Search Results for - Narrowed by: O'reilly E-Books - 2017 - S&eacute;curit&eacute; informatique. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AOREILLY$002509O$002527reilly$002bE-Books$0026qf$003dPUBDATE$002509Publication$002bDate$0025092017$0025092017$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300? 2024-06-23T11:09:27Z Securing open source libraries : managing vulnerabilities in open source code packages ent://SD_ILS/0/SD_ILS:2314890 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996980/?ar">https://learning.oreilly.com/library/view/~/9781491996980/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996980">https://learning.oreilly.com/library/view/~/9781491996980</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent training : take your security awareness program to the next level ent://SD_ILS/0/SD_ILS:2313452 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Schroeder, Jordan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484228357/?ar">https://learning.oreilly.com/library/view/~/9781484228357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484228357">https://learning.oreilly.com/library/view/~/9781484228357</a><br/>Format:&#160;Electronic Resources<br/> Incident management for operations ent://SD_ILS/0/SD_ILS:2313545 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Schnepp, Rob, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491917619/?ar">https://learning.oreilly.com/library/view/~/9781491917619/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar">https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491917619">https://learning.oreilly.com/library/view/~/9781491917619</a><br/>Format:&#160;Electronic Resources<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:2313104 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Grimes, Roger A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119396215/?ar">https://go.oreilly.com/library-access/library/view/-/9781119396215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119396215/?ar">https://learning.oreilly.com/library/view/~/9781119396215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119396215">https://learning.oreilly.com/library/view/~/9781119396215</a><br/>Format:&#160;Electronic Resources<br/> Spring Security LDAP integration and SAML extension ent://SD_ILS/0/SD_ILS:2313943 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Mishra, Ankit, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781787285538/?ar">https://learning.oreilly.com/videos/~/9781787285538/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar">https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital privacy and security using windows : a practical guide ent://SD_ILS/0/SD_ILS:2313658 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484227985/?ar">https://learning.oreilly.com/library/view/~/9781484227985/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484227985/?ar">https://go.oreilly.com/library-access/library/view/-/9781484227985/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484227985">https://learning.oreilly.com/library/view/~/9781484227985</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux cookbook : effective penetration testing solutions ent://SD_ILS/0/SD_ILS:2314270 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Schultz, Corey P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390303/?ar">https://learning.oreilly.com/library/view/~/9781784390303/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux network scanning cookbook : take your penetration-testing skills to the next level ent://SD_ILS/0/SD_ILS:2313499 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format:&#160;Electronic Resources<br/> Gray hat C# : a hacker's guide to creating and automating security tools ent://SD_ILS/0/SD_ILS:2312569 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Perry, Brandon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492023449">https://learning.oreilly.com/library/view/~/9781492023449</a> <a href="https://learning.oreilly.com/library/view/~/9781492023449/?ar">https://learning.oreilly.com/library/view/~/9781492023449/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492023449/?ar">https://go.oreilly.com/library-access/library/view/-/9781492023449/?ar</a><br/>Format:&#160;Electronic Resources<br/> Agile application security : enabling security in a continuous delivery pipeline ent://SD_ILS/0/SD_ILS:2312360 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Bell, Laura, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491938836">https://learning.oreilly.com/library/view/~/9781491938836</a> <a href="https://learning.oreilly.com/library/view/~/9781491938836/?ar">https://learning.oreilly.com/library/view/~/9781491938836/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491938836/?ar">https://go.oreilly.com/library-access/library/view/-/9781491938836/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed : malware and rootkits : security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2312362 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Davis, Michael, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071825757">https://learning.oreilly.com/library/view/~/9780071825757</a> <a href="https://learning.oreilly.com/library/view/~/9780071825757/?ar">https://learning.oreilly.com/library/view/~/9780071825757/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar">https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privacy and the Internet of Things ent://SD_ILS/0/SD_ILS:2316648 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Rosner, Gilad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042822">https://learning.oreilly.com/library/view/~/9781492042822</a> <a href="https://learning.oreilly.com/library/view/~/9781492042822/?ar">https://learning.oreilly.com/library/view/~/9781492042822/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042822/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042822/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security from first principles : a practical guide to the information security practice principles ent://SD_ILS/0/SD_ILS:2314425 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Jackson, Craig, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996911/?ar">https://learning.oreilly.com/library/view/~/9781491996911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996911">https://learning.oreilly.com/library/view/~/9781491996911</a><br/>Format:&#160;Electronic Resources<br/> Die Kunst der Anonymit&auml;t im Internet : so sch&uuml;tzen Sie Ihre Identit&auml;t und Ihre Daten ent://SD_ILS/0/SD_ILS:2315011 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack ent://SD_ILS/0/SD_ILS:2315529 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Buchanan, Cameron, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788831925/?ar">https://go.oreilly.com/library-access/library/view/-/9781788831925/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788831925/?ar">https://learning.oreilly.com/library/view/~/9781788831925/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building a HIPAA-compliant cybersecurity program : using NIST 800-30 and CSF to secure protected health information ent://SD_ILS/0/SD_ILS:2318128 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Thompson, Eric C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230602/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230602/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230602/?ar">https://learning.oreilly.com/library/view/~/9781484230602/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows virus and malware troubleshooting ent://SD_ILS/0/SD_ILS:2312937 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed industrial control systems : ICS and SCADA security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2311403 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Bodungen, Clint E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781259589720/?ar">https://go.oreilly.com/library-access/library/view/-/9781259589720/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781259589720/?ar">https://learning.oreilly.com/library/view/~/9781259589720/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of cyber safety : computer and mobile device safety made easy ent://SD_ILS/0/SD_ILS:2311432 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Sammons, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166394/?ar">https://learning.oreilly.com/library/view/~/9780124166394/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124166394/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166394/?ar</a><br/>Format:&#160;Electronic Resources<br/> Metasploit for beginners : create a threat-free environment with the best-in-class tool ent://SD_ILS/0/SD_ILS:2313840 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295970/?ar">https://learning.oreilly.com/library/view/~/9781788295970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295970">https://learning.oreilly.com/library/view/~/9781788295970</a><br/>Format:&#160;Electronic Resources<br/> Fluent conference 2017, San Jose, CA. ent://SD_ILS/0/SD_ILS:2313669 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Fluent (2017 : San Jose, California)<br/><a href="https://learning.oreilly.com/videos/~/9781491985298/?ar">https://learning.oreilly.com/videos/~/9781491985298/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491985298/?ar">https://go.oreilly.com/library-access/library/view/-/9781491985298/?ar</a><br/>Format:&#160;Electronic Resources<br/> To improve cybersecurity, think like a hacker ent://SD_ILS/0/SD_ILS:2313125 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Esteves, Jos&eacute;, 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT58314">https://learning.oreilly.com/library/view/~/53863MIT58314</a> <a href="https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT58314/?ar">https://learning.oreilly.com/library/view/~/53863MIT58314/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensics cookbook : 61 recipes to help you analyze Windows systems ent://SD_ILS/0/SD_ILS:2313990 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Sulkin, Oleg, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390495/?ar">https://learning.oreilly.com/library/view/~/9781784390495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390495">https://learning.oreilly.com/library/view/~/9781784390495</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : a practitioner's guide ent://SD_ILS/0/SD_ILS:2313763 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format:&#160;Electronic Resources<br/> VCP6-NV official cert guide : (exam #2VO-641) ent://SD_ILS/0/SD_ILS:2311292 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Sena Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134133713">https://learning.oreilly.com/library/view/~/9780134133713</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar">https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134133713/?ar">https://learning.oreilly.com/library/view/~/9780134133713/?ar</a><br/>Format:&#160;Electronic Resources<br/> Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules. ent://SD_ILS/0/SD_ILS:2315320 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788624596/?ar">https://learning.oreilly.com/library/view/~/9781788624596/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing essentials. ent://SD_ILS/0/SD_ILS:2311955 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Oriyano, Sean-Philip.<br/><a href="https://learning.oreilly.com/library/view/~/9781119235309">https://learning.oreilly.com/library/view/~/9781119235309</a> <a href="https://learning.oreilly.com/library/view/~/9781119235309/?ar">https://learning.oreilly.com/library/view/~/9781119235309/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar">https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar</a><br/>Format:&#160;Electronic Resources<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:2311609 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Griffor, Edward R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128038383/?ar">https://learning.oreilly.com/library/view/~/9780128038383/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar">https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128038383">https://learning.oreilly.com/library/view/~/9780128038383</a><br/>Format:&#160;Electronic Resources<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:2312348 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Li, Shancang, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045053">https://learning.oreilly.com/library/view/~/9780128045053</a> <a href="https://learning.oreilly.com/library/view/~/9780128045053/?ar">https://learning.oreilly.com/library/view/~/9780128045053/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar</a><br/>Format:&#160;Electronic Resources<br/> Industrial cybersecurity : efficiently secure critical infrastructure systems ent://SD_ILS/0/SD_ILS:2314674 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788395151/?ar">https://learning.oreilly.com/library/view/~/9781788395151/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar">https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788395151">https://learning.oreilly.com/library/view/~/9781788395151</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:2314683 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a> <a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format:&#160;Electronic Resources<br/> Spring Security : secure your web applications, RESTful services, and microservice architectures ent://SD_ILS/0/SD_ILS:2315067 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Knutson, Mick, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787129511/?ar">https://go.oreilly.com/library-access/library/view/-/9781787129511/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787129511/?ar">https://learning.oreilly.com/library/view/~/9781787129511/?ar</a><br/>Format:&#160;Electronic Resources<br/> Post-incident reviews : learning from failure for improved incident response ent://SD_ILS/0/SD_ILS:2318499 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Hand, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar">https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491986998">https://learning.oreilly.com/library/view/~/9781491986998</a> <a href="https://learning.oreilly.com/library/view/~/9781491986998/?ar">https://learning.oreilly.com/library/view/~/9781491986998/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments ent://SD_ILS/0/SD_ILS:2313287 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Shah, Dhruv, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar">https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783982165/?ar">https://learning.oreilly.com/library/view/~/9781783982165/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security on Azure : an IT professionals guide to Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2313788 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484227404/?ar">https://learning.oreilly.com/library/view/~/9781484227404/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484227404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484227404/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484227404">https://learning.oreilly.com/library/view/~/9781484227404</a><br/>Format:&#160;Electronic Resources<br/> Cloud computing security : foundations and challenges ent://SD_ILS/0/SD_ILS:2311524 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ransomware : defending against digital extortion ent://SD_ILS/0/SD_ILS:2311973 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Liska, Allan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491967874/?ar">https://learning.oreilly.com/library/view/~/9781491967874/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491967874">https://learning.oreilly.com/library/view/~/9781491967874</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar">https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security engineering : a practical approach for systems and software assurance ent://SD_ILS/0/SD_ILS:2311996 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Mead, Nancy R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar">https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134189857/?ar">https://learning.oreilly.com/library/view/~/9780134189857/?ar</a><br/>Format:&#160;Electronic Resources<br/> Red Hat Certificate of Expertise in server hardening - exam EX413 training : prepare to take the Red Hat EX413 exam and work towards your RHCA datacenter certification ent://SD_ILS/0/SD_ILS:2312826 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Rothwell, William, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491974483/?ar">https://go.oreilly.com/library-access/library/view/-/9781491974483/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491974483/?ar">https://learning.oreilly.com/videos/~/9781491974483/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:2311833 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128093658/?ar">https://learning.oreilly.com/library/view/~/9780128093658/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar">https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128093658">https://learning.oreilly.com/library/view/~/9780128093658</a><br/>Format:&#160;Electronic Resources<br/> An quan shen tou ce shi. ent://SD_ILS/0/SD_ILS:2332437 2024-06-23T11:09:27Z 2024-06-23T11:09:27Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882021010401/?ar">https://learning.oreilly.com/videos/~/8882021010401/?ar</a> <a href="https://learning.oreilly.com/videos/~/8882021010401">https://learning.oreilly.com/videos/~/8882021010401</a> <a href="https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar</a><br/>Format:&#160;Video recording<br/>