Search Results for - Narrowed by: 2013 - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2024-09-24T03:13:54Z Computer incident response and forensics team management : conducting a successful incident response ent://SD_ILS/0/SD_ILS:2300670 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Johnson, Leighton, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499965/?ar">https://learning.oreilly.com/library/view/~/9781597499965/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499965">https://learning.oreilly.com/library/view/~/9781597499965</a><br/>Format:&#160;Electronic Resources<br/> Introduction to computer and network security : navigating shades of gray ent://SD_ILS/0/SD_ILS:2313482 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format:&#160;Electronic Resources<br/> Discrete dynamical systems and chaotic machines : theory and applications ent://SD_ILS/0/SD_ILS:2299055 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Bahi, Jacques Mohcine, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466554511">https://learning.oreilly.com/library/view/~/9781466554511</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466554511/?ar">https://go.oreilly.com/library-access/library/view/-/9781466554511/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466554511/?ar">https://learning.oreilly.com/library/view/~/9781466554511/?ar</a><br/>Format:&#160;Electronic Resources<br/> Expert Oracle application express security ent://SD_ILS/0/SD_ILS:2299064 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Spendolini, Scott.<br/><a href="https://learning.oreilly.com/library/view/~/9781430247319/?ar">https://learning.oreilly.com/library/view/~/9781430247319/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430247319/?ar">https://go.oreilly.com/library-access/library/view/-/9781430247319/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430247319">https://learning.oreilly.com/library/view/~/9781430247319</a><br/>Format:&#160;Electronic Resources<br/> Secure coding in C and C++ ent://SD_ILS/0/SD_ILS:2299223 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Seacord, Robert C.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132981989/?ar">https://go.oreilly.com/library-access/library/view/-/9780132981989/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132981989/?ar">https://learning.oreilly.com/library/view/~/9780132981989/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nine steps to success : an ISO27001:2013 implementation overview ent://SD_ILS/0/SD_ILS:2300436 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285117/?ar">https://learning.oreilly.com/library/view/~/9781849285117/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285117">https://learning.oreilly.com/library/view/~/9781849285117</a><br/>Format:&#160;Electronic Resources<br/> Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux ent://SD_ILS/0/SD_ILS:2300350 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Muniz, Joseph.<br/><a href="https://learning.oreilly.com/library/view/~/9781782163169">https://learning.oreilly.com/library/view/~/9781782163169</a> <a href="https://learning.oreilly.com/library/view/~/9781782163169/?ar">https://learning.oreilly.com/library/view/~/9781782163169/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar">https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security : the complete reference ent://SD_ILS/0/SD_ILS:2299885 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Rhodes-Ousley, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071784351/?ar">https://go.oreilly.com/library-access/library/view/-/9780071784351/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071784351/?ar">https://learning.oreilly.com/library/view/~/9780071784351/?ar</a><br/>Format:&#160;Electronic Resources<br/> Suits and spooks conference : attacks, threats, and defense in cyberspace : complete video compliation. ent://SD_ILS/0/SD_ILS:2301909 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z <a href="https://learning.oreilly.com/videos/~/9781491946435">https://learning.oreilly.com/videos/~/9781491946435</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar">https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491946435/?ar">https://learning.oreilly.com/videos/~/9781491946435/?ar</a><br/>Format:&#160;Electronic Resources<br/> Simple steps to data encryption : a practical guide to secure computing ent://SD_ILS/0/SD_ILS:2300410 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Loshin, Peter.<br/><a href="https://learning.oreilly.com/library/view/~/9780124114838">https://learning.oreilly.com/library/view/~/9780124114838</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124114838/?ar">https://go.oreilly.com/library-access/library/view/-/9780124114838/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124114838/?ar">https://learning.oreilly.com/library/view/~/9780124114838/?ar</a><br/>Format:&#160;Electronic Resources<br/> The PayPal official insider guide to internet security : spot scams and protect your online business ent://SD_ILS/0/SD_ILS:2297259 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Savage, Michelle.<br/><a href="https://learning.oreilly.com/library/view/~/9780133154573">https://learning.oreilly.com/library/view/~/9780133154573</a> <a href="https://learning.oreilly.com/library/view/~/9780133154573/?ar">https://learning.oreilly.com/library/view/~/9780133154573/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar">https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar</a><br/>Format:&#160;Electronic Resources<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:2297534 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Yang, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047020">https://learning.oreilly.com/library/view/~/9780124047020</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124047020/?ar">https://learning.oreilly.com/library/view/~/9780124047020/?ar</a><br/>Format:&#160;Electronic Resources<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:2297537 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Radvanovsky, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502260/?ar">https://learning.oreilly.com/library/view/~/9781466502260/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466502260">https://learning.oreilly.com/library/view/~/9781466502260</a><br/>Format:&#160;Electronic Resources<br/> Learning computer forensics ent://SD_ILS/0/SD_ILS:2298554 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Messier, Ric.<br/><a href="https://learning.oreilly.com/videos/~/9781771370615/?ar">https://learning.oreilly.com/videos/~/9781771370615/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:2298818 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9781118331743/?ar">https://learning.oreilly.com/library/view/~/9781118331743/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118331743/?ar">https://go.oreilly.com/library-access/library/view/-/9781118331743/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing risk and information security : protect to enable ent://SD_ILS/0/SD_ILS:2297326 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Harkins, Malcolm.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430251132/?ar">https://go.oreilly.com/library-access/library/view/-/9781430251132/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430251132">https://learning.oreilly.com/library/view/~/9781430251132</a> <a href="https://learning.oreilly.com/library/view/~/9781430251132/?ar">https://learning.oreilly.com/library/view/~/9781430251132/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2298336 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar">https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118380956/?ar">https://learning.oreilly.com/library/view/~/9781118380956/?ar</a><br/>Format:&#160;Electronic Resources<br/> Pragmatic security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:2297966 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Brotby, W. Krag.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881538/?ar">https://learning.oreilly.com/library/view/~/9781439881538/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheit Konzepte - Verfahren - Protokolle. ent://SD_ILS/0/SD_ILS:528105 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Eckert, Claudia.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=757549">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=757549</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Security : A Data-Centric Approach to Securing the Enterprise. ent://SD_ILS/0/SD_ILS:1252521 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Woody, Aaron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1103988">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Safety of Computer Architectures. ent://SD_ILS/0/SD_ILS:1253942 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Boulanger, Jean-Louis.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1120753">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM Mainframe Security : Beyond the Basics—A Practical Guide from a z/OS and RACF Perspective. ent://SD_ILS/0/SD_ILS:1262591 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Dattani, Dinesh D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1411689">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Patterns in Practice : Designing Secure Architectures Using Software Patterns. ent://SD_ILS/0/SD_ILS:1259817 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Fernandez-Buglioni, Eduardo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1245159">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Basics of IT Audit : Purposes, Processes, and Practical Information. ent://SD_ILS/0/SD_ILS:1264247 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Gantz, Stephen D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1550527">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with FortiGate. ent://SD_ILS/0/SD_ILS:1265007 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Fabbri, Rosato.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572901">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Instant Java Password and Authentication Security. ent://SD_ILS/0/SD_ILS:1265019 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Mayoral, Fernando.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572913">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data Visualization, Part 2 : New Directions for Evaluation, Number 140. ent://SD_ILS/0/SD_ILS:1265488 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Azzam, Tarek.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1579356">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web Application Defender's Cookbook : Battling Hackers and Protecting Users. ent://SD_ILS/0/SD_ILS:1252873 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Barnett, Ryan C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Social Media Security : Leveraging Social Networking While Mitigating Risk. ent://SD_ILS/0/SD_ILS:1253495 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Cross, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115173">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Using Social Media for Global Security. ent://SD_ILS/0/SD_ILS:1253670 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Gupta, Ravi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1118756">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Biohackers : The Politics of Open Science. ent://SD_ILS/0/SD_ILS:1322996 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Delfanti, Alessandro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3386719">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Convergence : Illicit Networks and National Security in the Age of Globalization. ent://SD_ILS/0/SD_ILS:1337572 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;(U.S.), National Defense University.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3571653">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:2051712 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073021">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics for handheld devices ent://SD_ILS/0/SD_ILS:2295476 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Doherty, Eamon P.<br/><a href="https://learning.oreilly.com/library/view/~/9781439898789/?ar">https://learning.oreilly.com/library/view/~/9781439898789/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439898789">https://learning.oreilly.com/library/view/~/9781439898789</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439898789/?ar">https://go.oreilly.com/library-access/library/view/-/9781439898789/?ar</a><br/>Format:&#160;Electronic Resources<br/> Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:2296624 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;O'Connor, T. J.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499576/?ar">https://learning.oreilly.com/library/view/~/9781597499576/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499576">https://learning.oreilly.com/library/view/~/9781597499576</a><br/>Format:&#160;Electronic Resources<br/> Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business ent://SD_ILS/0/SD_ILS:2296328 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Laykin, Erik.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118235225/?ar">https://go.oreilly.com/library-access/library/view/-/9781118235225/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118235225/?ar">https://learning.oreilly.com/library/view/~/9781118235225/?ar</a><br/>Format:&#160;Electronic Resources<br/> Professional C programming LiveLessons ent://SD_ILS/0/SD_ILS:2296343 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Seacord, Robert C.<br/><a href="https://learning.oreilly.com/videos/~/9780133123364/?ar">https://learning.oreilly.com/videos/~/9780133123364/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133123364/?ar">https://go.oreilly.com/library-access/library/view/-/9780133123364/?ar</a><br/>Format:&#160;Electronic Resources<br/> FISMA and the risk management framework : the new practice of federal cyber security ent://SD_ILS/0/SD_ILS:2296615 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Gantz, Stephen D.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496414">https://learning.oreilly.com/library/view/~/9781597496414</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496414/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496414/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496414/?ar">https://learning.oreilly.com/library/view/~/9781597496414/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:2296616 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Raggo, Michael T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format:&#160;Electronic Resources<br/> Logging and log management : the authoritative guide to understanding the concepts surrounding logging and log management ent://SD_ILS/0/SD_ILS:2296851 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Chuvakin, Anton A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496353/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496353/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496353/?ar">https://learning.oreilly.com/library/view/~/9781597496353/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496353">https://learning.oreilly.com/library/view/~/9781597496353</a><br/>Format:&#160;Electronic Resources<br/> Pro ASP.NET web API security : securing ASP.NET web API ent://SD_ILS/0/SD_ILS:2298614 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Lakshmiraghavan, Badrinarayanan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430257820/?ar">https://go.oreilly.com/library-access/library/view/-/9781430257820/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430257820/?ar">https://learning.oreilly.com/library/view/~/9781430257820/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430257820">https://learning.oreilly.com/library/view/~/9781430257820</a><br/>Format:&#160;Electronic Resources<br/> The hacker's guide to OS X : exploiting OS X from the root-up ent://SD_ILS/0/SD_ILS:2298531 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Bathurst, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499507">https://learning.oreilly.com/library/view/~/9781597499507</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499507/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499507/?ar">https://learning.oreilly.com/library/view/~/9781597499507/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web Application Defender's Cookbook : Battling Hackers and Protecting Users. ent://SD_ILS/0/SD_ILS:2298453 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Barnett, Ryan C.<br/><a href="https://learning.oreilly.com/library/view/~/9781118417058/?ar">https://learning.oreilly.com/library/view/~/9781118417058/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar">https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118417058">https://learning.oreilly.com/library/view/~/9781118417058</a><br/>Format:&#160;Electronic Resources<br/> Enterprise security : a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise ent://SD_ILS/0/SD_ILS:2301251 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Woody, Aaron.<br/><a href="https://learning.oreilly.com/library/view/~/9781849685962/?ar">https://learning.oreilly.com/library/view/~/9781849685962/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849685962/?ar">https://go.oreilly.com/library-access/library/view/-/9781849685962/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning PHP security ent://SD_ILS/0/SD_ILS:2301438 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Bierer, Doug.<br/><a href="https://learning.oreilly.com/videos/~/9781771371636/?ar">https://learning.oreilly.com/videos/~/9781771371636/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781771371636/?ar">https://go.oreilly.com/library-access/library/view/-/9781771371636/?ar</a><br/>Format:&#160;Electronic Resources<br/> An Introduction to information security and ISO27001:2013 : a pocket guide ent://SD_ILS/0/SD_ILS:2301339 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Watkins, Steve G.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285278/?ar">https://learning.oreilly.com/library/view/~/9781849285278/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285278/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285278/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical anonymity : hiding in plain sight online ent://SD_ILS/0/SD_ILS:2299515 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Loshin, Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar">https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124104044/?ar">https://learning.oreilly.com/library/view/~/9780124104044/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Basics of Hacking and Penetration Testing : Ethical Hacking and Penetration Testing Made Easy ent://SD_ILS/0/SD_ILS:2299520 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Engebretson, Patrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar">https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124116443/?ar">https://learning.oreilly.com/library/view/~/9780124116443/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2012 security from end to edge and beyond : architecting, designing, planning, and deploying Windows Server 2012 security solutions ent://SD_ILS/0/SD_ILS:2299662 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Shinder, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499804">https://learning.oreilly.com/library/view/~/9781597499804</a> <a href="https://learning.oreilly.com/library/view/~/9781597499804/?ar">https://learning.oreilly.com/library/view/~/9781597499804/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499804/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499804/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with FortiGate : simplify and protect your network using the FortiGate network security applicance ent://SD_ILS/0/SD_ILS:2300940 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Fabbri, Rosato.<br/><a href="https://learning.oreilly.com/library/view/~/9781782178200">https://learning.oreilly.com/library/view/~/9781782178200</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782178200/?ar">https://go.oreilly.com/library-access/library/view/-/9781782178200/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782178200/?ar">https://learning.oreilly.com/library/view/~/9781782178200/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics : infoSec Pro guide ent://SD_ILS/0/SD_ILS:2299154 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Cowen, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780071742450">https://learning.oreilly.com/library/view/~/9780071742450</a> <a href="https://learning.oreilly.com/library/view/~/9780071742450/?ar">https://learning.oreilly.com/library/view/~/9780071742450/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071742450/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742450/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security for Linux on System z ent://SD_ILS/0/SD_ILS:2301872 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Parziale, Lydia.<br/><a href="https://learning.oreilly.com/library/view/~/0738437549/?ar">https://learning.oreilly.com/library/view/~/0738437549/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738437549/?ar">https://go.oreilly.com/library-access/library/view/-/0738437549/?ar</a><br/>Format:&#160;Electronic Resources<br/> Android security essentials LiveLessons : (sneak peek video training) ent://SD_ILS/0/SD_ILS:2302349 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Nolan, Godfrey.<br/><a href="https://learning.oreilly.com/videos/~/9780133829266/?ar">https://learning.oreilly.com/videos/~/9780133829266/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133829266/?ar">https://go.oreilly.com/library-access/library/view/-/9780133829266/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and IT Infrastructure Protection. ent://SD_ILS/0/SD_ILS:1261962 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1377640">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Safety Management of Software-based Equipment. ent://SD_ILS/0/SD_ILS:1257925 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Boulanger, Jean-Louis.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1187169">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Investigative Computer Forensics : The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives. ent://SD_ILS/0/SD_ILS:1235958 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Laykin, Erik.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=817953">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:2206583 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418381">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions ent://SD_ILS/0/SD_ILS:2206164 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115164">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:2206216 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1133729">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Logging and log management the authoritative guide to understanding the concepts surrounding logging and log management ent://SD_ILS/0/SD_ILS:2206060 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1077419">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:2206165 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Simple steps to data encryption a practical guide to secure computing ent://SD_ILS/0/SD_ILS:2206169 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115182">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Linux malware incident response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware forensics field guide for Linux systems ent://SD_ILS/0/SD_ILS:2206171 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Malin, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115185">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:2206005 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1047930">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:2206025 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1058152">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Technocrime, policing and surveillance ent://SD_ILS/0/SD_ILS:2128128 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Leman-Langlois, St&eacute;phane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1016143">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:2129336 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Baker, Paul R., 1958-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1112600">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Pragmatic security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:2129847 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1153198">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber security for educational leaders a guide to understanding and implementing technology policies ent://SD_ILS/0/SD_ILS:2129705 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1143733">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Sicherheit in kommunikationsnetzen ent://SD_ILS/0/SD_ILS:2142312 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Sorge, Christoph.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1524463">Click to View</a><br/>Format:&#160;Electronic Resources<br/> An introduction to information security and ISO27001:2013 : a pocket guide ent://SD_ILS/0/SD_ILS:2154908 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463578">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 / ISO27002 : a pocket guide ent://SD_ILS/0/SD_ILS:2154909 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463579">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Developing and evaluating security-aware software systems ent://SD_ILS/0/SD_ILS:476373 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Khan, Khaled M., 1959- editor.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Security a Data-Centric Approach to Securing the Enterprise. ent://SD_ILS/0/SD_ILS:476386 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Woody, Aaron.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpESADCAS1/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpESADCAS1/viewerType:toc/</a><br/>Format:&#160;Electronic Resources<br/> The complete book of data anonymization : from planning to implementation ent://SD_ILS/0/SD_ILS:409830 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Raghunathan, Balaji, author.<br/>Format:&#160;Books<br/> Afet durumunda kamuda veri g&uuml;venliği ent://SD_ILS/0/SD_ILS:430493 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;İstanbul İl &Ouml;zel İdaresi<br/>Format:&#160;Books<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:468252 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Elbahadır, Hamza, author.<br/>Format:&#160;Books<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols ent://SD_ILS/0/SD_ILS:2206043 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073014">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The dark side of personalization online privacy concerns influence customer behavior ent://SD_ILS/0/SD_ILS:2237976 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Ziesak, J&ouml;rg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1324048">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:2296698 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Rountree, Derrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar">https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124071896/?ar">https://learning.oreilly.com/library/view/~/9780124071896/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124071896">https://learning.oreilly.com/library/view/~/9780124071896</a><br/>Format:&#160;Electronic Resources<br/> Malware, rootkits &amp; botnets : a beginner's guide ent://SD_ILS/0/SD_ILS:2297380 2024-09-24T03:13:54Z 2024-09-24T03:13:54Z by&#160;Elisan, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780071792066">https://learning.oreilly.com/library/view/~/9780071792066</a> <a href="https://learning.oreilly.com/library/view/~/9780071792066/?ar">https://learning.oreilly.com/library/view/~/9780071792066/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar">https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar</a><br/>Format:&#160;Electronic Resources<br/>