Search Results for - Narrowed by: 2012 - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-06-14T10:26:32ZCyber security standards, practices and industrial applications systems and methodologiesent://SD_ILS/0/SD_ILS:4763482024-06-14T10:26:32Z2024-06-14T10:26:32Zby Zubairi, Junaid Ahmed, 1961-<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/</a><br/>Format: Electronic Resources<br/>The tangled Web: a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:2563412024-06-14T10:26:32Z2024-06-14T10:26:32Zby Zalewski, Michal.<br/>Format: Books<br/>Proceedings of the 11th European Conference on Information warfare and security : ECIW 2012.ent://SD_ILS/0/SD_ILS:12701312024-06-14T10:26:32Z2024-06-14T10:26:32Zby Filiol, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1667290">Click to View</a><br/>Format: Electronic Resources<br/>IT Governance : An International Guide to Data Security and ISO27001/ISO27002.ent://SD_ILS/0/SD_ILS:12381642024-06-14T10:26:32Z2024-06-14T10:26:32Zby Calder, Alan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=838114">Click to View</a><br/>Format: Electronic Resources<br/>Oracle 11g Anti-hacker's Cookbook.ent://SD_ILS/0/SD_ILS:12508622024-06-14T10:26:32Z2024-06-14T10:26:32Zby Neagu, Adrian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1057945">Click to View</a><br/>Format: Electronic Resources<br/>Getting Started with Citrix XenApp 6.5.ent://SD_ILS/0/SD_ILS:12472752024-06-14T10:26:32Z2024-06-14T10:26:32Zby Musumeci, Guillermo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=995550">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Forefront Identity Manager 2010 R2 Handbook.ent://SD_ILS/0/SD_ILS:12478162024-06-14T10:26:32Z2024-06-14T10:26:32Zby Nordström, Kent.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1019543">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft SQL Server 2012 Security Cookbook.ent://SD_ILS/0/SD_ILS:12486532024-06-14T10:26:32Z2024-06-14T10:26:32Zby Bruchez, Rudi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1036251">Click to View</a><br/>Format: Electronic Resources<br/>Hacking For Dummies.ent://SD_ILS/0/SD_ILS:12526562024-06-14T10:26:32Z2024-06-14T10:26:32Zby Beaver, Kevin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106542">Click to View</a><br/>Format: Electronic Resources<br/>Practical Malware Analysis : A Hands-On Guide to Dissecting Malicious Software.ent://SD_ILS/0/SD_ILS:12555862024-06-14T10:26:32Z2024-06-14T10:26:32Zby Sikorski, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137570">Click to View</a><br/>Format: Electronic Resources<br/>Spring Security 3.1.ent://SD_ILS/0/SD_ILS:12528402024-06-14T10:26:32Z2024-06-14T10:26:32Zby Winch, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1108351">Click to View</a><br/>Format: Electronic Resources<br/>Securing WebLogic Server 12c.ent://SD_ILS/0/SD_ILS:12521652024-06-14T10:26:32Z2024-06-14T10:26:32Zby Masini, Luca.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085228">Click to View</a><br/>Format: Electronic Resources<br/>Nmap 6 : Network exploration and security auditing Cookbook.ent://SD_ILS/0/SD_ILS:12521672024-06-14T10:26:32Z2024-06-14T10:26:32Zby Pale, Paulino Calderon.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085230">Click to View</a><br/>Format: Electronic Resources<br/>Group Policy : Fundamentals, Security, and the Managed Desktop.ent://SD_ILS/0/SD_ILS:12525962024-06-14T10:26:32Z2024-06-14T10:26:32Zby Moskowitz, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1104500">Click to View</a><br/>Format: Electronic Resources<br/>IBM i Security Administration and Compliance.ent://SD_ILS/0/SD_ILS:12427142024-06-14T10:26:32Z2024-06-14T10:26:32Zby Woodbury, Carol.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=906259">Click to View</a><br/>Format: Electronic Resources<br/>Hacking Web Apps : Detecting and Preventing Web Application Security Problems.ent://SD_ILS/0/SD_ILS:12476652024-06-14T10:26:32Z2024-06-14T10:26:32Zby Shema, Mike.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1012529">Click to View</a><br/>Format: Electronic Resources<br/>Safeguarding Critical E-Documents : Implementing a Program for Securing Confidential Information Assets.ent://SD_ILS/0/SD_ILS:12366012024-06-14T10:26:32Z2024-06-14T10:26:32Zby Smallwood, Robert F.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=821999">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:21264952024-06-14T10:26:32Z2024-06-14T10:26:32Zby Macaulay, Tyson.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826923">Click to View</a><br/>Format: Electronic Resources<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:21265082024-06-14T10:26:32Z2024-06-14T10:26:32Zby Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826949">Click to View</a><br/>Format: Electronic Resources<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:21317362024-06-14T10:26:32Z2024-06-14T10:26:32Zby Mjølsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1648315">Click to View</a><br/>Format: Electronic Resources<br/>Secure and resilient software : requirements, test cases, and testing methodsent://SD_ILS/0/SD_ILS:20775142024-06-14T10:26:32Z2024-06-14T10:26:32Zby Merkow, Mark S., author.<br/><a href="https://www.taylorfrancis.com/books/9781439866221">Click here to view.</a><br/>Format: Books<br/>Hands-On Ethical Hacking and Network Defense.ent://SD_ILS/0/SD_ILS:13052332024-06-14T10:26:32Z2024-06-14T10:26:32Zby Simpson, Michael T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136562">Click to View</a><br/>Format: Electronic Resources<br/>Securing SQL servers protecting your database from attackersent://SD_ILS/0/SD_ILS:22058462024-06-14T10:26:32Z2024-06-14T10:26:32Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=980013">Click to View</a><br/>Format: Electronic Resources<br/>Embedded systems security practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:22056592024-06-14T10:26:32Z2024-06-14T10:26:32Zby Kleidermacher, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=886256">Click to View</a><br/>Format: Electronic Resources<br/>Low tech hacking street smarts for security professionalsent://SD_ILS/0/SD_ILS:22055522024-06-14T10:26:32Z2024-06-14T10:26:32Zby Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=829964">Click to View</a><br/>Format: Electronic Resources<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:22056922024-06-14T10:26:32Z2024-06-14T10:26:32Zby Mao, Wenji.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=892251">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:22055812024-06-14T10:26:32Z2024-06-14T10:26:32Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=850700">Click to View</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems digital forensics field guidesent://SD_ILS/0/SD_ILS:22057382024-06-14T10:26:32Z2024-06-14T10:26:32Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=921016">Click to View</a><br/>Format: Electronic Resources<br/>Łamanie i zabezpieczanie aplikacji w systemie iOSent://SD_ILS/0/SD_ILS:22979862024-06-14T10:26:32Z2024-06-14T10:26:32Zby Zdziarski, Jonathan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781457177057/?ar">https://learning.oreilly.com/library/view/~/9781457177057/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457177057/?ar">https://go.oreilly.com/library-access/library/view/-/9781457177057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457177057">https://learning.oreilly.com/library/view/~/9781457177057</a><br/>Format: Electronic Resources<br/>Endpoint security and compliance management design guide : using IBM Tivoli Endpoint Managerent://SD_ILS/0/SD_ILS:22975122024-06-14T10:26:32Z2024-06-14T10:26:32Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738436984">https://learning.oreilly.com/library/view/~/0738436984</a>
<a href="https://learning.oreilly.com/library/view/~/0738436984/?ar">https://learning.oreilly.com/library/view/~/0738436984/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738436984/?ar">https://go.oreilly.com/library-access/library/view/-/0738436984/?ar</a><br/>Format: Electronic Resources<br/>Hacking and securing iOS applicationsent://SD_ILS/0/SD_ILS:22934642024-06-14T10:26:32Z2024-06-14T10:26:32Zby Zdziarski, Jonathan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781449325213/?ar">https://learning.oreilly.com/library/view/~/9781449325213/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781449325213/?ar">https://go.oreilly.com/library-access/library/view/-/9781449325213/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449325213">https://learning.oreilly.com/library/view/~/9781449325213</a><br/>Format: Electronic Resources<br/>The CERT Oracle Secure Coding Standard for Javaent://SD_ILS/0/SD_ILS:22933942024-06-14T10:26:32Z2024-06-14T10:26:32Zby Long, Fred, 1947-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132882842/?ar">https://go.oreilly.com/library-access/library/view/-/9780132882842/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132882842/?ar">https://learning.oreilly.com/library/view/~/9780132882842/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132882842">https://learning.oreilly.com/library/view/~/9780132882842</a><br/>Format: Electronic Resources<br/>Analyzing computer security : a threat/vulnerability/countermeasure approachent://SD_ILS/0/SD_ILS:22918062024-06-14T10:26:32Z2024-06-14T10:26:32Zby Pfleeger, Charles P., 1948-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar">https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132789493/?ar">https://learning.oreilly.com/library/view/~/9780132789493/?ar</a><br/>Format: Electronic Resources<br/>RC4 stream cipher and its variantsent://SD_ILS/0/SD_ILS:22931732024-06-14T10:26:32Z2024-06-14T10:26:32Zby Paul, Goutam.<br/><a href="https://learning.oreilly.com/library/view/~/9781439831373">https://learning.oreilly.com/library/view/~/9781439831373</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar">https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439831373/?ar">https://learning.oreilly.com/library/view/~/9781439831373/?ar</a><br/>Format: Electronic Resources<br/>Low tech hacking : street smarts for security professionalsent://SD_ILS/0/SD_ILS:22932292024-06-14T10:26:32Z2024-06-14T10:26:32Zby Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496650">https://learning.oreilly.com/library/view/~/9781597496650</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496650/?ar">https://learning.oreilly.com/library/view/~/9781597496650/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar</a><br/>Format: Electronic Resources<br/>Practical malware analysis : the hands-on guide to dissecting malicious softwareent://SD_ILS/0/SD_ILS:22951522024-06-14T10:26:32Z2024-06-14T10:26:32Zby Sikorski, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272906/?ar">https://learning.oreilly.com/library/view/~/9781593272906/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272906">https://learning.oreilly.com/library/view/~/9781593272906</a><br/>Format: Electronic Resources<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:22959512024-06-14T10:26:32Z2024-06-14T10:26:32Zby ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format: Electronic Resources<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:22969362024-06-14T10:26:32Z2024-06-14T10:26:32Zby Mao, Wenji.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123972002/?ar">https://go.oreilly.com/library-access/library/view/-/9780123972002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123972002/?ar">https://learning.oreilly.com/library/view/~/9780123972002/?ar</a><br/>Format: Electronic Resources<br/>Computer-Forensik Hacksent://SD_ILS/0/SD_ILS:22962292024-06-14T10:26:32Z2024-06-14T10:26:32Zby Kuhlee, Lorenz.<br/><a href="https://learning.oreilly.com/library/view/~/9783868997637">https://learning.oreilly.com/library/view/~/9783868997637</a>
<a href="https://learning.oreilly.com/library/view/~/9783868997637/?ar">https://learning.oreilly.com/library/view/~/9783868997637/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783868997637/?ar">https://go.oreilly.com/library-access/library/view/-/9783868997637/?ar</a><br/>Format: Electronic Resources<br/>Hacking web apps : detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:22959122024-06-14T10:26:32Z2024-06-14T10:26:32Zby Shema, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499514/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499514/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499514/?ar">https://learning.oreilly.com/library/view/~/9781597499514/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499514">https://learning.oreilly.com/library/view/~/9781597499514</a><br/>Format: Electronic Resources<br/>Hacking exposed 7 : network security secrets & solutionsent://SD_ILS/0/SD_ILS:22965282024-06-14T10:26:32Z2024-06-14T10:26:32Zby McClure, Stuart.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar">https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071780285/?ar">https://learning.oreilly.com/library/view/~/9780071780285/?ar</a><br/>Format: Electronic Resources<br/>Learning Whitehat hacking and penetration testingent://SD_ILS/0/SD_ILS:22978662024-06-14T10:26:32Z2024-06-14T10:26:32Zby Messier, Ric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771370349/?ar">https://learning.oreilly.com/videos/~/9781771370349/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing mit Metasploit : Eine praktische Einführungent://SD_ILS/0/SD_ILS:22979132024-06-14T10:26:32Z2024-06-14T10:26:32Zby Neugebauer, Frank.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457174933/?ar">https://go.oreilly.com/library-access/library/view/-/9781457174933/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457174933/?ar">https://learning.oreilly.com/library/view/~/9781457174933/?ar</a><br/>Format: Electronic Resources<br/>The computer incident response planning handbook : executable plans for protecting information at riskent://SD_ILS/0/SD_ILS:22963252024-06-14T10:26:32Z2024-06-14T10:26:32Zby McCarthy, N. K.<br/><a href="https://learning.oreilly.com/library/view/~/9780071790390/?ar">https://learning.oreilly.com/library/view/~/9780071790390/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071790390/?ar">https://go.oreilly.com/library-access/library/view/-/9780071790390/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071790390">https://learning.oreilly.com/library/view/~/9780071790390</a><br/>Format: Electronic Resources<br/>Information security risk assessment toolkit : practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:22985192024-06-14T10:26:32Z2024-06-14T10:26:32Zby Talabis, Mark Ryan M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497350/?ar">https://learning.oreilly.com/library/view/~/9781597497350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597497350/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497350/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497350">https://learning.oreilly.com/library/view/~/9781597497350</a><br/>Format: Electronic Resources<br/>125 sposobów na bezpieczeństwo siecient://SD_ILS/0/SD_ILS:22994392024-06-14T10:26:32Z2024-06-14T10:26:32Zby Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176357/?ar">https://learning.oreilly.com/library/view/~/9781457176357/?ar</a><br/>Format: Electronic Resources<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:22953692024-06-14T10:26:32Z2024-06-14T10:26:32Zby Clarke, Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499637/?ar">https://learning.oreilly.com/library/view/~/9781597499637/?ar</a><br/>Format: Electronic Resources<br/>Cloud computing : moving IT out of the officeent://SD_ILS/0/SD_ILS:22940262024-06-14T10:26:32Z2024-06-14T10:26:32Zby BCS, The Chartered Institute for IT.<br/><a href="https://learning.oreilly.com/library/view/~/9781780171302">https://learning.oreilly.com/library/view/~/9781780171302</a>
<a href="https://learning.oreilly.com/library/view/~/9781780171302/?ar">https://learning.oreilly.com/library/view/~/9781780171302/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780171302/?ar">https://go.oreilly.com/library-access/library/view/-/9781780171302/?ar</a><br/>Format: Electronic Resources<br/>Embedded systems security : practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:22949272024-06-14T10:26:32Z2024-06-14T10:26:32Zby Kleidermacher, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780123868862">https://learning.oreilly.com/library/view/~/9780123868862</a>
<a href="https://learning.oreilly.com/library/view/~/9780123868862/?ar">https://learning.oreilly.com/library/view/~/9780123868862/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780123868862/?ar">https://go.oreilly.com/library-access/library/view/-/9780123868862/?ar</a><br/>Format: Electronic Resources<br/>Predicting malicious behavior : tools and techniques for ensuring global securityent://SD_ILS/0/SD_ILS:22958452024-06-14T10:26:32Z2024-06-14T10:26:32Zby Jackson, Gary M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118239568/?ar">https://go.oreilly.com/library-access/library/view/-/9781118239568/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118239568/?ar">https://learning.oreilly.com/library/view/~/9781118239568/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkitent://SD_ILS/0/SD_ILS:22958232024-06-14T10:26:32Z2024-06-14T10:26:32Zby Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format: Electronic Resources<br/>Oracle 11g Anti-hacker's Cookbook.ent://SD_ILS/0/SD_ILS:22965542024-06-14T10:26:32Z2024-06-14T10:26:32Zby Neagu, Adrian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849685269/?ar">https://go.oreilly.com/library-access/library/view/-/9781849685269/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849685269/?ar">https://learning.oreilly.com/library/view/~/9781849685269/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849685269">https://learning.oreilly.com/library/view/~/9781849685269</a><br/>Format: Electronic Resources<br/>Clickjacking und UI-Redressing - Vom Klick-Betrug zum Datenklau : Ein Leitfaden für Sicherheitsexperten und Webentwickler.ent://SD_ILS/0/SD_ILS:22965552024-06-14T10:26:32Z2024-06-14T10:26:32Zby Niemietz, Marcus.<br/><a href="https://learning.oreilly.com/library/view/~/9781457171116/?ar">https://learning.oreilly.com/library/view/~/9781457171116/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457171116/?ar">https://go.oreilly.com/library-access/library/view/-/9781457171116/?ar</a><br/>Format: Electronic Resources<br/>Mastering Windows network forensics and investigationent://SD_ILS/0/SD_ILS:22991762024-06-14T10:26:32Z2024-06-14T10:26:32Zby Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781118236086/?ar">https://learning.oreilly.com/library/view/~/9781118236086/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar">https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar</a><br/>Format: Electronic Resources<br/>Podstawy ochrony komputerówent://SD_ILS/0/SD_ILS:22995462024-06-14T10:26:32Z2024-06-14T10:26:32Zby Lehtinen, Rick.<br/><a href="https://learning.oreilly.com/library/view/~/9781457172618">https://learning.oreilly.com/library/view/~/9781457172618</a>
<a href="https://learning.oreilly.com/library/view/~/9781457172618/?ar">https://learning.oreilly.com/library/view/~/9781457172618/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457172618/?ar">https://go.oreilly.com/library-access/library/view/-/9781457172618/?ar</a><br/>Format: Electronic Resources<br/>The tangled Web : a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:22939492024-06-14T10:26:32Z2024-06-14T10:26:32Zby Zalewski, Michal.<br/><a href="https://learning.oreilly.com/library/view/~/9781593273880">https://learning.oreilly.com/library/view/~/9781593273880</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273880/?ar">https://learning.oreilly.com/library/view/~/9781593273880/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar</a><br/>Format: Electronic Resources<br/>The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)ent://SD_ILS/0/SD_ILS:22941702024-06-14T10:26:32Z2024-06-14T10:26:32Zby Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format: Electronic Resources<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:22946552024-06-14T10:26:32Z2024-06-14T10:26:32Zby Easttom, Chuck.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar">https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132828284/?ar">https://learning.oreilly.com/library/view/~/9780132828284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132828284">https://learning.oreilly.com/library/view/~/9780132828284</a><br/>Format: Electronic Resources<br/>Security and privacy for Microsoft Office 2010 users.ent://SD_ILS/0/SD_ILS:22942102024-06-14T10:26:32Z2024-06-14T10:26:32Zby Tulloch, Mitch.<br/><a href="https://learning.oreilly.com/library/view/~/9780735668829">https://learning.oreilly.com/library/view/~/9780735668829</a>
<a href="https://learning.oreilly.com/library/view/~/9780735668829/?ar">https://learning.oreilly.com/library/view/~/9780735668829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar">https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems : digital forensics field guidesent://SD_ILS/0/SD_ILS:22946822024-06-14T10:26:32Z2024-06-14T10:26:32Zby Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format: Electronic Resources<br/>Healthcare fraud : auditing and detection guideent://SD_ILS/0/SD_ILS:22941322024-06-14T10:26:32Z2024-06-14T10:26:32Zby Busch, Rebecca S.<br/><a href="https://learning.oreilly.com/library/view/~/9781118240250/?ar">https://learning.oreilly.com/library/view/~/9781118240250/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118240250/?ar">https://go.oreilly.com/library-access/library/view/-/9781118240250/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118240250">https://learning.oreilly.com/library/view/~/9781118240250</a><br/>Format: Electronic Resources<br/>An introduction to hacking and crimeware : a pocket guideent://SD_ILS/0/SD_ILS:22946062024-06-14T10:26:32Z2024-06-14T10:26:32Zby Loewengart, Victoria, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283304">https://learning.oreilly.com/library/view/~/9781849283304</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283304/?ar">https://learning.oreilly.com/library/view/~/9781849283304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283304/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283304/?ar</a><br/>Format: Electronic Resources<br/>IT-Sicherheit & Datenschutz.ent://SD_ILS/0/SD_ILS:22952782024-06-14T10:26:32Z2024-06-14T10:26:32Zby Fröschle, Hans-Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457170416/?ar">https://go.oreilly.com/library-access/library/view/-/9781457170416/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457170416/?ar">https://learning.oreilly.com/library/view/~/9781457170416/?ar</a><br/>Format: Electronic Resources<br/>Handbook on securing cyber-physical critical infrastructure : foundation and challengesent://SD_ILS/0/SD_ILS:22956612024-06-14T10:26:32Z2024-06-14T10:26:32Zby Das, Sajal K.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124158153/?ar">https://go.oreilly.com/library-access/library/view/-/9780124158153/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124158153/?ar">https://learning.oreilly.com/library/view/~/9780124158153/?ar</a><br/>Format: Electronic Resources<br/>Manually removing viruses and malware from Windows 7ent://SD_ILS/0/SD_ILS:22967582024-06-14T10:26:32Z2024-06-14T10:26:32Zby Halsey, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar">https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781449338053/?ar">https://learning.oreilly.com/videos/~/9781449338053/?ar</a><br/>Format: Electronic Resources<br/>IBM business process manager security : concepts and guidanceent://SD_ILS/0/SD_ILS:23075462024-06-14T10:26:32Z2024-06-14T10:26:32Zby Wood, J. Keith, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738437263/?ar">https://go.oreilly.com/library-access/library/view/-/0738437263/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738437263">https://learning.oreilly.com/library/view/~/0738437263</a>
<a href="https://learning.oreilly.com/library/view/~/0738437263/?ar">https://learning.oreilly.com/library/view/~/0738437263/?ar</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography with Open-Source Software.ent://SD_ILS/0/SD_ILS:23070162024-06-14T10:26:32Z2024-06-14T10:26:32Zby McAndrew, Alasdair.<br/><a href="https://learning.oreilly.com/library/view/~/9781439825716">https://learning.oreilly.com/library/view/~/9781439825716</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar">https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439825716/?ar">https://learning.oreilly.com/library/view/~/9781439825716/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics explainedent://SD_ILS/0/SD_ILS:23180232024-06-14T10:26:32Z2024-06-14T10:26:32Zby Gogolin, Greg, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439874950/?ar">https://learning.oreilly.com/library/view/~/9781439874950/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439874950/?ar">https://go.oreilly.com/library-access/library/view/-/9781439874950/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439874950">https://learning.oreilly.com/library/view/~/9781439874950</a><br/>Format: Electronic Resources<br/>IOS an quan fang hu = Hacking and securing iOS applicationsent://SD_ILS/0/SD_ILS:23318112024-06-14T10:26:32Z2024-06-14T10:26:32Zby Zdziarski, Jonathan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789862766484">https://learning.oreilly.com/library/view/~/9789862766484</a>
<a href="https://learning.oreilly.com/library/view/~/9789862766484/?ar">https://learning.oreilly.com/library/view/~/9789862766484/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9789862766484/?ar">https://go.oreilly.com/library-access/library/view/-/9789862766484/?ar</a><br/>Format: Electronic Resources<br/>Security for Wireless Sensor Networks using Identity-Based Cryptographyent://SD_ILS/0/SD_ILS:23272862024-06-14T10:26:32Z2024-06-14T10:26:32Zby Patil, Harsh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439869024">https://learning.oreilly.com/library/view/~/9781439869024</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar">https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439869024/?ar">https://learning.oreilly.com/library/view/~/9781439869024/?ar</a><br/>Format: Electronic Resources<br/>