access/library/view/-/9781771371636/?ar</a><br/>Format:&#160;Electronic Resources<br/> SolarWinds server &amp; application monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server &amp; Application Monitor with minimum hassle ent://SD_ILS/0/SD_ILS:2300919 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Brant, Justin M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783551019/?ar">https://go.oreilly.com/library-access/library/view/-/9781783551019/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783551019/?ar">https://learning.oreilly.com/library/view/~/9781783551019/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security : the complete reference ent://SD_ILS/0/SD_ILS:2299885 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Rhodes-Ousley, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071784351/?ar">https://go.oreilly.com/library-access/library/view/-/9780071784351/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071784351/?ar">https://learning.oreilly.com/library/view/~/9780071784351/?ar</a><br/>Format:&#160;Electronic Resources<br/> The practice of network security monitoring ent://SD_ILS/0/SD_ILS:2300232 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Bejtlich, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457185175/?ar">https://go.oreilly.com/library-access/library/view/-/9781457185175/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457185175/?ar">https://learning.oreilly.com/library/view/~/9781457185175/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of web hacking : tools and techniques to attack the web ent://SD_ILS/0/SD_ILS:2300058 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux ent://SD_ILS/0/SD_ILS:2300350 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Muniz, Joseph.<br/><a href="https://learning.oreilly.com/library/view/~/9781782163169">https://learning.oreilly.com/library/view/~/9781782163169</a> <a href="https://learning.oreilly.com/library/view/~/9781782163169/?ar">https://learning.oreilly.com/library/view/~/9781782163169/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar">https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS : a pocket guide ent://SD_ILS/0/SD_ILS:2302895 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Calder, Alan, 1957-<br/><a href="https://learning.oreilly.com/library/view/~/9781849285551">https://learning.oreilly.com/library/view/~/9781849285551</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285551/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285551/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285551/?ar">https://learning.oreilly.com/library/view/~/9781849285551/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to computer networks and cybersecurity ent://SD_ILS/0/SD_ILS:2305578 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Wu, Chwan-Hwa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar">https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466572133/?ar">https://learning.oreilly.com/library/view/~/9781466572133/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook, second edition ent://SD_ILS/0/SD_ILS:2300197 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar">https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123943972/?ar">https://learning.oreilly.com/library/view/~/9780123943972/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security patterns in practice : designing secure architectures using software patterns ent://SD_ILS/0/SD_ILS:2300767 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Fernandez, Eduardo B., 1936-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar">https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119970484/?ar">https://learning.oreilly.com/library/view/~/9781119970484/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119970484">https://learning.oreilly.com/library/view/~/9781119970484</a><br/>Format:&#160;Electronic Resources<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:2301151 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Sanders, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar">https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124172081/?ar">https://learning.oreilly.com/library/view/~/9780124172081/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124172081">https://learning.oreilly.com/library/view/~/9780124172081</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed : mobile security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2301016 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Bergman, Neil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar">https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071817011/?ar">https://learning.oreilly.com/library/view/~/9780071817011/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071817011">https://learning.oreilly.com/library/view/~/9780071817011</a><br/>Format:&#160;Electronic Resources<br/> Security risks in social media technologies : safe practices in public service applications ent://SD_ILS/0/SD_ILS:2301076 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Oxley, Alan.<br/><a href="https://learning.oreilly.com/library/view/~/9781843347149">https://learning.oreilly.com/library/view/~/9781843347149</a> <a href="https://learning.oreilly.com/library/view/~/9781843347149/?ar">https://learning.oreilly.com/library/view/~/9781843347149/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781843347149/?ar">https://go.oreilly.com/library-access/library/view/-/9781843347149/?ar</a><br/>Format:&#160;Electronic Resources<br/> Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure ent://SD_ILS/0/SD_ILS:2298917 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Knapp, Eric D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499989/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499989/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499989/?ar">https://learning.oreilly.com/library/view/~/9781597499989/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499989">https://learning.oreilly.com/library/view/~/9781597499989</a><br/>Format:&#160;Electronic Resources<br/> Surviving the Top Ten Challenges of Software Testing : a People-Oriented Approach ent://SD_ILS/0/SD_ILS:2305832 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Rice, William E. Perry. Randall W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133489163">https://learning.oreilly.com/library/view/~/9780133489163</a> <a href="https://learning.oreilly.com/library/view/~/9780133489163/?ar">https://learning.oreilly.com/library/view/~/9780133489163/?ar</a><br/>Format:&#160;Electronic Resources<br/> Best Practices for the Formal Software Testing Process : a Menu of Testing Tasks ent://SD_ILS/0/SD_ILS:2320691 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Drabick, Rodger, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133489309/?ar">https://learning.oreilly.com/library/view/~/9780133489309/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133489309">https://learning.oreilly.com/library/view/~/9780133489309</a><br/>Format:&#160;Electronic Resources<br/> Introduction to computer and network security : navigating shades of gray ent://SD_ILS/0/SD_ILS:2313482 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format:&#160;Electronic Resources<br/> Strategic Information Management, 3rd Edition ent://SD_ILS/0/SD_ILS:2319914 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2343015 2024-06-21T12:03:09Z 2024-06-21T12:03:09Z by&#160;Vacca, John R., editor.<br/>Format:&#160;Books<br/>