Search Results for - Narrowed by: 2019 - S&eacute;curit&eacute; informatique. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092019$0025092019$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300$0026isd$003dtrue? 2024-09-26T01:23:19Z Incident response primer : how to keep from getting pwned too hard ent://SD_ILS/0/SD_ILS:2323316 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format:&#160;Electronic Resources<br/> Linux essentials for cybersecurity lab manual ent://SD_ILS/0/SD_ILS:2317558 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data analytics for IT networks : developing innovative use cases ent://SD_ILS/0/SD_ILS:2317559 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical security : simple practices for defending your systems ent://SD_ILS/0/SD_ILS:2319402 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Zabicki, Roman, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar">https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781680506679">https://learning.oreilly.com/library/view/~/9781680506679</a> <a href="https://learning.oreilly.com/library/view/~/9781680506679/?ar">https://learning.oreilly.com/library/view/~/9781680506679/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on cryptography with Java ent://SD_ILS/0/SD_ILS:2319124 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Costlow, Erik, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar">https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781838554972/?ar">https://learning.oreilly.com/videos/~/9781838554972/?ar</a><br/>Format:&#160;Electronic Resources<br/> Becoming the hacker : the playbook for getting inside the mind of an attacker ent://SD_ILS/0/SD_ILS:2319129 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format:&#160;Electronic Resources<br/> The art of hacking (video collection) ent://SD_ILS/0/SD_ILS:2319884 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar">https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780135767849/?ar">https://learning.oreilly.com/videos/~/9780135767849/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Ops with bash : attack, defend, and analyze from the command line ent://SD_ILS/0/SD_ILS:2319252 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a> <a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format:&#160;Electronic Resources<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:2319534 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a> <a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing ent://SD_ILS/0/SD_ILS:2319847 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Enterprise Mobility and Security training ent://SD_ILS/0/SD_ILS:2319556 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:2321574 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Quade, Phil.<br/><a href="https://learning.oreilly.com/library/view/~/9781119617365">https://learning.oreilly.com/library/view/~/9781119617365</a> <a href="https://learning.oreilly.com/library/view/~/9781119617365/?ar">https://learning.oreilly.com/library/view/~/9781119617365/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar">https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber smart : five habits to protect your family, money, and identity from cyber criminals ent://SD_ILS/0/SD_ILS:2318868 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;McDonough, Bart R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469071503/?ar">https://learning.oreilly.com/library/view/~/9781469071503/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar">https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781469071503">https://learning.oreilly.com/library/view/~/9781469071503</a><br/>Format:&#160;Sound recording<br/> Dynamic SQL : applications, performance, and security in Microsoft SQL server ent://SD_ILS/0/SD_ILS:2318295 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Pollack, Edward, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243183/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243183/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243183/?ar">https://learning.oreilly.com/library/view/~/9781484243183/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243183">https://learning.oreilly.com/library/view/~/9781484243183</a><br/>Format:&#160;Electronic Resources<br/> Zabbix 4 network monitoring : monitor the performance of your network devices and applications using the all-new Zabbix 4.0 ent://SD_ILS/0/SD_ILS:2319010 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Uytterhoeven, Patrik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340266/?ar">https://learning.oreilly.com/library/view/~/9781789340266/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber operations : building, defending, and attacking modern computer networks ent://SD_ILS/0/SD_ILS:2318914 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;O'Leary, Mike, 1968- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242940">https://learning.oreilly.com/library/view/~/9781484242940</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484242940/?ar">https://learning.oreilly.com/library/view/~/9781484242940/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber resiliency solution for IBM Spectrum Scale ent://SD_ILS/0/SD_ILS:2322145 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;IBM Storage Team, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457963/?ar">https://learning.oreilly.com/library/view/~/9780738457963/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar</a><br/>Format:&#160;Electronic Resources<br/> Solving identity management in modern applications : demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 ent://SD_ILS/0/SD_ILS:2322723 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Wilson, Yvonne.<br/><a href="https://learning.oreilly.com/library/view/~/9781484250952/?ar">https://learning.oreilly.com/library/view/~/9781484250952/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484250952">https://learning.oreilly.com/library/view/~/9781484250952</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar</a><br/>Format:&#160;Electronic Resources<br/> Rootkits and bootkits : reversing modern malware and next generation threats ent://SD_ILS/0/SD_ILS:2314357 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Matrosov, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492071259/?ar">https://learning.oreilly.com/library/view/~/9781492071259/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar">https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492071259">https://learning.oreilly.com/library/view/~/9781492071259</a><br/>Format:&#160;Electronic Resources<br/> Investigating Cryptocurrencies : Understanding, Extracting, and Analyzing Blockchain Evidence ent://SD_ILS/0/SD_ILS:2325578 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Furneaux, Nick.<br/><a href="https://learning.oreilly.com/library/view/~/9781469076607/?ar">https://learning.oreilly.com/library/view/~/9781469076607/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781469076607/?ar">https://go.oreilly.com/library-access/library/view/-/9781469076607/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781469076607">https://learning.oreilly.com/library/view/~/9781469076607</a><br/>Format:&#160;Sound recording<br/> Machine Learning et s&eacute;curit&eacute; ent://SD_ILS/0/SD_ILS:2326075 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar">https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9782412043561">https://learning.oreilly.com/library/view/~/9782412043561</a> <a href="https://learning.oreilly.com/library/view/~/9782412043561/?ar">https://learning.oreilly.com/library/view/~/9782412043561/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics basics : a practical guide using Windows OS ent://SD_ILS/0/SD_ILS:2319813 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Hassan, Nihad A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238387/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484238387/?ar">https://learning.oreilly.com/library/view/~/9781484238387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484238387">https://learning.oreilly.com/library/view/~/9781484238387</a><br/>Format:&#160;Electronic Resources<br/> Security with AI and machine learning : using advanced tools to improve application security at the edge ent://SD_ILS/0/SD_ILS:2319058 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format:&#160;Electronic Resources<br/> Computer security : art and science ent://SD_ILS/0/SD_ILS:2318452 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on Spring security 5.1.1 ent://SD_ILS/0/SD_ILS:2319110 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Lelek, Tomasz, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789802931/?ar">https://learning.oreilly.com/videos/~/9781789802931/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789802931/?ar">https://go.oreilly.com/library-access/library/view/-/9781789802931/?ar</a><br/>Format:&#160;Electronic Resources<br/> My online privacy for seniors ent://SD_ILS/0/SD_ILS:2319412 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Rich, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135381281/?ar">https://learning.oreilly.com/library/view/~/9780135381281/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar">https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:2319220 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Tanner, Nadean H., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar">https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119552932/?ar">https://learning.oreilly.com/library/view/~/9781119552932/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119552932">https://learning.oreilly.com/library/view/~/9781119552932</a><br/>Format:&#160;Electronic Resources<br/> Web hacking : become a professional web pentester ent://SD_ILS/0/SD_ILS:2319831 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital asset valuation and cyber risk measurement : principles of cybernomics ent://SD_ILS/0/SD_ILS:2320462 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Ruan, Keyun, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128123287">https://learning.oreilly.com/library/view/~/9780128123287</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128123287/?ar">https://go.oreilly.com/library-access/library/view/-/9780128123287/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128123287/?ar">https://learning.oreilly.com/library/view/~/9780128123287/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Malware Analysis : the Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks. ent://SD_ILS/0/SD_ILS:2320922 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Kleymenov, Alexey.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar">https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789610789">https://learning.oreilly.com/library/view/~/9781789610789</a> <a href="https://learning.oreilly.com/library/view/~/9781789610789/?ar">https://learning.oreilly.com/library/view/~/9781789610789/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat and vulnerability assessment for enterprises ent://SD_ILS/0/SD_ILS:2319277 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781838559205/?ar">https://learning.oreilly.com/videos/~/9781838559205/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar">https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux basics for hackers : getting started with networking, scripting, and security in Kali ent://SD_ILS/0/SD_ILS:2318554 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;OccupyTheWeb, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492069485/?ar">https://learning.oreilly.com/library/view/~/9781492069485/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492069485">https://learning.oreilly.com/library/view/~/9781492069485</a><br/>Format:&#160;Electronic Resources<br/> Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization ent://SD_ILS/0/SD_ILS:2318938 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134807614/?ar">https://learning.oreilly.com/library/view/~/9780134807614/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134807614">https://learning.oreilly.com/library/view/~/9780134807614</a><br/>Format:&#160;Electronic Resources<br/> Professional Red teaming : conducting successful cybersecurity engagements ent://SD_ILS/0/SD_ILS:2318977 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Oakley, Jacob G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243091/?ar">https://learning.oreilly.com/library/view/~/9781484243091/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243091">https://learning.oreilly.com/library/view/~/9781484243091</a><br/>Format:&#160;Electronic Resources<br/> Exam ref MS-101 Microsoft 365 Mobility and Security ent://SD_ILS/0/SD_ILS:2321271 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Svidergol, Brian, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135574843/?ar">https://go.oreilly.com/library-access/library/view/-/9780135574843/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135574843/?ar">https://learning.oreilly.com/library/view/~/9780135574843/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessons ent://SD_ILS/0/SD_ILS:2321550 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format:&#160;Electronic Resources<br/> Informationssicherheit und Datenschutz : Handbuch f&uuml;r Praktiker und Begleitbuch zum T.I.S.P. ent://SD_ILS/0/SD_ILS:2322189 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Domnick, Andr&eacute;, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar">https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098123659/?ar">https://learning.oreilly.com/library/view/~/9781098123659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098123659">https://learning.oreilly.com/library/view/~/9781098123659</a><br/>Format:&#160;Electronic Resources<br/> Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your data ent://SD_ILS/0/SD_ILS:2322204 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Chakrabarty, Boudhayan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458014/?ar">https://learning.oreilly.com/library/view/~/9780738458014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458014">https://learning.oreilly.com/library/view/~/9780738458014</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar</a><br/>Format:&#160;Electronic Resources<br/> Foundations of information security : a straightforward introduction ent://SD_ILS/0/SD_ILS:2322313 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098122546/?ar">https://learning.oreilly.com/library/view/~/9781098122546/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098122546">https://learning.oreilly.com/library/view/~/9781098122546</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with Ghidra ent://SD_ILS/0/SD_ILS:2322605 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar">https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098115265/?ar">https://learning.oreilly.com/library/view/~/9781098115265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098115265">https://learning.oreilly.com/library/view/~/9781098115265</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for dummies ent://SD_ILS/0/SD_ILS:2322747 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781494542450">https://learning.oreilly.com/library/view/~/9781494542450</a> <a href="https://learning.oreilly.com/library/view/~/9781494542450/?ar">https://learning.oreilly.com/library/view/~/9781494542450/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar">https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar</a><br/>Format:&#160;Electronic Resources<br/> Qi ye shen tou ce shi he chi xu jian kong. ent://SD_ILS/0/SD_ILS:2332289 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a> <a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a> <a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format:&#160;Video recording<br/> The complete Metasploit guide : explore effective penetration testing techniques with Metasploit ent://SD_ILS/0/SD_ILS:2327077 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838822477">https://learning.oreilly.com/library/view/~/9781838822477</a> <a href="https://learning.oreilly.com/library/view/~/9781838822477/?ar">https://learning.oreilly.com/library/view/~/9781838822477/?ar</a><br/>Format:&#160;Electronic Resources<br/> Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud ent://SD_ILS/0/SD_ILS:2321488 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Berkouwer, Sander, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806984">https://learning.oreilly.com/library/view/~/9781789806984</a> <a href="https://learning.oreilly.com/library/view/~/9781789806984/?ar">https://learning.oreilly.com/library/view/~/9781789806984/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies ent://SD_ILS/0/SD_ILS:2321510 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Parisi, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789804027/?ar">https://go.oreilly.com/library-access/library/view/-/9781789804027/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789804027">https://learning.oreilly.com/library/view/~/9781789804027</a> <a href="https://learning.oreilly.com/library/view/~/9781789804027/?ar">https://learning.oreilly.com/library/view/~/9781789804027/?ar</a><br/>Format:&#160;Electronic Resources<br/> The cybersecurity playbook : how every leader and employee can contribute to a culture of security ent://SD_ILS/0/SD_ILS:2321568 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Cerra, Allison, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar">https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119442196/?ar">https://learning.oreilly.com/library/view/~/9781119442196/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119442196">https://learning.oreilly.com/library/view/~/9781119442196</a><br/>Format:&#160;Electronic Resources<br/> We have root : even more advice from Schneier on security ent://SD_ILS/0/SD_ILS:2321573 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643012">https://learning.oreilly.com/library/view/~/9781119643012</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643012/?ar">https://learning.oreilly.com/library/view/~/9781119643012/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacks ent://SD_ILS/0/SD_ILS:2322400 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242551/?ar">https://learning.oreilly.com/library/view/~/9781484242551/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484242551">https://learning.oreilly.com/library/view/~/9781484242551</a><br/>Format:&#160;Electronic Resources<br/> Fraud detection without feature engineering ent://SD_ILS/0/SD_ILS:2322434 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Vagata, Pamela, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339540/?ar">https://learning.oreilly.com/videos/~/0636920339540/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339540">https://learning.oreilly.com/videos/~/0636920339540</a><br/>Format:&#160;Electronic Resources<br/> Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments ent://SD_ILS/0/SD_ILS:2322055 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber-Vigilance and Digital Trust ent://SD_ILS/0/SD_ILS:2324869 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Tounsi, Wiem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786304483">https://learning.oreilly.com/library/view/~/9781786304483</a> <a href="https://learning.oreilly.com/library/view/~/9781786304483/?ar">https://learning.oreilly.com/library/view/~/9781786304483/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing your cloud : IBM security for LinuxONE ent://SD_ILS/0/SD_ILS:2321597 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Alves, Edi Lopes, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457949/?ar">https://learning.oreilly.com/library/view/~/9780738457949/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:2321452 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format:&#160;Electronic Resources<br/> Beginning security with Microsoft technologies : protecting Office 365, devices, and data ent://SD_ILS/0/SD_ILS:2322123 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Lakshmi, Vasantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484248539/?ar">https://learning.oreilly.com/library/view/~/9781484248539/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar">https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar</a><br/>Format:&#160;Electronic Resources<br/> System administration ethics : ten commandments for security and compliance in a modern cyber world ent://SD_ILS/0/SD_ILS:2322866 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Ljubuncic, Igor, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249888/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249888/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484249888/?ar">https://learning.oreilly.com/library/view/~/9781484249888/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing mit mimikatz : Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchf&uuml;hren ent://SD_ILS/0/SD_ILS:2321348 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958459700">https://learning.oreilly.com/library/view/~/9783958459700</a> <a href="https://learning.oreilly.com/library/view/~/9783958459700/?ar">https://learning.oreilly.com/library/view/~/9783958459700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar">https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical cyber forensics : an incident-based approach to forensic investigations ent://SD_ILS/0/SD_ILS:2321521 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity ent://SD_ILS/0/SD_ILS:2321448 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643326">https://learning.oreilly.com/library/view/~/9781119643326</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643326/?ar">https://learning.oreilly.com/library/view/~/9781119643326/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with Linux on Z Encryption for data at-rest ent://SD_ILS/0/SD_ILS:2321973 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738457468/?ar">https://learning.oreilly.com/library/view/~/9780738457468/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security principles for the working architect ent://SD_ILS/0/SD_ILS:2322691 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Woods, Eoin, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338215/?ar">https://learning.oreilly.com/videos/~/0636920338215/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920338215">https://learning.oreilly.com/videos/~/0636920338215</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar</a><br/>Format:&#160;Electronic Resources<br/> How cyber security can protect your business : a guide for all stakeholders ent://SD_ILS/0/SD_ILS:2323060 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Wright, Christopher, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781979/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781979/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787781979/?ar">https://learning.oreilly.com/library/view/~/9781787781979/?ar</a><br/>Format:&#160;Electronic Resources<br/> Serverless security : protect functions using the CLAD security model ent://SD_ILS/0/SD_ILS:2323066 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar">https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492082538/?ar">https://learning.oreilly.com/library/view/~/9781492082538/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492082538">https://learning.oreilly.com/library/view/~/9781492082538</a><br/>Format:&#160;Electronic Resources<br/> Oracle cloud user security : providing for separation of duties and appropriate access by job function. ent://SD_ILS/0/SD_ILS:2322966 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Malcher, Michelle, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar">https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781484255643/?ar">https://learning.oreilly.com/videos/~/9781484255643/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781484255643">https://learning.oreilly.com/videos/~/9781484255643</a><br/>Format:&#160;Electronic Resources<br/> How to build privacy and security into deep learning models ent://SD_ILS/0/SD_ILS:2322791 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format:&#160;Electronic Resources<br/> The Complete Ethical Hacking Course ent://SD_ILS/0/SD_ILS:2323185 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity - Attack and Defense Strategies - Second Edition ent://SD_ILS/0/SD_ILS:2323102 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar">https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838827793/?ar">https://learning.oreilly.com/library/view/~/9781838827793/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838827793">https://learning.oreilly.com/library/view/~/9781838827793</a><br/>Format:&#160;Electronic Resources<br/> Linux troubleshooting course with real life examples ent://SD_ILS/0/SD_ILS:2323238 2024-09-26T01:23:19Z 2024-09-26T01:23:19Z by&#160;Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format:&#160;Electronic Resources<br/>