Search Results for - Narrowed by: 2019 - Computer networks -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092019$0025092019$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-05-26T18:50:33ZIncident response primer : how to keep from getting pwned too hardent://SD_ILS/0/SD_ILS:23233162024-05-26T18:50:33Z2024-05-26T18:50:33Zby Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format: Electronic Resources<br/>Cybersecurity of industrial systemsent://SD_ILS/0/SD_ILS:22735712024-05-26T18:50:33Z2024-05-26T18:50:33Zby Flaus, Jean-Marie, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5813671">Click to View</a><br/>Format: Electronic Resources<br/>Rewired cybersecurity governanceent://SD_ILS/0/SD_ILS:22734242024-05-26T18:50:33Z2024-05-26T18:50:33Zby Ellis, Ryan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5761058">Click to View</a><br/>Format: Electronic Resources<br/>Cyber and you : the impact of technology on our livesent://SD_ILS/0/SD_ILS:22170812024-05-26T18:50:33Z2024-05-26T18:50:33Zby Kendal, Maureen, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5811334">Click to View</a><br/>Format: Electronic Resources<br/>Extended topology analysis of a detection mechanism implementation against Botnet Based DDoS flooding attack in SDNent://SD_ILS/0/SD_ILS:21338912024-05-26T18:50:33Z2024-05-26T18:50:33Zby Karakış, Emre, author.<br/><a href="https://hdl.handle.net/11147/7430">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Understanding security issuesent://SD_ILS/0/SD_ILS:21445942024-05-26T18:50:33Z2024-05-26T18:50:33Zby Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157542">Click to View</a><br/>Format: Electronic Resources<br/>Security within Conasense Paragonent://SD_ILS/0/SD_ILS:22324832024-05-26T18:50:33Z2024-05-26T18:50:33Zby Prasad, Ramjee, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5829254">Click to View</a><br/>Format: Electronic Resources<br/>Smart cities cybersecurity and privacyent://SD_ILS/0/SD_ILS:22158832024-05-26T18:50:33Z2024-05-26T18:50:33Zby Kayhan Zrar Ghafoor, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5609779">Click to View</a><br/>Format: Electronic Resources<br/>Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risksent://SD_ILS/0/SD_ILS:23219542024-05-26T18:50:33Z2024-05-26T18:50:33Zby Born, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789807608/?ar">https://learning.oreilly.com/library/view/~/9781789807608/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807608">https://learning.oreilly.com/library/view/~/9781789807608</a><br/>Format: Electronic Resources<br/>Cyber resiliency solution for IBM Spectrum Scaleent://SD_ILS/0/SD_ILS:23221452024-05-26T18:50:33Z2024-05-26T18:50:33Zby IBM Storage Team, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457963/?ar">https://learning.oreilly.com/library/view/~/9780738457963/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar</a><br/>Format: Electronic Resources<br/>Practical cyber forensics : an incident-based approach to forensic investigationsent://SD_ILS/0/SD_ILS:23215212024-05-26T18:50:33Z2024-05-26T18:50:33Zby Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format: Electronic Resources<br/>The complete Metasploit guide : explore effective penetration testing techniques with Metasploitent://SD_ILS/0/SD_ILS:22682362024-05-26T18:50:33Z2024-05-26T18:50:33Zby Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5802136">Click to View</a><br/>Format: Electronic Resources<br/>The business of cybersecurity : foundations and ideologiesent://SD_ILS/0/SD_ILS:21569012024-05-26T18:50:33Z2024-05-26T18:50:33Zby Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5770273">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity of industrial systemsent://SD_ILS/0/SD_ILS:23212932024-05-26T18:50:33Z2024-05-26T18:50:33Zby Flaus, Jean-Marie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786304216/?ar">https://learning.oreilly.com/library/view/~/9781786304216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304216">https://learning.oreilly.com/library/view/~/9781786304216</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786304216/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304216/?ar</a><br/>Format: Electronic Resources<br/>PCI DSS : a pocket guideent://SD_ILS/0/SD_ILS:23221602024-05-26T18:50:33Z2024-05-26T18:50:33Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781641/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781641/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781641/?ar">https://learning.oreilly.com/library/view/~/9781787781641/?ar</a><br/>Format: Electronic Resources<br/>Learn Wireshark : Confidently Navigate the Wireshark Interface and Solve Real-World Networking Problems.ent://SD_ILS/0/SD_ILS:23217012024-05-26T18:50:33Z2024-05-26T18:50:33Zby Bock, Lisa.<br/><a href="https://learning.oreilly.com/library/view/~/9781789134506">https://learning.oreilly.com/library/view/~/9781789134506</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789134506/?ar">https://go.oreilly.com/library-access/library/view/-/9781789134506/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789134506/?ar">https://learning.oreilly.com/library/view/~/9781789134506/?ar</a><br/>Format: Electronic Resources<br/>Waging cyber war : technical challenges and operational constraintsent://SD_ILS/0/SD_ILS:23219082024-05-26T18:50:33Z2024-05-26T18:50:33Zby Oakley, Jacob G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249505/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249505/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484249505/?ar">https://learning.oreilly.com/library/view/~/9781484249505/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity for dummiesent://SD_ILS/0/SD_ILS:23227472024-05-26T18:50:33Z2024-05-26T18:50:33Zby Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781494542450">https://learning.oreilly.com/library/view/~/9781494542450</a>
<a href="https://learning.oreilly.com/library/view/~/9781494542450/?ar">https://learning.oreilly.com/library/view/~/9781494542450/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar">https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar</a><br/>Format: Electronic Resources<br/>Pro Spring security : securing Spring Framework 5 and Boot 2-based Java applicationsent://SD_ILS/0/SD_ILS:23230722024-05-26T18:50:33Z2024-05-26T18:50:33Zby Scarioni, Carlo, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484250525/?ar">https://learning.oreilly.com/library/view/~/9781484250525/?ar</a><br/>Format: Electronic Resources<br/>The Complete Ethical Hacking Courseent://SD_ILS/0/SD_ILS:23231852024-05-26T18:50:33Z2024-05-26T18:50:33Zby Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format: Electronic Resources<br/>Mastering Active Directory - Second Editionent://SD_ILS/0/SD_ILS:23239792024-05-26T18:50:33Z2024-05-26T18:50:33Zby Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789800203/?ar">https://learning.oreilly.com/library/view/~/9781789800203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar">https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789800203">https://learning.oreilly.com/library/view/~/9781789800203</a><br/>Format: Electronic Resources<br/>Computer security : art and scienceent://SD_ILS/0/SD_ILS:23184522024-05-26T18:50:33Z2024-05-26T18:50:33Zby Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format: Electronic Resources<br/>Practical cloud security : a guide for secure design and deploymentent://SD_ILS/0/SD_ILS:23190052024-05-26T18:50:33Z2024-05-26T18:50:33Zby Dotson, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492037507">https://learning.oreilly.com/library/view/~/9781492037507</a>
<a href="https://learning.oreilly.com/library/view/~/9781492037507/?ar">https://learning.oreilly.com/library/view/~/9781492037507/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar</a><br/>Format: Electronic Resources<br/>Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and dataent://SD_ILS/0/SD_ILS:23192382024-05-26T18:50:33Z2024-05-26T18:50:33Zby Nickel, Jochen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789132304/?ar">https://learning.oreilly.com/library/view/~/9781789132304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar">https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar</a><br/>Format: Electronic Resources<br/>Practical security automation and testing : tools and techniques for automated security scanning and testing in DevSecOpsent://SD_ILS/0/SD_ILS:23190962024-05-26T18:50:33Z2024-05-26T18:50:33Zby Hsu, Tony Hsiang-Chih, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789802023/?ar">https://learning.oreilly.com/library/view/~/9781789802023/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789802023/?ar">https://go.oreilly.com/library-access/library/view/-/9781789802023/?ar</a><br/>Format: Electronic Resources<br/>Hands-on penetration testing with Kali NetHunter : spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the goent://SD_ILS/0/SD_ILS:23193612024-05-26T18:50:33Z2024-05-26T18:50:33Zby Singh, Glen D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995177/?ar">https://learning.oreilly.com/library/view/~/9781788995177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995177">https://learning.oreilly.com/library/view/~/9781788995177</a><br/>Format: Electronic Resources<br/>Threat and vulnerability assessment for enterprisesent://SD_ILS/0/SD_ILS:23192772024-05-26T18:50:33Z2024-05-26T18:50:33Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781838559205/?ar">https://learning.oreilly.com/videos/~/9781838559205/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar">https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar</a><br/>Format: Electronic Resources<br/>Hands-on AWS penetration testing with Kali Linux : set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormationent://SD_ILS/0/SD_ILS:23214092024-05-26T18:50:33Z2024-05-26T18:50:33Zby Gilbert, Karl, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789136722">https://learning.oreilly.com/library/view/~/9781789136722</a>
<a href="https://learning.oreilly.com/library/view/~/9781789136722/?ar">https://learning.oreilly.com/library/view/~/9781789136722/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar">https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar</a><br/>Format: Electronic Resources<br/>Hands-on pfSense 2.x for firewalls and routersent://SD_ILS/0/SD_ILS:23193342024-05-26T18:50:33Z2024-05-26T18:50:33Zby White, Jason, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789805017/?ar">https://go.oreilly.com/library-access/library/view/-/9781789805017/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789805017/?ar">https://learning.oreilly.com/videos/~/9781789805017/?ar</a><br/>Format: Electronic Resources<br/>Microsoft AZ-301 certification : Azure architect designent://SD_ILS/0/SD_ILS:23208262024-05-26T18:50:33Z2024-05-26T18:50:33Zby Colyer, Nick, speaker.<br/><a href="https://learning.oreilly.com/videos/~/1018947653/?ar">https://learning.oreilly.com/videos/~/1018947653/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1018947653/?ar">https://go.oreilly.com/library-access/library/view/-/1018947653/?ar</a>
<a href="https://learning.oreilly.com/videos/~/1018947653">https://learning.oreilly.com/videos/~/1018947653</a><br/>Format: Electronic Resources<br/>Practical security : simple practices for defending your systemsent://SD_ILS/0/SD_ILS:23194022024-05-26T18:50:33Z2024-05-26T18:50:33Zby Zabicki, Roman, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar">https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679">https://learning.oreilly.com/library/view/~/9781680506679</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679/?ar">https://learning.oreilly.com/library/view/~/9781680506679/?ar</a><br/>Format: Electronic Resources<br/>The cybersecurity playbook : how every leader and employee can contribute to a culture of securityent://SD_ILS/0/SD_ILS:23215682024-05-26T18:50:33Z2024-05-26T18:50:33Zby Cerra, Allison, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar">https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196/?ar">https://learning.oreilly.com/library/view/~/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196">https://learning.oreilly.com/library/view/~/9781119442196</a><br/>Format: Electronic Resources<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:23195342024-05-26T18:50:33Z2024-05-26T18:50:33Zby Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a>
<a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format: Electronic Resources<br/>O'Reilly Velocity Conference 2019, San Jose, California.ent://SD_ILS/0/SD_ILS:23228862024-05-26T18:50:33Z2024-05-26T18:50:33Zby O'Reilly Velocity Conference (2019 : San Jose, Calif.) issuing body.<br/><a href="https://learning.oreilly.com/videos/~/9781492050582/?ar">https://learning.oreilly.com/videos/~/9781492050582/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492050582/?ar">https://go.oreilly.com/library-access/library/view/-/9781492050582/?ar</a><br/>Format: Electronic Resources<br/>Security principles for the working architectent://SD_ILS/0/SD_ILS:23226912024-05-26T18:50:33Z2024-05-26T18:50:33Zby Woods, Eoin, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338215/?ar">https://learning.oreilly.com/videos/~/0636920338215/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920338215">https://learning.oreilly.com/videos/~/0636920338215</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar</a><br/>Format: Electronic Resources<br/>Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessonsent://SD_ILS/0/SD_ILS:23215502024-05-26T18:50:33Z2024-05-26T18:50:33Zby Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format: Electronic Resources<br/>Zero trust networks with VMware NSX : build highly secure network architectures for your data centersent://SD_ILS/0/SD_ILS:23226592024-05-26T18:50:33Z2024-05-26T18:50:33Zby Keeriyattil, Sreejith, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484254318">https://learning.oreilly.com/library/view/~/9781484254318</a>
<a href="https://learning.oreilly.com/library/view/~/9781484254318/?ar">https://learning.oreilly.com/library/view/~/9781484254318/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484254318/?ar">https://go.oreilly.com/library-access/library/view/-/9781484254318/?ar</a><br/>Format: Electronic Resources<br/>Fraud detection without feature engineeringent://SD_ILS/0/SD_ILS:23224342024-05-26T18:50:33Z2024-05-26T18:50:33Zby Vagata, Pamela, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540/?ar">https://learning.oreilly.com/videos/~/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540">https://learning.oreilly.com/videos/~/0636920339540</a><br/>Format: Electronic Resources<br/>Bug bounty hunting for web security : find and exploit vulnerabilities in web sites and applicationsent://SD_ILS/0/SD_ILS:23230372024-05-26T18:50:33Z2024-05-26T18:50:33Zby Sinha, Sanjib, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484253915/?ar">https://learning.oreilly.com/library/view/~/9781484253915/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484253915/?ar">https://go.oreilly.com/library-access/library/view/-/9781484253915/?ar</a><br/>Format: Electronic Resources<br/>Linux essentials for cybersecurity lab manualent://SD_ILS/0/SD_ILS:23175582024-05-26T18:50:33Z2024-05-26T18:50:33Zby Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format: Electronic Resources<br/>Data analytics for IT networks : developing innovative use casesent://SD_ILS/0/SD_ILS:23175592024-05-26T18:50:33Z2024-05-26T18:50:33Zby Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format: Electronic Resources<br/>Cyber operations : building, defending, and attacking modern computer networksent://SD_ILS/0/SD_ILS:23189142024-05-26T18:50:33Z2024-05-26T18:50:33Zby O'Leary, Mike, 1968- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242940">https://learning.oreilly.com/library/view/~/9781484242940</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242940/?ar">https://learning.oreilly.com/library/view/~/9781484242940/?ar</a><br/>Format: Electronic Resources<br/>Zabbix 4 network monitoring : monitor the performance of your network devices and applications using the all-new Zabbix 4.0ent://SD_ILS/0/SD_ILS:23190102024-05-26T18:50:33Z2024-05-26T18:50:33Zby Uytterhoeven, Patrik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340266/?ar">https://learning.oreilly.com/library/view/~/9781789340266/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity Ops with bash : attack, defend, and analyze from the command lineent://SD_ILS/0/SD_ILS:23192522024-05-26T18:50:33Z2024-05-26T18:50:33Zby Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Enterprise Mobility and Security trainingent://SD_ILS/0/SD_ILS:23195562024-05-26T18:50:33Z2024-05-26T18:50:33Zby Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format: Electronic Resources<br/>Becoming the hacker : the playbook for getting inside the mind of an attackerent://SD_ILS/0/SD_ILS:23191292024-05-26T18:50:33Z2024-05-26T18:50:33Zby Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Electronic Resources<br/>Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environmentsent://SD_ILS/0/SD_ILS:23220552024-05-26T18:50:33Z2024-05-26T18:50:33Zby Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format: Electronic Resources<br/>Web hacking : become a professional web pentesterent://SD_ILS/0/SD_ILS:23198312024-05-26T18:50:33Z2024-05-26T18:50:33Zby Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format: Electronic Resources<br/>Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualizationent://SD_ILS/0/SD_ILS:23189382024-05-26T18:50:33Z2024-05-26T18:50:33Zby Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134807614/?ar">https://learning.oreilly.com/library/view/~/9780134807614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807614">https://learning.oreilly.com/library/view/~/9780134807614</a><br/>Format: Electronic Resources<br/>Cyber smart : five habits to protect your family, money, and identity from cyber criminalsent://SD_ILS/0/SD_ILS:23188682024-05-26T18:50:33Z2024-05-26T18:50:33Zby McDonough, Bart R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469071503/?ar">https://learning.oreilly.com/library/view/~/9781469071503/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar">https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469071503">https://learning.oreilly.com/library/view/~/9781469071503</a><br/>Format: Sound recording<br/>Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux 2019.1, the ultimate white hat hackers' toolkitent://SD_ILS/0/SD_ILS:23191142024-05-26T18:50:33Z2024-05-26T18:50:33Zby Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340563/?ar">https://learning.oreilly.com/library/view/~/9781789340563/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar</a><br/>Format: Electronic Resources<br/>Hands-on application penetration testing with Burp Suite : use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applicationsent://SD_ILS/0/SD_ILS:23193602024-05-26T18:50:33Z2024-05-26T18:50:33Zby Lozano, Carlos A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788994064/?ar">https://learning.oreilly.com/library/view/~/9781788994064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar">https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788994064">https://learning.oreilly.com/library/view/~/9781788994064</a><br/>Format: Electronic Resources<br/>Learning Python for forensics : leverage the power of Python in forensic investigationsent://SD_ILS/0/SD_ILS:23191162024-05-26T18:50:33Z2024-05-26T18:50:33Zby Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format: Electronic Resources<br/>Practical cloud security.ent://SD_ILS/0/SD_ILS:23346162024-05-26T18:50:33Z2024-05-26T18:50:33Zby Dotson, Chris, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar">https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727">https://learning.oreilly.com/videos/~/9781492060727</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727/?ar">https://learning.oreilly.com/videos/~/9781492060727/?ar</a><br/>Format: Video recording<br/>Implementing Cisco network security, Part 2.ent://SD_ILS/0/SD_ILS:23348012024-05-26T18:50:33Z2024-05-26T18:50:33Zby Pickard, John, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar">https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920303213">https://learning.oreilly.com/videos/~/0636920303213</a>
<a href="https://learning.oreilly.com/videos/~/0636920303213/?ar">https://learning.oreilly.com/videos/~/0636920303213/?ar</a><br/>Format: Video recording<br/>Foundations of information security : a straightforward introductionent://SD_ILS/0/SD_ILS:23223132024-05-26T18:50:33Z2024-05-26T18:50:33Zby Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098122546/?ar">https://learning.oreilly.com/library/view/~/9781098122546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122546">https://learning.oreilly.com/library/view/~/9781098122546</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar</a><br/>Format: Electronic Resources<br/>Linux troubleshooting course with real life examplesent://SD_ILS/0/SD_ILS:23232382024-05-26T18:50:33Z2024-05-26T18:50:33Zby Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format: Electronic Resources<br/>IBM Spectrum Protect Plus : practical guidance for deployment, configuration, and usageent://SD_ILS/0/SD_ILS:23230172024-05-26T18:50:33Z2024-05-26T18:50:33Zby Gaschler, Andre, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738458045/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458045/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458045/?ar">https://learning.oreilly.com/library/view/~/9780738458045/?ar</a><br/>Format: Electronic Resources<br/>How Lyft migrated to a service mesh with Envoyent://SD_ILS/0/SD_ILS:23232962024-05-26T18:50:33Z2024-05-26T18:50:33Zby Hochman, Daniel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338390/?ar">https://learning.oreilly.com/videos/~/0636920338390/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920338390">https://learning.oreilly.com/videos/~/0636920338390</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar</a><br/>Format: Electronic Resources<br/>Qi ye shen tou ce shi he chi xu jian kong.ent://SD_ILS/0/SD_ILS:23322892024-05-26T18:50:33Z2024-05-26T18:50:33Zby Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format: Video recording<br/>Spring security : LiveLessonsent://SD_ILS/0/SD_ILS:23184932024-05-26T18:50:33Z2024-05-26T18:50:33Zby Long, Josh, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar">https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780135415054/?ar">https://learning.oreilly.com/videos/~/9780135415054/?ar</a><br/>Format: Electronic Resources<br/>Security with AI and machine learning : using advanced tools to improve application security at the edgeent://SD_ILS/0/SD_ILS:23190582024-05-26T18:50:33Z2024-05-26T18:50:33Zby Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format: Electronic Resources<br/>Hands-on network forensics : investigate network attacks and find evidence using common network forensic toolsent://SD_ILS/0/SD_ILS:23198362024-05-26T18:50:33Z2024-05-26T18:50:33Zby Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789344523/?ar">https://learning.oreilly.com/library/view/~/9781789344523/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testingent://SD_ILS/0/SD_ILS:23198472024-05-26T18:50:33Z2024-05-26T18:50:33Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format: Electronic Resources<br/>Protecting your web applications : solutions and strategies to combat cybersecurity threatsent://SD_ILS/0/SD_ILS:23211662024-05-26T18:50:33Z2024-05-26T18:50:33Zby Sloper, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492052791">https://learning.oreilly.com/library/view/~/9781492052791</a>
<a href="https://learning.oreilly.com/library/view/~/9781492052791/?ar">https://learning.oreilly.com/library/view/~/9781492052791/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar</a><br/>Format: Electronic Resources<br/>My online privacy for seniorsent://SD_ILS/0/SD_ILS:23194122024-05-26T18:50:33Z2024-05-26T18:50:33Zby Rich, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135381281/?ar">https://learning.oreilly.com/library/view/~/9780135381281/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar">https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers : cybersecurity advice from the best hackers in the worldent://SD_ILS/0/SD_ILS:23214522024-05-26T18:50:33Z2024-05-26T18:50:33Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format: Electronic Resources<br/>Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloudent://SD_ILS/0/SD_ILS:23214882024-05-26T18:50:33Z2024-05-26T18:50:33Zby Berkouwer, Sander, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806984">https://learning.oreilly.com/library/view/~/9781789806984</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806984/?ar">https://learning.oreilly.com/library/view/~/9781789806984/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar</a><br/>Format: Electronic Resources<br/>Learn Kali Linux 2019 : perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wiresharkent://SD_ILS/0/SD_ILS:23237682024-05-26T18:50:33Z2024-05-26T18:50:33Zby Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789611809/?ar">https://learning.oreilly.com/library/view/~/9781789611809/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789611809">https://learning.oreilly.com/library/view/~/9781789611809</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar">https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar</a><br/>Format: Electronic Resources<br/>