Search Results for - Narrowed by: 2012 - Computer networks -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue? 2024-09-24T23:54:05Z Cyber security standards, practices and industrial applications systems and methodologies ent://SD_ILS/0/SD_ILS:476348 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Zubairi, Junaid Ahmed, 1961-<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/</a><br/>Format:&#160;Electronic Resources<br/> The tangled Web: a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:256341 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Zalewski, Michal.<br/>Format:&#160;Books<br/> Hands-On Ethical Hacking and Network Defense. ent://SD_ILS/0/SD_ILS:1305233 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Simpson, Michael T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136562">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dark Sides of the Internet : On Cyber Threats and Information Warfare. ent://SD_ILS/0/SD_ILS:1254538 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Heickeroe, Roland.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1129082">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering Windows Network Forensics and Investigation. ent://SD_ILS/0/SD_ILS:1236022 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Anson, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=818114">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Basics of Cyber Warfare : Understanding the Fundamentals of Cyber Warfare in Theory and Practice. ent://SD_ILS/0/SD_ILS:1251443 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Winterfeld, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073026">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking Web Apps : Detecting and Preventing Web Application Security Problems. ent://SD_ILS/0/SD_ILS:1247665 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Shema, Mike.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking For Dummies. ent://SD_ILS/0/SD_ILS:1252656 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Beaver, Kevin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer and Information Security Handbook. ent://SD_ILS/0/SD_ILS:1258612 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1195617">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security first-step ent://SD_ILS/0/SD_ILS:2293683 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Thomas, Thomas M.<br/><a href="https://learning.oreilly.com/library/view/~/9781587204142/?ar">https://learning.oreilly.com/library/view/~/9781587204142/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587204142/?ar">https://go.oreilly.com/library-access/library/view/-/9781587204142/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCNA Security 640-554 Official Cert Guide. ent://SD_ILS/0/SD_ILS:2325101 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Barker, Keith, Author.<br/><a href="https://learning.oreilly.com/library/view/~/9780132966061/?ar">https://learning.oreilly.com/library/view/~/9780132966061/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132966061">https://learning.oreilly.com/library/view/~/9780132966061</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780132966061/?ar">https://go.oreilly.com/library-access/library/view/-/9780132966061/?ar</a><br/>Format:&#160;Electronic Resources<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:2205973 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1036349">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:2205581 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=850700">Click to View</a><br/>Format:&#160;Electronic Resources<br/> PCI compliance understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:2205855 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Williams, Branden R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=989201">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:2126508 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826949">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:2126497 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Speed, Tyler Justin.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826927">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:2131736 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Mj&oslash;lsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1648315">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Single Sign-On design guide : using IBM Security Access Manager for Enterprise Single Sign-On 8.2 ent://SD_ILS/0/SD_ILS:2302060 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;B&uuml;cker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738437034/?ar">https://go.oreilly.com/library-access/library/view/-/0738437034/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738437034/?ar">https://learning.oreilly.com/library/view/~/0738437034/?ar</a><br/>Format:&#160;Electronic Resources<br/> The computer incident response planning handbook : executable plans for protecting information at risk ent://SD_ILS/0/SD_ILS:2296325 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;McCarthy, N. K.<br/><a href="https://learning.oreilly.com/library/view/~/9780071790390/?ar">https://learning.oreilly.com/library/view/~/9780071790390/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071790390/?ar">https://go.oreilly.com/library-access/library/view/-/9780071790390/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071790390">https://learning.oreilly.com/library/view/~/9780071790390</a><br/>Format:&#160;Electronic Resources<br/> Once more unto the breach : managing information security in an uncertain world ent://SD_ILS/0/SD_ILS:2298022 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a> <a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format:&#160;Electronic Resources<br/> Monitoring i bezpieczeństwo sieci ent://SD_ILS/0/SD_ILS:2299375 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Fry, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9781457167102/?ar">https://learning.oreilly.com/library/view/~/9781457167102/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457167102">https://learning.oreilly.com/library/view/~/9781457167102</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457167102/?ar">https://go.oreilly.com/library-access/library/view/-/9781457167102/?ar</a><br/>Format:&#160;Electronic Resources<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:2295369 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Clarke, Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499637/?ar">https://learning.oreilly.com/library/view/~/9781597499637/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit ent://SD_ILS/0/SD_ILS:2295823 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:2296392 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Fichera, Joe, 1966-<br/><a href="https://learning.oreilly.com/library/view/~/9781597499620">https://learning.oreilly.com/library/view/~/9781597499620</a> <a href="https://learning.oreilly.com/library/view/~/9781597499620/?ar">https://learning.oreilly.com/library/view/~/9781597499620/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:2295951 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a> <a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber conflict : competing national perspectives ent://SD_ILS/0/SD_ILS:2297590 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Ventre, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781118562741">https://learning.oreilly.com/library/view/~/9781118562741</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118562741/?ar">https://go.oreilly.com/library-access/library/view/-/9781118562741/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118562741/?ar">https://learning.oreilly.com/library/view/~/9781118562741/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning Whitehat hacking and penetration testing ent://SD_ILS/0/SD_ILS:2297866 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Messier, Ric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771370349/?ar">https://learning.oreilly.com/videos/~/9781771370349/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCNA security live lessons : a hands-on guide to implementing security on Cisco routers and switches. ent://SD_ILS/0/SD_ILS:2297867 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Barker, Keith.<br/><a href="https://learning.oreilly.com/videos/~/9780133259001/?ar">https://learning.oreilly.com/videos/~/9780133259001/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133259001/?ar">https://go.oreilly.com/library-access/library/view/-/9780133259001/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCNP security VPN 642-647 official cert guide ent://SD_ILS/0/SD_ILS:2291830 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Hooper, Howard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132372046/?ar">https://go.oreilly.com/library-access/library/view/-/9780132372046/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132372046/?ar">https://learning.oreilly.com/library/view/~/9780132372046/?ar</a><br/>Format:&#160;Electronic Resources<br/> Predicting malicious behavior : tools and techniques for ensuring global security ent://SD_ILS/0/SD_ILS:2295845 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Jackson, Gary M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118239568/?ar">https://go.oreilly.com/library-access/library/view/-/9781118239568/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118239568/?ar">https://learning.oreilly.com/library/view/~/9781118239568/?ar</a><br/>Format:&#160;Electronic Resources<br/> Handbook on securing cyber-physical critical infrastructure : foundation and challenges ent://SD_ILS/0/SD_ILS:2295661 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Das, Sajal K.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124158153/?ar">https://go.oreilly.com/library-access/library/view/-/9780124158153/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124158153/?ar">https://learning.oreilly.com/library/view/~/9780124158153/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2296528 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;McClure, Stuart.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar">https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071780285/?ar">https://learning.oreilly.com/library/view/~/9780071780285/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing the clicks : network security in the age of social media ent://SD_ILS/0/SD_ILS:2293761 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Bahadur, Gary.<br/><a href="https://learning.oreilly.com/library/view/~/9780071769051">https://learning.oreilly.com/library/view/~/9780071769051</a> <a href="https://learning.oreilly.com/library/view/~/9780071769051/?ar">https://learning.oreilly.com/library/view/~/9780071769051/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071769051/?ar">https://go.oreilly.com/library-access/library/view/-/9780071769051/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web application security : a beginner's guide ent://SD_ILS/0/SD_ILS:2293762 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Sullivan, Bryan, 1974-<br/><a href="https://learning.oreilly.com/library/view/~/9780071776165/?ar">https://learning.oreilly.com/library/view/~/9780071776165/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071776165/?ar">https://go.oreilly.com/library-access/library/view/-/9780071776165/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071776165">https://learning.oreilly.com/library/view/~/9780071776165</a><br/>Format:&#160;Electronic Resources<br/> The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) ent://SD_ILS/0/SD_ILS:2294170 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format:&#160;Electronic Resources<br/> Reverse Deception Organized Cyber Threat Counter-Exploitation. ent://SD_ILS/0/SD_ILS:2295096 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Kilger, Dr Max.<br/><a href="https://learning.oreilly.com/library/view/~/9780071772495">https://learning.oreilly.com/library/view/~/9780071772495</a> <a href="https://learning.oreilly.com/library/view/~/9780071772495/?ar">https://learning.oreilly.com/library/view/~/9780071772495/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar">https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kerberos : Single Sign-on in gemischten Linux/Windows-Umgebungen. ent://SD_ILS/0/SD_ILS:2295135 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Pr&ouml;hl, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9781457170393/?ar">https://learning.oreilly.com/library/view/~/9781457170393/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457170393/?ar">https://go.oreilly.com/library-access/library/view/-/9781457170393/?ar</a><br/>Format:&#160;Electronic Resources<br/> The tangled Web : a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:2293949 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Zalewski, Michal.<br/><a href="https://learning.oreilly.com/library/view/~/9781593273880">https://learning.oreilly.com/library/view/~/9781593273880</a> <a href="https://learning.oreilly.com/library/view/~/9781593273880/?ar">https://learning.oreilly.com/library/view/~/9781593273880/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management ent://SD_ILS/0/SD_ILS:2296031 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Nordstr&ouml;m, Kent.<br/><a href="https://learning.oreilly.com/library/view/~/9781849685368/?ar">https://learning.oreilly.com/library/view/~/9781849685368/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849685368/?ar">https://go.oreilly.com/library-access/library/view/-/9781849685368/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849685368">https://learning.oreilly.com/library/view/~/9781849685368</a><br/>Format:&#160;Electronic Resources<br/> The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:2296625 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Winterfeld, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047372/?ar">https://learning.oreilly.com/library/view/~/9780124047372/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124047372">https://learning.oreilly.com/library/view/~/9780124047372</a><br/>Format:&#160;Electronic Resources<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:2294655 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Easttom, Chuck.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar">https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132828284/?ar">https://learning.oreilly.com/library/view/~/9780132828284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132828284">https://learning.oreilly.com/library/view/~/9780132828284</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing : protecting networks and systems ent://SD_ILS/0/SD_ILS:2295898 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Henry, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283731">https://learning.oreilly.com/library/view/~/9781849283731</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849283731/?ar">https://learning.oreilly.com/library/view/~/9781849283731/?ar</a><br/>Format:&#160;Electronic Resources<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:2298518 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Shimonski, Robert.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495905/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495905/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495905/?ar">https://learning.oreilly.com/library/view/~/9781597495905/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI compliance : understand and implement effective PCI data security standard compliance, third edition ent://SD_ILS/0/SD_ILS:2298067 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Williams, Branden R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499484/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499484/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499484/?ar">https://learning.oreilly.com/library/view/~/9781597499484/?ar</a><br/>Format:&#160;Electronic Resources<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:2293442 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Speed, Tyler Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar">https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439809839/?ar">https://learning.oreilly.com/library/view/~/9781439809839/?ar</a><br/>Format:&#160;Electronic Resources<br/> 125 sposob&oacute;w na bezpieczeństwo sieci ent://SD_ILS/0/SD_ILS:2299439 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176357/?ar">https://learning.oreilly.com/library/view/~/9781457176357/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network Attacks and Defenses : a Hands-on Approach ent://SD_ILS/0/SD_ILS:2313475 2024-09-24T23:54:05Z 2024-09-24T23:54:05Z by&#160;Trabelsi, Zouheir, author<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466517974/?ar">https://go.oreilly.com/library-access/library/view/-/9781466517974/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466517974/?ar">https://learning.oreilly.com/library/view/~/9781466517974/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466517974">https://learning.oreilly.com/library/view/~/9781466517974</a><br/>Format:&#160;Electronic Resources<br/>