Search Results for - Narrowed by: 2015 - Réseaux d'ordinateurs -- Sécurité -- Mesures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092015$0025092015$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300?
2024-06-14T03:50:04Z
Essential cybersecurity science : build, test, and evaluate secure systems
ent://SD_ILS/0/SD_ILS:2309193
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format: Electronic Resources<br/>
How to define and build an effective cyber threat intelligence capability
ent://SD_ILS/0/SD_ILS:2305447
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Dalziel, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027301/?ar">https://learning.oreilly.com/library/view/~/9780128027301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027301">https://learning.oreilly.com/library/view/~/9780128027301</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128027301/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027301/?ar</a><br/>Format: Electronic Resources<br/>
Securing systems : applied security architecture and threat models
ent://SD_ILS/0/SD_ILS:2307464
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Schoenfield, Brook S. E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482233988/?ar">https://go.oreilly.com/library-access/library/view/-/9781482233988/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482233988/?ar">https://learning.oreilly.com/library/view/~/9781482233988/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482233988">https://learning.oreilly.com/library/view/~/9781482233988</a><br/>Format: Electronic Resources<br/>
Enterprise software security : a confluence of disciplines
ent://SD_ILS/0/SD_ILS:2305297
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Van Wyk, Kenneth R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780321604378/?ar">https://learning.oreilly.com/library/view/~/9780321604378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321604378">https://learning.oreilly.com/library/view/~/9780321604378</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar">https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar</a><br/>Format: Electronic Resources<br/>
Computational network science : an algorithmic approach
ent://SD_ILS/0/SD_ILS:2304682
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Hexmoor, Henry, 1960- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008911/?ar">https://learning.oreilly.com/library/view/~/9780128008911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008911">https://learning.oreilly.com/library/view/~/9780128008911</a><br/>Format: Electronic Resources<br/>
How to defeat advanced malware : new tools for protection and forensics
ent://SD_ILS/0/SD_ILS:2305937
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Dalziel, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027318/?ar">https://learning.oreilly.com/library/view/~/9780128027318/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027318">https://learning.oreilly.com/library/view/~/9780128027318</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128027318/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027318/?ar</a><br/>Format: Electronic Resources<br/>
A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of security
ent://SD_ILS/0/SD_ILS:2306964
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Arthur, Will, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265849/?ar">https://learning.oreilly.com/library/view/~/9781430265849/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar</a><br/>Format: Electronic Resources<br/>
PCI compliance : understand and implement effective PCI data security standard compliance
ent://SD_ILS/0/SD_ILS:2305306
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Williams, Branden R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128015797/?ar">https://go.oreilly.com/library-access/library/view/-/9780128015797/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128015797/?ar">https://learning.oreilly.com/library/view/~/9780128015797/?ar</a><br/>Format: Electronic Resources<br/>
How to attack and defend your website
ent://SD_ILS/0/SD_ILS:2305934
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027325/?ar">https://learning.oreilly.com/library/view/~/9780128027325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027325">https://learning.oreilly.com/library/view/~/9780128027325</a><br/>Format: Electronic Resources<br/>
Learning penetration testing with Python : utilize Python scripting to execute effective and efficient penetration tests
ent://SD_ILS/0/SD_ILS:2308640
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785282324/?ar">https://learning.oreilly.com/library/view/~/9781785282324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785282324">https://learning.oreilly.com/library/view/~/9781785282324</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar">https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar</a><br/>Format: Electronic Resources<br/>
Packet analysis with Wireshark : leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis
ent://SD_ILS/0/SD_ILS:2309348
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Nath, Anish, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785887819/?ar">https://learning.oreilly.com/library/view/~/9781785887819/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785887819">https://learning.oreilly.com/library/view/~/9781785887819</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785887819/?ar">https://go.oreilly.com/library-access/library/view/-/9781785887819/?ar</a><br/>Format: Electronic Resources<br/>
IBM z/OS V2R2 : security
ent://SD_ILS/0/SD_ILS:2309654
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Winnard, Keith, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738441276/?ar">https://learning.oreilly.com/library/view/~/9780738441276/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738441276">https://learning.oreilly.com/library/view/~/9780738441276</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738441276/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441276/?ar</a><br/>Format: Electronic Resources<br/>
Secure because math? : challenges on applying machine learning to security
ent://SD_ILS/0/SD_ILS:2309700
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Pinto, Alex, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491954850/?ar">https://go.oreilly.com/library-access/library/view/-/9781491954850/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491954850/?ar">https://learning.oreilly.com/videos/~/9781491954850/?ar</a><br/>Format: Electronic Resources<br/>
The network security test lab : a step-by-step guide
ent://SD_ILS/0/SD_ILS:2308043
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118987056/?ar">https://learning.oreilly.com/library/view/~/9781118987056/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar">https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118987056">https://learning.oreilly.com/library/view/~/9781118987056</a><br/>Format: Electronic Resources<br/>
Web penetration testing with Kali Linux : build your defense against web attacks with Kali Linus 2.0
ent://SD_ILS/0/SD_ILS:2309117
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Ansari, Juned Ahmed, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783988525/?ar">https://go.oreilly.com/library-access/library/view/-/9781783988525/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783988525/?ar">https://learning.oreilly.com/library/view/~/9781783988525/?ar</a><br/>Format: Electronic Resources<br/>
The security data lake : leveraging big data technologies to build a common data repository for security
ent://SD_ILS/0/SD_ILS:2318350
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Marty, Raffael, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491927748/?ar">https://learning.oreilly.com/library/view/~/9781491927748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar">https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar</a><br/>Format: Electronic Resources<br/>
A machine learning approach to phishing detection and defense
ent://SD_ILS/0/SD_ILS:2306002
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Akanbi, Oluwatobi Ayodeji, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029275/?ar">https://learning.oreilly.com/library/view/~/9780128029275/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128029275/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128029275">https://learning.oreilly.com/library/view/~/9780128029275</a><br/>Format: Electronic Resources<br/>
Microsoft security fundamentals LiveLessons
ent://SD_ILS/0/SD_ILS:2305725
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Lieberman, Ed, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780133949445/?ar">https://learning.oreilly.com/videos/~/9780133949445/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar">https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar</a><br/>Format: Electronic Resources<br/>
Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques
ent://SD_ILS/0/SD_ILS:2306859
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Chauhan, Sudhanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128018675">https://learning.oreilly.com/library/view/~/9780128018675</a>
<a href="https://learning.oreilly.com/library/view/~/9780128018675/?ar">https://learning.oreilly.com/library/view/~/9780128018675/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128018675/?ar">https://go.oreilly.com/library-access/library/view/-/9780128018675/?ar</a><br/>Format: Electronic Resources<br/>
Getting started with Windows Server Security : develop and implement a secure Microsoft infrastructure platform using native and built-in tools
ent://SD_ILS/0/SD_ILS:2306681
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Sivarajan, Santhosh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784398729/?ar">https://learning.oreilly.com/library/view/~/9781784398729/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781784398729/?ar">https://go.oreilly.com/library-access/library/view/-/9781784398729/?ar</a><br/>Format: Electronic Resources<br/>
A practical guide to computer forensics investigations
ent://SD_ILS/0/SD_ILS:2305632
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Hayes, Darren R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780132756174/?ar">https://learning.oreilly.com/library/view/~/9780132756174/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar">https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar</a><br/>Format: Electronic Resources<br/>
Beyond cybersecurity : protecting your digital business
ent://SD_ILS/0/SD_ILS:2306934
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Kaplan, James M., 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119026846">https://learning.oreilly.com/library/view/~/9781119026846</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar">https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119026846/?ar">https://learning.oreilly.com/library/view/~/9781119026846/?ar</a><br/>Format: Electronic Resources<br/>
Python passive network mapping : P2NMAP
ent://SD_ILS/0/SD_ILS:2307523
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Hosmer, Chet, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027424">https://learning.oreilly.com/library/view/~/9780128027424</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027424/?ar">https://learning.oreilly.com/library/view/~/9780128027424/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128027424/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027424/?ar</a><br/>Format: Electronic Resources<br/>
NX-OS configuration fundamentals
ent://SD_ILS/0/SD_ILS:2305892
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Fuller, Ron, 1972- on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134034249/?ar">https://learning.oreilly.com/videos/~/9780134034249/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134034249/?ar">https://go.oreilly.com/library-access/library/view/-/9780134034249/?ar</a><br/>Format: Electronic Resources<br/>
Cisco ASA 5500-X series next-generation firewalls : LiveLessons
ent://SD_ILS/0/SD_ILS:2307350
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134190969/?ar">https://learning.oreilly.com/videos/~/9780134190969/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134190969/?ar">https://go.oreilly.com/library-access/library/view/-/9780134190969/?ar</a><br/>Format: Electronic Resources<br/>
Group theoretic cryptography
ent://SD_ILS/0/SD_ILS:2306763
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by González Vasco, Maria Isabel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781584888369/?ar">https://go.oreilly.com/library-access/library/view/-/9781584888369/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781584888369/?ar">https://learning.oreilly.com/library/view/~/9781584888369/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781584888369">https://learning.oreilly.com/library/view/~/9781584888369</a><br/>Format: Electronic Resources<br/>
Managing online risk : apps, mobile, and social media security
ent://SD_ILS/0/SD_ILS:2304680
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Gonzalez, Deborah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200555/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200555/?ar">https://learning.oreilly.com/library/view/~/9780124200555/?ar</a><br/>Format: Electronic Resources<br/>
Agile security : an introduction for developers
ent://SD_ILS/0/SD_ILS:2316380
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Brunton-Spall, Michael, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492037699/?ar">https://learning.oreilly.com/videos/~/9781492037699/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492037699/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037699/?ar</a><br/>Format: Electronic Resources<br/>
Docker security : using containers safely in production
ent://SD_ILS/0/SD_ILS:2316622
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Mouat, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042297/?ar">https://learning.oreilly.com/library/view/~/9781492042297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042297/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042297/?ar</a><br/>Format: Electronic Resources<br/>
Securing Windows networks : from system security basics to monitoring and auditing
ent://SD_ILS/0/SD_ILS:2308561
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Long, Mark, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar">https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771374903/?ar">https://learning.oreilly.com/videos/~/9781771374903/?ar</a><br/>Format: Electronic Resources<br/>
Ethical hacking and penetration testing guide
ent://SD_ILS/0/SD_ILS:2314673
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Baloch, Rafay, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781351381345/?ar">https://learning.oreilly.com/library/view/~/9781351381345/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar">https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar</a><br/>Format: Electronic Resources<br/>
PCI DSS : a pocket guide
ent://SD_ILS/0/SD_ILS:2311270
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849288446/?ar">https://go.oreilly.com/library-access/library/view/-/9781849288446/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849288446/?ar">https://learning.oreilly.com/library/view/~/9781849288446/?ar</a><br/>Format: Electronic Resources<br/>
Troubleshooting Puppet : troubleshoot your Puppet infrastructure to fix problems quickly
ent://SD_ILS/0/SD_ILS:2308449
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Uphill, Thomas, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784398651/?ar">https://go.oreilly.com/library-access/library/view/-/9781784398651/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784398651/?ar">https://learning.oreilly.com/library/view/~/9781784398651/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784398651">https://learning.oreilly.com/library/view/~/9781784398651</a><br/>Format: Electronic Resources<br/>
Web application security is a stack : how to CYA (cover your apps) completely
ent://SD_ILS/0/SD_ILS:2308845
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by MacVittie, Lori A., 1969- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287050/?ar">https://learning.oreilly.com/library/view/~/9781849287050/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar</a><br/>Format: Electronic Resources<br/>
Once more unto the breach : managing information security in an uncertain world
ent://SD_ILS/0/SD_ILS:2308846
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Simmons, Andrea C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849287098/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287098/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849287098/?ar">https://learning.oreilly.com/library/view/~/9781849287098/?ar</a><br/>Format: Electronic Resources<br/>
Learning path : Networking for sysadmins.
ent://SD_ILS/0/SD_ILS:2310038
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Liu, Cricket, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491958285/?ar">https://learning.oreilly.com/videos/~/9781491958285/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491958285/?ar">https://go.oreilly.com/library-access/library/view/-/9781491958285/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491958285">https://learning.oreilly.com/videos/~/9781491958285</a><br/>Format: Electronic Resources<br/>
Preparing for a network incident
ent://SD_ILS/0/SD_ILS:2309896
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Messier, Ric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491955147/?ar">https://learning.oreilly.com/videos/~/9781491955147/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491955147/?ar">https://go.oreilly.com/library-access/library/view/-/9781491955147/?ar</a><br/>Format: Electronic Resources<br/>
Building an intelligence-led security program
ent://SD_ILS/0/SD_ILS:2307124
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Liska, Allan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128021453/?ar">https://go.oreilly.com/library-access/library/view/-/9780128021453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128021453">https://learning.oreilly.com/library/view/~/9780128021453</a>
<a href="https://learning.oreilly.com/library/view/~/9780128021453/?ar">https://learning.oreilly.com/library/view/~/9780128021453/?ar</a><br/>Format: Electronic Resources<br/>
Secrets and lies : digital security in a networked world
ent://SD_ILS/0/SD_ILS:2308753
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119092438">https://learning.oreilly.com/library/view/~/9781119092438</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar">https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119092438/?ar">https://learning.oreilly.com/library/view/~/9781119092438/?ar</a><br/>Format: Electronic Resources<br/>
Risk centric threat modeling : process for attack simulation and threat analysis
ent://SD_ILS/0/SD_ILS:2308792
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Uceda Vélez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format: Electronic Resources<br/>
The security consultant's handbook
ent://SD_ILS/0/SD_ILS:2309072
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Bingley, Richard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287500">https://learning.oreilly.com/library/view/~/9781849287500</a>
<a href="https://learning.oreilly.com/library/view/~/9781849287500/?ar">https://learning.oreilly.com/library/view/~/9781849287500/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar</a><br/>Format: Electronic Resources<br/>
Application security in the ISO 27001:2013 environment
ent://SD_ILS/0/SD_ILS:2309073
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Vasudevan, Vinod, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287692/?ar">https://learning.oreilly.com/library/view/~/9781849287692/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar</a><br/>Format: Electronic Resources<br/>
CCIE collaboration lab exam
ent://SD_ILS/0/SD_ILS:2309537
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Wallace, Kevin, 1965- on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134432540/?ar">https://go.oreilly.com/library-access/library/view/-/9780134432540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134432540/?ar">https://learning.oreilly.com/videos/~/9780134432540/?ar</a><br/>Format: Electronic Resources<br/>
Introduction to network security : theory and practice
ent://SD_ILS/0/SD_ILS:2311286
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Wang, Jie, 1961- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118939482/?ar">https://go.oreilly.com/library-access/library/view/-/9781118939482/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118939482/?ar">https://learning.oreilly.com/library/view/~/9781118939482/?ar</a><br/>Format: Electronic Resources<br/>
Cyber operations : building, defending, and attacking modern computer networks
ent://SD_ILS/0/SD_ILS:2308678
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by O'Leary, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484204573">https://learning.oreilly.com/library/view/~/9781484204573</a>
<a href="https://learning.oreilly.com/library/view/~/9781484204573/?ar">https://learning.oreilly.com/library/view/~/9781484204573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar">https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar</a><br/>Format: Electronic Resources<br/>
PCI DSS : a pocket guide
ent://SD_ILS/0/SD_ILS:2310744
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Calder, Alan, 1957- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287838/?ar">https://learning.oreilly.com/library/view/~/9781849287838/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287838/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287838/?ar</a><br/>Format: Electronic Resources<br/>
Anomaly detection for monitoring : a statistical approach to time series anomaly detection
ent://SD_ILS/0/SD_ILS:2316907
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by Jinka, Preetam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042341">https://learning.oreilly.com/library/view/~/9781492042341</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042341/?ar">https://learning.oreilly.com/library/view/~/9781492042341/?ar</a><br/>Format: Electronic Resources<br/>
Opportunities and challenges in the IoT : a conversation with Tim O'Reilly and Cory Doctorow
ent://SD_ILS/0/SD_ILS:2318384
2024-06-14T03:50:04Z
2024-06-14T03:50:04Z
by O'Reilly, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492048220/?ar">https://learning.oreilly.com/library/view/~/9781492048220/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492048220">https://learning.oreilly.com/library/view/~/9781492048220</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar">https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar</a><br/>Format: Electronic Resources<br/>