Search Results for - Narrowed by: English - 2013 - Computer networks -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-06-21T12:03:09ZHacking with Kali : Practical Penetration Testing Techniques.ent://SD_ILS/0/SD_ILS:12534972024-06-21T12:03:09Z2024-06-21T12:03:09Zby Broad, James.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115177">Click to View</a><br/>Format: Electronic Resources<br/>Instant Spring Security Starter.ent://SD_ILS/0/SD_ILS:12601432024-06-21T12:03:09Z2024-06-21T12:03:09Zby Jagielski, Piotr.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1274894">Click to View</a><br/>Format: Electronic Resources<br/>Digital Whoness : Identity, Privacy and Freedom in the Cyberworld.ent://SD_ILS/0/SD_ILS:12593082024-06-21T12:03:09Z2024-06-21T12:03:09Zby Capurro, Rafael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1215540">Click to View</a><br/>Format: Electronic Resources<br/>Security Patterns in Practice : Designing Secure Architectures Using Software Patterns.ent://SD_ILS/0/SD_ILS:12598172024-06-21T12:03:09Z2024-06-21T12:03:09Zby Fernandez-Buglioni, Eduardo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1245159">Click to View</a><br/>Format: Electronic Resources<br/>Business Continuity and Disaster Recovery Planning for IT Professionals.ent://SD_ILS/0/SD_ILS:12534982024-06-21T12:03:09Z2024-06-21T12:03:09Zby Snedaker, Susan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115178">Click to View</a><br/>Format: Electronic Resources<br/>Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infrastructure.ent://SD_ILS/0/SD_ILS:12534992024-06-21T12:03:09Z2024-06-21T12:03:09Zby Knapp, Eric D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115187">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Conflict : Competing National Perspectives.ent://SD_ILS/0/SD_ILS:12542592024-06-21T12:03:09Z2024-06-21T12:03:09Zby Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1124641">Click to View</a><br/>Format: Electronic Resources<br/>Professional Penetration Testing : Creating and Learning in a Hacking Lab.ent://SD_ILS/0/SD_ILS:12534942024-06-21T12:03:09Z2024-06-21T12:03:09Zby Wilhelm, Thomas.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115172">Click to View</a><br/>Format: Electronic Resources<br/>The Basics of Web Hacking : Tools and Techniques to Attack the Web.ent://SD_ILS/0/SD_ILS:12596962024-06-21T12:03:09Z2024-06-21T12:03:09Zby Pauli, Josh.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1222592">Click to View</a><br/>Format: Electronic Resources<br/>Web Application Defender's Cookbook : Battling Hackers and Protecting Users.ent://SD_ILS/0/SD_ILS:12528732024-06-21T12:03:09Z2024-06-21T12:03:09Zby Barnett, Ryan C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1108733">Click to View</a><br/>Format: Electronic Resources<br/>Advances in cyber security : technology, operations, and experiencesent://SD_ILS/0/SD_ILS:13884052024-06-21T12:03:09Z2024-06-21T12:03:09Zby Hsu, D. Frank (Derbiau Frank), 1948- editor.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4803841">Click to View</a><br/>Format: Electronic Resources<br/>UTM security with Fortinet Mastering FortiOSent://SD_ILS/0/SD_ILS:4788052024-06-21T12:03:09Z2024-06-21T12:03:09Zby Tam, Kenneth.<br/>Knovel <a href="http://app.knovel.com/hotlink/toc/id:kpUTMSFMF4/utm-security-with">http://app.knovel.com/hotlink/toc/id:kpUTMSFMF4/utm-security-with</a><br/>Format: Electronic Resources<br/>Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipesent://SD_ILS/0/SD_ILS:4754252024-06-21T12:03:09Z2024-06-21T12:03:09Zby Fadyushin, Vyacheslav.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format: Electronic Resources<br/>Group key establishment protocols: Pairing cryptography and verifiable secret sharing schemeent://SD_ILS/0/SD_ILS:4090092024-06-21T12:03:09Z2024-06-21T12:03:09Zby Aslanoğlu, Rabia.<br/><a href="http://hdl.handle.net/11147/3614">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Developing and evaluating security-aware software systemsent://SD_ILS/0/SD_ILS:4763732024-06-21T12:03:09Z2024-06-21T12:03:09Zby Khan, Khaled M., 1959- editor.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/</a><br/>Format: Electronic Resources<br/>Web Penetration Testing with Kali Linux.ent://SD_ILS/0/SD_ILS:12627462024-06-21T12:03:09Z2024-06-21T12:03:09Zby Muniz, Joseph.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1420531">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Security and IT Infrastructure Protection.ent://SD_ILS/0/SD_ILS:12619622024-06-21T12:03:09Z2024-06-21T12:03:09Zby Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1377640">Click to View</a><br/>Format: Electronic Resources<br/>IBM Mainframe Security : Beyond the BasicsA Practical Guide from a z/OS and RACF Perspective.ent://SD_ILS/0/SD_ILS:12625912024-06-21T12:03:09Z2024-06-21T12:03:09Zby Dattani, Dinesh D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1411689">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity : Managing Systems, Conducting Testing, and Investigating Intrusions.ent://SD_ILS/0/SD_ILS:12635962024-06-21T12:03:09Z2024-06-21T12:03:09Zby Mowbray, Thomas J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1481185">Click to View</a><br/>Format: Electronic Resources<br/>Practice of Network Security Monitoring : Understanding Incident Detection and Response.ent://SD_ILS/0/SD_ILS:12649952024-06-21T12:03:09Z2024-06-21T12:03:09Zby Bejtlich, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572876">Click to View</a><br/>Format: Electronic Resources<br/>Managing Information Security.ent://SD_ILS/0/SD_ILS:12615602024-06-21T12:03:09Z2024-06-21T12:03:09Zby Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1357643">Click to View</a><br/>Format: Electronic Resources<br/>The Basics of IT Audit : Purposes, Processes, and Practical Information.ent://SD_ILS/0/SD_ILS:12642472024-06-21T12:03:09Z2024-06-21T12:03:09Zby Gantz, Stephen D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1550527">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft DirectAccess Best Practices and Troubleshooting.ent://SD_ILS/0/SD_ILS:12622132024-06-21T12:03:09Z2024-06-21T12:03:09Zby Krause, Jordan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1389355">Click to View</a><br/>Format: Electronic Resources<br/>Network and System Security.ent://SD_ILS/0/SD_ILS:12616822024-06-21T12:03:09Z2024-06-21T12:03:09Zby Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1364061">Click to View</a><br/>Format: Electronic Resources<br/>Data Visualization, Part 2 : New Directions for Evaluation, Number 140.ent://SD_ILS/0/SD_ILS:12654882024-06-21T12:03:09Z2024-06-21T12:03:09Zby Azzam, Tarek.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1579356">Click to View</a><br/>Format: Electronic Resources<br/>SolarWinds Server & Application Monitor : Deployment and Administration.ent://SD_ILS/0/SD_ILS:12657472024-06-21T12:03:09Z2024-06-21T12:03:09Zby Brant, Justin M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1582950">Click to View</a><br/>Format: Electronic Resources<br/>Biohackers : The Politics of Open Science.ent://SD_ILS/0/SD_ILS:13229962024-06-21T12:03:09Z2024-06-21T12:03:09Zby Delfanti, Alessandro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3386719">Click to View</a><br/>Format: Electronic Resources<br/>Federated identity primerent://SD_ILS/0/SD_ILS:22060712024-06-21T12:03:09Z2024-06-21T12:03:09Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1081145">Click to View</a><br/>Format: Electronic Resources<br/>The benefits and security risks of web-based applications for business trend reportent://SD_ILS/0/SD_ILS:22063752024-06-21T12:03:09Z2024-06-21T12:03:09Zby Kotwica, Kathleen.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1210948">Click to View</a><br/>Format: Electronic Resources<br/>What should go on the internet? : privacy, freedom, and security onlineent://SD_ILS/0/SD_ILS:20988752024-06-21T12:03:09Z2024-06-21T12:03:09Zby Engel, Mary, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4533280">Click to View</a><br/>Format: Electronic Resources<br/>American exceptionalism, the French exception, and digital media lawent://SD_ILS/0/SD_ILS:20530102024-06-21T12:03:09Z2024-06-21T12:03:09Zby Eko, Lyombe.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1358660">Click to View</a><br/>Format: Electronic Resources<br/>Spring Security 3.x cookbookent://SD_ILS/0/SD_ILS:21549232024-06-21T12:03:09Z2024-06-21T12:03:09Zby Mankale, Anjana.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1532014">Click to View</a><br/>Format: Electronic Resources<br/>Iris biometric model for secured network accessent://SD_ILS/0/SD_ILS:21301262024-06-21T12:03:09Z2024-06-21T12:03:09Zby Khoury, Franjieh El.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1177222">Click to View</a><br/>Format: Electronic Resources<br/>Windows 2012 server network security securing your windows network systems and infrastructureent://SD_ILS/0/SD_ILS:22061632024-06-21T12:03:09Z2024-06-21T12:03:09Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115160">Click to View</a><br/>Format: Electronic Resources<br/>Information protection playbookent://SD_ILS/0/SD_ILS:22065832024-06-21T12:03:09Z2024-06-21T12:03:09Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418381">Click to View</a><br/>Format: Electronic Resources<br/>UTM security with Fortinet Mastering FortiOSent://SD_ILS/0/SD_ILS:22060322024-06-21T12:03:09Z2024-06-21T12:03:09Zby Tam, Kenneth.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1068442">Click to View</a><br/>Format: Electronic Resources<br/>Advanced persistent threat understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:22060462024-06-21T12:03:09Z2024-06-21T12:03:09Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073020">Click to View</a><br/>Format: Electronic Resources<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:22061652024-06-21T12:03:09Z2024-06-21T12:03:09Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115167">Click to View</a><br/>Format: Electronic Resources<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:22060252024-06-21T12:03:09Z2024-06-21T12:03:09Zby Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1058152">Click to View</a><br/>Format: Electronic Resources<br/>Automatic defense against zero-day polymorphic worms in communication networksent://SD_ILS/0/SD_ILS:21305512024-06-21T12:03:09Z2024-06-21T12:03:09Zby Mohammed, Mohssen, 1982- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1220106">Click to View</a><br/>Format: Electronic Resources<br/>Security risks in social media technologies : safe practices in public service applicationsent://SD_ILS/0/SD_ILS:22068422024-06-21T12:03:09Z2024-06-21T12:03:09Zby Oxley, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1574994">Click to View</a><br/>Format: Electronic Resources<br/>Handbook of SCADA/control systems securityent://SD_ILS/0/SD_ILS:22975372024-06-21T12:03:09Z2024-06-21T12:03:09Zby Radvanovsky, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502260/?ar">https://learning.oreilly.com/library/view/~/9781466502260/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466502260">https://learning.oreilly.com/library/view/~/9781466502260</a><br/>Format: Electronic Resources<br/>Learning computer forensicsent://SD_ILS/0/SD_ILS:22985542024-06-21T12:03:09Z2024-06-21T12:03:09Zby Messier, Ric.<br/><a href="https://learning.oreilly.com/videos/~/9781771370615/?ar">https://learning.oreilly.com/videos/~/9781771370615/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar</a><br/>Format: Electronic Resources<br/>Advanced persistent threat : understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:22968452024-06-21T12:03:09Z2024-06-21T12:03:09Zby Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499491">https://learning.oreilly.com/library/view/~/9781597499491</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499491/?ar">https://learning.oreilly.com/library/view/~/9781597499491/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499491/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499491/?ar</a><br/>Format: Electronic Resources<br/>FISMA and the risk management framework : the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:22966152024-06-21T12:03:09Z2024-06-21T12:03:09Zby Gantz, Stephen D.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496414">https://learning.oreilly.com/library/view/~/9781597496414</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496414/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496414/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496414/?ar">https://learning.oreilly.com/library/view/~/9781597496414/?ar</a><br/>Format: Electronic Resources<br/>UTM security with Fortinet : Mastering FortiOSent://SD_ILS/0/SD_ILS:22966172024-06-21T12:03:09Z2024-06-21T12:03:09Zby Tam, Kenneth.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497473/?ar">https://learning.oreilly.com/library/view/~/9781597497473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497473">https://learning.oreilly.com/library/view/~/9781597497473</a><br/>Format: Electronic Resources<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:22983362024-06-21T12:03:09Z2024-06-21T12:03:09Zby Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar">https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118380956/?ar">https://learning.oreilly.com/library/view/~/9781118380956/?ar</a><br/>Format: Electronic Resources<br/>Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this dayent://SD_ILS/0/SD_ILS:22980532024-06-21T12:03:09Z2024-06-21T12:03:09Zby Yerrid, K. C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960/?ar">https://learning.oreilly.com/library/view/~/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960">https://learning.oreilly.com/library/view/~/9781849519960</a><br/>Format: Electronic Resources<br/>Iris biometric model for secured network accessent://SD_ILS/0/SD_ILS:22984662024-06-21T12:03:09Z2024-06-21T12:03:09Zby El Khoury, Franjieh.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502147/?ar">https://learning.oreilly.com/library/view/~/9781466502147/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466502147">https://learning.oreilly.com/library/view/~/9781466502147</a><br/>Format: Electronic Resources<br/>Professional penetration testing : creating and learning in a hacking labent://SD_ILS/0/SD_ILS:22994832024-06-21T12:03:09Z2024-06-21T12:03:09Zby Wilhelm, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499934/?ar">https://learning.oreilly.com/library/view/~/9781597499934/?ar</a><br/>Format: Electronic Resources<br/>Practical anonymity : hiding in plain sight onlineent://SD_ILS/0/SD_ILS:22995152024-06-21T12:03:09Z2024-06-21T12:03:09Zby Loshin, Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar">https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124104044/?ar">https://learning.oreilly.com/library/view/~/9780124104044/?ar</a><br/>Format: Electronic Resources<br/>Pro Spring securityent://SD_ILS/0/SD_ILS:22986982024-06-21T12:03:09Z2024-06-21T12:03:09Zby Scarioni, Carlo.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430248187/?ar">https://go.oreilly.com/library-access/library/view/-/9781430248187/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430248187/?ar">https://learning.oreilly.com/library/view/~/9781430248187/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430248187">https://learning.oreilly.com/library/view/~/9781430248187</a><br/>Format: Electronic Resources<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:22975342024-06-21T12:03:09Z2024-06-21T12:03:09Zby Yang, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047020">https://learning.oreilly.com/library/view/~/9780124047020</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124047020/?ar">https://learning.oreilly.com/library/view/~/9780124047020/?ar</a><br/>Format: Electronic Resources<br/>Web Application Defender's Cookbook : Battling Hackers and Protecting Users.ent://SD_ILS/0/SD_ILS:22984532024-06-21T12:03:09Z2024-06-21T12:03:09Zby Barnett, Ryan C.<br/><a href="https://learning.oreilly.com/library/view/~/9781118417058/?ar">https://learning.oreilly.com/library/view/~/9781118417058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar">https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118417058">https://learning.oreilly.com/library/view/~/9781118417058</a><br/>Format: Electronic Resources<br/>Windows 2012 server network security : securing your windows network systems and infrastructureent://SD_ILS/0/SD_ILS:22984942024-06-21T12:03:09Z2024-06-21T12:03:09Zby Rountree, Derrick.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499583/?ar">https://learning.oreilly.com/library/view/~/9781597499583/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499583/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499583/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499583">https://learning.oreilly.com/library/view/~/9781597499583</a><br/>Format: Electronic Resources<br/>Learning PHP securityent://SD_ILS/0/SD_ILS:23014382024-06-21T12:03:09Z2024-06-21T12:03:09Zby Bierer, Doug.<br/><a href="https://learning.oreilly.com/videos/~/9781771371636/?ar">https://learning.oreilly.com/videos/~/9781771371636/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771371636/?ar">https://go.oreilly.com/library-access/library/view/-/9781771371636/?ar</a><br/>Format: Electronic Resources<br/>SolarWinds server & application monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server & Application Monitor with minimum hassleent://SD_ILS/0/SD_ILS:23009192024-06-21T12:03:09Z2024-06-21T12:03:09Zby Brant, Justin M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783551019/?ar">https://go.oreilly.com/library-access/library/view/-/9781783551019/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783551019/?ar">https://learning.oreilly.com/library/view/~/9781783551019/?ar</a><br/>Format: Electronic Resources<br/>Information security : the complete referenceent://SD_ILS/0/SD_ILS:22998852024-06-21T12:03:09Z2024-06-21T12:03:09Zby Rhodes-Ousley, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071784351/?ar">https://go.oreilly.com/library-access/library/view/-/9780071784351/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071784351/?ar">https://learning.oreilly.com/library/view/~/9780071784351/?ar</a><br/>Format: Electronic Resources<br/>The practice of network security monitoringent://SD_ILS/0/SD_ILS:23002322024-06-21T12:03:09Z2024-06-21T12:03:09Zby Bejtlich, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457185175/?ar">https://go.oreilly.com/library-access/library/view/-/9781457185175/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457185175/?ar">https://learning.oreilly.com/library/view/~/9781457185175/?ar</a><br/>Format: Electronic Resources<br/>The basics of web hacking : tools and techniques to attack the webent://SD_ILS/0/SD_ILS:23000582024-06-21T12:03:09Z2024-06-21T12:03:09Zby Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format: Electronic Resources<br/>Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linuxent://SD_ILS/0/SD_ILS:23003502024-06-21T12:03:09Z2024-06-21T12:03:09Zby Muniz, Joseph.<br/><a href="https://learning.oreilly.com/library/view/~/9781782163169">https://learning.oreilly.com/library/view/~/9781782163169</a>
<a href="https://learning.oreilly.com/library/view/~/9781782163169/?ar">https://learning.oreilly.com/library/view/~/9781782163169/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar">https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar</a><br/>Format: Electronic Resources<br/>PCI DSS : a pocket guideent://SD_ILS/0/SD_ILS:23028952024-06-21T12:03:09Z2024-06-21T12:03:09Zby Calder, Alan, 1957-<br/><a href="https://learning.oreilly.com/library/view/~/9781849285551">https://learning.oreilly.com/library/view/~/9781849285551</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285551/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285551/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285551/?ar">https://learning.oreilly.com/library/view/~/9781849285551/?ar</a><br/>Format: Electronic Resources<br/>Introduction to computer networks and cybersecurityent://SD_ILS/0/SD_ILS:23055782024-06-21T12:03:09Z2024-06-21T12:03:09Zby Wu, Chwan-Hwa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar">https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466572133/?ar">https://learning.oreilly.com/library/view/~/9781466572133/?ar</a><br/>Format: Electronic Resources<br/>Computer and information security handbook, second editionent://SD_ILS/0/SD_ILS:23001972024-06-21T12:03:09Z2024-06-21T12:03:09Zby Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar">https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123943972/?ar">https://learning.oreilly.com/library/view/~/9780123943972/?ar</a><br/>Format: Electronic Resources<br/>Security patterns in practice : designing secure architectures using software patternsent://SD_ILS/0/SD_ILS:23007672024-06-21T12:03:09Z2024-06-21T12:03:09Zby Fernandez, Eduardo B., 1936-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar">https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119970484/?ar">https://learning.oreilly.com/library/view/~/9781119970484/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119970484">https://learning.oreilly.com/library/view/~/9781119970484</a><br/>Format: Electronic Resources<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:23011512024-06-21T12:03:09Z2024-06-21T12:03:09Zby Sanders, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar">https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124172081/?ar">https://learning.oreilly.com/library/view/~/9780124172081/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124172081">https://learning.oreilly.com/library/view/~/9780124172081</a><br/>Format: Electronic Resources<br/>Hacking exposed : mobile security secrets & solutionsent://SD_ILS/0/SD_ILS:23010162024-06-21T12:03:09Z2024-06-21T12:03:09Zby Bergman, Neil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar">https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071817011/?ar">https://learning.oreilly.com/library/view/~/9780071817011/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071817011">https://learning.oreilly.com/library/view/~/9780071817011</a><br/>Format: Electronic Resources<br/>Security risks in social media technologies : safe practices in public service applicationsent://SD_ILS/0/SD_ILS:23010762024-06-21T12:03:09Z2024-06-21T12:03:09Zby Oxley, Alan.<br/><a href="https://learning.oreilly.com/library/view/~/9781843347149">https://learning.oreilly.com/library/view/~/9781843347149</a>
<a href="https://learning.oreilly.com/library/view/~/9781843347149/?ar">https://learning.oreilly.com/library/view/~/9781843347149/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781843347149/?ar">https://go.oreilly.com/library-access/library/view/-/9781843347149/?ar</a><br/>Format: Electronic Resources<br/>Applied cyber security and the smart grid : implementing security controls into the modern power infrastructureent://SD_ILS/0/SD_ILS:22989172024-06-21T12:03:09Z2024-06-21T12:03:09Zby Knapp, Eric D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499989/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499989/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499989/?ar">https://learning.oreilly.com/library/view/~/9781597499989/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499989">https://learning.oreilly.com/library/view/~/9781597499989</a><br/>Format: Electronic Resources<br/>Surviving the Top Ten Challenges of Software Testing : a People-Oriented Approachent://SD_ILS/0/SD_ILS:23058322024-06-21T12:03:09Z2024-06-21T12:03:09Zby Rice, William E. Perry. Randall W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163">https://learning.oreilly.com/library/view/~/9780133489163</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163/?ar">https://learning.oreilly.com/library/view/~/9780133489163/?ar</a><br/>Format: Electronic Resources<br/>Best Practices for the Formal Software Testing Process : a Menu of Testing Tasksent://SD_ILS/0/SD_ILS:23206912024-06-21T12:03:09Z2024-06-21T12:03:09Zby Drabick, Rodger, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309/?ar">https://learning.oreilly.com/library/view/~/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309">https://learning.oreilly.com/library/view/~/9780133489309</a><br/>Format: Electronic Resources<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:23134822024-06-21T12:03:09Z2024-06-21T12:03:09Zby Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format: Electronic Resources<br/>Strategic Information Management, 3rd Editionent://SD_ILS/0/SD_ILS:23199142024-06-21T12:03:09Z2024-06-21T12:03:09Zby Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:23430152024-06-21T12:03:09Z2024-06-21T12:03:09Zby Vacca, John R., editor.<br/>Format: Books<br/>