Search Results for - Narrowed by: 2015 - R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092015$0025092015$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300? 2024-06-14T03:50:04Z Essential cybersecurity science : build, test, and evaluate secure systems ent://SD_ILS/0/SD_ILS:2309193 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to define and build an effective cyber threat intelligence capability ent://SD_ILS/0/SD_ILS:2305447 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Dalziel, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027301/?ar">https://learning.oreilly.com/library/view/~/9780128027301/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128027301">https://learning.oreilly.com/library/view/~/9780128027301</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128027301/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027301/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing systems : applied security architecture and threat models ent://SD_ILS/0/SD_ILS:2307464 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Schoenfield, Brook S. E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482233988/?ar">https://go.oreilly.com/library-access/library/view/-/9781482233988/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482233988/?ar">https://learning.oreilly.com/library/view/~/9781482233988/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482233988">https://learning.oreilly.com/library/view/~/9781482233988</a><br/>Format:&#160;Electronic Resources<br/> Enterprise software security : a confluence of disciplines ent://SD_ILS/0/SD_ILS:2305297 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Van Wyk, Kenneth R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780321604378/?ar">https://learning.oreilly.com/library/view/~/9780321604378/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321604378">https://learning.oreilly.com/library/view/~/9780321604378</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar">https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:2304682 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Hexmoor, Henry, 1960- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128008911/?ar">https://learning.oreilly.com/library/view/~/9780128008911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128008911">https://learning.oreilly.com/library/view/~/9780128008911</a><br/>Format:&#160;Electronic Resources<br/> How to defeat advanced malware : new tools for protection and forensics ent://SD_ILS/0/SD_ILS:2305937 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Dalziel, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027318/?ar">https://learning.oreilly.com/library/view/~/9780128027318/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128027318">https://learning.oreilly.com/library/view/~/9780128027318</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128027318/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027318/?ar</a><br/>Format:&#160;Electronic Resources<br/> A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of security ent://SD_ILS/0/SD_ILS:2306964 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Arthur, Will, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265849/?ar">https://learning.oreilly.com/library/view/~/9781430265849/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI compliance : understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:2305306 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Williams, Branden R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128015797/?ar">https://go.oreilly.com/library-access/library/view/-/9780128015797/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128015797/?ar">https://learning.oreilly.com/library/view/~/9780128015797/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to attack and defend your website ent://SD_ILS/0/SD_ILS:2305934 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128027325/?ar">https://learning.oreilly.com/library/view/~/9780128027325/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128027325">https://learning.oreilly.com/library/view/~/9780128027325</a><br/>Format:&#160;Electronic Resources<br/> Learning penetration testing with Python : utilize Python scripting to execute effective and efficient penetration tests ent://SD_ILS/0/SD_ILS:2308640 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785282324/?ar">https://learning.oreilly.com/library/view/~/9781785282324/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785282324">https://learning.oreilly.com/library/view/~/9781785282324</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar">https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar</a><br/>Format:&#160;Electronic Resources<br/> Packet analysis with Wireshark : leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis ent://SD_ILS/0/SD_ILS:2309348 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Nath, Anish, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785887819/?ar">https://learning.oreilly.com/library/view/~/9781785887819/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785887819">https://learning.oreilly.com/library/view/~/9781785887819</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785887819/?ar">https://go.oreilly.com/library-access/library/view/-/9781785887819/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM z/OS V2R2 : security ent://SD_ILS/0/SD_ILS:2309654 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Winnard, Keith, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738441276/?ar">https://learning.oreilly.com/library/view/~/9780738441276/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738441276">https://learning.oreilly.com/library/view/~/9780738441276</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738441276/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441276/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure because math? : challenges on applying machine learning to security ent://SD_ILS/0/SD_ILS:2309700 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Pinto, Alex, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491954850/?ar">https://go.oreilly.com/library-access/library/view/-/9781491954850/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491954850/?ar">https://learning.oreilly.com/videos/~/9781491954850/?ar</a><br/>Format:&#160;Electronic Resources<br/> The network security test lab : a step-by-step guide ent://SD_ILS/0/SD_ILS:2308043 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118987056/?ar">https://learning.oreilly.com/library/view/~/9781118987056/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar">https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118987056">https://learning.oreilly.com/library/view/~/9781118987056</a><br/>Format:&#160;Electronic Resources<br/> Web penetration testing with Kali Linux : build your defense against web attacks with Kali Linus 2.0 ent://SD_ILS/0/SD_ILS:2309117 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Ansari, Juned Ahmed, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783988525/?ar">https://go.oreilly.com/library-access/library/view/-/9781783988525/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783988525/?ar">https://learning.oreilly.com/library/view/~/9781783988525/?ar</a><br/>Format:&#160;Electronic Resources<br/> The security data lake : leveraging big data technologies to build a common data repository for security ent://SD_ILS/0/SD_ILS:2318350 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Marty, Raffael, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491927748/?ar">https://learning.oreilly.com/library/view/~/9781491927748/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar">https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar</a><br/>Format:&#160;Electronic Resources<br/> A machine learning approach to phishing detection and defense ent://SD_ILS/0/SD_ILS:2306002 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Akanbi, Oluwatobi Ayodeji, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029275/?ar">https://learning.oreilly.com/library/view/~/9780128029275/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128029275/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128029275">https://learning.oreilly.com/library/view/~/9780128029275</a><br/>Format:&#160;Electronic Resources<br/> Microsoft security fundamentals LiveLessons ent://SD_ILS/0/SD_ILS:2305725 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Lieberman, Ed, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780133949445/?ar">https://learning.oreilly.com/videos/~/9780133949445/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar">https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques ent://SD_ILS/0/SD_ILS:2306859 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Chauhan, Sudhanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128018675">https://learning.oreilly.com/library/view/~/9780128018675</a> <a href="https://learning.oreilly.com/library/view/~/9780128018675/?ar">https://learning.oreilly.com/library/view/~/9780128018675/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128018675/?ar">https://go.oreilly.com/library-access/library/view/-/9780128018675/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with Windows Server Security : develop and implement a secure Microsoft infrastructure platform using native and built-in tools ent://SD_ILS/0/SD_ILS:2306681 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Sivarajan, Santhosh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784398729/?ar">https://learning.oreilly.com/library/view/~/9781784398729/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781784398729/?ar">https://go.oreilly.com/library-access/library/view/-/9781784398729/?ar</a><br/>Format:&#160;Electronic Resources<br/> A practical guide to computer forensics investigations ent://SD_ILS/0/SD_ILS:2305632 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Hayes, Darren R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780132756174/?ar">https://learning.oreilly.com/library/view/~/9780132756174/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar">https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar</a><br/>Format:&#160;Electronic Resources<br/> Beyond cybersecurity : protecting your digital business ent://SD_ILS/0/SD_ILS:2306934 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Kaplan, James M., 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119026846">https://learning.oreilly.com/library/view/~/9781119026846</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar">https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119026846/?ar">https://learning.oreilly.com/library/view/~/9781119026846/?ar</a><br/>Format:&#160;Electronic Resources<br/> Python passive network mapping : P2NMAP ent://SD_ILS/0/SD_ILS:2307523 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Hosmer, Chet, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027424">https://learning.oreilly.com/library/view/~/9780128027424</a> <a href="https://learning.oreilly.com/library/view/~/9780128027424/?ar">https://learning.oreilly.com/library/view/~/9780128027424/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128027424/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027424/?ar</a><br/>Format:&#160;Electronic Resources<br/> NX-OS configuration fundamentals ent://SD_ILS/0/SD_ILS:2305892 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Fuller, Ron, 1972- on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134034249/?ar">https://learning.oreilly.com/videos/~/9780134034249/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134034249/?ar">https://go.oreilly.com/library-access/library/view/-/9780134034249/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco ASA 5500-X series next-generation firewalls : LiveLessons ent://SD_ILS/0/SD_ILS:2307350 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134190969/?ar">https://learning.oreilly.com/videos/~/9780134190969/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134190969/?ar">https://go.oreilly.com/library-access/library/view/-/9780134190969/?ar</a><br/>Format:&#160;Electronic Resources<br/> Group theoretic cryptography ent://SD_ILS/0/SD_ILS:2306763 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Gonz&aacute;lez Vasco, Maria Isabel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781584888369/?ar">https://go.oreilly.com/library-access/library/view/-/9781584888369/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781584888369/?ar">https://learning.oreilly.com/library/view/~/9781584888369/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781584888369">https://learning.oreilly.com/library/view/~/9781584888369</a><br/>Format:&#160;Electronic Resources<br/> Managing online risk : apps, mobile, and social media security ent://SD_ILS/0/SD_ILS:2304680 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Gonzalez, Deborah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200555/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200555/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124200555/?ar">https://learning.oreilly.com/library/view/~/9780124200555/?ar</a><br/>Format:&#160;Electronic Resources<br/> Agile security : an introduction for developers ent://SD_ILS/0/SD_ILS:2316380 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Brunton-Spall, Michael, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492037699/?ar">https://learning.oreilly.com/videos/~/9781492037699/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492037699/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037699/?ar</a><br/>Format:&#160;Electronic Resources<br/> Docker security : using containers safely in production ent://SD_ILS/0/SD_ILS:2316622 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Mouat, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042297/?ar">https://learning.oreilly.com/library/view/~/9781492042297/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042297/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Windows networks : from system security basics to monitoring and auditing ent://SD_ILS/0/SD_ILS:2308561 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Long, Mark, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar">https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771374903/?ar">https://learning.oreilly.com/videos/~/9781771374903/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking and penetration testing guide ent://SD_ILS/0/SD_ILS:2314673 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Baloch, Rafay, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781351381345/?ar">https://learning.oreilly.com/library/view/~/9781351381345/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar">https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS : a pocket guide ent://SD_ILS/0/SD_ILS:2311270 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849288446/?ar">https://go.oreilly.com/library-access/library/view/-/9781849288446/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849288446/?ar">https://learning.oreilly.com/library/view/~/9781849288446/?ar</a><br/>Format:&#160;Electronic Resources<br/> Troubleshooting Puppet : troubleshoot your Puppet infrastructure to fix problems quickly ent://SD_ILS/0/SD_ILS:2308449 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Uphill, Thomas, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784398651/?ar">https://go.oreilly.com/library-access/library/view/-/9781784398651/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784398651/?ar">https://learning.oreilly.com/library/view/~/9781784398651/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784398651">https://learning.oreilly.com/library/view/~/9781784398651</a><br/>Format:&#160;Electronic Resources<br/> Web application security is a stack : how to CYA (cover your apps) completely ent://SD_ILS/0/SD_ILS:2308845 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;MacVittie, Lori A., 1969- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287050/?ar">https://learning.oreilly.com/library/view/~/9781849287050/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar</a><br/>Format:&#160;Electronic Resources<br/> Once more unto the breach : managing information security in an uncertain world ent://SD_ILS/0/SD_ILS:2308846 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Simmons, Andrea C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849287098/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287098/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849287098/?ar">https://learning.oreilly.com/library/view/~/9781849287098/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning path : Networking for sysadmins. ent://SD_ILS/0/SD_ILS:2310038 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Liu, Cricket, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491958285/?ar">https://learning.oreilly.com/videos/~/9781491958285/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491958285/?ar">https://go.oreilly.com/library-access/library/view/-/9781491958285/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491958285">https://learning.oreilly.com/videos/~/9781491958285</a><br/>Format:&#160;Electronic Resources<br/> Preparing for a network incident ent://SD_ILS/0/SD_ILS:2309896 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Messier, Ric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491955147/?ar">https://learning.oreilly.com/videos/~/9781491955147/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491955147/?ar">https://go.oreilly.com/library-access/library/view/-/9781491955147/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building an intelligence-led security program ent://SD_ILS/0/SD_ILS:2307124 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Liska, Allan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128021453/?ar">https://go.oreilly.com/library-access/library/view/-/9780128021453/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128021453">https://learning.oreilly.com/library/view/~/9780128021453</a> <a href="https://learning.oreilly.com/library/view/~/9780128021453/?ar">https://learning.oreilly.com/library/view/~/9780128021453/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secrets and lies : digital security in a networked world ent://SD_ILS/0/SD_ILS:2308753 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119092438">https://learning.oreilly.com/library/view/~/9781119092438</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar">https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119092438/?ar">https://learning.oreilly.com/library/view/~/9781119092438/?ar</a><br/>Format:&#160;Electronic Resources<br/> Risk centric threat modeling : process for attack simulation and threat analysis ent://SD_ILS/0/SD_ILS:2308792 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Uceda V&eacute;lez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format:&#160;Electronic Resources<br/> The security consultant's handbook ent://SD_ILS/0/SD_ILS:2309072 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Bingley, Richard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287500">https://learning.oreilly.com/library/view/~/9781849287500</a> <a href="https://learning.oreilly.com/library/view/~/9781849287500/?ar">https://learning.oreilly.com/library/view/~/9781849287500/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar</a><br/>Format:&#160;Electronic Resources<br/> Application security in the ISO 27001:2013 environment ent://SD_ILS/0/SD_ILS:2309073 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Vasudevan, Vinod, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287692/?ar">https://learning.oreilly.com/library/view/~/9781849287692/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCIE collaboration lab exam ent://SD_ILS/0/SD_ILS:2309537 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Wallace, Kevin, 1965- on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134432540/?ar">https://go.oreilly.com/library-access/library/view/-/9780134432540/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780134432540/?ar">https://learning.oreilly.com/videos/~/9780134432540/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to network security : theory and practice ent://SD_ILS/0/SD_ILS:2311286 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Wang, Jie, 1961- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118939482/?ar">https://go.oreilly.com/library-access/library/view/-/9781118939482/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118939482/?ar">https://learning.oreilly.com/library/view/~/9781118939482/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber operations : building, defending, and attacking modern computer networks ent://SD_ILS/0/SD_ILS:2308678 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;O'Leary, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484204573">https://learning.oreilly.com/library/view/~/9781484204573</a> <a href="https://learning.oreilly.com/library/view/~/9781484204573/?ar">https://learning.oreilly.com/library/view/~/9781484204573/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar">https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS : a pocket guide ent://SD_ILS/0/SD_ILS:2310744 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287838/?ar">https://learning.oreilly.com/library/view/~/9781849287838/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287838/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287838/?ar</a><br/>Format:&#160;Electronic Resources<br/> Anomaly detection for monitoring : a statistical approach to time series anomaly detection ent://SD_ILS/0/SD_ILS:2316907 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;Jinka, Preetam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492042341">https://learning.oreilly.com/library/view/~/9781492042341</a> <a href="https://learning.oreilly.com/library/view/~/9781492042341/?ar">https://learning.oreilly.com/library/view/~/9781492042341/?ar</a><br/>Format:&#160;Electronic Resources<br/> Opportunities and challenges in the IoT : a conversation with Tim O'Reilly and Cory Doctorow ent://SD_ILS/0/SD_ILS:2318384 2024-06-14T03:50:04Z 2024-06-14T03:50:04Z by&#160;O'Reilly, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492048220/?ar">https://learning.oreilly.com/library/view/~/9781492048220/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492048220">https://learning.oreilly.com/library/view/~/9781492048220</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar">https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar</a><br/>Format:&#160;Electronic Resources<br/>