Search Results for - Narrowed by: 2010 - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-06-14T12:02:40Z Adaptive Security Management Architecture ent://SD_ILS/0/SD_ILS:2326064 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Tiller, James S.<br/><a href="https://learning.oreilly.com/library/view/~/9781420013375">https://learning.oreilly.com/library/view/~/9781420013375</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar">https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420013375/?ar">https://learning.oreilly.com/library/view/~/9781420013375/?ar</a><br/>Format:&#160;Electronic Resources<br/> Internet fraud casebook : the World Wide Web of deceit ent://SD_ILS/0/SD_ILS:2289384 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Wells, Joseph T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470643631/?ar">https://go.oreilly.com/library-access/library/view/-/9780470643631/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470643631/?ar">https://learning.oreilly.com/library/view/~/9780470643631/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470643631">https://learning.oreilly.com/library/view/~/9780470643631</a><br/>Format:&#160;Electronic Resources<br/> Professional Cocoa application security ent://SD_ILS/0/SD_ILS:2289315 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Lee, Graham J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470525951/?ar">https://go.oreilly.com/library-access/library/view/-/9780470525951/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470525951/?ar">https://learning.oreilly.com/library/view/~/9780470525951/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hashing in computer science : fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:2289360 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar">https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118031834/?ar">https://learning.oreilly.com/library/view/~/9781118031834/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118031834">https://learning.oreilly.com/library/view/~/9781118031834</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:2289849 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Kraus, Rob.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495516/?ar">https://learning.oreilly.com/library/view/~/9781597495516/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495516/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495516/?ar</a><br/>Format:&#160;Electronic Resources<br/> Spring Security 3. ent://SD_ILS/0/SD_ILS:1245197 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Mularien, Peter.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944051">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dear Hacker : Letters to the Editor Of 2600. ent://SD_ILS/0/SD_ILS:1215671 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Goldstein, Emmanuel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537340">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Assessing Information Security : Strategies, Tactics, Logic and Framework. ent://SD_ILS/0/SD_ILS:1213366 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Vladimirov, Andrew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=499606">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Group Policy : Fundamentals, Security, and the Managed Desktop. ent://SD_ILS/0/SD_ILS:1214337 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Moskowitz, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=530009">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Social Engineering : The Art of Human Hacking. ent://SD_ILS/0/SD_ILS:1228889 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Hadnagy, Christopher.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706746">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Relation Based Access Control. ent://SD_ILS/0/SD_ILS:1266040 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Zhang, R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1589007">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cloud Security : A Comprehensive Guide to Secure Cloud Computing. ent://SD_ILS/0/SD_ILS:1218987 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Krutz, Ronald L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=589027">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hashing in Computer Science : Fifty Years of Slicing and Dicing. ent://SD_ILS/0/SD_ILS:1215673 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Konheim, Alan G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537352">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Professional Cocoa Application Security. ent://SD_ILS/0/SD_ILS:1215674 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Lee, Graham J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537355">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Logics and Languages for Reliability and Security. ent://SD_ILS/0/SD_ILS:1217301 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Esparza, J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=557042">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Assurance : Dependability and Security in Networked Systems. ent://SD_ILS/0/SD_ILS:1196458 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Qian, Yi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328312">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT Audit, Control, and Security. ent://SD_ILS/0/SD_ILS:1222274 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Moeller, Robert R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=624573">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Risk Factors in Computer-Crime Victimization. ent://SD_ILS/0/SD_ILS:1250757 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Choi, Kyung-Shick.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1057793">Click to View</a><br/>Format:&#160;Electronic Resources<br/> GlassFish Security. ent://SD_ILS/0/SD_ILS:1245243 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Kalali, Masoud.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944941">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Least Privilege Security for Windows 7, Vista and XP : Implement Efficient System Security By Assigning Permissions Effectively. ent://SD_ILS/0/SD_ILS:1245184 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Smith, Russell.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944038">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security 2020 : Reduce Security Risks This Decade. ent://SD_ILS/0/SD_ILS:1228316 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Howard, Doug.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=694289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:2131381 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Merkow, Mark S., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1446770">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:2125451 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=625004">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web services research for emerging applications discoveries and trends ent://SD_ILS/0/SD_ILS:2262123 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Zhang, Liang-Jie.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-684-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-684-1</a><br/>Format:&#160;Electronic Resources<br/> Collaborative computer security and trust management ent://SD_ILS/0/SD_ILS:2261215 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Seigneur, Jean-Marc.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format:&#160;Electronic Resources<br/> Virtualization and forensics : a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:2290041 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Barrett, Diane.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495578/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495578/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495578/?ar">https://learning.oreilly.com/library/view/~/9781597495578/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco DCUCI quick reference ent://SD_ILS/0/SD_ILS:2289858 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Casaletto, James.<br/><a href="https://learning.oreilly.com/library/view/~/9781587141881/?ar">https://learning.oreilly.com/library/view/~/9781587141881/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587141881/?ar">https://go.oreilly.com/library-access/library/view/-/9781587141881/?ar</a><br/>Format:&#160;Electronic Resources<br/> Vulnerability management ent://SD_ILS/0/SD_ILS:2293842 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Foreman, Park.<br/><a href="https://learning.oreilly.com/library/view/~/9781439801512">https://learning.oreilly.com/library/view/~/9781439801512</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439801512/?ar">https://go.oreilly.com/library-access/library/view/-/9781439801512/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439801512/?ar">https://learning.oreilly.com/library/view/~/9781439801512/?ar</a><br/>Format:&#160;Electronic Resources<br/> Aus dem Tagebuch eines Bughunters : wie man Softwareschwachstellen aufsp&uuml;rt und behebt ent://SD_ILS/0/SD_ILS:2297743 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar">https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457169670/?ar">https://learning.oreilly.com/library/view/~/9781457169670/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457169670">https://learning.oreilly.com/library/view/~/9781457169670</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:2289718 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Timm, Carl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495455/?ar">https://learning.oreilly.com/library/view/~/9781597495455/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495455">https://learning.oreilly.com/library/view/~/9781597495455</a><br/>Format:&#160;Electronic Resources<br/> Inside cyber warfare ent://SD_ILS/0/SD_ILS:2287453 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Carr, Jeffrey.<br/><a href="https://learning.oreilly.com/library/view/~/9781449318475">https://learning.oreilly.com/library/view/~/9781449318475</a> <a href="https://learning.oreilly.com/library/view/~/9781449377229">https://learning.oreilly.com/library/view/~/9781449377229</a> <a href="https://learning.oreilly.com/library/view/~/9781449377229/?ar">https://learning.oreilly.com/library/view/~/9781449377229/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781449377229/?ar">https://go.oreilly.com/library-access/library/view/-/9781449377229/?ar</a><br/>Format:&#160;Electronic Resources<br/> Dear Hacker : letters to the editor of 2600 ent://SD_ILS/0/SD_ILS:2289468 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Goldstein, Emmanuel, 1959-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar">https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470620069/?ar">https://learning.oreilly.com/library/view/~/9780470620069/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT Governance to Drive High Performance : Lessons from Accenture. ent://SD_ILS/0/SD_ILS:2288636 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Kress, Robert E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281188/?ar">https://learning.oreilly.com/library/view/~/9781849281188/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281188">https://learning.oreilly.com/library/view/~/9781849281188</a><br/>Format:&#160;Electronic Resources<br/> Mac Security Bible. ent://SD_ILS/0/SD_ILS:2287722 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Kissell, Joe.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar">https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470474198/?ar">https://learning.oreilly.com/library/view/~/9780470474198/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470474198">https://learning.oreilly.com/library/view/~/9780470474198</a><br/>Format:&#160;Electronic Resources<br/> Mac OS X security and mobility v10.6 ent://SD_ILS/0/SD_ILS:2288654 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Kite, Robert.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321685698/?ar">https://go.oreilly.com/library-access/library/view/-/9780321685698/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321685698/?ar">https://learning.oreilly.com/library/view/~/9780321685698/?ar</a><br/>Format:&#160;Electronic Resources<br/> Handbook of research on computational forensics, digital crime, and investigation methods and solutions ent://SD_ILS/0/SD_ILS:2261483 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Li, Chang-Tsun.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-836-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-836-9</a><br/>Format:&#160;Electronic Resources<br/> Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection ent://SD_ILS/0/SD_ILS:2286982 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Collberg, Christian.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591258/?ar">https://learning.oreilly.com/library/view/~/9780321591258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:2289149 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Lillard, Terrence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495387/?ar">https://learning.oreilly.com/library/view/~/9781597495387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495387">https://learning.oreilly.com/library/view/~/9781597495387</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:2288720 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Haines, Brad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495417/?ar">https://learning.oreilly.com/library/view/~/9781597495417/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495417">https://learning.oreilly.com/library/view/~/9781597495417</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:2288721 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Anderson, Brian (Brian James)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495547/?ar">https://learning.oreilly.com/library/view/~/9781597495547/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495547">https://learning.oreilly.com/library/view/~/9781597495547</a><br/>Format:&#160;Electronic Resources<br/> 24 deadly sins of software security : programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:2287176 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780071626750/?ar">https://learning.oreilly.com/library/view/~/9780071626750/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar">https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071626750">https://learning.oreilly.com/library/view/~/9780071626750</a><br/>Format:&#160;Electronic Resources<br/> Applied Oracle security : developing secure database and middleware environments ent://SD_ILS/0/SD_ILS:2287303 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Knox, David (David C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar">https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071613705/?ar">https://learning.oreilly.com/library/view/~/9780071613705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071613705">https://learning.oreilly.com/library/view/~/9780071613705</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics : a pocket guide ent://SD_ILS/0/SD_ILS:2289616 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:2289816 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Merkow, Mark S.<br/><a href="https://learning.oreilly.com/library/view/~/9781439826973/?ar">https://learning.oreilly.com/library/view/~/9781439826973/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar">https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar</a><br/>Format:&#160;Electronic Resources<br/> System assurance : beyond detecting vulnerabilities ent://SD_ILS/0/SD_ILS:2290369 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Mansourov, Nikolai.<br/><a href="https://learning.oreilly.com/library/view/~/9780123814142">https://learning.oreilly.com/library/view/~/9780123814142</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780123814142/?ar">https://go.oreilly.com/library-access/library/view/-/9780123814142/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123814142/?ar">https://learning.oreilly.com/library/view/~/9780123814142/?ar</a><br/>Format:&#160;Electronic Resources<br/> IOS forensic analysis for iPhone, iPad, and iPod Touch ent://SD_ILS/0/SD_ILS:2291230 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Morrissey, Sean.<br/><a href="https://learning.oreilly.com/library/view/~/9781430233428">https://learning.oreilly.com/library/view/~/9781430233428</a> <a href="https://learning.oreilly.com/library/view/~/9781430233428/?ar">https://learning.oreilly.com/library/view/~/9781430233428/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430233428/?ar">https://go.oreilly.com/library-access/library/view/-/9781430233428/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical intrusion analysis : prevention and detection for the twenty-first century ent://SD_ILS/0/SD_ILS:2286080 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Trost, Ryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591890/?ar">https://learning.oreilly.com/library/view/~/9780321591890/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security : a comprehensive guide to secure cloud computing ent://SD_ILS/0/SD_ILS:2289708 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Krutz, Ronald L., 1938-<br/><a href="https://learning.oreilly.com/library/view/~/9780470589878/?ar">https://learning.oreilly.com/library/view/~/9780470589878/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar">https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470589878">https://learning.oreilly.com/library/view/~/9780470589878</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 in a Windows Environment : the best practice handbook for a Microsoft Windows environment ent://SD_ILS/0/SD_ILS:2290026 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Honan, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280495/?ar">https://learning.oreilly.com/library/view/~/9781849280495/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Mac security : MAC OS X Snow Leopard ent://SD_ILS/0/SD_ILS:2290421 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Edge, Charles S., Jr.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar">https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430227304/?ar">https://learning.oreilly.com/library/view/~/9781430227304/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430227304">https://learning.oreilly.com/library/view/~/9781430227304</a><br/>Format:&#160;Electronic Resources<br/> Cloud Security and Governance : Who's on your cloud?. ent://SD_ILS/0/SD_ILS:2290671 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Blount, Sumner.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280983">https://learning.oreilly.com/library/view/~/9781849280983</a> <a href="https://learning.oreilly.com/library/view/~/9781849280983/?ar">https://learning.oreilly.com/library/view/~/9781849280983/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT induction and information security awareness : a pocket guide ent://SD_ILS/0/SD_ILS:2292243 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Maddock, Valerie.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281195">https://learning.oreilly.com/library/view/~/9781849281195</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281195/?ar">https://learning.oreilly.com/library/view/~/9781849281195/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Forefront threat management gateway (TMG) : administrator's companion ent://SD_ILS/0/SD_ILS:2287747 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Harrison, Jim.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735640535/?ar">https://go.oreilly.com/library-access/library/view/-/9780735640535/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735640535/?ar">https://learning.oreilly.com/library/view/~/9780735640535/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735640535">https://learning.oreilly.com/library/view/~/9780735640535</a><br/>Format:&#160;Electronic Resources<br/> ISO27000 and information security : a combined glossary ent://SD_ILS/0/SD_ILS:2299924 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Calder, Alan, 1957-<br/><a href="https://learning.oreilly.com/library/view/~/9781849281652/?ar">https://learning.oreilly.com/library/view/~/9781849281652/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281652/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281652/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security Breaches : Studies from Real Life. ent://SD_ILS/0/SD_ILS:2290674 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format:&#160;Electronic Resources<br/> E-mail Security : a Pocket Guide. ent://SD_ILS/0/SD_ILS:2290676 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Furnell, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280976">https://learning.oreilly.com/library/view/~/9781849280976</a> <a href="https://learning.oreilly.com/library/view/~/9781849280976/?ar">https://learning.oreilly.com/library/view/~/9781849280976/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the f0rb1dd3n network ent://SD_ILS/0/SD_ILS:2290700 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Protection 2010 for Exchange Server ent://SD_ILS/0/SD_ILS:2290701 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656734/?ar">https://learning.oreilly.com/library/view/~/9780735656734/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2287972 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar">https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470550939/?ar">https://learning.oreilly.com/library/view/~/9780470550939/?ar</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:2288891 2024-06-14T12:02:40Z 2024-06-14T12:02:40Z by&#160;Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470581858/?ar">https://learning.oreilly.com/library/view/~/9780470581858/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470769805/?ar">https://learning.oreilly.com/library/view/~/9780470769805/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar">https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar">https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470769805">https://learning.oreilly.com/library/view/~/9780470769805</a><br/>Format:&#160;Electronic Resources<br/>