Search Results for - Narrowed by: 2012 - Computer networks -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-09-27T06:25:34ZClient-side attacks and defenseent://SD_ILS/0/SD_ILS:22059732024-09-27T06:25:34Z2024-09-27T06:25:34Zby Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1036349">Click to View</a><br/>Format: Electronic Resources<br/>Network Attacks and Defenses : a Hands-on Approachent://SD_ILS/0/SD_ILS:23134752024-09-27T06:25:34Z2024-09-27T06:25:34Zby Trabelsi, Zouheir, author<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466517974/?ar">https://go.oreilly.com/library-access/library/view/-/9781466517974/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466517974/?ar">https://learning.oreilly.com/library/view/~/9781466517974/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466517974">https://learning.oreilly.com/library/view/~/9781466517974</a><br/>Format: Electronic Resources<br/>Cyber security standards, practices and industrial applications systems and methodologiesent://SD_ILS/0/SD_ILS:4763482024-09-27T06:25:34Z2024-09-27T06:25:34Zby Zubairi, Junaid Ahmed, 1961-<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/</a><br/>Format: Electronic Resources<br/>The tangled Web: a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:2563412024-09-27T06:25:34Z2024-09-27T06:25:34Zby Zalewski, Michal.<br/>Format: Books<br/>Hands-On Ethical Hacking and Network Defense.ent://SD_ILS/0/SD_ILS:13052332024-09-27T06:25:34Z2024-09-27T06:25:34Zby Simpson, Michael T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136562">Click to View</a><br/>Format: Electronic Resources<br/>Dark Sides of the Internet : On Cyber Threats and Information Warfare.ent://SD_ILS/0/SD_ILS:12545382024-09-27T06:25:34Z2024-09-27T06:25:34Zby Heickeroe, Roland.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1129082">Click to View</a><br/>Format: Electronic Resources<br/>Hacking For Dummies.ent://SD_ILS/0/SD_ILS:12526562024-09-27T06:25:34Z2024-09-27T06:25:34Zby Beaver, Kevin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106542">Click to View</a><br/>Format: Electronic Resources<br/>The Basics of Cyber Warfare : Understanding the Fundamentals of Cyber Warfare in Theory and Practice.ent://SD_ILS/0/SD_ILS:12514432024-09-27T06:25:34Z2024-09-27T06:25:34Zby Winterfeld, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073026">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Windows Network Forensics and Investigation.ent://SD_ILS/0/SD_ILS:12360222024-09-27T06:25:34Z2024-09-27T06:25:34Zby Anson, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=818114">Click to View</a><br/>Format: Electronic Resources<br/>Hacking Web Apps : Detecting and Preventing Web Application Security Problems.ent://SD_ILS/0/SD_ILS:12476652024-09-27T06:25:34Z2024-09-27T06:25:34Zby Shema, Mike.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1012529">Click to View</a><br/>Format: Electronic Resources<br/>Computer and Information Security Handbook.ent://SD_ILS/0/SD_ILS:12586122024-09-27T06:25:34Z2024-09-27T06:25:34Zby Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1195617">Click to View</a><br/>Format: Electronic Resources<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:21264972024-09-27T06:25:34Z2024-09-27T06:25:34Zby Speed, Tyler Justin.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826927">Click to View</a><br/>Format: Electronic Resources<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:21265082024-09-27T06:25:34Z2024-09-27T06:25:34Zby Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826949">Click to View</a><br/>Format: Electronic Resources<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:21317362024-09-27T06:25:34Z2024-09-27T06:25:34Zby Mjølsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1648315">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkitent://SD_ILS/0/SD_ILS:22958232024-09-27T06:25:34Z2024-09-27T06:25:34Zby Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format: Electronic Resources<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:22959512024-09-27T06:25:34Z2024-09-27T06:25:34Zby ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format: Electronic Resources<br/>Network intrusion analysis : methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:22963922024-09-27T06:25:34Z2024-09-27T06:25:34Zby Fichera, Joe, 1966-<br/><a href="https://learning.oreilly.com/library/view/~/9781597499620">https://learning.oreilly.com/library/view/~/9781597499620</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499620/?ar">https://learning.oreilly.com/library/view/~/9781597499620/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing : protecting networks and systemsent://SD_ILS/0/SD_ILS:22958982024-09-27T06:25:34Z2024-09-27T06:25:34Zby Henry, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283731">https://learning.oreilly.com/library/view/~/9781849283731</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283731/?ar">https://learning.oreilly.com/library/view/~/9781849283731/?ar</a><br/>Format: Electronic Resources<br/>Cyber conflict : competing national perspectivesent://SD_ILS/0/SD_ILS:22975902024-09-27T06:25:34Z2024-09-27T06:25:34Zby Ventre, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781118562741">https://learning.oreilly.com/library/view/~/9781118562741</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118562741/?ar">https://go.oreilly.com/library-access/library/view/-/9781118562741/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118562741/?ar">https://learning.oreilly.com/library/view/~/9781118562741/?ar</a><br/>Format: Electronic Resources<br/>PCI compliance : understand and implement effective PCI data security standard compliance, third editionent://SD_ILS/0/SD_ILS:22980672024-09-27T06:25:34Z2024-09-27T06:25:34Zby Williams, Branden R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499484/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499484/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499484/?ar">https://learning.oreilly.com/library/view/~/9781597499484/?ar</a><br/>Format: Electronic Resources<br/>Learning Whitehat hacking and penetration testingent://SD_ILS/0/SD_ILS:22978662024-09-27T06:25:34Z2024-09-27T06:25:34Zby Messier, Ric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771370349/?ar">https://learning.oreilly.com/videos/~/9781771370349/?ar</a><br/>Format: Electronic Resources<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:22985182024-09-27T06:25:34Z2024-09-27T06:25:34Zby Shimonski, Robert.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495905/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495905/?ar">https://learning.oreilly.com/library/view/~/9781597495905/?ar</a><br/>Format: Electronic Resources<br/>The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)ent://SD_ILS/0/SD_ILS:22941702024-09-27T06:25:34Z2024-09-27T06:25:34Zby Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format: Electronic Resources<br/>Handbook on securing cyber-physical critical infrastructure : foundation and challengesent://SD_ILS/0/SD_ILS:22956612024-09-27T06:25:34Z2024-09-27T06:25:34Zby Das, Sajal K.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124158153/?ar">https://go.oreilly.com/library-access/library/view/-/9780124158153/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124158153/?ar">https://learning.oreilly.com/library/view/~/9780124158153/?ar</a><br/>Format: Electronic Resources<br/>Predicting malicious behavior : tools and techniques for ensuring global securityent://SD_ILS/0/SD_ILS:22958452024-09-27T06:25:34Z2024-09-27T06:25:34Zby Jackson, Gary M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118239568/?ar">https://go.oreilly.com/library-access/library/view/-/9781118239568/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118239568/?ar">https://learning.oreilly.com/library/view/~/9781118239568/?ar</a><br/>Format: Electronic Resources<br/>Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate managementent://SD_ILS/0/SD_ILS:22960312024-09-27T06:25:34Z2024-09-27T06:25:34Zby Nordström, Kent.<br/><a href="https://learning.oreilly.com/library/view/~/9781849685368/?ar">https://learning.oreilly.com/library/view/~/9781849685368/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849685368/?ar">https://go.oreilly.com/library-access/library/view/-/9781849685368/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849685368">https://learning.oreilly.com/library/view/~/9781849685368</a><br/>Format: Electronic Resources<br/>CCNA security live lessons : a hands-on guide to implementing security on Cisco routers and switches.ent://SD_ILS/0/SD_ILS:22978672024-09-27T06:25:34Z2024-09-27T06:25:34Zby Barker, Keith.<br/><a href="https://learning.oreilly.com/videos/~/9780133259001/?ar">https://learning.oreilly.com/videos/~/9780133259001/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133259001/?ar">https://go.oreilly.com/library-access/library/view/-/9780133259001/?ar</a><br/>Format: Electronic Resources<br/>Reverse Deception Organized Cyber Threat Counter-Exploitation.ent://SD_ILS/0/SD_ILS:22950962024-09-27T06:25:34Z2024-09-27T06:25:34Zby Kilger, Dr Max.<br/><a href="https://learning.oreilly.com/library/view/~/9780071772495">https://learning.oreilly.com/library/view/~/9780071772495</a>
<a href="https://learning.oreilly.com/library/view/~/9780071772495/?ar">https://learning.oreilly.com/library/view/~/9780071772495/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar">https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar</a><br/>Format: Electronic Resources<br/>Hacking exposed 7 : network security secrets & solutionsent://SD_ILS/0/SD_ILS:22965282024-09-27T06:25:34Z2024-09-27T06:25:34Zby McClure, Stuart.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar">https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071780285/?ar">https://learning.oreilly.com/library/view/~/9780071780285/?ar</a><br/>Format: Electronic Resources<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:22946552024-09-27T06:25:34Z2024-09-27T06:25:34Zby Easttom, Chuck.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar">https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132828284/?ar">https://learning.oreilly.com/library/view/~/9780132828284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132828284">https://learning.oreilly.com/library/view/~/9780132828284</a><br/>Format: Electronic Resources<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:22953692024-09-27T06:25:34Z2024-09-27T06:25:34Zby Clarke, Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499637/?ar">https://learning.oreilly.com/library/view/~/9781597499637/?ar</a><br/>Format: Electronic Resources<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:22934422024-09-27T06:25:34Z2024-09-27T06:25:34Zby Speed, Tyler Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar">https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439809839/?ar">https://learning.oreilly.com/library/view/~/9781439809839/?ar</a><br/>Format: Electronic Resources<br/>Network security first-stepent://SD_ILS/0/SD_ILS:22936832024-09-27T06:25:34Z2024-09-27T06:25:34Zby Thomas, Thomas M.<br/><a href="https://learning.oreilly.com/library/view/~/9781587204142/?ar">https://learning.oreilly.com/library/view/~/9781587204142/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587204142/?ar">https://go.oreilly.com/library-access/library/view/-/9781587204142/?ar</a><br/>Format: Electronic Resources<br/>Securing the clicks : network security in the age of social mediaent://SD_ILS/0/SD_ILS:22937612024-09-27T06:25:34Z2024-09-27T06:25:34Zby Bahadur, Gary.<br/><a href="https://learning.oreilly.com/library/view/~/9780071769051">https://learning.oreilly.com/library/view/~/9780071769051</a>
<a href="https://learning.oreilly.com/library/view/~/9780071769051/?ar">https://learning.oreilly.com/library/view/~/9780071769051/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071769051/?ar">https://go.oreilly.com/library-access/library/view/-/9780071769051/?ar</a><br/>Format: Electronic Resources<br/>Web application security : a beginner's guideent://SD_ILS/0/SD_ILS:22937622024-09-27T06:25:34Z2024-09-27T06:25:34Zby Sullivan, Bryan, 1974-<br/><a href="https://learning.oreilly.com/library/view/~/9780071776165/?ar">https://learning.oreilly.com/library/view/~/9780071776165/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071776165/?ar">https://go.oreilly.com/library-access/library/view/-/9780071776165/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071776165">https://learning.oreilly.com/library/view/~/9780071776165</a><br/>Format: Electronic Resources<br/>Kerberos : Single Sign-on in gemischten Linux/Windows-Umgebungen.ent://SD_ILS/0/SD_ILS:22951352024-09-27T06:25:34Z2024-09-27T06:25:34Zby Pröhl, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9781457170393/?ar">https://learning.oreilly.com/library/view/~/9781457170393/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457170393/?ar">https://go.oreilly.com/library-access/library/view/-/9781457170393/?ar</a><br/>Format: Electronic Resources<br/>The computer incident response planning handbook : executable plans for protecting information at riskent://SD_ILS/0/SD_ILS:22963252024-09-27T06:25:34Z2024-09-27T06:25:34Zby McCarthy, N. K.<br/><a href="https://learning.oreilly.com/library/view/~/9780071790390/?ar">https://learning.oreilly.com/library/view/~/9780071790390/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071790390/?ar">https://go.oreilly.com/library-access/library/view/-/9780071790390/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071790390">https://learning.oreilly.com/library/view/~/9780071790390</a><br/>Format: Electronic Resources<br/>The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practiceent://SD_ILS/0/SD_ILS:22966252024-09-27T06:25:34Z2024-09-27T06:25:34Zby Winterfeld, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047372/?ar">https://learning.oreilly.com/library/view/~/9780124047372/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124047372">https://learning.oreilly.com/library/view/~/9780124047372</a><br/>Format: Electronic Resources<br/>125 sposobów na bezpieczeństwo siecient://SD_ILS/0/SD_ILS:22994392024-09-27T06:25:34Z2024-09-27T06:25:34Zby Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176357/?ar">https://learning.oreilly.com/library/view/~/9781457176357/?ar</a><br/>Format: Electronic Resources<br/>Monitoring i bezpieczeństwo siecient://SD_ILS/0/SD_ILS:22993752024-09-27T06:25:34Z2024-09-27T06:25:34Zby Fry, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9781457167102/?ar">https://learning.oreilly.com/library/view/~/9781457167102/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457167102">https://learning.oreilly.com/library/view/~/9781457167102</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457167102/?ar">https://go.oreilly.com/library-access/library/view/-/9781457167102/?ar</a><br/>Format: Electronic Resources<br/>Once more unto the breach : managing information security in an uncertain worldent://SD_ILS/0/SD_ILS:22980222024-09-27T06:25:34Z2024-09-27T06:25:34Zby Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format: Electronic Resources<br/>CCNA Security 640-554 Official Cert Guide.ent://SD_ILS/0/SD_ILS:23251012024-09-27T06:25:34Z2024-09-27T06:25:34Zby Barker, Keith, Author.<br/><a href="https://learning.oreilly.com/library/view/~/9780132966061/?ar">https://learning.oreilly.com/library/view/~/9780132966061/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132966061">https://learning.oreilly.com/library/view/~/9780132966061</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132966061/?ar">https://go.oreilly.com/library-access/library/view/-/9780132966061/?ar</a><br/>Format: Electronic Resources<br/>CCNP security VPN 642-647 official cert guideent://SD_ILS/0/SD_ILS:22918302024-09-27T06:25:34Z2024-09-27T06:25:34Zby Hooper, Howard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132372046/?ar">https://go.oreilly.com/library-access/library/view/-/9780132372046/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132372046/?ar">https://learning.oreilly.com/library/view/~/9780132372046/?ar</a><br/>Format: Electronic Resources<br/>Enterprise Single Sign-On design guide : using IBM Security Access Manager for Enterprise Single Sign-On 8.2ent://SD_ILS/0/SD_ILS:23020602024-09-27T06:25:34Z2024-09-27T06:25:34Zby Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738437034/?ar">https://go.oreilly.com/library-access/library/view/-/0738437034/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738437034/?ar">https://learning.oreilly.com/library/view/~/0738437034/?ar</a><br/>Format: Electronic Resources<br/>The tangled Web : a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:22939492024-09-27T06:25:34Z2024-09-27T06:25:34Zby Zalewski, Michal.<br/><a href="https://learning.oreilly.com/library/view/~/9781593273880">https://learning.oreilly.com/library/view/~/9781593273880</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273880/?ar">https://learning.oreilly.com/library/view/~/9781593273880/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:22055812024-09-27T06:25:34Z2024-09-27T06:25:34Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=850700">Click to View</a><br/>Format: Electronic Resources<br/>PCI compliance understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:22058552024-09-27T06:25:34Z2024-09-27T06:25:34Zby Williams, Branden R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=989201">Click to View</a><br/>Format: Electronic Resources<br/>