Search Results for - Narrowed by: IYTE Library - Computer Security - Microsoft Windows (Computer file) SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLIBRARY$002509Library$0025091$00253AIYTE$002509IYTE$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Computer$002bSecurity$002509Computer$002bSecurity$0026qf$003dSUBJECT$002509Subject$002509Microsoft$002bWindows$002b$002528Computer$002bfile$002529$002509Microsoft$002bWindows$002b$002528Computer$002bfile$002529$0026ps$003d300? 2024-09-27T04:09:04Z Mastering Malware Analysis : the Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks. ent://SD_ILS/0/SD_ILS:2320922 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Kleymenov, Alexey.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar">https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789610789">https://learning.oreilly.com/library/view/~/9781789610789</a> <a href="https://learning.oreilly.com/library/view/~/9781789610789/?ar">https://learning.oreilly.com/library/view/~/9781789610789/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows security monitoring : scenarios and patterns ent://SD_ILS/0/SD_ILS:2315945 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Miroshnikov, Andrei, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar">https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119390640/?ar">https://learning.oreilly.com/library/view/~/9781119390640/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119390640">https://learning.oreilly.com/library/view/~/9781119390640</a><br/>Format:&#160;Electronic Resources<br/> Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis ent://SD_ILS/0/SD_ILS:2317231 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Bramwell, Phil, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295666">https://learning.oreilly.com/library/view/~/9781788295666</a> <a href="https://learning.oreilly.com/library/view/~/9781788295666/?ar">https://learning.oreilly.com/library/view/~/9781788295666/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware ent://SD_ILS/0/SD_ILS:2317050 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;K. A., Monnappa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar">https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788392501/?ar">https://learning.oreilly.com/library/view/~/9781788392501/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital privacy and security using windows : a practical guide ent://SD_ILS/0/SD_ILS:2313658 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484227985/?ar">https://learning.oreilly.com/library/view/~/9781484227985/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484227985/?ar">https://go.oreilly.com/library-access/library/view/-/9781484227985/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484227985">https://learning.oreilly.com/library/view/~/9781484227985</a><br/>Format:&#160;Electronic Resources<br/> Windows virus and malware troubleshooting ent://SD_ILS/0/SD_ILS:2312937 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering the Microsoft Deployment Toolkit : take a deep dive into the world of Windows desktop deployment using the Microsoft Deployment Toolkit ent://SD_ILS/0/SD_ILS:2310813 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Stokes, Jeff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782172499/?ar">https://learning.oreilly.com/library/view/~/9781782172499/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782172499">https://learning.oreilly.com/library/view/~/9781782172499</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782172499/?ar">https://go.oreilly.com/library-access/library/view/-/9781782172499/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:2310018 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar">https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128033357/?ar">https://learning.oreilly.com/library/view/~/9780128033357/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Windows forensics : leverage the power of digital forensics for Windows systems ent://SD_ILS/0/SD_ILS:2311021 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Windows networks : from system security basics to monitoring and auditing ent://SD_ILS/0/SD_ILS:2308561 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Long, Mark, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar">https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771374903/?ar">https://learning.oreilly.com/videos/~/9781771374903/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Windows Server 2012 R2 ent://SD_ILS/0/SD_ILS:2301152 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Minasi, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar">https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118289426/?ar">https://learning.oreilly.com/library/view/~/9781118289426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118289426">https://learning.oreilly.com/library/view/~/9781118289426</a><br/>Format:&#160;Electronic Resources<br/> Programming Windows Identity Foundation ent://SD_ILS/0/SD_ILS:2290015 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Bertocci, Vittorio.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735652040/?ar">https://go.oreilly.com/library-access/library/view/-/9780735652040/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735652040/?ar">https://learning.oreilly.com/library/view/~/9780735652040/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:2309995 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495806/?ar">https://learning.oreilly.com/library/view/~/9781597495806/?ar</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:2288891 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470581858/?ar">https://learning.oreilly.com/library/view/~/9780470581858/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470769805/?ar">https://learning.oreilly.com/library/view/~/9780470769805/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar">https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar">https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470769805">https://learning.oreilly.com/library/view/~/9780470769805</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 in a Windows Environment : the best practice handbook for a Microsoft Windows environment ent://SD_ILS/0/SD_ILS:2290026 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Honan, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280495/?ar">https://learning.oreilly.com/library/view/~/9781849280495/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis DVD toolkit 2E ent://SD_ILS/0/SD_ILS:2287802 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and troubleshooting ent://SD_ILS/0/SD_ILS:2288763 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470275894/?ar">https://learning.oreilly.com/library/view/~/9780470275894/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar">https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Vista security for dummies ent://SD_ILS/0/SD_ILS:2284218 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Koerner, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9780470118054">https://learning.oreilly.com/library/view/~/9780470118054</a> <a href="https://learning.oreilly.com/library/view/~/9780470118054/?ar">https://learning.oreilly.com/library/view/~/9780470118054/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar">https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing the Vista environment ent://SD_ILS/0/SD_ILS:2283409 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Gregory, Peter H.<br/><a href="https://learning.oreilly.com/library/view/~/9780596514303/?ar">https://learning.oreilly.com/library/view/~/9780596514303/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596514303">https://learning.oreilly.com/library/view/~/9780596514303</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar">https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar</a><br/>Format:&#160;Electronic Resources<br/> Perl scripting for Windows security : live response, forensic analysis, and monitoring ent://SD_ILS/0/SD_ILS:2284953 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Carvey, Harlan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491730/?ar">https://learning.oreilly.com/library/view/~/9781597491730/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491730/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491730/?ar</a><br/>Format:&#160;Electronic Resources<br/> The .NET developer's guide to Windows security ent://SD_ILS/0/SD_ILS:2324153 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Brown, Keith, 1967 March 16-<br/><a href="https://learning.oreilly.com/library/view/~/0321228359">https://learning.oreilly.com/library/view/~/0321228359</a> <a href="https://learning.oreilly.com/library/view/~/0321228359/?ar">https://learning.oreilly.com/library/view/~/0321228359/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321228359/?ar">https://go.oreilly.com/library-access/library/view/-/0321228359/?ar</a><br/>Format:&#160;Electronic Resources<br/> Check Point NG : next generation security administration ent://SD_ILS/0/SD_ILS:2306066 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Simonis, Drew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994749/?ar">https://learning.oreilly.com/library/view/~/9781928994749/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Windows 2000 security handbook ent://SD_ILS/0/SD_ILS:2281170 2024-09-27T04:09:04Z 2024-09-27T04:09:04Z by&#160;Schmidt, Jeff, MCSE.<br/><a href="https://learning.oreilly.com/library/view/~/0789719991">https://learning.oreilly.com/library/view/~/0789719991</a> <a href="https://learning.oreilly.com/library/view/~/0789719991/?ar">https://learning.oreilly.com/library/view/~/0789719991/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0789719991/?ar">https://go.oreilly.com/library-access/library/view/-/0789719991/?ar</a><br/>Format:&#160;Electronic Resources<br/>