Search Results for - Narrowed by: 2020 - S&eacute;curit&eacute; informatique. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092020$0025092020$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300? 2024-05-25T22:55:06Z PCI DSS : an integrated data security standard guide ent://SD_ILS/0/SD_ILS:2324386 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Seaman, Jim.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258088">https://learning.oreilly.com/library/view/~/9781484258088</a> <a href="https://learning.oreilly.com/library/view/~/9781484258088/?ar">https://learning.oreilly.com/library/view/~/9781484258088/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar</a><br/>Format:&#160;Electronic Resources<br/> DevSecOps for .NET core : securing modern software applications ent://SD_ILS/0/SD_ILS:2324612 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Zeeshan, Afzaal Ahmad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258507/?ar">https://learning.oreilly.com/library/view/~/9781484258507/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484258507">https://learning.oreilly.com/library/view/~/9781484258507</a><br/>Format:&#160;Electronic Resources<br/> Hacking : der umfassende Praxis-Guide: inkl. Pr&uuml;fungsvorbereitung zum CEHv10 ent://SD_ILS/0/SD_ILS:2325946 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Amberg, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958452206/?ar">https://learning.oreilly.com/library/view/~/9783958452206/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958452206">https://learning.oreilly.com/library/view/~/9783958452206</a><br/>Format:&#160;Electronic Resources<br/> Security engineering 101 : when good design and security work together ent://SD_ILS/0/SD_ILS:2324433 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Everette, Wendy Knox, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920342960/?ar">https://go.oreilly.com/library-access/library/view/-/0636920342960/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920342960/?ar">https://learning.oreilly.com/videos/~/0636920342960/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920342960">https://learning.oreilly.com/videos/~/0636920342960</a><br/>Format:&#160;Electronic Resources<br/> Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe ent://SD_ILS/0/SD_ILS:2324802 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity ent://SD_ILS/0/SD_ILS:2325451 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Carey, Marcus J. (Cybersecurity professional)<br/><a href="https://learning.oreilly.com/library/view/~/9781119643418">https://learning.oreilly.com/library/view/~/9781119643418</a> <a href="https://learning.oreilly.com/library/view/~/9781119643418/?ar">https://learning.oreilly.com/library/view/~/9781119643418/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:2325452 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a> <a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format:&#160;Electronic Resources<br/> Generative malware outbreak detection ent://SD_ILS/0/SD_ILS:2325158 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Park, Sean, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar">https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920373452/?ar">https://learning.oreilly.com/videos/~/0636920373452/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920373452">https://learning.oreilly.com/videos/~/0636920373452</a><br/>Format:&#160;Electronic Resources<br/> Exposed : how revealing your data and eliminating privacy increases trust and liberates humanity ent://SD_ILS/0/SD_ILS:2326413 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a> <a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering VMware NSX for vSphere ent://SD_ILS/0/SD_ILS:2327302 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119513544">https://learning.oreilly.com/library/view/~/9781119513544</a> <a href="https://learning.oreilly.com/library/view/~/9781119513544/?ar">https://learning.oreilly.com/library/view/~/9781119513544/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar">https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Security+ SY0-601 Certification Guide - Second Edition ent://SD_ILS/0/SD_ILS:2327971 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Neil, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781800564244">https://learning.oreilly.com/library/view/~/9781800564244</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar">https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800564244/?ar">https://learning.oreilly.com/library/view/~/9781800564244/?ar</a><br/>Format:&#160;Electronic Resources<br/> Identity attack vectors : implementing an effective identity and access management solution ent://SD_ILS/0/SD_ILS:2322737 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484251652/?ar">https://learning.oreilly.com/library/view/~/9781484251652/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484251652">https://learning.oreilly.com/library/view/~/9781484251652</a><br/>Format:&#160;Electronic Resources<br/> Data breaches : crisis and opportunity ent://SD_ILS/0/SD_ILS:2322222 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for space : protecting the final frontier ent://SD_ILS/0/SD_ILS:2323781 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Oakley, Jacob G.<br/><a href="https://learning.oreilly.com/library/view/~/9781484257326/?ar">https://learning.oreilly.com/library/view/~/9781484257326/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484257326/?ar">https://go.oreilly.com/library-access/library/view/-/9781484257326/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484257326">https://learning.oreilly.com/library/view/~/9781484257326</a><br/>Format:&#160;Electronic Resources<br/> Applied incident response ent://SD_ILS/0/SD_ILS:2322826 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781119560265">https://learning.oreilly.com/library/view/~/9781119560265</a> <a href="https://learning.oreilly.com/library/view/~/9781119560265/?ar">https://learning.oreilly.com/library/view/~/9781119560265/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware ent://SD_ILS/0/SD_ILS:2325847 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Mohanta, Abhijit.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261934">https://learning.oreilly.com/library/view/~/9781484261934</a> <a href="https://learning.oreilly.com/library/view/~/9781484261934/?ar">https://learning.oreilly.com/library/view/~/9781484261934/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar</a><br/>Format:&#160;Electronic Resources<br/> Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies ent://SD_ILS/0/SD_ILS:2325773 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Parker, Carey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261897">https://learning.oreilly.com/library/view/~/9781484261897</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484261897/?ar">https://learning.oreilly.com/library/view/~/9781484261897/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Windows security and hardening : secure and protect your Windows environment from intruders, malware attacks, and other cyber threats. ent://SD_ILS/0/SD_ILS:2325966 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Dunkerley, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216411">https://learning.oreilly.com/library/view/~/9781839216411</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839216411/?ar">https://learning.oreilly.com/library/view/~/9781839216411/?ar</a><br/>Format:&#160;Electronic Resources<br/> Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu ent://SD_ILS/0/SD_ILS:2332657 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format:&#160;Electronic Resources<br/> JSON web tokens and alternatives. ent://SD_ILS/0/SD_ILS:2332693 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Madden, Neil, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202163/?ar">https://learning.oreilly.com/videos/~/10000MNLV202163/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202163">https://learning.oreilly.com/videos/~/10000MNLV202163</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar</a><br/>Format:&#160;Video recording<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:2323589 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Security, 2nd Edition ent://SD_ILS/0/SD_ILS:2331101 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a> <a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2322053 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:2322126 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Kegerreis, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260453232/?ar">https://learning.oreilly.com/library/view/~/9781260453232/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar">https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for dummies ent://SD_ILS/0/SD_ILS:2322839 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119560326/?ar">https://learning.oreilly.com/library/view/~/9781119560326/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Linux Security and Hardening - Second Edition ent://SD_ILS/0/SD_ILS:2324167 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Tevault, Donald A.<br/><a href="https://learning.oreilly.com/library/view/~/9781838981778/?ar">https://learning.oreilly.com/library/view/~/9781838981778/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar">https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838981778">https://learning.oreilly.com/library/view/~/9781838981778</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity threats, malware trends, and strategies : mitigate exploits, malware, phishing, and other social engineering attacks ent://SD_ILS/0/SD_ILS:2324609 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Rains, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800206014/?ar">https://learning.oreilly.com/library/view/~/9781800206014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800206014">https://learning.oreilly.com/library/view/~/9781800206014</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar">https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar</a><br/>Format:&#160;Electronic Resources<br/> Rational cybersecurity for business : the security leaders' guide to business alignment ent://SD_ILS/0/SD_ILS:2325488 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Blum, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781484259528">https://learning.oreilly.com/library/view/~/9781484259528</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484259528/?ar">https://learning.oreilly.com/library/view/~/9781484259528/?ar</a><br/>Format:&#160;Electronic Resources<br/> SECURING CLOUD SERVICES;A PRAGMATIC APPROACH, SECOND EDITION. ent://SD_ILS/0/SD_ILS:2328081 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;LEE NEWCOMBE.<br/><a href="https://learning.oreilly.com/library/view/~/9781787782075">https://learning.oreilly.com/library/view/~/9781787782075</a> <a href="https://learning.oreilly.com/library/view/~/9781787782075/?ar">https://learning.oreilly.com/library/view/~/9781787782075/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar">https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar</a><br/>Format:&#160;Electronic Resources<br/> Designing a HIPAA-compliant security operations center : a guide to detecting and responding to healthcare breaches and events ent://SD_ILS/0/SD_ILS:2323333 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Thompson, Eric C.<br/><a href="https://learning.oreilly.com/library/view/~/9781484256084">https://learning.oreilly.com/library/view/~/9781484256084</a> <a href="https://learning.oreilly.com/library/view/~/9781484256084/?ar">https://learning.oreilly.com/library/view/~/9781484256084/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM Security Key Lifecycle Manager ent://SD_ILS/0/SD_ILS:2323982 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Chen, An, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458786/?ar">https://learning.oreilly.com/library/view/~/9780738458786/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458786">https://learning.oreilly.com/library/view/~/9780738458786</a><br/>Format:&#160;Electronic Resources<br/> Protecting Data Privacy Beyond the Trusted System of Record ent://SD_ILS/0/SD_ILS:2323918 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a> <a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn Kubernetes security : securely orchestrate, scale, and manage your microservices in Kubernetes deployments ent://SD_ILS/0/SD_ILS:2325970 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Huang, Kaizhe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216503">https://learning.oreilly.com/library/view/~/9781839216503</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839216503/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216503/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839216503/?ar">https://learning.oreilly.com/library/view/~/9781839216503/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building secure firmware : armoring the foundation of the platform ent://SD_ILS/0/SD_ILS:2326020 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Yao, Jiewen.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261064">https://learning.oreilly.com/library/view/~/9781484261064</a> <a href="https://learning.oreilly.com/library/view/~/9781484261064/?ar">https://learning.oreilly.com/library/view/~/9781484261064/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar</a><br/>Format:&#160;Electronic Resources<br/> PoC GTFO. Volume III ent://SD_ILS/0/SD_ILS:2327149 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Laphroaig, Manul.<br/><a href="https://learning.oreilly.com/library/view/~/9781098125691/?ar">https://learning.oreilly.com/library/view/~/9781098125691/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098125691">https://learning.oreilly.com/library/view/~/9781098125691</a><br/>Format:&#160;Electronic Resources<br/> Demystifying Internet of Things security : successful IoT device/edge and platform security deployment ent://SD_ILS/0/SD_ILS:2321696 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Cheruvu, Sunil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484228968/?ar">https://learning.oreilly.com/library/view/~/9781484228968/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484228968">https://learning.oreilly.com/library/view/~/9781484228968</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484228968/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228968/?ar</a><br/>Format:&#160;Electronic Resources<br/> Build Your Own Cybersecurity Testing Lab : Low-cost Solutions for Testing in Virtual and Cloud-based Environments ent://SD_ILS/0/SD_ILS:2323438 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260458329">https://learning.oreilly.com/library/view/~/9781260458329</a> <a href="https://learning.oreilly.com/library/view/~/9781260458329/?ar">https://learning.oreilly.com/library/view/~/9781260458329/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar">https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar</a><br/>Format:&#160;Electronic Resources<br/> Temenos on IBM LinuxONE Best Practices Guide ent://SD_ILS/0/SD_ILS:2323440 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Coble, Deana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458458">https://learning.oreilly.com/library/view/~/9780738458458</a> <a href="https://learning.oreilly.com/library/view/~/9780738458458/?ar">https://learning.oreilly.com/library/view/~/9780738458458/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber Warfare - Truth, Tactics, and Strategies ent://SD_ILS/0/SD_ILS:2323667 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a> <a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident response primer : how to keep from getting pwned too hard ent://SD_ILS/0/SD_ILS:2323316 2024-05-25T22:55:06Z 2024-05-25T22:55:06Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format:&#160;Electronic Resources<br/>