Search Results for - Narrowed by: 2013 - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2024-09-24T03:13:54ZComputer incident response and forensics team management : conducting a successful incident responseent://SD_ILS/0/SD_ILS:23006702024-09-24T03:13:54Z2024-09-24T03:13:54Zby Johnson, Leighton, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499965/?ar">https://learning.oreilly.com/library/view/~/9781597499965/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499965">https://learning.oreilly.com/library/view/~/9781597499965</a><br/>Format: Electronic Resources<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:23134822024-09-24T03:13:54Z2024-09-24T03:13:54Zby Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format: Electronic Resources<br/>Discrete dynamical systems and chaotic machines : theory and applicationsent://SD_ILS/0/SD_ILS:22990552024-09-24T03:13:54Z2024-09-24T03:13:54Zby Bahi, Jacques Mohcine, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466554511">https://learning.oreilly.com/library/view/~/9781466554511</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466554511/?ar">https://go.oreilly.com/library-access/library/view/-/9781466554511/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466554511/?ar">https://learning.oreilly.com/library/view/~/9781466554511/?ar</a><br/>Format: Electronic Resources<br/>Expert Oracle application express securityent://SD_ILS/0/SD_ILS:22990642024-09-24T03:13:54Z2024-09-24T03:13:54Zby Spendolini, Scott.<br/><a href="https://learning.oreilly.com/library/view/~/9781430247319/?ar">https://learning.oreilly.com/library/view/~/9781430247319/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430247319/?ar">https://go.oreilly.com/library-access/library/view/-/9781430247319/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430247319">https://learning.oreilly.com/library/view/~/9781430247319</a><br/>Format: Electronic Resources<br/>Secure coding in C and C++ent://SD_ILS/0/SD_ILS:22992232024-09-24T03:13:54Z2024-09-24T03:13:54Zby Seacord, Robert C.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132981989/?ar">https://go.oreilly.com/library-access/library/view/-/9780132981989/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132981989/?ar">https://learning.oreilly.com/library/view/~/9780132981989/?ar</a><br/>Format: Electronic Resources<br/>Nine steps to success : an ISO27001:2013 implementation overviewent://SD_ILS/0/SD_ILS:23004362024-09-24T03:13:54Z2024-09-24T03:13:54Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117/?ar">https://learning.oreilly.com/library/view/~/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117">https://learning.oreilly.com/library/view/~/9781849285117</a><br/>Format: Electronic Resources<br/>Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linuxent://SD_ILS/0/SD_ILS:23003502024-09-24T03:13:54Z2024-09-24T03:13:54Zby Muniz, Joseph.<br/><a href="https://learning.oreilly.com/library/view/~/9781782163169">https://learning.oreilly.com/library/view/~/9781782163169</a>
<a href="https://learning.oreilly.com/library/view/~/9781782163169/?ar">https://learning.oreilly.com/library/view/~/9781782163169/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar">https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar</a><br/>Format: Electronic Resources<br/>Information security : the complete referenceent://SD_ILS/0/SD_ILS:22998852024-09-24T03:13:54Z2024-09-24T03:13:54Zby Rhodes-Ousley, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071784351/?ar">https://go.oreilly.com/library-access/library/view/-/9780071784351/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071784351/?ar">https://learning.oreilly.com/library/view/~/9780071784351/?ar</a><br/>Format: Electronic Resources<br/>Suits and spooks conference : attacks, threats, and defense in cyberspace : complete video compliation.ent://SD_ILS/0/SD_ILS:23019092024-09-24T03:13:54Z2024-09-24T03:13:54Z<a href="https://learning.oreilly.com/videos/~/9781491946435">https://learning.oreilly.com/videos/~/9781491946435</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar">https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491946435/?ar">https://learning.oreilly.com/videos/~/9781491946435/?ar</a><br/>Format: Electronic Resources<br/>Simple steps to data encryption : a practical guide to secure computingent://SD_ILS/0/SD_ILS:23004102024-09-24T03:13:54Z2024-09-24T03:13:54Zby Loshin, Peter.<br/><a href="https://learning.oreilly.com/library/view/~/9780124114838">https://learning.oreilly.com/library/view/~/9780124114838</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124114838/?ar">https://go.oreilly.com/library-access/library/view/-/9780124114838/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124114838/?ar">https://learning.oreilly.com/library/view/~/9780124114838/?ar</a><br/>Format: Electronic Resources<br/>The PayPal official insider guide to internet security : spot scams and protect your online businessent://SD_ILS/0/SD_ILS:22972592024-09-24T03:13:54Z2024-09-24T03:13:54Zby Savage, Michelle.<br/><a href="https://learning.oreilly.com/library/view/~/9780133154573">https://learning.oreilly.com/library/view/~/9780133154573</a>
<a href="https://learning.oreilly.com/library/view/~/9780133154573/?ar">https://learning.oreilly.com/library/view/~/9780133154573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar">https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar</a><br/>Format: Electronic Resources<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:22975342024-09-24T03:13:54Z2024-09-24T03:13:54Zby Yang, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047020">https://learning.oreilly.com/library/view/~/9780124047020</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124047020/?ar">https://learning.oreilly.com/library/view/~/9780124047020/?ar</a><br/>Format: Electronic Resources<br/>Handbook of SCADA/control systems securityent://SD_ILS/0/SD_ILS:22975372024-09-24T03:13:54Z2024-09-24T03:13:54Zby Radvanovsky, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502260/?ar">https://learning.oreilly.com/library/view/~/9781466502260/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466502260">https://learning.oreilly.com/library/view/~/9781466502260</a><br/>Format: Electronic Resources<br/>Learning computer forensicsent://SD_ILS/0/SD_ILS:22985542024-09-24T03:13:54Z2024-09-24T03:13:54Zby Messier, Ric.<br/><a href="https://learning.oreilly.com/videos/~/9781771370615/?ar">https://learning.oreilly.com/videos/~/9781771370615/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:22988182024-09-24T03:13:54Z2024-09-24T03:13:54Zby Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9781118331743/?ar">https://learning.oreilly.com/library/view/~/9781118331743/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118331743/?ar">https://go.oreilly.com/library-access/library/view/-/9781118331743/?ar</a><br/>Format: Electronic Resources<br/>Managing risk and information security : protect to enableent://SD_ILS/0/SD_ILS:22973262024-09-24T03:13:54Z2024-09-24T03:13:54Zby Harkins, Malcolm.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430251132/?ar">https://go.oreilly.com/library-access/library/view/-/9781430251132/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430251132">https://learning.oreilly.com/library/view/~/9781430251132</a>
<a href="https://learning.oreilly.com/library/view/~/9781430251132/?ar">https://learning.oreilly.com/library/view/~/9781430251132/?ar</a><br/>Format: Electronic Resources<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:22983362024-09-24T03:13:54Z2024-09-24T03:13:54Zby Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar">https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118380956/?ar">https://learning.oreilly.com/library/view/~/9781118380956/?ar</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:22979662024-09-24T03:13:54Z2024-09-24T03:13:54Zby Brotby, W. Krag.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881538/?ar">https://learning.oreilly.com/library/view/~/9781439881538/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar</a><br/>Format: Electronic Resources<br/>IT-Sicherheit Konzepte - Verfahren - Protokolle.ent://SD_ILS/0/SD_ILS:5281052024-09-24T03:13:54Z2024-09-24T03:13:54Zby Eckert, Claudia.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=757549">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=757549</a><br/>Format: Electronic Resources<br/>Enterprise Security : A Data-Centric Approach to Securing the Enterprise.ent://SD_ILS/0/SD_ILS:12525212024-09-24T03:13:54Z2024-09-24T03:13:54Zby Woody, Aaron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1103988">Click to View</a><br/>Format: Electronic Resources<br/>Safety of Computer Architectures.ent://SD_ILS/0/SD_ILS:12539422024-09-24T03:13:54Z2024-09-24T03:13:54Zby Boulanger, Jean-Louis.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1120753">Click to View</a><br/>Format: Electronic Resources<br/>IBM Mainframe Security : Beyond the BasicsA Practical Guide from a z/OS and RACF Perspective.ent://SD_ILS/0/SD_ILS:12625912024-09-24T03:13:54Z2024-09-24T03:13:54Zby Dattani, Dinesh D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1411689">Click to View</a><br/>Format: Electronic Resources<br/>Security Patterns in Practice : Designing Secure Architectures Using Software Patterns.ent://SD_ILS/0/SD_ILS:12598172024-09-24T03:13:54Z2024-09-24T03:13:54Zby Fernandez-Buglioni, Eduardo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1245159">Click to View</a><br/>Format: Electronic Resources<br/>The Basics of IT Audit : Purposes, Processes, and Practical Information.ent://SD_ILS/0/SD_ILS:12642472024-09-24T03:13:54Z2024-09-24T03:13:54Zby Gantz, Stephen D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1550527">Click to View</a><br/>Format: Electronic Resources<br/>Getting Started with FortiGate.ent://SD_ILS/0/SD_ILS:12650072024-09-24T03:13:54Z2024-09-24T03:13:54Zby Fabbri, Rosato.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572901">Click to View</a><br/>Format: Electronic Resources<br/>Instant Java Password and Authentication Security.ent://SD_ILS/0/SD_ILS:12650192024-09-24T03:13:54Z2024-09-24T03:13:54Zby Mayoral, Fernando.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572913">Click to View</a><br/>Format: Electronic Resources<br/>Data Visualization, Part 2 : New Directions for Evaluation, Number 140.ent://SD_ILS/0/SD_ILS:12654882024-09-24T03:13:54Z2024-09-24T03:13:54Zby Azzam, Tarek.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1579356">Click to View</a><br/>Format: Electronic Resources<br/>Web Application Defender's Cookbook : Battling Hackers and Protecting Users.ent://SD_ILS/0/SD_ILS:12528732024-09-24T03:13:54Z2024-09-24T03:13:54Zby Barnett, Ryan C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1108733">Click to View</a><br/>Format: Electronic Resources<br/>Social Media Security : Leveraging Social Networking While Mitigating Risk.ent://SD_ILS/0/SD_ILS:12534952024-09-24T03:13:54Z2024-09-24T03:13:54Zby Cross, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115173">Click to View</a><br/>Format: Electronic Resources<br/>Using Social Media for Global Security.ent://SD_ILS/0/SD_ILS:12536702024-09-24T03:13:54Z2024-09-24T03:13:54Zby Gupta, Ravi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1118756">Click to View</a><br/>Format: Electronic Resources<br/>Biohackers : The Politics of Open Science.ent://SD_ILS/0/SD_ILS:13229962024-09-24T03:13:54Z2024-09-24T03:13:54Zby Delfanti, Alessandro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3386719">Click to View</a><br/>Format: Electronic Resources<br/>Convergence : Illicit Networks and National Security in the Age of Globalization.ent://SD_ILS/0/SD_ILS:13375722024-09-24T03:13:54Z2024-09-24T03:13:54Zby (U.S.), National Defense University.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3571653">Click to View</a><br/>Format: Electronic Resources<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:20517122024-09-24T03:13:54Z2024-09-24T03:13:54Zby O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073021">Click to View</a><br/>Format: Electronic Resources<br/>Digital forensics for handheld devicesent://SD_ILS/0/SD_ILS:22954762024-09-24T03:13:54Z2024-09-24T03:13:54Zby Doherty, Eamon P.<br/><a href="https://learning.oreilly.com/library/view/~/9781439898789/?ar">https://learning.oreilly.com/library/view/~/9781439898789/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439898789">https://learning.oreilly.com/library/view/~/9781439898789</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439898789/?ar">https://go.oreilly.com/library-access/library/view/-/9781439898789/?ar</a><br/>Format: Electronic Resources<br/>Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:22966242024-09-24T03:13:54Z2024-09-24T03:13:54Zby O'Connor, T. J.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499576/?ar">https://learning.oreilly.com/library/view/~/9781597499576/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499576">https://learning.oreilly.com/library/view/~/9781597499576</a><br/>Format: Electronic Resources<br/>Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and businessent://SD_ILS/0/SD_ILS:22963282024-09-24T03:13:54Z2024-09-24T03:13:54Zby Laykin, Erik.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118235225/?ar">https://go.oreilly.com/library-access/library/view/-/9781118235225/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118235225/?ar">https://learning.oreilly.com/library/view/~/9781118235225/?ar</a><br/>Format: Electronic Resources<br/>Professional C programming LiveLessonsent://SD_ILS/0/SD_ILS:22963432024-09-24T03:13:54Z2024-09-24T03:13:54Zby Seacord, Robert C.<br/><a href="https://learning.oreilly.com/videos/~/9780133123364/?ar">https://learning.oreilly.com/videos/~/9780133123364/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133123364/?ar">https://go.oreilly.com/library-access/library/view/-/9780133123364/?ar</a><br/>Format: Electronic Resources<br/>FISMA and the risk management framework : the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:22966152024-09-24T03:13:54Z2024-09-24T03:13:54Zby Gantz, Stephen D.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496414">https://learning.oreilly.com/library/view/~/9781597496414</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496414/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496414/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496414/?ar">https://learning.oreilly.com/library/view/~/9781597496414/?ar</a><br/>Format: Electronic Resources<br/>Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:22966162024-09-24T03:13:54Z2024-09-24T03:13:54Zby Raggo, Michael T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format: Electronic Resources<br/>Logging and log management : the authoritative guide to understanding the concepts surrounding logging and log managementent://SD_ILS/0/SD_ILS:22968512024-09-24T03:13:54Z2024-09-24T03:13:54Zby Chuvakin, Anton A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496353/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496353/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496353/?ar">https://learning.oreilly.com/library/view/~/9781597496353/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496353">https://learning.oreilly.com/library/view/~/9781597496353</a><br/>Format: Electronic Resources<br/>Pro ASP.NET web API security : securing ASP.NET web APIent://SD_ILS/0/SD_ILS:22986142024-09-24T03:13:54Z2024-09-24T03:13:54Zby Lakshmiraghavan, Badrinarayanan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430257820/?ar">https://go.oreilly.com/library-access/library/view/-/9781430257820/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430257820/?ar">https://learning.oreilly.com/library/view/~/9781430257820/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430257820">https://learning.oreilly.com/library/view/~/9781430257820</a><br/>Format: Electronic Resources<br/>The hacker's guide to OS X : exploiting OS X from the root-upent://SD_ILS/0/SD_ILS:22985312024-09-24T03:13:54Z2024-09-24T03:13:54Zby Bathurst, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499507">https://learning.oreilly.com/library/view/~/9781597499507</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499507/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499507/?ar">https://learning.oreilly.com/library/view/~/9781597499507/?ar</a><br/>Format: Electronic Resources<br/>Web Application Defender's Cookbook : Battling Hackers and Protecting Users.ent://SD_ILS/0/SD_ILS:22984532024-09-24T03:13:54Z2024-09-24T03:13:54Zby Barnett, Ryan C.<br/><a href="https://learning.oreilly.com/library/view/~/9781118417058/?ar">https://learning.oreilly.com/library/view/~/9781118417058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar">https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118417058">https://learning.oreilly.com/library/view/~/9781118417058</a><br/>Format: Electronic Resources<br/>Enterprise security : a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterpriseent://SD_ILS/0/SD_ILS:23012512024-09-24T03:13:54Z2024-09-24T03:13:54Zby Woody, Aaron.<br/><a href="https://learning.oreilly.com/library/view/~/9781849685962/?ar">https://learning.oreilly.com/library/view/~/9781849685962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849685962/?ar">https://go.oreilly.com/library-access/library/view/-/9781849685962/?ar</a><br/>Format: Electronic Resources<br/>Learning PHP securityent://SD_ILS/0/SD_ILS:23014382024-09-24T03:13:54Z2024-09-24T03:13:54Zby Bierer, Doug.<br/><a href="https://learning.oreilly.com/videos/~/9781771371636/?ar">https://learning.oreilly.com/videos/~/9781771371636/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771371636/?ar">https://go.oreilly.com/library-access/library/view/-/9781771371636/?ar</a><br/>Format: Electronic Resources<br/>An Introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:23013392024-09-24T03:13:54Z2024-09-24T03:13:54Zby Watkins, Steve G.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285278/?ar">https://learning.oreilly.com/library/view/~/9781849285278/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285278/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285278/?ar</a><br/>Format: Electronic Resources<br/>Practical anonymity : hiding in plain sight onlineent://SD_ILS/0/SD_ILS:22995152024-09-24T03:13:54Z2024-09-24T03:13:54Zby Loshin, Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar">https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124104044/?ar">https://learning.oreilly.com/library/view/~/9780124104044/?ar</a><br/>Format: Electronic Resources<br/>The Basics of Hacking and Penetration Testing : Ethical Hacking and Penetration Testing Made Easyent://SD_ILS/0/SD_ILS:22995202024-09-24T03:13:54Z2024-09-24T03:13:54Zby Engebretson, Patrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar">https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124116443/?ar">https://learning.oreilly.com/library/view/~/9780124116443/?ar</a><br/>Format: Electronic Resources<br/>Windows Server 2012 security from end to edge and beyond : architecting, designing, planning, and deploying Windows Server 2012 security solutionsent://SD_ILS/0/SD_ILS:22996622024-09-24T03:13:54Z2024-09-24T03:13:54Zby Shinder, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499804">https://learning.oreilly.com/library/view/~/9781597499804</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499804/?ar">https://learning.oreilly.com/library/view/~/9781597499804/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499804/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499804/?ar</a><br/>Format: Electronic Resources<br/>Getting started with FortiGate : simplify and protect your network using the FortiGate network security applicanceent://SD_ILS/0/SD_ILS:23009402024-09-24T03:13:54Z2024-09-24T03:13:54Zby Fabbri, Rosato.<br/><a href="https://learning.oreilly.com/library/view/~/9781782178200">https://learning.oreilly.com/library/view/~/9781782178200</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782178200/?ar">https://go.oreilly.com/library-access/library/view/-/9781782178200/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782178200/?ar">https://learning.oreilly.com/library/view/~/9781782178200/?ar</a><br/>Format: Electronic Resources<br/>Computer forensics : infoSec Pro guideent://SD_ILS/0/SD_ILS:22991542024-09-24T03:13:54Z2024-09-24T03:13:54Zby Cowen, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780071742450">https://learning.oreilly.com/library/view/~/9780071742450</a>
<a href="https://learning.oreilly.com/library/view/~/9780071742450/?ar">https://learning.oreilly.com/library/view/~/9780071742450/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071742450/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742450/?ar</a><br/>Format: Electronic Resources<br/>Security for Linux on System zent://SD_ILS/0/SD_ILS:23018722024-09-24T03:13:54Z2024-09-24T03:13:54Zby Parziale, Lydia.<br/><a href="https://learning.oreilly.com/library/view/~/0738437549/?ar">https://learning.oreilly.com/library/view/~/0738437549/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738437549/?ar">https://go.oreilly.com/library-access/library/view/-/0738437549/?ar</a><br/>Format: Electronic Resources<br/>Android security essentials LiveLessons : (sneak peek video training)ent://SD_ILS/0/SD_ILS:23023492024-09-24T03:13:54Z2024-09-24T03:13:54Zby Nolan, Godfrey.<br/><a href="https://learning.oreilly.com/videos/~/9780133829266/?ar">https://learning.oreilly.com/videos/~/9780133829266/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133829266/?ar">https://go.oreilly.com/library-access/library/view/-/9780133829266/?ar</a><br/>Format: Electronic Resources<br/>Cyber Security and IT Infrastructure Protection.ent://SD_ILS/0/SD_ILS:12619622024-09-24T03:13:54Z2024-09-24T03:13:54Zby Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1377640">Click to View</a><br/>Format: Electronic Resources<br/>Safety Management of Software-based Equipment.ent://SD_ILS/0/SD_ILS:12579252024-09-24T03:13:54Z2024-09-24T03:13:54Zby Boulanger, Jean-Louis.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1187169">Click to View</a><br/>Format: Electronic Resources<br/>Investigative Computer Forensics : The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives.ent://SD_ILS/0/SD_ILS:12359582024-09-24T03:13:54Z2024-09-24T03:13:54Zby Laykin, Erik.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=817953">Click to View</a><br/>Format: Electronic Resources<br/>Information protection playbookent://SD_ILS/0/SD_ILS:22065832024-09-24T03:13:54Z2024-09-24T03:13:54Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418381">Click to View</a><br/>Format: Electronic Resources<br/>Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutionsent://SD_ILS/0/SD_ILS:22061642024-09-24T03:13:54Z2024-09-24T03:13:54Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115164">Click to View</a><br/>Format: Electronic Resources<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:22062162024-09-24T03:13:54Z2024-09-24T03:13:54Zby Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1133729">Click to View</a><br/>Format: Electronic Resources<br/>Logging and log management the authoritative guide to understanding the concepts surrounding logging and log managementent://SD_ILS/0/SD_ILS:22060602024-09-24T03:13:54Z2024-09-24T03:13:54Zby Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1077419">Click to View</a><br/>Format: Electronic Resources<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:22061652024-09-24T03:13:54Z2024-09-24T03:13:54Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115167">Click to View</a><br/>Format: Electronic Resources<br/>Simple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:22061692024-09-24T03:13:54Z2024-09-24T03:13:54Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115182">Click to View</a><br/>Format: Electronic Resources<br/>Linux malware incident response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:22061712024-09-24T03:13:54Z2024-09-24T03:13:54Zby Malin, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115185">Click to View</a><br/>Format: Electronic Resources<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:22060052024-09-24T03:13:54Z2024-09-24T03:13:54Zby Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1047930">Click to View</a><br/>Format: Electronic Resources<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:22060252024-09-24T03:13:54Z2024-09-24T03:13:54Zby Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1058152">Click to View</a><br/>Format: Electronic Resources<br/>Technocrime, policing and surveillanceent://SD_ILS/0/SD_ILS:21281282024-09-24T03:13:54Z2024-09-24T03:13:54Zby Leman-Langlois, Stéphane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1016143">Click to View</a><br/>Format: Electronic Resources<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:21293362024-09-24T03:13:54Z2024-09-24T03:13:54Zby Baker, Paul R., 1958-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1112600">Click to View</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:21298472024-09-24T03:13:54Z2024-09-24T03:13:54Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1153198">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security for educational leaders a guide to understanding and implementing technology policiesent://SD_ILS/0/SD_ILS:21297052024-09-24T03:13:54Z2024-09-24T03:13:54Zby Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1143733">Click to View</a><br/>Format: Electronic Resources<br/>Sicherheit in kommunikationsnetzenent://SD_ILS/0/SD_ILS:21423122024-09-24T03:13:54Z2024-09-24T03:13:54Zby Sorge, Christoph.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1524463">Click to View</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:21549082024-09-24T03:13:54Z2024-09-24T03:13:54Zby Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463578">Click to View</a><br/>Format: Electronic Resources<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:21549092024-09-24T03:13:54Z2024-09-24T03:13:54Zby Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463579">Click to View</a><br/>Format: Electronic Resources<br/>Developing and evaluating security-aware software systemsent://SD_ILS/0/SD_ILS:4763732024-09-24T03:13:54Z2024-09-24T03:13:54Zby Khan, Khaled M., 1959- editor.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/</a><br/>Format: Electronic Resources<br/>Enterprise Security a Data-Centric Approach to Securing the Enterprise.ent://SD_ILS/0/SD_ILS:4763862024-09-24T03:13:54Z2024-09-24T03:13:54Zby Woody, Aaron.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpESADCAS1/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpESADCAS1/viewerType:toc/</a><br/>Format: Electronic Resources<br/>The complete book of data anonymization : from planning to implementationent://SD_ILS/0/SD_ILS:4098302024-09-24T03:13:54Z2024-09-24T03:13:54Zby Raghunathan, Balaji, author.<br/>Format: Books<br/>Afet durumunda kamuda veri güvenliğient://SD_ILS/0/SD_ILS:4304932024-09-24T03:13:54Z2024-09-24T03:13:54Zby İstanbul İl Özel İdaresi<br/>Format: Books<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:4682522024-09-24T03:13:54Z2024-09-24T03:13:54Zby Elbahadır, Hamza, author.<br/>Format: Books<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocolsent://SD_ILS/0/SD_ILS:22060432024-09-24T03:13:54Z2024-09-24T03:13:54Zby Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073014">Click to View</a><br/>Format: Electronic Resources<br/>The dark side of personalization online privacy concerns influence customer behaviorent://SD_ILS/0/SD_ILS:22379762024-09-24T03:13:54Z2024-09-24T03:13:54Zby Ziesak, Jörg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1324048">Click to View</a><br/>Format: Electronic Resources<br/>Federated identity primerent://SD_ILS/0/SD_ILS:22966982024-09-24T03:13:54Z2024-09-24T03:13:54Zby Rountree, Derrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar">https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124071896/?ar">https://learning.oreilly.com/library/view/~/9780124071896/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124071896">https://learning.oreilly.com/library/view/~/9780124071896</a><br/>Format: Electronic Resources<br/>Malware, rootkits & botnets : a beginner's guideent://SD_ILS/0/SD_ILS:22973802024-09-24T03:13:54Z2024-09-24T03:13:54Zby Elisan, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780071792066">https://learning.oreilly.com/library/view/~/9780071792066</a>
<a href="https://learning.oreilly.com/library/view/~/9780071792066/?ar">https://learning.oreilly.com/library/view/~/9780071792066/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar">https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar</a><br/>Format: Electronic Resources<br/>