Search Results for - Narrowed by: 2022 - Computer security.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092022$0025092022$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2024-05-29T22:07:15Z
Mastering Defensive Security : Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure.
ent://SD_ILS/0/SD_ILS:2330841
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Bravo, Cesar.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar">https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800208162/?ar">https://learning.oreilly.com/library/view/~/9781800208162/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800208162">https://learning.oreilly.com/library/view/~/9781800208162</a><br/>Format: Electronic Resources<br/>
Trust in computer systems and the cloud
ent://SD_ILS/0/SD_ILS:2330850
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Bursell, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119692324/?ar">https://learning.oreilly.com/library/view/~/9781119692324/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar">https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119692324">https://learning.oreilly.com/library/view/~/9781119692324</a><br/>Format: Electronic Resources<br/>
Cybersecurity For Dummies
ent://SD_ILS/0/SD_ILS:2332872
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119867180">https://learning.oreilly.com/library/view/~/9781119867180</a>
<a href="https://learning.oreilly.com/library/view/~/9781119867180/?ar">https://learning.oreilly.com/library/view/~/9781119867180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar">https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar</a><br/>Format: Electronic Resources<br/>
Hacking
ent://SD_ILS/0/SD_ILS:2332886
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Beaver, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119872191">https://learning.oreilly.com/library/view/~/9781119872191</a>
<a href="https://learning.oreilly.com/library/view/~/9781119872191/?ar">https://learning.oreilly.com/library/view/~/9781119872191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar">https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar</a><br/>Format: Electronic Resources<br/>
Designing secure software : a guide for developers
ent://SD_ILS/0/SD_ILS:2329594
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Kohnfelder, Loren, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129804/?ar">https://learning.oreilly.com/library/view/~/9781098129804/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129804">https://learning.oreilly.com/library/view/~/9781098129804</a><br/>Format: Electronic Resources<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:2332857
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Sharp, Matthew K., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663718556/?ar">https://go.oreilly.com/library-access/library/view/-/9781663718556/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781663718556">https://learning.oreilly.com/library/view/~/9781663718556</a>
<a href="https://learning.oreilly.com/library/view/~/9781663718556/?ar">https://learning.oreilly.com/library/view/~/9781663718556/?ar</a><br/>Format: Sound recording<br/>
Security awareness for dummies
ent://SD_ILS/0/SD_ILS:2332874
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Winkler, Ira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar">https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119720928">https://learning.oreilly.com/library/view/~/9781119720928</a>
<a href="https://learning.oreilly.com/library/view/~/9781119720928/?ar">https://learning.oreilly.com/library/view/~/9781119720928/?ar</a><br/>Format: Electronic Resources<br/>
Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacks
ent://SD_ILS/0/SD_ILS:2329941
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Peiris, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119804062/?ar">https://learning.oreilly.com/library/view/~/9781119804062/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar">https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119804062">https://learning.oreilly.com/library/view/~/9781119804062</a><br/>Format: Electronic Resources<br/>
Risk management for cyber security managers.
ent://SD_ILS/0/SD_ILS:2335524
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Oni, Alexander, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837639878/?ar">https://learning.oreilly.com/videos/~/9781837639878/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837639878/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639878/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639878">https://learning.oreilly.com/videos/~/9781837639878</a><br/>Format: Video recording<br/>
Cyber security for absolute beginners, Part 01.
ent://SD_ILS/0/SD_ILS:2335525
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Oni, Alexander, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837630943/?ar">https://learning.oreilly.com/videos/~/9781837630943/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837630943">https://learning.oreilly.com/videos/~/9781837630943</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar">https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar</a><br/>Format: Video recording<br/>
Snowflake security : securing your Snowflake data cloud
ent://SD_ILS/0/SD_ILS:2330261
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Herzberg, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484273890">https://learning.oreilly.com/library/view/~/9781484273890</a>
<a href="https://learning.oreilly.com/library/view/~/9781484273890/?ar">https://learning.oreilly.com/library/view/~/9781484273890/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar">https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar</a><br/>Format: Electronic Resources<br/>
CEH v11 : certified ethical hacker version 11 practice tests
ent://SD_ILS/0/SD_ILS:2330385
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar">https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119824510/?ar">https://learning.oreilly.com/library/view/~/9781119824510/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119824510">https://learning.oreilly.com/library/view/~/9781119824510</a><br/>Format: Electronic Resources<br/>
Phishing and communication channels a guide to identifying and mitigating phishing attacks
ent://SD_ILS/0/SD_ILS:2331058
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Sonowal, Gunikhan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277447/?ar">https://learning.oreilly.com/library/view/~/9781484277447/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277447">https://learning.oreilly.com/library/view/~/9781484277447</a><br/>Format: Electronic Resources<br/>
Fight fire with fire : proactive cybersecurity strategies for today's leaders
ent://SD_ILS/0/SD_ILS:2330914
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Tarun, Renee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119854265/?ar">https://learning.oreilly.com/library/view/~/9781119854265/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119854265">https://learning.oreilly.com/library/view/~/9781119854265</a><br/>Format: Electronic Resources<br/>
Ransomware protection playbook
ent://SD_ILS/0/SD_ILS:2330090
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Grimes, Roger A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119849124">https://learning.oreilly.com/library/view/~/9781119849124</a>
<a href="https://learning.oreilly.com/library/view/~/9781119849124/?ar">https://learning.oreilly.com/library/view/~/9781119849124/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar">https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar</a><br/>Format: Electronic Resources<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:2330102
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Sharp, Matthew K., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar">https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119782483/?ar">https://learning.oreilly.com/library/view/~/9781119782483/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119782483">https://learning.oreilly.com/library/view/~/9781119782483</a><br/>Format: Electronic Resources<br/>
Navigating the cybersecurity career path
ent://SD_ILS/0/SD_ILS:2330836
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Patton, Helen E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119833420">https://learning.oreilly.com/library/view/~/9781119833420</a>
<a href="https://learning.oreilly.com/library/view/~/9781119833420/?ar">https://learning.oreilly.com/library/view/~/9781119833420/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar">https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar</a><br/>Format: Electronic Resources<br/>
Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptions
ent://SD_ILS/0/SD_ILS:2329799
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format: Electronic Resources<br/>
Cybersecurity and local government
ent://SD_ILS/0/SD_ILS:2331746
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Norris, Donald F., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119788287/?ar">https://learning.oreilly.com/library/view/~/9781119788287/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119788287">https://learning.oreilly.com/library/view/~/9781119788287</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119788287/?ar">https://go.oreilly.com/library-access/library/view/-/9781119788287/?ar</a><br/>Format: Electronic Resources<br/>
Hacking : der umfassende Praxis-Guide : inkl. Prüfungsvorbereitung zum CEHv11
ent://SD_ILS/0/SD_ILS:2331683
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Amberg, Eric, author<br/><a href="https://learning.oreilly.com/library/view/~/9783747504840">https://learning.oreilly.com/library/view/~/9783747504840</a>
<a href="https://learning.oreilly.com/library/view/~/9783747504840/?ar">https://learning.oreilly.com/library/view/~/9783747504840/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar">https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar</a><br/>Format: Electronic Resources<br/>
Python for cybersecurity : using Python for cyber offense and defense
ent://SD_ILS/0/SD_ILS:2331574
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Poston, Howard E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar">https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649/?ar">https://learning.oreilly.com/library/view/~/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649">https://learning.oreilly.com/library/view/~/9781119850649</a><br/>Format: Electronic Resources<br/>
Threat Intelligence and threat hunting
ent://SD_ILS/0/SD_ILS:2331779
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137896301/?ar">https://learning.oreilly.com/videos/~/9780137896301/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar">https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137896301">https://learning.oreilly.com/videos/~/9780137896301</a><br/>Format: Video recording<br/>
Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory.
ent://SD_ILS/0/SD_ILS:2331787
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Ostrovskaya, Svetlana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070331">https://learning.oreilly.com/library/view/~/9781801070331</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070331/?ar">https://learning.oreilly.com/library/view/~/9781801070331/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar</a><br/>Format: Electronic Resources<br/>
Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linux
ent://SD_ILS/0/SD_ILS:2332265
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar">https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750/?ar">https://learning.oreilly.com/videos/~/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750">https://learning.oreilly.com/videos/~/9781803239750</a><br/>Format: Video recording<br/>
Container storage and data protection for applications on Kubernetes
ent://SD_ILS/0/SD_ILS:2332574
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127022/?ar">https://learning.oreilly.com/library/view/~/9781098127022/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127022">https://learning.oreilly.com/library/view/~/9781098127022</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar</a><br/>Format: Electronic Resources<br/>
Shifting left for application security : bridging the divide between DevOps and security with the right security tools
ent://SD_ILS/0/SD_ILS:2332575
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format: Electronic Resources<br/>
Security Observability with eBPF
ent://SD_ILS/0/SD_ILS:2332576
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Salazar, Jed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492096719">https://learning.oreilly.com/library/view/~/9781492096719</a>
<a href="https://learning.oreilly.com/library/view/~/9781492096719/?ar">https://learning.oreilly.com/library/view/~/9781492096719/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar">https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security handbook : find out how to effectively secure cloud environments using AWS, Azure, and GCP
ent://SD_ILS/0/SD_ILS:2332481
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Estrin, Eyal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800569195">https://learning.oreilly.com/library/view/~/9781800569195</a>
<a href="https://learning.oreilly.com/library/view/~/9781800569195/?ar">https://learning.oreilly.com/library/view/~/9781800569195/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar">https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar</a><br/>Format: Electronic Resources<br/>
Ransomware
ent://SD_ILS/0/SD_ILS:2332705
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Messdaghi, Chloé, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar">https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641/?ar">https://learning.oreilly.com/videos/~/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641">https://learning.oreilly.com/videos/~/0636920702641</a><br/>Format: Video recording<br/>
Security awareness for dummies
ent://SD_ILS/0/SD_ILS:2333093
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666174175/?ar">https://learning.oreilly.com/library/view/~/9781666174175/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781666174175/?ar">https://go.oreilly.com/library-access/library/view/-/9781666174175/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781666174175">https://learning.oreilly.com/library/view/~/9781666174175</a><br/>Format: Sound recording<br/>
The complete cybersecurity bootcamp
ent://SD_ILS/0/SD_ILS:2333407
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137949397">https://learning.oreilly.com/videos/~/9780137949397</a>
<a href="https://learning.oreilly.com/videos/~/9780137949397/?ar">https://learning.oreilly.com/videos/~/9780137949397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar">https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar</a><br/>Format: Video recording<br/>
IF IT'S SMART, IT'S VULNERABLE
ent://SD_ILS/0/SD_ILS:2333601
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Hypponen, Mikko, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119895183/?ar">https://go.oreilly.com/library-access/library/view/-/9781119895183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119895183/?ar">https://learning.oreilly.com/library/view/~/9781119895183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119895183">https://learning.oreilly.com/library/view/~/9781119895183</a><br/>Format: Electronic Resources<br/>
Common types of attack
ent://SD_ILS/0/SD_ILS:2333855
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Assemble You, publisher.<br/><a href="https://learning.oreilly.com/library/view/~/125053AYPOD">https://learning.oreilly.com/library/view/~/125053AYPOD</a>
<a href="https://go.oreilly.com/library-access/library/view/-/125053AYPOD/?ar">https://go.oreilly.com/library-access/library/view/-/125053AYPOD/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/125053AYPOD/?ar">https://learning.oreilly.com/library/view/~/125053AYPOD/?ar</a><br/>Format: Sound recording<br/>
Security superstream : zero trust
ent://SD_ILS/0/SD_ILS:2334748
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Messdaghi, Chloé, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920817680">https://learning.oreilly.com/videos/~/0636920817680</a>
<a href="https://learning.oreilly.com/videos/~/0636920817680/?ar">https://learning.oreilly.com/videos/~/0636920817680/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920817680/?ar">https://go.oreilly.com/library-access/library/view/-/0636920817680/?ar</a><br/>Format: Video recording<br/>
Building a Red Hat OpenShift environment on IBM Z
ent://SD_ILS/0/SD_ILS:2334093
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Parziale, Lydia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460741/?ar">https://learning.oreilly.com/library/view/~/9780738460741/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460741">https://learning.oreilly.com/library/view/~/9780738460741</a><br/>Format: Electronic Resources<br/>
Secret key cryptography : ciphers, from simple to unbreakable
ent://SD_ILS/0/SD_ILS:2334094
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Rubin, Frank (Cryptographer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781633439795">https://learning.oreilly.com/library/view/~/9781633439795</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar">https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781633439795/?ar">https://learning.oreilly.com/library/view/~/9781633439795/?ar</a><br/>Format: Electronic Resources<br/>
Computer science security : concepts and tools
ent://SD_ILS/0/SD_ILS:2334035
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Zaidoun, Ameur Salem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786307552/?ar">https://learning.oreilly.com/library/view/~/9781786307552/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar">https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786307552">https://learning.oreilly.com/library/view/~/9781786307552</a><br/>Format: Electronic Resources<br/>
Getting started with IBM Hyper Protect Data Controller
ent://SD_ILS/0/SD_ILS:2331451
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format: Electronic Resources<br/>
A hybrid cloud cyber security solution using IBM Spectrum Virtualize for public cloud on Azure and IBM Spectrum Virtualize safeguarded copy.
ent://SD_ILS/0/SD_ILS:2331705
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
<a href="https://learning.oreilly.com/library/view/~/9780738460345/?ar">https://learning.oreilly.com/library/view/~/9780738460345/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460345">https://learning.oreilly.com/library/view/~/9780738460345</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar</a><br/>Format: Electronic Resources<br/>
CEH Certified Ethical Hacker Cert guide
ent://SD_ILS/0/SD_ILS:2331621
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format: Electronic Resources<br/>
Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response.
ent://SD_ILS/0/SD_ILS:2331491
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Hettema, Hinne.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512/?ar">https://learning.oreilly.com/library/view/~/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512">https://learning.oreilly.com/library/view/~/9781801815512</a><br/>Format: Electronic Resources<br/>
Offensive shellcode from scratch : get to grips with shellcode countermeasures and discover how to bypass them
ent://SD_ILS/0/SD_ILS:2332537
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Pillay, Rishalin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar">https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803247427">https://learning.oreilly.com/library/view/~/9781803247427</a>
<a href="https://learning.oreilly.com/library/view/~/9781803247427/?ar">https://learning.oreilly.com/library/view/~/9781803247427/?ar</a><br/>Format: Electronic Resources<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:2332538
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Pramanik, Sabyasachi, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119812494">https://learning.oreilly.com/library/view/~/9781119812494</a>
<a href="https://learning.oreilly.com/library/view/~/9781119812494/?ar">https://learning.oreilly.com/library/view/~/9781119812494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar">https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar</a><br/>Format: Electronic Resources<br/>
Cybercrime : protecting your business, your family and yourself
ent://SD_ILS/0/SD_ILS:2332545
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Wade, Todd author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175874/?ar">https://learning.oreilly.com/library/view/~/9781780175874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175874">https://learning.oreilly.com/library/view/~/9781780175874</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar</a><br/>Format: Electronic Resources<br/>
WIRELESS SECURITY ARCHITECTURE designing and maintaining secure wireless for enterprise.
ent://SD_ILS/0/SD_ILS:2331905
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by MINELLA, JENNIFER.<br/><a href="https://learning.oreilly.com/library/view/~/9781119883050">https://learning.oreilly.com/library/view/~/9781119883050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119883050/?ar">https://go.oreilly.com/library-access/library/view/-/9781119883050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119883050/?ar">https://learning.oreilly.com/library/view/~/9781119883050/?ar</a><br/>Format: Electronic Resources<br/>
Snowflake access control : mastering the features for data privacy and regulatory compliance
ent://SD_ILS/0/SD_ILS:2331907
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Larson, Jessica Megan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484280386">https://learning.oreilly.com/library/view/~/9781484280386</a>
<a href="https://learning.oreilly.com/library/view/~/9781484280386/?ar">https://learning.oreilly.com/library/view/~/9781484280386/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar">https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar</a><br/>Format: Electronic Resources<br/>
The cybersecurity playbook for modern enterprises
ent://SD_ILS/0/SD_ILS:2332323
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Wittkop, Jeremy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639/?ar">https://learning.oreilly.com/library/view/~/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639">https://learning.oreilly.com/library/view/~/9781803248639</a><br/>Format: Electronic Resources<br/>
The security culture playbook : an executive guide to reducing risk and developing your human defense layer
ent://SD_ILS/0/SD_ILS:2332410
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119875239/?ar">https://learning.oreilly.com/library/view/~/9781119875239/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119875239">https://learning.oreilly.com/library/view/~/9781119875239</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar">https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar</a><br/>Format: Electronic Resources<br/>
Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them
ent://SD_ILS/0/SD_ILS:2332411
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format: Electronic Resources<br/>
IT security controls : a guide to corporate standards and frameworks
ent://SD_ILS/0/SD_ILS:2332412
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Viegas, Virgilio, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484277997/?ar">https://learning.oreilly.com/library/view/~/9781484277997/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277997">https://learning.oreilly.com/library/view/~/9781484277997</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Defender for Cloud Cookbook : Protect Multicloud and Hybrid Cloud Environments, Manage Compliance and Strengthen Security Posture
ent://SD_ILS/0/SD_ILS:2333592
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Kranjac, Sasha.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801076135/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076135/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076135">https://learning.oreilly.com/library/view/~/9781801076135</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076135/?ar">https://learning.oreilly.com/library/view/~/9781801076135/?ar</a><br/>Format: Electronic Resources<br/>
Learn computer forensics : your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
ent://SD_ILS/0/SD_ILS:2333947
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Oettinger, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803238302/?ar">https://learning.oreilly.com/library/view/~/9781803238302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238302">https://learning.oreilly.com/library/view/~/9781803238302</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803238302/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238302/?ar</a><br/>Format: Electronic Resources<br/>
Infrastructure & ops hour with Sam Newman. eBPF with Liz Rice
ent://SD_ILS/0/SD_ILS:2334144
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Newman, Sam, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920788362/?ar">https://go.oreilly.com/library-access/library/view/-/0636920788362/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920788362">https://learning.oreilly.com/videos/~/0636920788362</a>
<a href="https://learning.oreilly.com/videos/~/0636920788362/?ar">https://learning.oreilly.com/videos/~/0636920788362/?ar</a><br/>Format: Video recording<br/>
Cybersecurity : attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system
ent://SD_ILS/0/SD_ILS:2334741
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803248776/?ar">https://learning.oreilly.com/library/view/~/9781803248776/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248776">https://learning.oreilly.com/library/view/~/9781803248776</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803248776/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248776/?ar</a><br/>Format: Electronic Resources<br/>
System and privacy data protection.
ent://SD_ILS/0/SD_ILS:2331777
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a>
<a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format: Video recording<br/>
Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadar
ent://SD_ILS/0/SD_ILS:2332057
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by IBM Storage Team, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260/?ar">https://learning.oreilly.com/library/view/~/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260">https://learning.oreilly.com/library/view/~/9780738460260</a><br/>Format: Electronic Resources<br/>
Practical fraud prevention : fraud and AML analytics for Fintech and eCommerce, using SQL and Python
ent://SD_ILS/0/SD_ILS:2332348
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Saporta, Gilit, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492093312/?ar">https://go.oreilly.com/library-access/library/view/-/9781492093312/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492093312/?ar">https://learning.oreilly.com/library/view/~/9781492093312/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492093312">https://learning.oreilly.com/library/view/~/9781492093312</a><br/>Format: Electronic Resources<br/>
Learn man in the middle attacks from scratch.
ent://SD_ILS/0/SD_ILS:2332269
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar">https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245/?ar">https://learning.oreilly.com/videos/~/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245">https://learning.oreilly.com/videos/~/9781803243245</a><br/>Format: Video recording<br/>
Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10
ent://SD_ILS/0/SD_ILS:2332617
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Nita, Stefania Loredana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484281055/?ar">https://learning.oreilly.com/library/view/~/9781484281055/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar">https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484281055">https://learning.oreilly.com/library/view/~/9781484281055</a><br/>Format: Electronic Resources<br/>
Cloud security for dummies
ent://SD_ILS/0/SD_ILS:2332497
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a>
<a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format: Electronic Resources<br/>
The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more
ent://SD_ILS/0/SD_ILS:2332630
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format: Electronic Resources<br/>
Digital Earth : cyber threats, privacy and ethics in an age of paranoia
ent://SD_ILS/0/SD_ILS:2332896
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Katz, Sarah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783614">https://learning.oreilly.com/library/view/~/9781787783614</a>
<a href="https://learning.oreilly.com/library/view/~/9781787783614/?ar">https://learning.oreilly.com/library/view/~/9781787783614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar</a><br/>Format: Electronic Resources<br/>
Mastering Azure security : keeping your Microsoft Azure workloads safe
ent://SD_ILS/0/SD_ILS:2332927
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Toroman, Mustafa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803238555">https://learning.oreilly.com/library/view/~/9781803238555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238555/?ar">https://learning.oreilly.com/library/view/~/9781803238555/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security for dummies
ent://SD_ILS/0/SD_ILS:2332936
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Coombs, Ted, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar">https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9798765008096/?ar">https://learning.oreilly.com/library/view/~/9798765008096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9798765008096">https://learning.oreilly.com/library/view/~/9798765008096</a><br/>Format: Sound recording<br/>
PRACTICAL INDUSTRIAL CYBERSECURITY ICS, Industry 4.0, and IIoT
ent://SD_ILS/0/SD_ILS:2333070
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Brooks, Charles J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119883029/?ar">https://go.oreilly.com/library-access/library/view/-/9781119883029/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119883029/?ar">https://learning.oreilly.com/library/view/~/9781119883029/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119883029">https://learning.oreilly.com/library/view/~/9781119883029</a><br/>Format: Electronic Resources<br/>
Operationalizing Threat Intelligence : a Guide to Developing and Operationalizing Cyber Threat Intelligence Programs.
ent://SD_ILS/0/SD_ILS:2333075
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Wilhoit, Kyle.<br/><a href="https://learning.oreilly.com/library/view/~/9781801814683">https://learning.oreilly.com/library/view/~/9781801814683</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801814683/?ar">https://go.oreilly.com/library-access/library/view/-/9781801814683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801814683/?ar">https://learning.oreilly.com/library/view/~/9781801814683/?ar</a><br/>Format: Electronic Resources<br/>
Executive's guide to cyber risk : securing the future today
ent://SD_ILS/0/SD_ILS:2333211
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Moyo, Siegfried, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119863113">https://learning.oreilly.com/library/view/~/9781119863113</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar">https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119863113/?ar">https://learning.oreilly.com/library/view/~/9781119863113/?ar</a><br/>Format: Electronic Resources<br/>
Getting started with cybersecurity science
ent://SD_ILS/0/SD_ILS:2333381
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Dykstra, Josiah, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920670926">https://learning.oreilly.com/videos/~/0636920670926</a>
<a href="https://learning.oreilly.com/videos/~/0636920670926/?ar">https://learning.oreilly.com/videos/~/0636920670926/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar">https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar</a><br/>Format: Video recording<br/>
Hands-on threat modeling
ent://SD_ILS/0/SD_ILS:2333383
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Deleersnyder, Sebastien, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671268">https://learning.oreilly.com/videos/~/0636920671268</a>
<a href="https://learning.oreilly.com/videos/~/0636920671268/?ar">https://learning.oreilly.com/videos/~/0636920671268/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar</a><br/>Format: Video recording<br/>
Single sign-on and passwordless authentication : an overview.
ent://SD_ILS/0/SD_ILS:2333558
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Ovcharov, Andrey, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202294">https://learning.oreilly.com/videos/~/10000MNHV202294</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202294/?ar">https://learning.oreilly.com/videos/~/10000MNHV202294/?ar</a><br/>Format: Video recording<br/>
The ransomware dilemma : the decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attack
ent://SD_ILS/0/SD_ILS:2333559
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Leo, Philipp, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63419">https://learning.oreilly.com/library/view/~/53863MIT63419</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT63419/?ar">https://learning.oreilly.com/library/view/~/53863MIT63419/?ar</a><br/>Format: Electronic Resources<br/>
Building cyber resilience before the next attack occurs : companies that are most successful in responding to cyberattacks leverage distributed leadership, crisis experience, and consistent communication
ent://SD_ILS/0/SD_ILS:2333560
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Hepfer, Manuel, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63431/?ar">https://learning.oreilly.com/library/view/~/53863MIT63431/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT63431">https://learning.oreilly.com/library/view/~/53863MIT63431</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63431/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63431/?ar</a><br/>Format: Electronic Resources<br/>
The unbreakable one-time pad cipher.
ent://SD_ILS/0/SD_ILS:2333562
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Rubin, Frank (Cryptographer), presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202291/?ar">https://learning.oreilly.com/videos/~/10000MNHV202291/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202291">https://learning.oreilly.com/videos/~/10000MNHV202291</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202291/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202291/?ar</a><br/>Format: Video recording<br/>
The art of cyber security : a practical guide to winning the war on cyber crime
ent://SD_ILS/0/SD_ILS:2333417
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Hibberd, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783676">https://learning.oreilly.com/library/view/~/9781787783676</a>
<a href="https://learning.oreilly.com/library/view/~/9781787783676/?ar">https://learning.oreilly.com/library/view/~/9781787783676/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar</a><br/>Format: Electronic Resources<br/>
Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud
ent://SD_ILS/0/SD_ILS:2333792
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Berkouwer, Sander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar">https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242507/?ar">https://learning.oreilly.com/library/view/~/9781803242507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242507">https://learning.oreilly.com/library/view/~/9781803242507</a><br/>Format: Electronic Resources<br/>
Penetration Testing mit Metasploit : Praxiswissen für mehr IT-Sicherheit
ent://SD_ILS/0/SD_ILS:2333963
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783747505649">https://learning.oreilly.com/library/view/~/9783747505649</a>
<a href="https://learning.oreilly.com/library/view/~/9783747505649/?ar">https://learning.oreilly.com/library/view/~/9783747505649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar">https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar</a><br/>Format: Electronic Resources<br/>
Deploying a modern security data lake
ent://SD_ILS/0/SD_ILS:2333965
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Baum, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098134983/?ar">https://learning.oreilly.com/library/view/~/9781098134983/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar">https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098134983">https://learning.oreilly.com/library/view/~/9781098134983</a><br/>Format: Electronic Resources<br/>
Mastering Windows security and hardening : secure and protect your Windows environment from cyber threats using zero-trust security principles
ent://SD_ILS/0/SD_ILS:2334156
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Dunkerley, Mark, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar">https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803236544/?ar">https://learning.oreilly.com/library/view/~/9781803236544/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803236544">https://learning.oreilly.com/library/view/~/9781803236544</a><br/>Format: Electronic Resources<br/>
AWS security : compliance and observability setup and AWS account bootstrap walkthrough.
ent://SD_ILS/0/SD_ILS:2334241
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Kascic, Eric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNCS2022141/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNCS2022141/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNCS2022141/?ar">https://learning.oreilly.com/videos/~/10000MNCS2022141/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNCS2022141">https://learning.oreilly.com/videos/~/10000MNCS2022141</a><br/>Format: Video recording<br/>
Cybersecurity leadership demystified : a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
ent://SD_ILS/0/SD_ILS:2334691
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781804619827/?ar">https://go.oreilly.com/library-access/library/view/-/9781804619827/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781804619827/?ar">https://learning.oreilly.com/library/view/~/9781804619827/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781804619827">https://learning.oreilly.com/library/view/~/9781804619827</a><br/>Format: Sound recording<br/>
IoT system testing : an IoT journey from devices to analytics and the edge
ent://SD_ILS/0/SD_ILS:2334592
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Hagar, Jon Duncan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar">https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484282762/?ar">https://learning.oreilly.com/library/view/~/9781484282762/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484282762">https://learning.oreilly.com/library/view/~/9781484282762</a><br/>Format: Electronic Resources<br/>
Making sense of cybersecurity
ent://SD_ILS/0/SD_ILS:2335000
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Kranz, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617298004/?ar">https://learning.oreilly.com/library/view/~/9781617298004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617298004">https://learning.oreilly.com/library/view/~/9781617298004</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar">https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar</a><br/>Format: Electronic Resources<br/>
Identity and access management fundamentals.
ent://SD_ILS/0/SD_ILS:2335277
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Kohli, Harpreet, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671145/?ar">https://learning.oreilly.com/videos/~/0636920671145/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920671145">https://learning.oreilly.com/videos/~/0636920671145</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar</a><br/>Format: Video recording<br/>
Web hacking expert : full-stack exploitation mastery.
ent://SD_ILS/0/SD_ILS:2335278
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Czagan, Dawid, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717">https://learning.oreilly.com/videos/~/9781837639717</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717/?ar">https://learning.oreilly.com/videos/~/9781837639717/?ar</a><br/>Format: Video recording<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:2331694
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Harper, Allen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar">https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781264268955/?ar">https://learning.oreilly.com/library/view/~/9781264268955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781264268955">https://learning.oreilly.com/library/view/~/9781264268955</a><br/>Format: Electronic Resources<br/>
Cybersecurity leadership demystified : a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
ent://SD_ILS/0/SD_ILS:2331468
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801819282/?ar">https://go.oreilly.com/library-access/library/view/-/9781801819282/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801819282/?ar">https://learning.oreilly.com/library/view/~/9781801819282/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801819282">https://learning.oreilly.com/library/view/~/9781801819282</a><br/>Format: Electronic Resources<br/>
Threat modeling with Owasp Threat Dragon & risk rating a vulnerability.
ent://SD_ILS/0/SD_ILS:2332599
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Fisher, Derek, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202248/?ar">https://learning.oreilly.com/videos/~/10000MNHV202248/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202248">https://learning.oreilly.com/videos/~/10000MNHV202248</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar</a><br/>Format: Video recording<br/>
Finding your cyber security path.
ent://SD_ILS/0/SD_ILS:2332701
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Miller, Alyssa, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202258">https://learning.oreilly.com/videos/~/10000MNHV202258</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202258/?ar">https://learning.oreilly.com/videos/~/10000MNHV202258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar</a><br/>Format: Video recording<br/>
What is eBPF?
ent://SD_ILS/0/SD_ILS:2332631
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Rice, Liz (Open Source engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492097266/?ar">https://learning.oreilly.com/library/view/~/9781492097266/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492097266">https://learning.oreilly.com/library/view/~/9781492097266</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar">https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar</a><br/>Format: Electronic Resources<br/>
CYBERSECURITY IN SMART HOMES architectures, solutions and technologies.
ent://SD_ILS/0/SD_ILS:2333168
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by KHATOUN, RIDA.<br/><a href="https://learning.oreilly.com/library/view/~/9781789450866">https://learning.oreilly.com/library/view/~/9781789450866</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789450866/?ar">https://go.oreilly.com/library-access/library/view/-/9781789450866/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789450866/?ar">https://learning.oreilly.com/library/view/~/9781789450866/?ar</a><br/>Format: Electronic Resources<br/>
CEH : Certified Ethical Hacker Practice Exams
ent://SD_ILS/0/SD_ILS:2333635
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Walker, Matthew.<br/><a href="https://learning.oreilly.com/library/view/~/9781264269976">https://learning.oreilly.com/library/view/~/9781264269976</a>
<a href="https://learning.oreilly.com/library/view/~/9781264269976/?ar">https://learning.oreilly.com/library/view/~/9781264269976/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar">https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar</a><br/>Format: Electronic Resources<br/>
Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict
ent://SD_ILS/0/SD_ILS:2334696
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Borges, Dan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818/?ar">https://learning.oreilly.com/library/view/~/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818">https://learning.oreilly.com/library/view/~/9781801812818</a><br/>Format: Sound recording<br/>
ETHICAL GUIDE TO CYBER ANONYMITY concepts, tools,and techniques to be anonymous from criminals, unethical hackers, and governments
ent://SD_ILS/0/SD_ILS:2335153
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Gunawardana, Kushantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801810210">https://learning.oreilly.com/library/view/~/9781801810210</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801810210/?ar">https://go.oreilly.com/library-access/library/view/-/9781801810210/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801810210/?ar">https://learning.oreilly.com/library/view/~/9781801810210/?ar</a><br/>Format: Electronic Resources<br/>
Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence
ent://SD_ILS/0/SD_ILS:2335333
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Oettinger, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781837632503">https://learning.oreilly.com/library/view/~/9781837632503</a>
<a href="https://learning.oreilly.com/library/view/~/9781837632503/?ar">https://learning.oreilly.com/library/view/~/9781837632503/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837632503/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632503/?ar</a><br/>Format: Sound recording<br/>
Cyber security for absolute beginners. Part 02.
ent://SD_ILS/0/SD_ILS:2335513
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639403/?ar">https://learning.oreilly.com/videos/~/9781837639403/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639403">https://learning.oreilly.com/videos/~/9781837639403</a><br/>Format: Video recording<br/>
Practical cyber hacking skills for beginners.
ent://SD_ILS/0/SD_ILS:2335514
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar">https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181">https://learning.oreilly.com/videos/~/9781837636181</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181/?ar">https://learning.oreilly.com/videos/~/9781837636181/?ar</a><br/>Format: Video recording<br/>
Red Hat OpenShift container platform for IBM zCX
ent://SD_ILS/0/SD_ILS:2334911
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Parziale, Lydia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460871/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460871/?ar">https://learning.oreilly.com/library/view/~/9780738460871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460871">https://learning.oreilly.com/library/view/~/9780738460871</a><br/>Format: Electronic Resources<br/>
Security superstream : security in the cloud.
ent://SD_ILS/0/SD_ILS:2334923
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Messdaghi, Chloé, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920835578/?ar">https://go.oreilly.com/library-access/library/view/-/0636920835578/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920835578/?ar">https://learning.oreilly.com/videos/~/0636920835578/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920835578">https://learning.oreilly.com/videos/~/0636920835578</a><br/>Format: Video recording<br/>
Mastering malware analysis : a malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks
ent://SD_ILS/0/SD_ILS:2334733
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Kleymenov, Alexey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803240244/?ar">https://learning.oreilly.com/library/view/~/9781803240244/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240244">https://learning.oreilly.com/library/view/~/9781803240244</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar</a><br/>Format: Electronic Resources<br/>
Becoming a cyber security professional : a beginner's career guide.
ent://SD_ILS/0/SD_ILS:2335522
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837638321/?ar">https://go.oreilly.com/library-access/library/view/-/9781837638321/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837638321">https://learning.oreilly.com/videos/~/9781837638321</a>
<a href="https://learning.oreilly.com/videos/~/9781837638321/?ar">https://learning.oreilly.com/videos/~/9781837638321/?ar</a><br/>Format: Video recording<br/>
Making sense of application security.
ent://SD_ILS/0/SD_ILS:2332363
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Saikali, Adib, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202229">https://learning.oreilly.com/videos/~/10000MNHV202229</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202229/?ar">https://learning.oreilly.com/videos/~/10000MNHV202229/?ar</a><br/>Format: Video recording<br/>
Case study : how Tools & Solutions survived a ransomware attack.
ent://SD_ILS/0/SD_ILS:2332364
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Majumdar, Partha, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar">https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0636920673859">https://learning.oreilly.com/library/view/~/0636920673859</a>
<a href="https://learning.oreilly.com/library/view/~/0636920673859/?ar">https://learning.oreilly.com/library/view/~/0636920673859/?ar</a><br/>Format: Video recording<br/>
IBM Spectrum Virtualize, IBM FlashSystem, and IBM SAN volume controller security feature checklist
ent://SD_ILS/0/SD_ILS:2332372
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Scales, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460437">https://learning.oreilly.com/library/view/~/9780738460437</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460437/?ar">https://learning.oreilly.com/library/view/~/9780738460437/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar</a><br/>Format: Electronic Resources<br/>
Windows Network security fundamentals
ent://SD_ILS/0/SD_ILS:2333384
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Weadock, Glenn E., presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206">https://learning.oreilly.com/videos/~/0636920671206</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206/?ar">https://learning.oreilly.com/videos/~/0636920671206/?ar</a><br/>Format: Video recording<br/>
Purple team strategies : enhancing global security posture through uniting red and blue teams with adversary emulation
ent://SD_ILS/0/SD_ILS:2333493
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Routin, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801074292/?ar">https://learning.oreilly.com/library/view/~/9781801074292/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801074292">https://learning.oreilly.com/library/view/~/9781801074292</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801074292/?ar">https://go.oreilly.com/library-access/library/view/-/9781801074292/?ar</a><br/>Format: Electronic Resources<br/>
The security culture playbook : an executive guide to reducing risk and developing your human defense layer
ent://SD_ILS/0/SD_ILS:2334218
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Carpenter, Perry, author, narrator.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar">https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781663720177">https://learning.oreilly.com/library/view/~/9781663720177</a>
<a href="https://learning.oreilly.com/library/view/~/9781663720177/?ar">https://learning.oreilly.com/library/view/~/9781663720177/?ar</a><br/>Format: Sound recording<br/>
Cyber security : the complete guide to cyber threats and protection
ent://SD_ILS/0/SD_ILS:2335194
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Sutton, David (Information security practitioner), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175973">https://learning.oreilly.com/library/view/~/9781780175973</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175973/?ar">https://learning.oreilly.com/library/view/~/9781780175973/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar</a><br/>Format: Electronic Resources<br/>
Web hacker's toolbox : tools used by successful hackers.
ent://SD_ILS/0/SD_ILS:2335459
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Czagan, Dawid, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837632831/?ar">https://learning.oreilly.com/videos/~/9781837632831/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837632831">https://learning.oreilly.com/videos/~/9781837632831</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar</a><br/>Format: Video recording<br/>
Burp Suite unfiltered : go from a beginner to advanced.
ent://SD_ILS/0/SD_ILS:2335463
2024-05-29T22:07:15Z
2024-05-29T22:07:15Z
by Yadav, Avinash, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837639199">https://learning.oreilly.com/videos/~/9781837639199</a>
<a href="https://learning.oreilly.com/videos/~/9781837639199/?ar">https://learning.oreilly.com/videos/~/9781837639199/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837639199/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639199/?ar</a><br/>Format: Video recording<br/>