Search Results for - Narrowed by: 2014 - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2024-06-20T20:50:22ZHacking Point of Sale : Payment Application Secrets, Threats, and Solutions.ent://SD_ILS/0/SD_ILS:12679142024-06-20T20:50:22Z2024-06-20T20:50:22Zby Gomzin, Slava.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1629175">Click to View</a><br/>Format: Electronic Resources<br/>Threat Modeling : Designing for Security.ent://SD_ILS/0/SD_ILS:12679162024-06-20T20:50:22Z2024-06-20T20:50:22Zby Shostack, Adam.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1629177">Click to View</a><br/>Format: Electronic Resources<br/>Computer Forensics with FTK.ent://SD_ILS/0/SD_ILS:12695842024-06-20T20:50:22Z2024-06-20T20:50:22Zby Carbone, Fernando.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1657797">Click to View</a><br/>Format: Electronic Resources<br/>Best Practices in Computer Network Defense : Incident Detection and Response.ent://SD_ILS/0/SD_ILS:12684532024-06-20T20:50:22Z2024-06-20T20:50:22Zby Hathaway, M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1637648">Click to View</a><br/>Format: Electronic Resources<br/>Detection and Intelligent Systems for Homeland Security.ent://SD_ILS/0/SD_ILS:12665142024-06-20T20:50:22Z2024-06-20T20:50:22Zby Voeller, John G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1598817">Click to View</a><br/>Format: Electronic Resources<br/>Security Using Data Analysis, Visualization, and Dashboards : Analysis, Visualization and Dashboards.ent://SD_ILS/0/SD_ILS:12666662024-06-20T20:50:22Z2024-06-20T20:50:22Zby Jacobs, Jay.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1599321">Click to View</a><br/>Format: Electronic Resources<br/>The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory.ent://SD_ILS/0/SD_ILS:12739522024-06-20T20:50:22Z2024-06-20T20:50:22Zby Hale Ligh, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1740753">Click to View</a><br/>Format: Electronic Resources<br/>Understanding Bitcoin : Cryptography, Engineering and Economics.ent://SD_ILS/0/SD_ILS:12777492024-06-20T20:50:22Z2024-06-20T20:50:22Zby Franco, Pedro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1823060">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux Network Scanning Cookbook.ent://SD_ILS/0/SD_ILS:12757822024-06-20T20:50:22Z2024-06-20T20:50:22Zby Hutchens, Justin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1771381">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Blockades.ent://SD_ILS/0/SD_ILS:12769992024-06-20T20:50:22Z2024-06-20T20:50:22Zby Russell, Alison Lawlor.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1810129">Click to View</a><br/>Format: Electronic Resources<br/>Iste : Chinese Cybersecurity and Cyberdefense.ent://SD_ILS/0/SD_ILS:12754012024-06-20T20:50:22Z2024-06-20T20:50:22Zby Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1765106">Click to View</a><br/>Format: Electronic Resources<br/>Cloud Management and Security.ent://SD_ILS/0/SD_ILS:12725982024-06-20T20:50:22Z2024-06-20T20:50:22Zby Abbadi, Imad M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1701403">Click to View</a><br/>Format: Electronic Resources<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013.ent://SD_ILS/0/SD_ILS:12745852024-06-20T20:50:22Z2024-06-20T20:50:22Zby Furnell, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1752831">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux CTF Blueprints.ent://SD_ILS/0/SD_ILS:12720992024-06-20T20:50:22Z2024-06-20T20:50:22Zby Buchanan, Cameron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1688607">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Threat! : How to Manage the Growing Risk of Cyber Attacks.ent://SD_ILS/0/SD_ILS:12741262024-06-20T20:50:22Z2024-06-20T20:50:22Zby Ulsch, MacDonnell.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1742833">Click to View</a><br/>Format: Electronic Resources<br/>Android Hacker's Handbook.ent://SD_ILS/0/SD_ILS:12698772024-06-20T20:50:22Z2024-06-20T20:50:22Zby Drake, Joshua J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1662701">Click to View</a><br/>Format: Electronic Resources<br/>Implementing NetScaler VPX™.ent://SD_ILS/0/SD_ILS:12703992024-06-20T20:50:22Z2024-06-20T20:50:22Zby Sandbu, Marius.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1674868">Click to View</a><br/>Format: Electronic Resources<br/>Cyber blockadesent://SD_ILS/0/SD_ILS:5279062024-06-20T20:50:22Z2024-06-20T20:50:22Zby Russell, Alison Lawlor, author.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030</a><br/>Format: Electronic Resources<br/>Measurement of javascript applications' readiness to untrusted data using bayesian networksent://SD_ILS/0/SD_ILS:4683082024-06-20T20:50:22Z2024-06-20T20:50:22Zby Ufuktepe, Ekincan, author.<br/><a href="http://hdl.handle.net/11147/4249">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Core software security : security at the sourceent://SD_ILS/0/SD_ILS:21316112024-06-20T20:50:22Z2024-06-20T20:50:22Zby Ransome, James.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1547083">Click to View</a><br/>Format: Electronic Resources<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:21108552024-06-20T20:50:22Z2024-06-20T20:50:22Zby Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192124">Click to View</a><br/>Format: Electronic Resources<br/>Security leader insights for information protection : lessons and strategies from leading security professionalsent://SD_ILS/0/SD_ILS:22074672024-06-20T20:50:22Z2024-06-20T20:50:22Zby Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699254">Click to View</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:22074682024-06-20T20:50:22Z2024-06-20T20:50:22Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699255">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:22072932024-06-20T20:50:22Z2024-06-20T20:50:22Zby Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1659012">Click to View</a><br/>Format: Electronic Resources<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:22067942024-06-20T20:50:22Z2024-06-20T20:50:22Zby Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1574451">Click to View</a><br/>Format: Electronic Resources<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:22073392024-06-20T20:50:22Z2024-06-20T20:50:22Zby Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1675198">Click to View</a><br/>Format: Electronic Resources<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:22703482024-06-20T20:50:22Z2024-06-20T20:50:22Zby Stapleton, Jeffrey James, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1538312">Click to View</a><br/>Format: Electronic Resources<br/>Security for service oriented architecturesent://SD_ILS/0/SD_ILS:22703852024-06-20T20:50:22Z2024-06-20T20:50:22Zby Williams, Walter (Telecommunications engineer), author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1564631">Click to View</a><br/>Format: Electronic Resources<br/>Datennutzungs- und datenschutzverträge : muster, klauseln, erläuterungenent://SD_ILS/0/SD_ILS:21191022024-06-20T20:50:22Z2024-06-20T20:50:22Zby Moos, Flemming, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2129586">Click to View</a><br/>Format: Electronic Resources<br/>Cyber essentials : a pocket guideent://SD_ILS/0/SD_ILS:21107262024-06-20T20:50:22Z2024-06-20T20:50:22Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1778769">Click to View</a><br/>Format: Electronic Resources<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:22067902024-06-20T20:50:22Z2024-06-20T20:50:22Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1573362">Click to View</a><br/>Format: Electronic Resources<br/>Burp suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the jobent://SD_ILS/0/SD_ILS:22243442024-06-20T20:50:22Z2024-06-20T20:50:22Zby Mahajan, Akash, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1879299">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:23025922024-06-20T20:50:22Z2024-06-20T20:50:22Zby Carvey, Harlan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124171572/?ar">https://learning.oreilly.com/library/view/~/9780124171572/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar</a><br/>Format: Electronic Resources<br/>Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscationent://SD_ILS/0/SD_ILS:23026252024-06-20T20:50:22Z2024-06-20T20:50:22Zby Dang, Bruce, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118787397/?ar">https://learning.oreilly.com/library/view/~/9781118787397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar">https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118787397">https://learning.oreilly.com/library/view/~/9781118787397</a><br/>Format: Electronic Resources<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:23026262024-06-20T20:50:22Z2024-06-20T20:50:22Zby Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format: Electronic Resources<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:23031052024-06-20T20:50:22Z2024-06-20T20:50:22Zby Messier, Ric.<br/><a href="https://learning.oreilly.com/library/view/~/9780124170407/?ar">https://learning.oreilly.com/library/view/~/9780124170407/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar">https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar</a><br/>Format: Electronic Resources<br/>Platform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engineent://SD_ILS/0/SD_ILS:23042752024-06-20T20:50:22Z2024-06-20T20:50:22Zby Ruan, Xiaoyu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265726/?ar">https://learning.oreilly.com/library/view/~/9781430265726/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430265726">https://learning.oreilly.com/library/view/~/9781430265726</a><br/>Format: Electronic Resources<br/>Advanced API security : securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWEent://SD_ILS/0/SD_ILS:23042762024-06-20T20:50:22Z2024-06-20T20:50:22Zby Siriwardena, Prabath, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430268178">https://learning.oreilly.com/library/view/~/9781430268178</a>
<a href="https://learning.oreilly.com/library/view/~/9781430268178/?ar">https://learning.oreilly.com/library/view/~/9781430268178/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430268178/?ar">https://go.oreilly.com/library-access/library/view/-/9781430268178/?ar</a><br/>Format: Electronic Resources<br/>10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacyent://SD_ILS/0/SD_ILS:23048612024-06-20T20:50:22Z2024-06-20T20:50:22Zby Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format: Electronic Resources<br/>Incident response & computer forensicsent://SD_ILS/0/SD_ILS:23048742024-06-20T20:50:22Z2024-06-20T20:50:22Zby Luttgens, Jason T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071798686/?ar">https://go.oreilly.com/library-access/library/view/-/9780071798686/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071798686/?ar">https://learning.oreilly.com/library/view/~/9780071798686/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071798686">https://learning.oreilly.com/library/view/~/9780071798686</a><br/>Format: Electronic Resources<br/>Information Risk Management : a Practitioner's Guideent://SD_ILS/0/SD_ILS:23052412024-06-20T20:50:22Z2024-06-20T20:50:22Zby Sutton, David (Information security practitioner), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780172651">https://learning.oreilly.com/library/view/~/9781780172651</a>
<a href="https://learning.oreilly.com/library/view/~/9781780172651/?ar">https://learning.oreilly.com/library/view/~/9781780172651/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780172651/?ar">https://go.oreilly.com/library-access/library/view/-/9781780172651/?ar</a><br/>Format: Electronic Resources<br/>Optimizing IEEE 802.11i resource and security essentials : for mobile and stationary devicesent://SD_ILS/0/SD_ILS:23054462024-06-20T20:50:22Z2024-06-20T20:50:22Zby Naraei, Parisa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128022221/?ar">https://go.oreilly.com/library-access/library/view/-/9780128022221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128022221">https://learning.oreilly.com/library/view/~/9780128022221</a>
<a href="https://learning.oreilly.com/library/view/~/9780128022221/?ar">https://learning.oreilly.com/library/view/~/9780128022221/?ar</a><br/>Format: Electronic Resources<br/>Mastering Windows Server 2012 R2ent://SD_ILS/0/SD_ILS:23011522024-06-20T20:50:22Z2024-06-20T20:50:22Zby Minasi, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar">https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118289426/?ar">https://learning.oreilly.com/library/view/~/9781118289426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118289426">https://learning.oreilly.com/library/view/~/9781118289426</a><br/>Format: Electronic Resources<br/>Data-Driven Security : Analysis, Visualization and Dashboards.ent://SD_ILS/0/SD_ILS:23015562024-06-20T20:50:22Z2024-06-20T20:50:22Zby Jacobs, Jay (Data analyst)<br/><a href="https://learning.oreilly.com/library/view/~/9781118793824">https://learning.oreilly.com/library/view/~/9781118793824</a>
<a href="https://learning.oreilly.com/library/view/~/9781118793824/?ar">https://learning.oreilly.com/library/view/~/9781118793824/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar">https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar</a><br/>Format: Electronic Resources<br/>Official (ISC)2 guide to the CSSLP CBKent://SD_ILS/0/SD_ILS:23003032024-06-20T20:50:22Z2024-06-20T20:50:22Zby Paul, Mano.<br/><a href="https://learning.oreilly.com/library/view/~/9781466571273">https://learning.oreilly.com/library/view/~/9781466571273</a>
<a href="https://learning.oreilly.com/library/view/~/9781466571273/?ar">https://learning.oreilly.com/library/view/~/9781466571273/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar">https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar</a><br/>Format: Electronic Resources<br/>Core software security : security at the sourceent://SD_ILS/0/SD_ILS:23016412024-06-20T20:50:22Z2024-06-20T20:50:22Zby Ransome, James F., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466560963">https://learning.oreilly.com/library/view/~/9781466560963</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar">https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466560963/?ar">https://learning.oreilly.com/library/view/~/9781466560963/?ar</a><br/>Format: Electronic Resources<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:23022342024-06-20T20:50:22Z2024-06-20T20:50:22Zby Pathan, Al-Sakib Khan, editor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482203523">https://learning.oreilly.com/library/view/~/9781482203523</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar">https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482203523/?ar">https://learning.oreilly.com/library/view/~/9781482203523/?ar</a><br/>Format: Electronic Resources<br/>Identity and access management : business performance through connected intelligenceent://SD_ILS/0/SD_ILS:23019312024-06-20T20:50:22Z2024-06-20T20:50:22Zby Osmanoglu, T. Ertem.<br/><a href="https://learning.oreilly.com/library/view/~/9780124081406/?ar">https://learning.oreilly.com/library/view/~/9780124081406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124081406">https://learning.oreilly.com/library/view/~/9780124081406</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar">https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar</a><br/>Format: Electronic Resources<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:23032672024-06-20T20:50:22Z2024-06-20T20:50:22Zby Stapleton, Jeffrey James.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592155">https://learning.oreilly.com/library/view/~/9781466592155</a>
<a href="https://learning.oreilly.com/library/view/~/9781466592155/?ar">https://learning.oreilly.com/library/view/~/9781466592155/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar</a><br/>Format: Electronic Resources<br/>Cloud management and securityent://SD_ILS/0/SD_ILS:23032822024-06-20T20:50:22Z2024-06-20T20:50:22Zby Abbadi, Imad M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118817094/?ar">https://learning.oreilly.com/library/view/~/9781118817094/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118817094/?ar">https://go.oreilly.com/library-access/library/view/-/9781118817094/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118817094">https://learning.oreilly.com/library/view/~/9781118817094</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approachent://SD_ILS/0/SD_ILS:23034752024-06-20T20:50:22Z2024-06-20T20:50:22Zby Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar">https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782162223/?ar">https://learning.oreilly.com/library/view/~/9781782162223/?ar</a><br/>Format: Electronic Resources<br/>Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environmentent://SD_ILS/0/SD_ILS:23040392024-06-20T20:50:22Z2024-06-20T20:50:22Zby Mehan, Julie E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285728/?ar">https://learning.oreilly.com/library/view/~/9781849285728/?ar</a><br/>Format: Electronic Resources<br/>Information security breaches : avoidance treatment based on ISO27001ent://SD_ILS/0/SD_ILS:23040412024-06-20T20:50:22Z2024-06-20T20:50:22Zby Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285841/?ar">https://learning.oreilly.com/library/view/~/9781849285841/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar</a><br/>Format: Electronic Resources<br/>Online security for the business travelerent://SD_ILS/0/SD_ILS:23042462024-06-20T20:50:22Z2024-06-20T20:50:22Zby Gonzalez, Deborah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000694">https://learning.oreilly.com/library/view/~/9780128000694</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128000694/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000694/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000694/?ar">https://learning.oreilly.com/library/view/~/9780128000694/?ar</a><br/>Format: Electronic Resources<br/>Enhanced networking on IBM z/VSEent://SD_ILS/0/SD_ILS:23024132024-06-20T20:50:22Z2024-06-20T20:50:22Zby Schmidbauer, Joerg.<br/><a href="https://learning.oreilly.com/library/view/~/0738439088/?ar">https://learning.oreilly.com/library/view/~/0738439088/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738439088/?ar">https://go.oreilly.com/library-access/library/view/-/0738439088/?ar</a><br/>Format: Electronic Resources<br/>Hacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:23026232024-06-20T20:50:22Z2024-06-20T20:50:22Zby Gomzin, Slava, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118810071/?ar">https://learning.oreilly.com/library/view/~/9781118810071/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810071">https://learning.oreilly.com/library/view/~/9781118810071</a><br/>Format: Electronic Resources<br/>Security for service oriented architecturesent://SD_ILS/0/SD_ILS:23032922024-06-20T20:50:22Z2024-06-20T20:50:22Zby Williams, Walter (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584044">https://learning.oreilly.com/library/view/~/9781466584044</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466584044/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466584044/?ar">https://learning.oreilly.com/library/view/~/9781466584044/?ar</a><br/>Format: Electronic Resources<br/>The InfoSec handbook : an introduction to information securityent://SD_ILS/0/SD_ILS:23043932024-06-20T20:50:22Z2024-06-20T20:50:22Zby Rao, Umesh Hodeghatta, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263838">https://learning.oreilly.com/library/view/~/9781430263838</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430263838/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263838/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430263838/?ar">https://learning.oreilly.com/library/view/~/9781430263838/?ar</a><br/>Format: Electronic Resources<br/>Intrusion detection networks : a key to collaborative securityent://SD_ILS/0/SD_ILS:23011122024-06-20T20:50:22Z2024-06-20T20:50:22Zby Fung, Carol, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564121/?ar">https://learning.oreilly.com/library/view/~/9781466564121/?ar</a><br/>Format: Electronic Resources<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:23014742024-06-20T20:50:22Z2024-06-20T20:50:22Zby DeFranco, Joanna F.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564527/?ar">https://learning.oreilly.com/library/view/~/9781466564527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564527">https://learning.oreilly.com/library/view/~/9781466564527</a><br/>Format: Electronic Resources<br/>Security management : a critical thinking approachent://SD_ILS/0/SD_ILS:23015622024-06-20T20:50:22Z2024-06-20T20:50:22Zby Land, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781466561779">https://learning.oreilly.com/library/view/~/9781466561779</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466561779/?ar">https://go.oreilly.com/library-access/library/view/-/9781466561779/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466561779/?ar">https://learning.oreilly.com/library/view/~/9781466561779/?ar</a><br/>Format: Electronic Resources<br/>The basics of IT audit : Purposes, processes, and practical information.ent://SD_ILS/0/SD_ILS:23015012024-06-20T20:50:22Z2024-06-20T20:50:22Zby Gantz, Stephen D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596/?ar">https://learning.oreilly.com/library/view/~/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596">https://learning.oreilly.com/library/view/~/9780124171596</a><br/>Format: Electronic Resources<br/>The privacy engineer's manifesto : getting from policy to code to QA to valueent://SD_ILS/0/SD_ILS:23022962024-06-20T20:50:22Z2024-06-20T20:50:22Zby Dennedy, Michelle Finneran.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263555">https://learning.oreilly.com/library/view/~/9781430263555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430263555/?ar">https://learning.oreilly.com/library/view/~/9781430263555/?ar</a><br/>Format: Electronic Resources<br/>Managing information security breaches : studies from real lifeent://SD_ILS/0/SD_ILS:23088362024-06-20T20:50:22Z2024-06-20T20:50:22Zby Krausz, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285964/?ar">https://learning.oreilly.com/library/view/~/9781849285964/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar</a><br/>Format: Electronic Resources<br/>The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memoryent://SD_ILS/0/SD_ILS:23067472024-06-20T20:50:22Z2024-06-20T20:50:22Zby Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9781118824993/?ar">https://learning.oreilly.com/library/view/~/9781118824993/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar">https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar</a><br/>Format: Electronic Resources<br/>Case studies in secure computing : achievements and trendsent://SD_ILS/0/SD_ILS:23222772024-06-20T20:50:22Z2024-06-20T20:50:22Zby Issac, Biju, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781482207064/?ar">https://learning.oreilly.com/library/view/~/9781482207064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482207064/?ar">https://go.oreilly.com/library-access/library/view/-/9781482207064/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482207064">https://learning.oreilly.com/library/view/~/9781482207064</a><br/>Format: Electronic Resources<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:23001802024-06-20T20:50:22Z2024-06-20T20:50:22Zby Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format: Electronic Resources<br/>Computer incident response and forensics team management : conducting a successful incident responseent://SD_ILS/0/SD_ILS:23006702024-06-20T20:50:22Z2024-06-20T20:50:22Zby Johnson, Leighton, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499965/?ar">https://learning.oreilly.com/library/view/~/9781597499965/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499965">https://learning.oreilly.com/library/view/~/9781597499965</a><br/>Format: Electronic Resources<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:23011502024-06-20T20:50:22Z2024-06-20T20:50:22Zby Cherry, Denny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113/?ar">https://learning.oreilly.com/library/view/~/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113">https://learning.oreilly.com/library/view/~/9780128000113</a><br/>Format: Electronic Resources<br/>Cybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:23015242024-06-20T20:50:22Z2024-06-20T20:50:22Zby Mowbray, Thomas J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar">https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115/?ar">https://learning.oreilly.com/library/view/~/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115">https://learning.oreilly.com/library/view/~/9781118697115</a><br/>Format: Electronic Resources<br/>Anonymizing health data : case studies and methods to get you startedent://SD_ILS/0/SD_ILS:23015932024-06-20T20:50:22Z2024-06-20T20:50:22Zby El Emam, Khaled.<br/><a href="https://learning.oreilly.com/library/view/~/9781449363062">https://learning.oreilly.com/library/view/~/9781449363062</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781449363062/?ar">https://go.oreilly.com/library-access/library/view/-/9781449363062/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449363062/?ar">https://learning.oreilly.com/library/view/~/9781449363062/?ar</a><br/>Format: Electronic Resources<br/>Windows 8.1 administration pocket consultant : storage, security, & Networkingent://SD_ILS/0/SD_ILS:23023022024-06-20T20:50:22Z2024-06-20T20:50:22Zby Stanek, William R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735685536/?ar">https://go.oreilly.com/library-access/library/view/-/9780735685536/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735685536/?ar">https://learning.oreilly.com/library/view/~/9780735685536/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:23023882024-06-20T20:50:22Z2024-06-20T20:50:22Zby Malin, Cameron H.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494700/?ar">https://learning.oreilly.com/library/view/~/9781597494700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar</a><br/>Format: Electronic Resources<br/>VCP5-DVC official cert training : VMware certified professional : data center virtualization (Exam VCP 550)ent://SD_ILS/0/SD_ILS:23025742024-06-20T20:50:22Z2024-06-20T20:50:22Zby Ferguson, Bill.<br/><a href="https://learning.oreilly.com/videos/~/9780133838176/?ar">https://learning.oreilly.com/videos/~/9780133838176/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133838176/?ar">https://go.oreilly.com/library-access/library/view/-/9780133838176/?ar</a><br/>Format: Electronic Resources<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:23034482024-06-20T20:50:22Z2024-06-20T20:50:22Zby Ulsch, N. MacDonnell, 1951-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar">https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118935958/?ar">https://learning.oreilly.com/library/view/~/9781118935958/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118935958">https://learning.oreilly.com/library/view/~/9781118935958</a><br/>Format: Electronic Resources<br/>Building an information security awareness program : defending against social engineering and technical threatsent://SD_ILS/0/SD_ILS:23039522024-06-20T20:50:22Z2024-06-20T20:50:22Zby Gardner, Bill (Bill G.)<br/><a href="https://learning.oreilly.com/library/view/~/9780124199675">https://learning.oreilly.com/library/view/~/9780124199675</a>
<a href="https://learning.oreilly.com/library/view/~/9780124199675/?ar">https://learning.oreilly.com/library/view/~/9780124199675/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124199675/?ar">https://go.oreilly.com/library-access/library/view/-/9780124199675/?ar</a><br/>Format: Electronic Resources<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:23034122024-06-20T20:50:22Z2024-06-20T20:50:22Zby Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format: Electronic Resources<br/>CompTIA security+ (SYO-401) : complete video courseent://SD_ILS/0/SD_ILS:23041062024-06-20T20:50:22Z2024-06-20T20:50:22Zby Shannon, Michael J.<br/><a href="https://learning.oreilly.com/videos/~/9780133888706/?ar">https://learning.oreilly.com/videos/~/9780133888706/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133888706/?ar">https://go.oreilly.com/library-access/library/view/-/9780133888706/?ar</a><br/>Format: Electronic Resources<br/>Black hat Python : Python programming for hackers and pentestersent://SD_ILS/0/SD_ILS:23056592024-06-20T20:50:22Z2024-06-20T20:50:22Zby Seitz, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar">https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457189807/?ar">https://learning.oreilly.com/library/view/~/9781457189807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457189807">https://learning.oreilly.com/library/view/~/9781457189807</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:23032942024-06-20T20:50:22Z2024-06-20T20:50:22Zby Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format: Electronic Resources<br/>CompTIA Security+ent://SD_ILS/0/SD_ILS:23049062024-06-20T20:50:22Z2024-06-20T20:50:22Zby Long, Mark.<br/><a href="https://learning.oreilly.com/videos/~/9781771372831/?ar">https://learning.oreilly.com/videos/~/9781771372831/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar">https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar</a><br/>Format: Electronic Resources<br/>VMware vSphere Security Cookbook : Over 75 practical recipes to help you successfully secure your vSphere environmentent://SD_ILS/0/SD_ILS:23055192024-06-20T20:50:22Z2024-06-20T20:50:22Zby Greer, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782170341/?ar">https://learning.oreilly.com/library/view/~/9781782170341/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782170341/?ar">https://go.oreilly.com/library-access/library/view/-/9781782170341/?ar</a><br/>Format: Electronic Resources<br/>Salt at scale : lessons from LinkedInent://SD_ILS/0/SD_ILS:23082162024-06-20T20:50:22Z2024-06-20T20:50:22Zby Sebenik, Craig, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491920893/?ar">https://learning.oreilly.com/videos/~/9781491920893/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar">https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar</a><br/>Format: Electronic Resources<br/>Securing cloud servicesent://SD_ILS/0/SD_ILS:23061212024-06-20T20:50:22Z2024-06-20T20:50:22Zby Miller, David, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar">https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771373340/?ar">https://learning.oreilly.com/videos/~/9781771373340/?ar</a><br/>Format: Electronic Resources<br/>Chinese cybersecurity and defenseent://SD_ILS/0/SD_ILS:23071302024-06-20T20:50:22Z2024-06-20T20:50:22Zby Ventre, Daniel, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119009139/?ar">https://learning.oreilly.com/library/view/~/9781119009139/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119009139/?ar">https://go.oreilly.com/library-access/library/view/-/9781119009139/?ar</a><br/>Format: Electronic Resources<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:23088442024-06-20T20:50:22Z2024-06-20T20:50:22Zby Vladimirov, Andrew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849286008/?ar">https://go.oreilly.com/library-access/library/view/-/9781849286008/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849286008/?ar">https://learning.oreilly.com/library/view/~/9781849286008/?ar</a><br/>Format: Electronic Resources<br/>