Search Results for - Narrowed by: 2008 - S&eacute;curit&eacute; informatique. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300$0026isd$003dtrue? 2024-09-27T06:35:12Z Professional ASP.NET 3.5 security, membership, and role management with C♯ and VB ent://SD_ILS/0/SD_ILS:2291742 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Haidar, Bilal.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470379301/?ar">https://go.oreilly.com/library-access/library/view/-/9780470379301/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470379301/?ar">https://learning.oreilly.com/library/view/~/9780470379301/?ar</a><br/>Format:&#160;Electronic Resources<br/> Is it safe? : protecting your computer, your business, and yourself online ent://SD_ILS/0/SD_ILS:2285554 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Miller, Michael, 1958-<br/><a href="https://learning.oreilly.com/library/view/~/9780768683080/?ar">https://learning.oreilly.com/library/view/~/9780768683080/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar">https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768683080">https://learning.oreilly.com/library/view/~/9780768683080</a><br/>Format:&#160;Electronic Resources<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:2284222 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Harris, Shon.<br/><a href="https://learning.oreilly.com/library/view/~/9780071495684/?ar">https://learning.oreilly.com/library/view/~/9780071495684/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar">https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar</a><br/>Format:&#160;Electronic Resources<br/> The new school of information security ent://SD_ILS/0/SD_ILS:2285032 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Shostack, Adam.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321562753/?ar">https://go.oreilly.com/library-access/library/view/-/9780321562753/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321562753/?ar">https://learning.oreilly.com/library/view/~/9780321562753/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321562753">https://learning.oreilly.com/library/view/~/9780321562753</a><br/>Format:&#160;Electronic Resources<br/> A practical guide to trusted computing ent://SD_ILS/0/SD_ILS:2284460 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Challener, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780132398428">https://learning.oreilly.com/library/view/~/9780132398428</a> <a href="https://learning.oreilly.com/library/view/~/9780132398428/?ar">https://learning.oreilly.com/library/view/~/9780132398428/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780132398428/?ar">https://go.oreilly.com/library-access/library/view/-/9780132398428/?ar</a><br/>Format:&#160;Electronic Resources<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:2284509 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Long, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491761/?ar">https://learning.oreilly.com/library/view/~/9781597491761/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar</a><br/>Format:&#160;Electronic Resources<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:2285140 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Hay, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492409">https://learning.oreilly.com/library/view/~/9781597492409</a> <a href="https://learning.oreilly.com/library/view/~/9781597492409/?ar">https://learning.oreilly.com/library/view/~/9781597492409/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Windows server 2008 : prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:2285141 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z <a href="https://learning.oreilly.com/library/view/~/9781597492805">https://learning.oreilly.com/library/view/~/9781597492805</a> <a href="https://learning.oreilly.com/library/view/~/9781597492805/?ar">https://learning.oreilly.com/library/view/~/9781597492805/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Windows server 2008 security resource kit ent://SD_ILS/0/SD_ILS:2284887 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Johansson, Jesper M.<br/><a href="https://learning.oreilly.com/library/view/~/9780735625044/?ar">https://learning.oreilly.com/library/view/~/9780735625044/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735625044">https://learning.oreilly.com/library/view/~/9780735625044</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735625044/?ar">https://go.oreilly.com/library-access/library/view/-/9780735625044/?ar</a><br/>Format:&#160;Electronic Resources<br/> Geekonomics : the real cost of insecure software ent://SD_ILS/0/SD_ILS:2284350 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Rice, David, 1971-<br/><a href="https://learning.oreilly.com/library/view/~/9780321477897/?ar">https://learning.oreilly.com/library/view/~/9780321477897/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321477897/?ar">https://go.oreilly.com/library-access/library/view/-/9780321477897/?ar</a><br/>Format:&#160;Electronic Resources<br/> Software security engineering : a guide for project managers ent://SD_ILS/0/SD_ILS:2284470 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Allen, Julia H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar">https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321559685/?ar">https://learning.oreilly.com/library/view/~/9780321559685/?ar</a><br/>Format:&#160;Electronic Resources<br/> No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing ent://SD_ILS/0/SD_ILS:2285143 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Long, Johnny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492157/?ar">https://learning.oreilly.com/library/view/~/9781597492157/?ar</a><br/>Format:&#160;Electronic Resources<br/> Creating the secure managed desktop : using group policy, SoftGrid, Microsoft deployment toolkit, and other management tools ent://SD_ILS/0/SD_ILS:2288756 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470277645/?ar">https://learning.oreilly.com/library/view/~/9780470277645/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470277645/?ar">https://go.oreilly.com/library-access/library/view/-/9780470277645/?ar</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and troubleshooting ent://SD_ILS/0/SD_ILS:2288763 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470275894/?ar">https://learning.oreilly.com/library/view/~/9780470275894/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar">https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deployment guides series. IBM Tivoli Compliance Insight Manager ent://SD_ILS/0/SD_ILS:2294667 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;B&uuml;cker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738485705/?ar">https://go.oreilly.com/library-access/library/view/-/0738485705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738485705/?ar">https://learning.oreilly.com/library/view/~/0738485705/?ar</a><br/>Format:&#160;Electronic Resources<br/> Scene of the cybercrime. ent://SD_ILS/0/SD_ILS:2285149 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492768">https://learning.oreilly.com/library/view/~/9781597492768</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492768/?ar">https://learning.oreilly.com/library/view/~/9781597492768/?ar</a><br/>Format:&#160;Electronic Resources<br/> OS X exploits and defense ent://SD_ILS/0/SD_ILS:2285157 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Baccas, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492546/?ar">https://learning.oreilly.com/library/view/~/9781597492546/?ar</a><br/>Format:&#160;Electronic Resources<br/> The craft of system security ent://SD_ILS/0/SD_ILS:2284058 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Smith, Sean W., 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780321434838">https://learning.oreilly.com/library/view/~/9780321434838</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321434838/?ar">https://go.oreilly.com/library-access/library/view/-/9780321434838/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321434838/?ar">https://learning.oreilly.com/library/view/~/9780321434838/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mainframe basics for security professionals : getting started with RACF ent://SD_ILS/0/SD_ILS:2284327 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Pomerantz, Ori.<br/><a href="https://learning.oreilly.com/library/view/~/9780137137596/?ar">https://learning.oreilly.com/library/view/~/9780137137596/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137137596/?ar">https://go.oreilly.com/library-access/library/view/-/9780137137596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780137137596">https://learning.oreilly.com/library/view/~/9780137137596</a><br/>Format:&#160;Electronic Resources<br/> Ajax security ent://SD_ILS/0/SD_ILS:2284335 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Hoffman, Billy, 1980-<br/><a href="https://learning.oreilly.com/library/view/~/9780321491930">https://learning.oreilly.com/library/view/~/9780321491930</a> <a href="https://learning.oreilly.com/library/view/~/9780321491930/?ar">https://learning.oreilly.com/library/view/~/9780321491930/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321491930/?ar">https://go.oreilly.com/library-access/library/view/-/9780321491930/?ar</a><br/>Format:&#160;Electronic Resources<br/> Modern cryptanalysis : techniques for advanced code breaking ent://SD_ILS/0/SD_ILS:2284627 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Swenson, Christopher, 1983-<br/><a href="https://learning.oreilly.com/library/view/~/9780470135938">https://learning.oreilly.com/library/view/~/9780470135938</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar">https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470135938/?ar">https://learning.oreilly.com/library/view/~/9780470135938/?ar</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Mac OS X Leopard security ent://SD_ILS/0/SD_ILS:2284628 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Edge, Charles S., Jr.<br/><a href="https://learning.oreilly.com/library/view/~/9781590599891/?ar">https://learning.oreilly.com/library/view/~/9781590599891/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar">https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781590599891">https://learning.oreilly.com/library/view/~/9781590599891</a><br/>Format:&#160;Electronic Resources<br/> Mastering System Center Data Protection Manager 2007 ent://SD_ILS/0/SD_ILS:2284542 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Ganger, Devin L.<br/><a href="https://learning.oreilly.com/library/view/~/9780470181522/?ar">https://learning.oreilly.com/library/view/~/9780470181522/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar">https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470181522">https://learning.oreilly.com/library/view/~/9780470181522</a><br/>Format:&#160;Electronic Resources<br/> Securing Citrix XenApp Server in the enterprise ent://SD_ILS/0/SD_ILS:2285144 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Bin Azad, Tariq.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492812/?ar">https://learning.oreilly.com/library/view/~/9781597492812/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492812/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492812/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492812">https://learning.oreilly.com/library/view/~/9781597492812</a><br/>Format:&#160;Electronic Resources<br/> Managing catastrophic loss of sensitive data ent://SD_ILS/0/SD_ILS:2284690 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Photopoulos, Constantine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492393/?ar">https://learning.oreilly.com/library/view/~/9781597492393/?ar</a><br/>Format:&#160;Electronic Resources<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:2285226 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Clark, Champ, III.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492249">https://learning.oreilly.com/library/view/~/9781597492249</a> <a href="https://learning.oreilly.com/library/view/~/9781597492249/?ar">https://learning.oreilly.com/library/view/~/9781597492249/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security engineering : a guide to building dependable distributed systems ent://SD_ILS/0/SD_ILS:2289990 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Anderson, Ross, 1956-<br/><a href="https://learning.oreilly.com/library/view/~/9780470068526">https://learning.oreilly.com/library/view/~/9780470068526</a> <a href="https://learning.oreilly.com/library/view/~/9780470068526/?ar">https://learning.oreilly.com/library/view/~/9780470068526/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470068526/?ar">https://go.oreilly.com/library-access/library/view/-/9780470068526/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security and Usability : Designing Secure Systems that People Can Use. ent://SD_ILS/0/SD_ILS:2288610 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Cranor, Lorrie Faith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008279/?ar">https://go.oreilly.com/library-access/library/view/-/0596008279/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008279/?ar">https://learning.oreilly.com/library/view/~/0596008279/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008279">https://learning.oreilly.com/library/view/~/0596008279</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics : investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:2285693 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Aquilina, James M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492683/?ar">https://learning.oreilly.com/library/view/~/9781597492683/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492683">https://learning.oreilly.com/library/view/~/9781597492683</a><br/>Format:&#160;Electronic Resources<br/> Deployment guide series. IBM Tivoli Identity Manager 5.0 ent://SD_ILS/0/SD_ILS:2285844 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;B&uuml;cker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738432067/?ar">https://go.oreilly.com/library-access/library/view/-/0738432067/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738432067/?ar">https://learning.oreilly.com/library/view/~/0738432067/?ar</a><br/>Format:&#160;Electronic Resources<br/> Crimeware : understanding new attacks and defenses ent://SD_ILS/0/SD_ILS:2285587 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Jakobsson, Markus.<br/><a href="https://learning.oreilly.com/library/view/~/9780321553744/?ar">https://learning.oreilly.com/library/view/~/9780321553744/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar">https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar</a><br/>Format:&#160;Electronic Resources<br/> SOA security ent://SD_ILS/0/SD_ILS:2284936 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Kanneganti, Ramarao.<br/><a href="https://learning.oreilly.com/library/view/~/9781932394689">https://learning.oreilly.com/library/view/~/9781932394689</a> <a href="https://learning.oreilly.com/library/view/~/9781932394689/?ar">https://learning.oreilly.com/library/view/~/9781932394689/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar">https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking : the art of exploitation ent://SD_ILS/0/SD_ILS:2287983 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Erickson, Jon, 1977-<br/><a href="https://learning.oreilly.com/library/view/~/9781593271442">https://learning.oreilly.com/library/view/~/9781593271442</a> <a href="https://learning.oreilly.com/library/view/~/9781593271442/?ar">https://learning.oreilly.com/library/view/~/9781593271442/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ten rules of information security for the smaller business : a plain English guide ent://SD_ILS/0/SD_ILS:2289629 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781905356553/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356553/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781905356553/?ar">https://learning.oreilly.com/library/view/~/9781905356553/?ar</a><br/>Format:&#160;Electronic Resources<br/> The web application hacker's handbook : discovering and exploiting security flaws ent://SD_ILS/0/SD_ILS:2288534 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Stuttard, Dafydd, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470170779/?ar">https://learning.oreilly.com/library/view/~/9780470170779/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar">https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470170779">https://learning.oreilly.com/library/view/~/9780470170779</a><br/>Format:&#160;Electronic Resources<br/> Windows Vista security for dummies ent://SD_ILS/0/SD_ILS:2284218 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Koerner, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9780470118054">https://learning.oreilly.com/library/view/~/9780470118054</a> <a href="https://learning.oreilly.com/library/view/~/9780470118054/?ar">https://learning.oreilly.com/library/view/~/9780470118054/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar">https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:2284517 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Varsalone, Jesse.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492447">https://learning.oreilly.com/library/view/~/9781597492447</a> <a href="https://learning.oreilly.com/library/view/~/9781597492447/?ar">https://learning.oreilly.com/library/view/~/9781597492447/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical embedded security : building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:2284523 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Stapko, Timothy John.<br/><a href="https://learning.oreilly.com/library/view/~/9780750682152/?ar">https://learning.oreilly.com/library/view/~/9780750682152/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780750682152/?ar">https://go.oreilly.com/library-access/library/view/-/9780750682152/?ar</a><br/>Format:&#160;Electronic Resources<br/> Understanding Windows CardSpace : an introduction to the concepts and challenges of digital identities ent://SD_ILS/0/SD_ILS:2284402 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Bertocci, Vittorio.<br/><a href="https://learning.oreilly.com/library/view/~/9780321496843/?ar">https://learning.oreilly.com/library/view/~/9780321496843/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar">https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:2286245 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Qian, Yi, 1962-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar">https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123735669/?ar">https://learning.oreilly.com/library/view/~/9780123735669/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics for dummies ent://SD_ILS/0/SD_ILS:2285672 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Volonino, Linda.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470371916/?ar">https://learning.oreilly.com/library/view/~/9780470371916/?ar</a><br/>Format:&#160;Electronic Resources<br/> Netzwerkangriffe von innen ent://SD_ILS/0/SD_ILS:2286474 2024-09-27T06:35:12Z 2024-09-27T06:35:12Z by&#160;Ziegler, Paul Sebastian.<br/><a href="https://learning.oreilly.com/library/view/~/9783897217782">https://learning.oreilly.com/library/view/~/9783897217782</a> <a href="https://learning.oreilly.com/library/view/~/9783897217782/?ar">https://learning.oreilly.com/library/view/~/9783897217782/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783897217782/?ar">https://go.oreilly.com/library-access/library/view/-/9783897217782/?ar</a><br/>Format:&#160;Electronic Resources<br/>