Search Results for - Narrowed by: 2017 - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092017$0025092017$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2024-06-19T21:59:52ZSecuring open source libraries : managing vulnerabilities in open source code packagesent://SD_ILS/0/SD_ILS:23148902024-06-19T21:59:52Z2024-06-19T21:59:52Zby Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996980/?ar">https://learning.oreilly.com/library/view/~/9781491996980/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996980">https://learning.oreilly.com/library/view/~/9781491996980</a><br/>Format: Electronic Resources<br/>Hacking the hackerent://SD_ILS/0/SD_ILS:20627952024-06-19T21:59:52Z2024-06-19T21:59:52Zby Grimes, Roger A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4845208">Click to View</a><br/>Format: Electronic Resources<br/>Software update as a mechanism for resilience and security : proceedings of a Workshop.ent://SD_ILS/0/SD_ILS:20137242024-06-19T21:59:52Z2024-06-19T21:59:52Zby Johnson, Anne Frances, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Software-Update-as-a-Mechanism-for-Resilience-and-Security.pdf">An electronic book accessible through the World Wide Web; click for information.</a>
<a href="http://doi.org/10.17226/24833">http://doi.org/10.17226/24833</a><br/>Format: Electronic Resources<br/>Cybercrime and business : strategies for global corporate securityent://SD_ILS/0/SD_ILS:22123622024-06-19T21:59:52Z2024-06-19T21:59:52Zby Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4863624">Click to View</a><br/>Format: Electronic Resources<br/>Spring security : secure your web applications, RESTful services, and microservice architecturesent://SD_ILS/0/SD_ILS:22301482024-06-19T21:59:52Z2024-06-19T21:59:52Zby Knutson, Mick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5165113">Click to View</a><br/>Format: Electronic Resources<br/>Wireshark for security professionals : using wireshark and the metasploit frameworkent://SD_ILS/0/SD_ILS:21440972024-06-19T21:59:52Z2024-06-19T21:59:52Zby Bullock, Jessey, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4816492">Click to View</a><br/>Format: Electronic Resources<br/>IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodellent://SD_ILS/0/SD_ILS:21213252024-06-19T21:59:52Z2024-06-19T21:59:52Zby Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4830572">Click to View</a><br/>Format: Electronic Resources<br/>From corporate security to commercial force : a business leader's guide to security economicsent://SD_ILS/0/SD_ILS:22123862024-06-19T21:59:52Z2024-06-19T21:59:52Zby Cabric, Marko, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4865431">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:22107202024-06-19T21:59:52Z2024-06-19T21:59:52Zby Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4676113">Click to View</a><br/>Format: Electronic Resources<br/>Securing the internet of thingsent://SD_ILS/0/SD_ILS:22116152024-06-19T21:59:52Z2024-06-19T21:59:52Zby Li, Shancang, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4786871">Click to View</a><br/>Format: Electronic Resources<br/>Preventing digital extortion : mitigate ransomware, DDoS, and other cyber-extortion attacksent://SD_ILS/0/SD_ILS:22293562024-06-19T21:59:52Z2024-06-19T21:59:52Zby Thakkar, Dhanya, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4867419">Click to View</a><br/>Format: Electronic Resources<br/>Capture and analysis of network-based evidence.ent://SD_ILS/0/SD_ILS:23347672024-06-19T21:59:52Z2024-06-19T21:59:52Zby Messier, Ric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492029182">https://learning.oreilly.com/videos/~/9781492029182</a>
<a href="https://learning.oreilly.com/videos/~/9781492029182/?ar">https://learning.oreilly.com/videos/~/9781492029182/?ar</a><br/>Format: Video recording<br/>The basics of cyber safety : computer and mobile device safety made easyent://SD_ILS/0/SD_ILS:23114322024-06-19T21:59:52Z2024-06-19T21:59:52Zby Sammons, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166394/?ar">https://learning.oreilly.com/library/view/~/9780124166394/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124166394/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166394/?ar</a><br/>Format: Electronic Resources<br/>Gray hat C# : a hacker's guide to creating and automating security toolsent://SD_ILS/0/SD_ILS:23125692024-06-19T21:59:52Z2024-06-19T21:59:52Zby Perry, Brandon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492023449">https://learning.oreilly.com/library/view/~/9781492023449</a>
<a href="https://learning.oreilly.com/library/view/~/9781492023449/?ar">https://learning.oreilly.com/library/view/~/9781492023449/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492023449/?ar">https://go.oreilly.com/library-access/library/view/-/9781492023449/?ar</a><br/>Format: Electronic Resources<br/>Hacking the hacker : learn from the experts who take down hackersent://SD_ILS/0/SD_ILS:23131042024-06-19T21:59:52Z2024-06-19T21:59:52Zby Grimes, Roger A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119396215/?ar">https://go.oreilly.com/library-access/library/view/-/9781119396215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119396215/?ar">https://learning.oreilly.com/library/view/~/9781119396215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119396215">https://learning.oreilly.com/library/view/~/9781119396215</a><br/>Format: Electronic Resources<br/>To improve cybersecurity, think like a hackerent://SD_ILS/0/SD_ILS:23131252024-06-19T21:59:52Z2024-06-19T21:59:52Zby Esteves, José, 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT58314">https://learning.oreilly.com/library/view/~/53863MIT58314</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT58314/?ar">https://learning.oreilly.com/library/view/~/53863MIT58314/?ar</a><br/>Format: Electronic Resources<br/>RIoT control : understanding and managing risks and the internet of thingsent://SD_ILS/0/SD_ILS:22107952024-06-19T21:59:52Z2024-06-19T21:59:52Zby Macaulay, Tyson, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4691335">Click to View</a><br/>Format: Electronic Resources<br/>Advanced persistent training : take your security awareness program to the next levelent://SD_ILS/0/SD_ILS:23134522024-06-19T21:59:52Z2024-06-19T21:59:52Zby Schroeder, Jordan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228357/?ar">https://learning.oreilly.com/library/view/~/9781484228357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228357">https://learning.oreilly.com/library/view/~/9781484228357</a><br/>Format: Electronic Resources<br/>Ransomware : defending against digital extortionent://SD_ILS/0/SD_ILS:23119732024-06-19T21:59:52Z2024-06-19T21:59:52Zby Liska, Allan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491967874/?ar">https://learning.oreilly.com/library/view/~/9781491967874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491967874">https://learning.oreilly.com/library/view/~/9781491967874</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar">https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar</a><br/>Format: Electronic Resources<br/>Hacking exposed industrial control systems : ICS and SCADA security secrets & solutionsent://SD_ILS/0/SD_ILS:23114032024-06-19T21:59:52Z2024-06-19T21:59:52Zby Bodungen, Clint E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781259589720/?ar">https://go.oreilly.com/library-access/library/view/-/9781259589720/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781259589720/?ar">https://learning.oreilly.com/library/view/~/9781259589720/?ar</a><br/>Format: Electronic Resources<br/>Securing the internet of thingsent://SD_ILS/0/SD_ILS:23123482024-06-19T21:59:52Z2024-06-19T21:59:52Zby Li, Shancang, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045053">https://learning.oreilly.com/library/view/~/9780128045053</a>
<a href="https://learning.oreilly.com/library/view/~/9780128045053/?ar">https://learning.oreilly.com/library/view/~/9780128045053/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar</a><br/>Format: Electronic Resources<br/>Personal cybersecurity : how to avoid and recover from cybercrimeent://SD_ILS/0/SD_ILS:23123492024-06-19T21:59:52Z2024-06-19T21:59:52Zby Waschke, Marvin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484224304/?ar">https://go.oreilly.com/library-access/library/view/-/9781484224304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484224304/?ar">https://learning.oreilly.com/library/view/~/9781484224304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484224304">https://learning.oreilly.com/library/view/~/9781484224304</a><br/>Format: Electronic Resources<br/>Agile application security : enabling security in a continuous delivery pipelineent://SD_ILS/0/SD_ILS:23123602024-06-19T21:59:52Z2024-06-19T21:59:52Zby Bell, Laura, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491938836">https://learning.oreilly.com/library/view/~/9781491938836</a>
<a href="https://learning.oreilly.com/library/view/~/9781491938836/?ar">https://learning.oreilly.com/library/view/~/9781491938836/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491938836/?ar">https://go.oreilly.com/library-access/library/view/-/9781491938836/?ar</a><br/>Format: Electronic Resources<br/>Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategiesent://SD_ILS/0/SD_ILS:23118332024-06-19T21:59:52Z2024-06-19T21:59:52Zby Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128093658/?ar">https://learning.oreilly.com/library/view/~/9780128093658/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar">https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128093658">https://learning.oreilly.com/library/view/~/9780128093658</a><br/>Format: Electronic Resources<br/>Red Hat Certificate of Expertise in server hardening - exam EX413 training : prepare to take the Red Hat EX413 exam and work towards your RHCA datacenter certificationent://SD_ILS/0/SD_ILS:23128262024-06-19T21:59:52Z2024-06-19T21:59:52Zby Rothwell, William, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491974483/?ar">https://go.oreilly.com/library-access/library/view/-/9781491974483/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491974483/?ar">https://learning.oreilly.com/videos/~/9781491974483/?ar</a><br/>Format: Electronic Resources<br/>Incident management for operationsent://SD_ILS/0/SD_ILS:23135452024-06-19T21:59:52Z2024-06-19T21:59:52Zby Schnepp, Rob, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491917619/?ar">https://learning.oreilly.com/library/view/~/9781491917619/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar">https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491917619">https://learning.oreilly.com/library/view/~/9781491917619</a><br/>Format: Electronic Resources<br/>Digital privacy and security using windows : a practical guideent://SD_ILS/0/SD_ILS:23136582024-06-19T21:59:52Z2024-06-19T21:59:52Zby Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484227985/?ar">https://learning.oreilly.com/library/view/~/9781484227985/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484227985/?ar">https://go.oreilly.com/library-access/library/view/-/9781484227985/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484227985">https://learning.oreilly.com/library/view/~/9781484227985</a><br/>Format: Electronic Resources<br/>O'Reilly Security Conference 2017, New York, NY.ent://SD_ILS/0/SD_ILS:23157102024-06-19T21:59:52Z2024-06-19T21:59:52Zby O'Reilly Security Conference (2017 : New York, N.Y.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491985359/?ar">https://go.oreilly.com/library-access/library/view/-/9781491985359/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491985359/?ar">https://learning.oreilly.com/videos/~/9781491985359/?ar</a><br/>Format: Electronic Resources<br/>Spring Security : secure your web applications, RESTful services, and microservice architecturesent://SD_ILS/0/SD_ILS:23150672024-06-19T21:59:52Z2024-06-19T21:59:52Zby Knutson, Mick, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787129511/?ar">https://go.oreilly.com/library-access/library/view/-/9781787129511/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787129511/?ar">https://learning.oreilly.com/library/view/~/9781787129511/?ar</a><br/>Format: Electronic Resources<br/>Achieving and sustaining secured business operations : an executive's guide to planning and managementent://SD_ILS/0/SD_ILS:23148652024-06-19T21:59:52Z2024-06-19T21:59:52Zby Ajmani, Neelesh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230992/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230992/?ar">https://learning.oreilly.com/library/view/~/9781484230992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230992">https://learning.oreilly.com/library/view/~/9781484230992</a><br/>Format: Electronic Resources<br/>Building a HIPAA-compliant cybersecurity program : using NIST 800-30 and CSF to secure protected health informationent://SD_ILS/0/SD_ILS:23181282024-06-19T21:59:52Z2024-06-19T21:59:52Zby Thompson, Eric C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230602/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230602/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230602/?ar">https://learning.oreilly.com/library/view/~/9781484230602/?ar</a><br/>Format: Electronic Resources<br/>Post-incident reviews : learning from failure for improved incident responseent://SD_ILS/0/SD_ILS:23184992024-06-19T21:59:52Z2024-06-19T21:59:52Zby Hand, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar">https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491986998">https://learning.oreilly.com/library/view/~/9781491986998</a>
<a href="https://learning.oreilly.com/library/view/~/9781491986998/?ar">https://learning.oreilly.com/library/view/~/9781491986998/?ar</a><br/>Format: Electronic Resources<br/>Industrial cybersecurity : efficiently secure critical infrastructure systemsent://SD_ILS/0/SD_ILS:23146742024-06-19T21:59:52Z2024-06-19T21:59:52Zby Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788395151/?ar">https://learning.oreilly.com/library/view/~/9781788395151/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar">https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788395151">https://learning.oreilly.com/library/view/~/9781788395151</a><br/>Format: Electronic Resources<br/>Die Kunst der Anonymität im Internet : so schützen Sie Ihre Identität und Ihre Datenent://SD_ILS/0/SD_ILS:23150112024-06-19T21:59:52Z2024-06-19T21:59:52Zby Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format: Electronic Resources<br/>Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux toolsent://SD_ILS/0/SD_ILS:23153862024-06-19T21:59:52Z2024-06-19T21:59:52Zby Parasram, Shiva V. N., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625005">https://learning.oreilly.com/library/view/~/9781788625005</a>
<a href="https://learning.oreilly.com/library/view/~/9781788625005/?ar">https://learning.oreilly.com/library/view/~/9781788625005/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788625005/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625005/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attackent://SD_ILS/0/SD_ILS:23155292024-06-19T21:59:52Z2024-06-19T21:59:52Zby Buchanan, Cameron, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788831925/?ar">https://go.oreilly.com/library-access/library/view/-/9781788831925/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788831925/?ar">https://learning.oreilly.com/library/view/~/9781788831925/?ar</a><br/>Format: Electronic Resources<br/>Operating system forensic analysis.ent://SD_ILS/0/SD_ILS:23347922024-06-19T21:59:52Z2024-06-19T21:59:52Zby Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029205">https://learning.oreilly.com/videos/~/9781492029205</a>
<a href="https://learning.oreilly.com/videos/~/9781492029205/?ar">https://learning.oreilly.com/videos/~/9781492029205/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492029205/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029205/?ar</a><br/>Format: Video recording<br/>Forensic analysis of computer memory.ent://SD_ILS/0/SD_ILS:23347972024-06-19T21:59:52Z2024-06-19T21:59:52Zby Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029144">https://learning.oreilly.com/videos/~/9781492029144</a>
<a href="https://learning.oreilly.com/videos/~/9781492029144/?ar">https://learning.oreilly.com/videos/~/9781492029144/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar</a><br/>Format: Video recording<br/>Forensic analysis of disk-based evidence.ent://SD_ILS/0/SD_ILS:23347982024-06-19T21:59:52Z2024-06-19T21:59:52Zby Messier, Ric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029120/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029120/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492029120/?ar">https://learning.oreilly.com/videos/~/9781492029120/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492029120">https://learning.oreilly.com/videos/~/9781492029120</a><br/>Format: Video recording<br/>Managing SSH clients and servers.ent://SD_ILS/0/SD_ILS:23343442024-06-19T21:59:52Z2024-06-19T21:59:52Zby Wallen, Jack, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar">https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492031666">https://learning.oreilly.com/videos/~/9781492031666</a>
<a href="https://learning.oreilly.com/videos/~/9781492031666/?ar">https://learning.oreilly.com/videos/~/9781492031666/?ar</a><br/>Format: Video recording<br/>Uygulamalı siber güvenlik ve hackingent://SD_ILS/0/SD_ILS:23430312024-06-19T21:59:52Z2024-06-19T21:59:52Zby Altınkaynak, Mustafa, author<br/>Format: Books<br/>VCP6-NV official cert guide : (exam #2VO-641)ent://SD_ILS/0/SD_ILS:23112922024-06-19T21:59:52Z2024-06-19T21:59:52Zby Sena Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134133713">https://learning.oreilly.com/library/view/~/9780134133713</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar">https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134133713/?ar">https://learning.oreilly.com/library/view/~/9780134133713/?ar</a><br/>Format: Electronic Resources<br/>Fluent conference 2017, San Jose, CA.ent://SD_ILS/0/SD_ILS:23136692024-06-19T21:59:52Z2024-06-19T21:59:52Zby Fluent (2017 : San Jose, California)<br/><a href="https://learning.oreilly.com/videos/~/9781491985298/?ar">https://learning.oreilly.com/videos/~/9781491985298/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491985298/?ar">https://go.oreilly.com/library-access/library/view/-/9781491985298/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux cookbook : effective penetration testing solutionsent://SD_ILS/0/SD_ILS:23142702024-06-19T21:59:52Z2024-06-19T21:59:52Zby Schultz, Corey P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390303/?ar">https://learning.oreilly.com/library/view/~/9781784390303/?ar</a><br/>Format: Electronic Resources<br/>Spring Security LDAP integration and SAML extensionent://SD_ILS/0/SD_ILS:23139432024-06-19T21:59:52Z2024-06-19T21:59:52Zby Mishra, Ankit, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781787285538/?ar">https://learning.oreilly.com/videos/~/9781787285538/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar">https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar</a><br/>Format: Electronic Resources<br/>Cyber security on Azure : an IT professionals guide to Microsoft Azure security centerent://SD_ILS/0/SD_ILS:23137882024-06-19T21:59:52Z2024-06-19T21:59:52Zby Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484227404/?ar">https://learning.oreilly.com/library/view/~/9781484227404/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484227404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484227404/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484227404">https://learning.oreilly.com/library/view/~/9781484227404</a><br/>Format: Electronic Resources<br/>Windows forensics cookbook : 61 recipes to help you analyze Windows systemsent://SD_ILS/0/SD_ILS:23139902024-06-19T21:59:52Z2024-06-19T21:59:52Zby Sulkin, Oleg, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495/?ar">https://learning.oreilly.com/library/view/~/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495">https://learning.oreilly.com/library/view/~/9781784390495</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutionsent://SD_ILS/0/SD_ILS:23146832024-06-19T21:59:52Z2024-06-19T21:59:52Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a>
<a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format: Electronic Resources<br/>Security from first principles : a practical guide to the information security practice principlesent://SD_ILS/0/SD_ILS:23144252024-06-19T21:59:52Z2024-06-19T21:59:52Zby Jackson, Craig, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996911/?ar">https://learning.oreilly.com/library/view/~/9781491996911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996911">https://learning.oreilly.com/library/view/~/9781491996911</a><br/>Format: Electronic Resources<br/>Penetration testing essentials.ent://SD_ILS/0/SD_ILS:23119552024-06-19T21:59:52Z2024-06-19T21:59:52Zby Oriyano, Sean-Philip.<br/><a href="https://learning.oreilly.com/library/view/~/9781119235309">https://learning.oreilly.com/library/view/~/9781119235309</a>
<a href="https://learning.oreilly.com/library/view/~/9781119235309/?ar">https://learning.oreilly.com/library/view/~/9781119235309/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar">https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux network scanning cookbook : take your penetration-testing skills to the next levelent://SD_ILS/0/SD_ILS:23134992024-06-19T21:59:52Z2024-06-19T21:59:52Zby Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format: Electronic Resources<br/>CCSP Certified Cloud Security Professional exam guideent://SD_ILS/0/SD_ILS:23122482024-06-19T21:59:52Z2024-06-19T21:59:52Zby Carter, Daniel, CISSP.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781259835452/?ar">https://go.oreilly.com/library-access/library/view/-/9781259835452/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781259835452/?ar">https://learning.oreilly.com/library/view/~/9781259835452/?ar</a><br/>Format: Electronic Resources<br/>Cyber security engineering : a practical approach for systems and software assuranceent://SD_ILS/0/SD_ILS:23119962024-06-19T21:59:52Z2024-06-19T21:59:52Zby Mead, Nancy R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar">https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134189857/?ar">https://learning.oreilly.com/library/view/~/9780134189857/?ar</a><br/>Format: Electronic Resources<br/>Windows virus and malware troubleshootingent://SD_ILS/0/SD_ILS:23129372024-06-19T21:59:52Z2024-06-19T21:59:52Zby Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format: Electronic Resources<br/>Cloud computing security : foundations and challengesent://SD_ILS/0/SD_ILS:23115242024-06-19T21:59:52Z2024-06-19T21:59:52Zby Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format: Electronic Resources<br/>Hacking exposed : malware and rootkits : security secrets & solutionsent://SD_ILS/0/SD_ILS:23123622024-06-19T21:59:52Z2024-06-19T21:59:52Zby Davis, Michael, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071825757">https://learning.oreilly.com/library/view/~/9780071825757</a>
<a href="https://learning.oreilly.com/library/view/~/9780071825757/?ar">https://learning.oreilly.com/library/view/~/9780071825757/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar">https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar</a><br/>Format: Electronic Resources<br/>Beginning ethical hacking with Pythonent://SD_ILS/0/SD_ILS:23122622024-06-19T21:59:52Z2024-06-19T21:59:52Zby Sinha, Sanjib.<br/><a href="https://learning.oreilly.com/library/view/~/9781484225417">https://learning.oreilly.com/library/view/~/9781484225417</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar">https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484225417/?ar">https://learning.oreilly.com/library/view/~/9781484225417/?ar</a><br/>Format: Electronic Resources<br/>Metasploit for beginners : create a threat-free environment with the best-in-class toolent://SD_ILS/0/SD_ILS:23138402024-06-19T21:59:52Z2024-06-19T21:59:52Zby Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970/?ar">https://learning.oreilly.com/library/view/~/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970">https://learning.oreilly.com/library/view/~/9781788295970</a><br/>Format: Electronic Resources<br/>Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessmentsent://SD_ILS/0/SD_ILS:23132872024-06-19T21:59:52Z2024-06-19T21:59:52Zby Shah, Dhruv, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar">https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783982165/?ar">https://learning.oreilly.com/library/view/~/9781783982165/?ar</a><br/>Format: Electronic Resources<br/>Cyber security : a practitioner's guideent://SD_ILS/0/SD_ILS:23137632024-06-19T21:59:52Z2024-06-19T21:59:52Zby Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format: Electronic Resources<br/>Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systemsent://SD_ILS/0/SD_ILS:23116092024-06-19T21:59:52Z2024-06-19T21:59:52Zby Griffor, Edward R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128038383/?ar">https://learning.oreilly.com/library/view/~/9780128038383/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar">https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128038383">https://learning.oreilly.com/library/view/~/9780128038383</a><br/>Format: Electronic Resources<br/>Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules.ent://SD_ILS/0/SD_ILS:23153202024-06-19T21:59:52Z2024-06-19T21:59:52Zby Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788624596/?ar">https://learning.oreilly.com/library/view/~/9781788624596/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar</a><br/>Format: Electronic Resources<br/>Privacy and the Internet of Thingsent://SD_ILS/0/SD_ILS:23166482024-06-19T21:59:52Z2024-06-19T21:59:52Zby Rosner, Gilad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042822">https://learning.oreilly.com/library/view/~/9781492042822</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042822/?ar">https://learning.oreilly.com/library/view/~/9781492042822/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042822/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042822/?ar</a><br/>Format: Electronic Resources<br/>An quan shen tou ce shi.ent://SD_ILS/0/SD_ILS:23324372024-06-19T21:59:52Z2024-06-19T21:59:52Zby Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882021010401/?ar">https://learning.oreilly.com/videos/~/8882021010401/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010401">https://learning.oreilly.com/videos/~/8882021010401</a>
<a href="https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar</a><br/>Format: Video recording<br/>