Search Results for - Narrowed by: 2022 - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092022$0025092022$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-05-29T22:07:15Z Mastering Defensive Security : Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure. ent://SD_ILS/0/SD_ILS:2330841 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Bravo, Cesar.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar">https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800208162/?ar">https://learning.oreilly.com/library/view/~/9781800208162/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800208162">https://learning.oreilly.com/library/view/~/9781800208162</a><br/>Format:&#160;Electronic Resources<br/> Trust in computer systems and the cloud ent://SD_ILS/0/SD_ILS:2330850 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Bursell, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119692324/?ar">https://learning.oreilly.com/library/view/~/9781119692324/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar">https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119692324">https://learning.oreilly.com/library/view/~/9781119692324</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity For Dummies ent://SD_ILS/0/SD_ILS:2332872 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119867180">https://learning.oreilly.com/library/view/~/9781119867180</a> <a href="https://learning.oreilly.com/library/view/~/9781119867180/?ar">https://learning.oreilly.com/library/view/~/9781119867180/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar">https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking ent://SD_ILS/0/SD_ILS:2332886 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Beaver, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119872191">https://learning.oreilly.com/library/view/~/9781119872191</a> <a href="https://learning.oreilly.com/library/view/~/9781119872191/?ar">https://learning.oreilly.com/library/view/~/9781119872191/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar">https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar</a><br/>Format:&#160;Electronic Resources<br/> Designing secure software : a guide for developers ent://SD_ILS/0/SD_ILS:2329594 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Kohnfelder, Loren, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129804/?ar">https://learning.oreilly.com/library/view/~/9781098129804/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129804">https://learning.oreilly.com/library/view/~/9781098129804</a><br/>Format:&#160;Electronic Resources<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:2332857 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Sharp, Matthew K., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663718556/?ar">https://go.oreilly.com/library-access/library/view/-/9781663718556/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781663718556">https://learning.oreilly.com/library/view/~/9781663718556</a> <a href="https://learning.oreilly.com/library/view/~/9781663718556/?ar">https://learning.oreilly.com/library/view/~/9781663718556/?ar</a><br/>Format:&#160;Sound recording<br/> Security awareness for dummies ent://SD_ILS/0/SD_ILS:2332874 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Winkler, Ira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar">https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119720928">https://learning.oreilly.com/library/view/~/9781119720928</a> <a href="https://learning.oreilly.com/library/view/~/9781119720928/?ar">https://learning.oreilly.com/library/view/~/9781119720928/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacks ent://SD_ILS/0/SD_ILS:2329941 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Peiris, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119804062/?ar">https://learning.oreilly.com/library/view/~/9781119804062/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar">https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119804062">https://learning.oreilly.com/library/view/~/9781119804062</a><br/>Format:&#160;Electronic Resources<br/> Risk management for cyber security managers. ent://SD_ILS/0/SD_ILS:2335524 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Oni, Alexander, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837639878/?ar">https://learning.oreilly.com/videos/~/9781837639878/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781837639878/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639878/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837639878">https://learning.oreilly.com/videos/~/9781837639878</a><br/>Format:&#160;Video recording<br/> Cyber security for absolute beginners, Part 01. ent://SD_ILS/0/SD_ILS:2335525 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Oni, Alexander, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837630943/?ar">https://learning.oreilly.com/videos/~/9781837630943/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837630943">https://learning.oreilly.com/videos/~/9781837630943</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar">https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar</a><br/>Format:&#160;Video recording<br/> Snowflake security : securing your Snowflake data cloud ent://SD_ILS/0/SD_ILS:2330261 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Herzberg, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484273890">https://learning.oreilly.com/library/view/~/9781484273890</a> <a href="https://learning.oreilly.com/library/view/~/9781484273890/?ar">https://learning.oreilly.com/library/view/~/9781484273890/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar">https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar</a><br/>Format:&#160;Electronic Resources<br/> CEH v11 : certified ethical hacker version 11 practice tests ent://SD_ILS/0/SD_ILS:2330385 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar">https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119824510/?ar">https://learning.oreilly.com/library/view/~/9781119824510/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119824510">https://learning.oreilly.com/library/view/~/9781119824510</a><br/>Format:&#160;Electronic Resources<br/> Phishing and communication channels a guide to identifying and mitigating phishing attacks ent://SD_ILS/0/SD_ILS:2331058 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Sonowal, Gunikhan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484277447/?ar">https://learning.oreilly.com/library/view/~/9781484277447/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484277447">https://learning.oreilly.com/library/view/~/9781484277447</a><br/>Format:&#160;Electronic Resources<br/> Fight fire with fire : proactive cybersecurity strategies for today's leaders ent://SD_ILS/0/SD_ILS:2330914 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Tarun, Renee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119854265/?ar">https://learning.oreilly.com/library/view/~/9781119854265/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119854265">https://learning.oreilly.com/library/view/~/9781119854265</a><br/>Format:&#160;Electronic Resources<br/> Ransomware protection playbook ent://SD_ILS/0/SD_ILS:2330090 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Grimes, Roger A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119849124">https://learning.oreilly.com/library/view/~/9781119849124</a> <a href="https://learning.oreilly.com/library/view/~/9781119849124/?ar">https://learning.oreilly.com/library/view/~/9781119849124/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar">https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar</a><br/>Format:&#160;Electronic Resources<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:2330102 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Sharp, Matthew K., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar">https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119782483/?ar">https://learning.oreilly.com/library/view/~/9781119782483/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119782483">https://learning.oreilly.com/library/view/~/9781119782483</a><br/>Format:&#160;Electronic Resources<br/> Navigating the cybersecurity career path ent://SD_ILS/0/SD_ILS:2330836 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Patton, Helen E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119833420">https://learning.oreilly.com/library/view/~/9781119833420</a> <a href="https://learning.oreilly.com/library/view/~/9781119833420/?ar">https://learning.oreilly.com/library/view/~/9781119833420/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar">https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptions ent://SD_ILS/0/SD_ILS:2329799 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and local government ent://SD_ILS/0/SD_ILS:2331746 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Norris, Donald F., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119788287/?ar">https://learning.oreilly.com/library/view/~/9781119788287/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119788287">https://learning.oreilly.com/library/view/~/9781119788287</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119788287/?ar">https://go.oreilly.com/library-access/library/view/-/9781119788287/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking : der umfassende Praxis-Guide : inkl. Pr&uuml;fungsvorbereitung zum CEHv11 ent://SD_ILS/0/SD_ILS:2331683 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Amberg, Eric, author<br/><a href="https://learning.oreilly.com/library/view/~/9783747504840">https://learning.oreilly.com/library/view/~/9783747504840</a> <a href="https://learning.oreilly.com/library/view/~/9783747504840/?ar">https://learning.oreilly.com/library/view/~/9783747504840/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar">https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar</a><br/>Format:&#160;Electronic Resources<br/> Python for cybersecurity : using Python for cyber offense and defense ent://SD_ILS/0/SD_ILS:2331574 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Poston, Howard E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar">https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119850649/?ar">https://learning.oreilly.com/library/view/~/9781119850649/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119850649">https://learning.oreilly.com/library/view/~/9781119850649</a><br/>Format:&#160;Electronic Resources<br/> Threat Intelligence and threat hunting ent://SD_ILS/0/SD_ILS:2331779 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137896301/?ar">https://learning.oreilly.com/videos/~/9780137896301/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar">https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137896301">https://learning.oreilly.com/videos/~/9780137896301</a><br/>Format:&#160;Video recording<br/> Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory. ent://SD_ILS/0/SD_ILS:2331787 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Ostrovskaya, Svetlana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070331">https://learning.oreilly.com/library/view/~/9781801070331</a> <a href="https://learning.oreilly.com/library/view/~/9781801070331/?ar">https://learning.oreilly.com/library/view/~/9781801070331/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linux ent://SD_ILS/0/SD_ILS:2332265 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar">https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803239750/?ar">https://learning.oreilly.com/videos/~/9781803239750/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803239750">https://learning.oreilly.com/videos/~/9781803239750</a><br/>Format:&#160;Video recording<br/> Container storage and data protection for applications on Kubernetes ent://SD_ILS/0/SD_ILS:2332574 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127022/?ar">https://learning.oreilly.com/library/view/~/9781098127022/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098127022">https://learning.oreilly.com/library/view/~/9781098127022</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar</a><br/>Format:&#160;Electronic Resources<br/> Shifting left for application security : bridging the divide between DevOps and security with the right security tools ent://SD_ILS/0/SD_ILS:2332575 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a> <a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security Observability with eBPF ent://SD_ILS/0/SD_ILS:2332576 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Salazar, Jed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492096719">https://learning.oreilly.com/library/view/~/9781492096719</a> <a href="https://learning.oreilly.com/library/view/~/9781492096719/?ar">https://learning.oreilly.com/library/view/~/9781492096719/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar">https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security handbook : find out how to effectively secure cloud environments using AWS, Azure, and GCP ent://SD_ILS/0/SD_ILS:2332481 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Estrin, Eyal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800569195">https://learning.oreilly.com/library/view/~/9781800569195</a> <a href="https://learning.oreilly.com/library/view/~/9781800569195/?ar">https://learning.oreilly.com/library/view/~/9781800569195/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar">https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ransomware ent://SD_ILS/0/SD_ILS:2332705 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Messdaghi, Chlo&eacute;, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar">https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920702641/?ar">https://learning.oreilly.com/videos/~/0636920702641/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920702641">https://learning.oreilly.com/videos/~/0636920702641</a><br/>Format:&#160;Video recording<br/> Security awareness for dummies ent://SD_ILS/0/SD_ILS:2333093 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666174175/?ar">https://learning.oreilly.com/library/view/~/9781666174175/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781666174175/?ar">https://go.oreilly.com/library-access/library/view/-/9781666174175/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781666174175">https://learning.oreilly.com/library/view/~/9781666174175</a><br/>Format:&#160;Sound recording<br/> The complete cybersecurity bootcamp ent://SD_ILS/0/SD_ILS:2333407 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137949397">https://learning.oreilly.com/videos/~/9780137949397</a> <a href="https://learning.oreilly.com/videos/~/9780137949397/?ar">https://learning.oreilly.com/videos/~/9780137949397/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar">https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar</a><br/>Format:&#160;Video recording<br/> IF IT'S SMART, IT'S VULNERABLE ent://SD_ILS/0/SD_ILS:2333601 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Hypponen, Mikko, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119895183/?ar">https://go.oreilly.com/library-access/library/view/-/9781119895183/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119895183/?ar">https://learning.oreilly.com/library/view/~/9781119895183/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119895183">https://learning.oreilly.com/library/view/~/9781119895183</a><br/>Format:&#160;Electronic Resources<br/> Common types of attack ent://SD_ILS/0/SD_ILS:2333855 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Assemble You, publisher.<br/><a href="https://learning.oreilly.com/library/view/~/125053AYPOD">https://learning.oreilly.com/library/view/~/125053AYPOD</a> <a href="https://go.oreilly.com/library-access/library/view/-/125053AYPOD/?ar">https://go.oreilly.com/library-access/library/view/-/125053AYPOD/?ar</a> <a href="https://learning.oreilly.com/library/view/~/125053AYPOD/?ar">https://learning.oreilly.com/library/view/~/125053AYPOD/?ar</a><br/>Format:&#160;Sound recording<br/> Security superstream : zero trust ent://SD_ILS/0/SD_ILS:2334748 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Messdaghi, Chlo&eacute;, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920817680">https://learning.oreilly.com/videos/~/0636920817680</a> <a href="https://learning.oreilly.com/videos/~/0636920817680/?ar">https://learning.oreilly.com/videos/~/0636920817680/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920817680/?ar">https://go.oreilly.com/library-access/library/view/-/0636920817680/?ar</a><br/>Format:&#160;Video recording<br/> Building a Red Hat OpenShift environment on IBM Z ent://SD_ILS/0/SD_ILS:2334093 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Parziale, Lydia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460741/?ar">https://learning.oreilly.com/library/view/~/9780738460741/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460741">https://learning.oreilly.com/library/view/~/9780738460741</a><br/>Format:&#160;Electronic Resources<br/> Secret key cryptography : ciphers, from simple to unbreakable ent://SD_ILS/0/SD_ILS:2334094 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Rubin, Frank (Cryptographer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781633439795">https://learning.oreilly.com/library/view/~/9781633439795</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar">https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781633439795/?ar">https://learning.oreilly.com/library/view/~/9781633439795/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer science security : concepts and tools ent://SD_ILS/0/SD_ILS:2334035 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Zaidoun, Ameur Salem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786307552/?ar">https://learning.oreilly.com/library/view/~/9781786307552/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar">https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786307552">https://learning.oreilly.com/library/view/~/9781786307552</a><br/>Format:&#160;Electronic Resources<br/> Getting started with IBM Hyper Protect Data Controller ent://SD_ILS/0/SD_ILS:2331451 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format:&#160;Electronic Resources<br/> A hybrid cloud cyber security solution using IBM Spectrum Virtualize for public cloud on Azure and IBM Spectrum Virtualize safeguarded copy. ent://SD_ILS/0/SD_ILS:2331705 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z <a href="https://learning.oreilly.com/library/view/~/9780738460345/?ar">https://learning.oreilly.com/library/view/~/9780738460345/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460345">https://learning.oreilly.com/library/view/~/9780738460345</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar</a><br/>Format:&#160;Electronic Resources<br/> CEH Certified Ethical Hacker Cert guide ent://SD_ILS/0/SD_ILS:2331621 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format:&#160;Electronic Resources<br/> Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response. ent://SD_ILS/0/SD_ILS:2331491 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Hettema, Hinne.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801815512/?ar">https://learning.oreilly.com/library/view/~/9781801815512/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801815512">https://learning.oreilly.com/library/view/~/9781801815512</a><br/>Format:&#160;Electronic Resources<br/> Offensive shellcode from scratch : get to grips with shellcode countermeasures and discover how to bypass them ent://SD_ILS/0/SD_ILS:2332537 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Pillay, Rishalin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar">https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803247427">https://learning.oreilly.com/library/view/~/9781803247427</a> <a href="https://learning.oreilly.com/library/view/~/9781803247427/?ar">https://learning.oreilly.com/library/view/~/9781803247427/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:2332538 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Pramanik, Sabyasachi, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119812494">https://learning.oreilly.com/library/view/~/9781119812494</a> <a href="https://learning.oreilly.com/library/view/~/9781119812494/?ar">https://learning.oreilly.com/library/view/~/9781119812494/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar">https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime : protecting your business, your family and yourself ent://SD_ILS/0/SD_ILS:2332545 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Wade, Todd author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175874/?ar">https://learning.oreilly.com/library/view/~/9781780175874/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780175874">https://learning.oreilly.com/library/view/~/9781780175874</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar</a><br/>Format:&#160;Electronic Resources<br/> WIRELESS SECURITY ARCHITECTURE designing and maintaining secure wireless for enterprise. ent://SD_ILS/0/SD_ILS:2331905 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;MINELLA, JENNIFER.<br/><a href="https://learning.oreilly.com/library/view/~/9781119883050">https://learning.oreilly.com/library/view/~/9781119883050</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119883050/?ar">https://go.oreilly.com/library-access/library/view/-/9781119883050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119883050/?ar">https://learning.oreilly.com/library/view/~/9781119883050/?ar</a><br/>Format:&#160;Electronic Resources<br/> Snowflake access control : mastering the features for data privacy and regulatory compliance ent://SD_ILS/0/SD_ILS:2331907 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Larson, Jessica Megan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484280386">https://learning.oreilly.com/library/view/~/9781484280386</a> <a href="https://learning.oreilly.com/library/view/~/9781484280386/?ar">https://learning.oreilly.com/library/view/~/9781484280386/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar">https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar</a><br/>Format:&#160;Electronic Resources<br/> The cybersecurity playbook for modern enterprises ent://SD_ILS/0/SD_ILS:2332323 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Wittkop, Jeremy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803248639/?ar">https://learning.oreilly.com/library/view/~/9781803248639/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803248639">https://learning.oreilly.com/library/view/~/9781803248639</a><br/>Format:&#160;Electronic Resources<br/> The security culture playbook : an executive guide to reducing risk and developing your human defense layer ent://SD_ILS/0/SD_ILS:2332410 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119875239/?ar">https://learning.oreilly.com/library/view/~/9781119875239/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119875239">https://learning.oreilly.com/library/view/~/9781119875239</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar">https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them ent://SD_ILS/0/SD_ILS:2332411 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format:&#160;Electronic Resources<br/> IT security controls : a guide to corporate standards and frameworks ent://SD_ILS/0/SD_ILS:2332412 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Viegas, Virgilio, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484277997/?ar">https://learning.oreilly.com/library/view/~/9781484277997/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484277997">https://learning.oreilly.com/library/view/~/9781484277997</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Defender for Cloud Cookbook : Protect Multicloud and Hybrid Cloud Environments, Manage Compliance and Strengthen Security Posture ent://SD_ILS/0/SD_ILS:2333592 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Kranjac, Sasha.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801076135/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076135/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801076135">https://learning.oreilly.com/library/view/~/9781801076135</a> <a href="https://learning.oreilly.com/library/view/~/9781801076135/?ar">https://learning.oreilly.com/library/view/~/9781801076135/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn computer forensics : your one-stop guide to searching, analyzing, acquiring, and securing digital evidence ent://SD_ILS/0/SD_ILS:2333947 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Oettinger, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803238302/?ar">https://learning.oreilly.com/library/view/~/9781803238302/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803238302">https://learning.oreilly.com/library/view/~/9781803238302</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803238302/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238302/?ar</a><br/>Format:&#160;Electronic Resources<br/> Infrastructure &amp; ops hour with Sam Newman. eBPF with Liz Rice ent://SD_ILS/0/SD_ILS:2334144 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Newman, Sam, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920788362/?ar">https://go.oreilly.com/library-access/library/view/-/0636920788362/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920788362">https://learning.oreilly.com/videos/~/0636920788362</a> <a href="https://learning.oreilly.com/videos/~/0636920788362/?ar">https://learning.oreilly.com/videos/~/0636920788362/?ar</a><br/>Format:&#160;Video recording<br/> Cybersecurity : attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system ent://SD_ILS/0/SD_ILS:2334741 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803248776/?ar">https://learning.oreilly.com/library/view/~/9781803248776/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803248776">https://learning.oreilly.com/library/view/~/9781803248776</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803248776/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248776/?ar</a><br/>Format:&#160;Electronic Resources<br/> System and privacy data protection. ent://SD_ILS/0/SD_ILS:2331777 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a> <a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format:&#160;Video recording<br/> Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadar ent://SD_ILS/0/SD_ILS:2332057 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;IBM Storage Team, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460260/?ar">https://learning.oreilly.com/library/view/~/9780738460260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460260">https://learning.oreilly.com/library/view/~/9780738460260</a><br/>Format:&#160;Electronic Resources<br/> Practical fraud prevention : fraud and AML analytics for Fintech and eCommerce, using SQL and Python ent://SD_ILS/0/SD_ILS:2332348 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Saporta, Gilit, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492093312/?ar">https://go.oreilly.com/library-access/library/view/-/9781492093312/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492093312/?ar">https://learning.oreilly.com/library/view/~/9781492093312/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492093312">https://learning.oreilly.com/library/view/~/9781492093312</a><br/>Format:&#160;Electronic Resources<br/> Learn man in the middle attacks from scratch. ent://SD_ILS/0/SD_ILS:2332269 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar">https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803243245/?ar">https://learning.oreilly.com/videos/~/9781803243245/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803243245">https://learning.oreilly.com/videos/~/9781803243245</a><br/>Format:&#160;Video recording<br/> Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 ent://SD_ILS/0/SD_ILS:2332617 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Nita, Stefania Loredana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484281055/?ar">https://learning.oreilly.com/library/view/~/9781484281055/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar">https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484281055">https://learning.oreilly.com/library/view/~/9781484281055</a><br/>Format:&#160;Electronic Resources<br/> Cloud security for dummies ent://SD_ILS/0/SD_ILS:2332497 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a> <a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format:&#160;Electronic Resources<br/> The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more ent://SD_ILS/0/SD_ILS:2332630 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital Earth : cyber threats, privacy and ethics in an age of paranoia ent://SD_ILS/0/SD_ILS:2332896 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Katz, Sarah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783614">https://learning.oreilly.com/library/view/~/9781787783614</a> <a href="https://learning.oreilly.com/library/view/~/9781787783614/?ar">https://learning.oreilly.com/library/view/~/9781787783614/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Azure security : keeping your Microsoft Azure workloads safe ent://SD_ILS/0/SD_ILS:2332927 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Toroman, Mustafa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803238555">https://learning.oreilly.com/library/view/~/9781803238555</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803238555/?ar">https://learning.oreilly.com/library/view/~/9781803238555/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security for dummies ent://SD_ILS/0/SD_ILS:2332936 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Coombs, Ted, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar">https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9798765008096/?ar">https://learning.oreilly.com/library/view/~/9798765008096/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9798765008096">https://learning.oreilly.com/library/view/~/9798765008096</a><br/>Format:&#160;Sound recording<br/> PRACTICAL INDUSTRIAL CYBERSECURITY ICS, Industry 4.0, and IIoT ent://SD_ILS/0/SD_ILS:2333070 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Brooks, Charles J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119883029/?ar">https://go.oreilly.com/library-access/library/view/-/9781119883029/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119883029/?ar">https://learning.oreilly.com/library/view/~/9781119883029/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119883029">https://learning.oreilly.com/library/view/~/9781119883029</a><br/>Format:&#160;Electronic Resources<br/> Operationalizing Threat Intelligence : a Guide to Developing and Operationalizing Cyber Threat Intelligence Programs. ent://SD_ILS/0/SD_ILS:2333075 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Wilhoit, Kyle.<br/><a href="https://learning.oreilly.com/library/view/~/9781801814683">https://learning.oreilly.com/library/view/~/9781801814683</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801814683/?ar">https://go.oreilly.com/library-access/library/view/-/9781801814683/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801814683/?ar">https://learning.oreilly.com/library/view/~/9781801814683/?ar</a><br/>Format:&#160;Electronic Resources<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:2333211 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Moyo, Siegfried, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119863113">https://learning.oreilly.com/library/view/~/9781119863113</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar">https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119863113/?ar">https://learning.oreilly.com/library/view/~/9781119863113/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with cybersecurity science ent://SD_ILS/0/SD_ILS:2333381 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Dykstra, Josiah, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920670926">https://learning.oreilly.com/videos/~/0636920670926</a> <a href="https://learning.oreilly.com/videos/~/0636920670926/?ar">https://learning.oreilly.com/videos/~/0636920670926/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar">https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar</a><br/>Format:&#160;Video recording<br/> Hands-on threat modeling ent://SD_ILS/0/SD_ILS:2333383 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Deleersnyder, Sebastien, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671268">https://learning.oreilly.com/videos/~/0636920671268</a> <a href="https://learning.oreilly.com/videos/~/0636920671268/?ar">https://learning.oreilly.com/videos/~/0636920671268/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar</a><br/>Format:&#160;Video recording<br/> Single sign-on and passwordless authentication : an overview. ent://SD_ILS/0/SD_ILS:2333558 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Ovcharov, Andrey, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202294">https://learning.oreilly.com/videos/~/10000MNHV202294</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202294/?ar">https://learning.oreilly.com/videos/~/10000MNHV202294/?ar</a><br/>Format:&#160;Video recording<br/> The ransomware dilemma : the decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attack ent://SD_ILS/0/SD_ILS:2333559 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Leo, Philipp, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63419">https://learning.oreilly.com/library/view/~/53863MIT63419</a> <a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT63419/?ar">https://learning.oreilly.com/library/view/~/53863MIT63419/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building cyber resilience before the next attack occurs : companies that are most successful in responding to cyberattacks leverage distributed leadership, crisis experience, and consistent communication ent://SD_ILS/0/SD_ILS:2333560 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Hepfer, Manuel, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63431/?ar">https://learning.oreilly.com/library/view/~/53863MIT63431/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT63431">https://learning.oreilly.com/library/view/~/53863MIT63431</a> <a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63431/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63431/?ar</a><br/>Format:&#160;Electronic Resources<br/> The unbreakable one-time pad cipher. ent://SD_ILS/0/SD_ILS:2333562 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Rubin, Frank (Cryptographer), presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202291/?ar">https://learning.oreilly.com/videos/~/10000MNHV202291/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202291">https://learning.oreilly.com/videos/~/10000MNHV202291</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202291/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202291/?ar</a><br/>Format:&#160;Video recording<br/> The art of cyber security : a practical guide to winning the war on cyber crime ent://SD_ILS/0/SD_ILS:2333417 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Hibberd, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783676">https://learning.oreilly.com/library/view/~/9781787783676</a> <a href="https://learning.oreilly.com/library/view/~/9781787783676/?ar">https://learning.oreilly.com/library/view/~/9781787783676/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar</a><br/>Format:&#160;Electronic Resources<br/> Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud ent://SD_ILS/0/SD_ILS:2333792 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Berkouwer, Sander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar">https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803242507/?ar">https://learning.oreilly.com/library/view/~/9781803242507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803242507">https://learning.oreilly.com/library/view/~/9781803242507</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing mit Metasploit : Praxiswissen f&uuml;r mehr IT-Sicherheit ent://SD_ILS/0/SD_ILS:2333963 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783747505649">https://learning.oreilly.com/library/view/~/9783747505649</a> <a href="https://learning.oreilly.com/library/view/~/9783747505649/?ar">https://learning.oreilly.com/library/view/~/9783747505649/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar">https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deploying a modern security data lake ent://SD_ILS/0/SD_ILS:2333965 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Baum, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098134983/?ar">https://learning.oreilly.com/library/view/~/9781098134983/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar">https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098134983">https://learning.oreilly.com/library/view/~/9781098134983</a><br/>Format:&#160;Electronic Resources<br/> Mastering Windows security and hardening : secure and protect your Windows environment from cyber threats using zero-trust security principles ent://SD_ILS/0/SD_ILS:2334156 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Dunkerley, Mark, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar">https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803236544/?ar">https://learning.oreilly.com/library/view/~/9781803236544/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803236544">https://learning.oreilly.com/library/view/~/9781803236544</a><br/>Format:&#160;Electronic Resources<br/> AWS security : compliance and observability setup and AWS account bootstrap walkthrough. ent://SD_ILS/0/SD_ILS:2334241 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Kascic, Eric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNCS2022141/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNCS2022141/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNCS2022141/?ar">https://learning.oreilly.com/videos/~/10000MNCS2022141/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNCS2022141">https://learning.oreilly.com/videos/~/10000MNCS2022141</a><br/>Format:&#160;Video recording<br/> Cybersecurity leadership demystified : a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO ent://SD_ILS/0/SD_ILS:2334691 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781804619827/?ar">https://go.oreilly.com/library-access/library/view/-/9781804619827/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781804619827/?ar">https://learning.oreilly.com/library/view/~/9781804619827/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781804619827">https://learning.oreilly.com/library/view/~/9781804619827</a><br/>Format:&#160;Sound recording<br/> IoT system testing : an IoT journey from devices to analytics and the edge ent://SD_ILS/0/SD_ILS:2334592 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Hagar, Jon Duncan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar">https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484282762/?ar">https://learning.oreilly.com/library/view/~/9781484282762/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484282762">https://learning.oreilly.com/library/view/~/9781484282762</a><br/>Format:&#160;Electronic Resources<br/> Making sense of cybersecurity ent://SD_ILS/0/SD_ILS:2335000 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Kranz, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617298004/?ar">https://learning.oreilly.com/library/view/~/9781617298004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617298004">https://learning.oreilly.com/library/view/~/9781617298004</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar">https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar</a><br/>Format:&#160;Electronic Resources<br/> Identity and access management fundamentals. ent://SD_ILS/0/SD_ILS:2335277 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Kohli, Harpreet, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671145/?ar">https://learning.oreilly.com/videos/~/0636920671145/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920671145">https://learning.oreilly.com/videos/~/0636920671145</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar</a><br/>Format:&#160;Video recording<br/> Web hacking expert : full-stack exploitation mastery. ent://SD_ILS/0/SD_ILS:2335278 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Czagan, Dawid, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837639717">https://learning.oreilly.com/videos/~/9781837639717</a> <a href="https://learning.oreilly.com/videos/~/9781837639717/?ar">https://learning.oreilly.com/videos/~/9781837639717/?ar</a><br/>Format:&#160;Video recording<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:2331694 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Harper, Allen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar">https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781264268955/?ar">https://learning.oreilly.com/library/view/~/9781264268955/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781264268955">https://learning.oreilly.com/library/view/~/9781264268955</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity leadership demystified : a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO ent://SD_ILS/0/SD_ILS:2331468 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801819282/?ar">https://go.oreilly.com/library-access/library/view/-/9781801819282/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801819282/?ar">https://learning.oreilly.com/library/view/~/9781801819282/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801819282">https://learning.oreilly.com/library/view/~/9781801819282</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling with Owasp Threat Dragon &amp; risk rating a vulnerability. ent://SD_ILS/0/SD_ILS:2332599 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Fisher, Derek, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202248/?ar">https://learning.oreilly.com/videos/~/10000MNHV202248/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202248">https://learning.oreilly.com/videos/~/10000MNHV202248</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar</a><br/>Format:&#160;Video recording<br/> Finding your cyber security path. ent://SD_ILS/0/SD_ILS:2332701 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Miller, Alyssa, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202258">https://learning.oreilly.com/videos/~/10000MNHV202258</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202258/?ar">https://learning.oreilly.com/videos/~/10000MNHV202258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar</a><br/>Format:&#160;Video recording<br/> What is eBPF? ent://SD_ILS/0/SD_ILS:2332631 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Rice, Liz (Open Source engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492097266/?ar">https://learning.oreilly.com/library/view/~/9781492097266/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492097266">https://learning.oreilly.com/library/view/~/9781492097266</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar">https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar</a><br/>Format:&#160;Electronic Resources<br/> CYBERSECURITY IN SMART HOMES architectures, solutions and technologies. ent://SD_ILS/0/SD_ILS:2333168 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;KHATOUN, RIDA.<br/><a href="https://learning.oreilly.com/library/view/~/9781789450866">https://learning.oreilly.com/library/view/~/9781789450866</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789450866/?ar">https://go.oreilly.com/library-access/library/view/-/9781789450866/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789450866/?ar">https://learning.oreilly.com/library/view/~/9781789450866/?ar</a><br/>Format:&#160;Electronic Resources<br/> CEH : Certified Ethical Hacker Practice Exams ent://SD_ILS/0/SD_ILS:2333635 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Walker, Matthew.<br/><a href="https://learning.oreilly.com/library/view/~/9781264269976">https://learning.oreilly.com/library/view/~/9781264269976</a> <a href="https://learning.oreilly.com/library/view/~/9781264269976/?ar">https://learning.oreilly.com/library/view/~/9781264269976/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar">https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar</a><br/>Format:&#160;Electronic Resources<br/> Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict ent://SD_ILS/0/SD_ILS:2334696 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Borges, Dan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812818/?ar">https://learning.oreilly.com/library/view/~/9781801812818/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812818">https://learning.oreilly.com/library/view/~/9781801812818</a><br/>Format:&#160;Sound recording<br/> ETHICAL GUIDE TO CYBER ANONYMITY concepts, tools,and techniques to be anonymous from criminals, unethical hackers, and governments ent://SD_ILS/0/SD_ILS:2335153 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Gunawardana, Kushantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801810210">https://learning.oreilly.com/library/view/~/9781801810210</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801810210/?ar">https://go.oreilly.com/library-access/library/view/-/9781801810210/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801810210/?ar">https://learning.oreilly.com/library/view/~/9781801810210/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence ent://SD_ILS/0/SD_ILS:2335333 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Oettinger, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781837632503">https://learning.oreilly.com/library/view/~/9781837632503</a> <a href="https://learning.oreilly.com/library/view/~/9781837632503/?ar">https://learning.oreilly.com/library/view/~/9781837632503/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781837632503/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632503/?ar</a><br/>Format:&#160;Sound recording<br/> Cyber security for absolute beginners. Part 02. ent://SD_ILS/0/SD_ILS:2335513 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837639403/?ar">https://learning.oreilly.com/videos/~/9781837639403/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837639403">https://learning.oreilly.com/videos/~/9781837639403</a><br/>Format:&#160;Video recording<br/> Practical cyber hacking skills for beginners. ent://SD_ILS/0/SD_ILS:2335514 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar">https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837636181">https://learning.oreilly.com/videos/~/9781837636181</a> <a href="https://learning.oreilly.com/videos/~/9781837636181/?ar">https://learning.oreilly.com/videos/~/9781837636181/?ar</a><br/>Format:&#160;Video recording<br/> Red Hat OpenShift container platform for IBM zCX ent://SD_ILS/0/SD_ILS:2334911 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Parziale, Lydia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460871/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460871/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460871/?ar">https://learning.oreilly.com/library/view/~/9780738460871/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460871">https://learning.oreilly.com/library/view/~/9780738460871</a><br/>Format:&#160;Electronic Resources<br/> Security superstream : security in the cloud. ent://SD_ILS/0/SD_ILS:2334923 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Messdaghi, Chlo&eacute;, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920835578/?ar">https://go.oreilly.com/library-access/library/view/-/0636920835578/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920835578/?ar">https://learning.oreilly.com/videos/~/0636920835578/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920835578">https://learning.oreilly.com/videos/~/0636920835578</a><br/>Format:&#160;Video recording<br/> Mastering malware analysis : a malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks ent://SD_ILS/0/SD_ILS:2334733 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Kleymenov, Alexey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803240244/?ar">https://learning.oreilly.com/library/view/~/9781803240244/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240244">https://learning.oreilly.com/library/view/~/9781803240244</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar</a><br/>Format:&#160;Electronic Resources<br/> Becoming a cyber security professional : a beginner's career guide. ent://SD_ILS/0/SD_ILS:2335522 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837638321/?ar">https://go.oreilly.com/library-access/library/view/-/9781837638321/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837638321">https://learning.oreilly.com/videos/~/9781837638321</a> <a href="https://learning.oreilly.com/videos/~/9781837638321/?ar">https://learning.oreilly.com/videos/~/9781837638321/?ar</a><br/>Format:&#160;Video recording<br/> Making sense of application security. ent://SD_ILS/0/SD_ILS:2332363 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Saikali, Adib, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202229">https://learning.oreilly.com/videos/~/10000MNHV202229</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202229/?ar">https://learning.oreilly.com/videos/~/10000MNHV202229/?ar</a><br/>Format:&#160;Video recording<br/> Case study : how Tools &amp; Solutions survived a ransomware attack. ent://SD_ILS/0/SD_ILS:2332364 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Majumdar, Partha, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar">https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0636920673859">https://learning.oreilly.com/library/view/~/0636920673859</a> <a href="https://learning.oreilly.com/library/view/~/0636920673859/?ar">https://learning.oreilly.com/library/view/~/0636920673859/?ar</a><br/>Format:&#160;Video recording<br/> IBM Spectrum Virtualize, IBM FlashSystem, and IBM SAN volume controller security feature checklist ent://SD_ILS/0/SD_ILS:2332372 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Scales, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460437">https://learning.oreilly.com/library/view/~/9780738460437</a> <a href="https://learning.oreilly.com/library/view/~/9780738460437/?ar">https://learning.oreilly.com/library/view/~/9780738460437/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Network security fundamentals ent://SD_ILS/0/SD_ILS:2333384 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Weadock, Glenn E., presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920671206">https://learning.oreilly.com/videos/~/0636920671206</a> <a href="https://learning.oreilly.com/videos/~/0636920671206/?ar">https://learning.oreilly.com/videos/~/0636920671206/?ar</a><br/>Format:&#160;Video recording<br/> Purple team strategies : enhancing global security posture through uniting red and blue teams with adversary emulation ent://SD_ILS/0/SD_ILS:2333493 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Routin, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801074292/?ar">https://learning.oreilly.com/library/view/~/9781801074292/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801074292">https://learning.oreilly.com/library/view/~/9781801074292</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801074292/?ar">https://go.oreilly.com/library-access/library/view/-/9781801074292/?ar</a><br/>Format:&#160;Electronic Resources<br/> The security culture playbook : an executive guide to reducing risk and developing your human defense layer ent://SD_ILS/0/SD_ILS:2334218 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Carpenter, Perry, author, narrator.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar">https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781663720177">https://learning.oreilly.com/library/view/~/9781663720177</a> <a href="https://learning.oreilly.com/library/view/~/9781663720177/?ar">https://learning.oreilly.com/library/view/~/9781663720177/?ar</a><br/>Format:&#160;Sound recording<br/> Cyber security : the complete guide to cyber threats and protection ent://SD_ILS/0/SD_ILS:2335194 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Sutton, David (Information security practitioner), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175973">https://learning.oreilly.com/library/view/~/9781780175973</a> <a href="https://learning.oreilly.com/library/view/~/9781780175973/?ar">https://learning.oreilly.com/library/view/~/9781780175973/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web hacker's toolbox : tools used by successful hackers. ent://SD_ILS/0/SD_ILS:2335459 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Czagan, Dawid, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837632831/?ar">https://learning.oreilly.com/videos/~/9781837632831/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837632831">https://learning.oreilly.com/videos/~/9781837632831</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar</a><br/>Format:&#160;Video recording<br/> Burp Suite unfiltered : go from a beginner to advanced. ent://SD_ILS/0/SD_ILS:2335463 2024-05-29T22:07:15Z 2024-05-29T22:07:15Z by&#160;Yadav, Avinash, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837639199">https://learning.oreilly.com/videos/~/9781837639199</a> <a href="https://learning.oreilly.com/videos/~/9781837639199/?ar">https://learning.oreilly.com/videos/~/9781837639199/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781837639199/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639199/?ar</a><br/>Format:&#160;Video recording<br/>