Search Results for - Narrowed by: Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-05-23T14:51:05ZSustainably investing in digital assets globallyent://SD_ILS/0/SD_ILS:23340662024-05-23T14:51:05Z2024-05-23T14:51:05Zby Ozelli, Selva, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119885627">https://learning.oreilly.com/library/view/~/9781119885627</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119885627/?ar">https://go.oreilly.com/library-access/library/view/-/9781119885627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119885627/?ar">https://learning.oreilly.com/library/view/~/9781119885627/?ar</a><br/>Format: Electronic Resources<br/>The official (ISC)2 CCSP CBK referenceent://SD_ILS/0/SD_ILS:23349192024-05-23T14:51:05Z2024-05-23T14:51:05Zby Kraus, Aaron, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119909019/?ar">https://go.oreilly.com/library-access/library/view/-/9781119909019/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119909019/?ar">https://learning.oreilly.com/library/view/~/9781119909019/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119909019">https://learning.oreilly.com/library/view/~/9781119909019</a><br/>Format: Electronic Resources<br/>Learn man in the middle attacks from scratch.ent://SD_ILS/0/SD_ILS:23322692024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar">https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245/?ar">https://learning.oreilly.com/videos/~/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245">https://learning.oreilly.com/videos/~/9781803243245</a><br/>Format: Video recording<br/>The security culture playbook : an executive guide to reducing risk and developing your human defense layerent://SD_ILS/0/SD_ILS:23324102024-05-23T14:51:05Z2024-05-23T14:51:05Zby Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119875239/?ar">https://learning.oreilly.com/library/view/~/9781119875239/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119875239">https://learning.oreilly.com/library/view/~/9781119875239</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar">https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar</a><br/>Format: Electronic Resources<br/>Threat modeling with Owasp Threat Dragon & risk rating a vulnerability.ent://SD_ILS/0/SD_ILS:23325992024-05-23T14:51:05Z2024-05-23T14:51:05Zby Fisher, Derek, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202248/?ar">https://learning.oreilly.com/videos/~/10000MNHV202248/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202248">https://learning.oreilly.com/videos/~/10000MNHV202248</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar</a><br/>Format: Video recording<br/>Purple team strategies : enhancing global security posture through uniting red and blue teams with adversary emulationent://SD_ILS/0/SD_ILS:23334932024-05-23T14:51:05Z2024-05-23T14:51:05Zby Routin, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801074292/?ar">https://learning.oreilly.com/library/view/~/9781801074292/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801074292">https://learning.oreilly.com/library/view/~/9781801074292</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801074292/?ar">https://go.oreilly.com/library-access/library/view/-/9781801074292/?ar</a><br/>Format: Electronic Resources<br/>The security culture playbook : an executive guide to reducing risk and developing your human defense layerent://SD_ILS/0/SD_ILS:23342182024-05-23T14:51:05Z2024-05-23T14:51:05Zby Carpenter, Perry, author, narrator.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar">https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781663720177">https://learning.oreilly.com/library/view/~/9781663720177</a>
<a href="https://learning.oreilly.com/library/view/~/9781663720177/?ar">https://learning.oreilly.com/library/view/~/9781663720177/?ar</a><br/>Format: Sound recording<br/>The art of cyber security : a practical guide to winning the war on cyber crimeent://SD_ILS/0/SD_ILS:23334172024-05-23T14:51:05Z2024-05-23T14:51:05Zby Hibberd, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783676">https://learning.oreilly.com/library/view/~/9781787783676</a>
<a href="https://learning.oreilly.com/library/view/~/9781787783676/?ar">https://learning.oreilly.com/library/view/~/9781787783676/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar</a><br/>Format: Electronic Resources<br/>Making sense of cybersecurityent://SD_ILS/0/SD_ILS:23350002024-05-23T14:51:05Z2024-05-23T14:51:05Zby Kranz, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617298004/?ar">https://learning.oreilly.com/library/view/~/9781617298004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617298004">https://learning.oreilly.com/library/view/~/9781617298004</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar">https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar</a><br/>Format: Electronic Resources<br/>Security superstream : zero trustent://SD_ILS/0/SD_ILS:23347482024-05-23T14:51:05Z2024-05-23T14:51:05Zby Messdaghi, Chloé, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920817680">https://learning.oreilly.com/videos/~/0636920817680</a>
<a href="https://learning.oreilly.com/videos/~/0636920817680/?ar">https://learning.oreilly.com/videos/~/0636920817680/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920817680/?ar">https://go.oreilly.com/library-access/library/view/-/0636920817680/?ar</a><br/>Format: Video recording<br/>Building a Red Hat OpenShift environment on IBM Zent://SD_ILS/0/SD_ILS:23340932024-05-23T14:51:05Z2024-05-23T14:51:05Zby Parziale, Lydia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460741/?ar">https://learning.oreilly.com/library/view/~/9780738460741/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460741">https://learning.oreilly.com/library/view/~/9780738460741</a><br/>Format: Electronic Resources<br/>Secret key cryptography : ciphers, from simple to unbreakableent://SD_ILS/0/SD_ILS:23340942024-05-23T14:51:05Z2024-05-23T14:51:05Zby Rubin, Frank (Cryptographer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781633439795">https://learning.oreilly.com/library/view/~/9781633439795</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar">https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781633439795/?ar">https://learning.oreilly.com/library/view/~/9781633439795/?ar</a><br/>Format: Electronic Resources<br/>Web hacker's toolbox : tools used by successful hackers.ent://SD_ILS/0/SD_ILS:23354592024-05-23T14:51:05Z2024-05-23T14:51:05Zby Czagan, Dawid, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837632831/?ar">https://learning.oreilly.com/videos/~/9781837632831/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837632831">https://learning.oreilly.com/videos/~/9781837632831</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar</a><br/>Format: Video recording<br/>Burp Suite unfiltered : go from a beginner to advanced.ent://SD_ILS/0/SD_ILS:23354632024-05-23T14:51:05Z2024-05-23T14:51:05Zby Yadav, Avinash, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837639199">https://learning.oreilly.com/videos/~/9781837639199</a>
<a href="https://learning.oreilly.com/videos/~/9781837639199/?ar">https://learning.oreilly.com/videos/~/9781837639199/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837639199/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639199/?ar</a><br/>Format: Video recording<br/>Becoming a cyber security professional : a beginner's career guide.ent://SD_ILS/0/SD_ILS:23355222024-05-23T14:51:05Z2024-05-23T14:51:05Zby Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837638321/?ar">https://go.oreilly.com/library-access/library/view/-/9781837638321/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837638321">https://learning.oreilly.com/videos/~/9781837638321</a>
<a href="https://learning.oreilly.com/videos/~/9781837638321/?ar">https://learning.oreilly.com/videos/~/9781837638321/?ar</a><br/>Format: Video recording<br/>Risk management for cyber security managers.ent://SD_ILS/0/SD_ILS:23355242024-05-23T14:51:05Z2024-05-23T14:51:05Zby Oni, Alexander, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837639878/?ar">https://learning.oreilly.com/videos/~/9781837639878/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837639878/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639878/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639878">https://learning.oreilly.com/videos/~/9781837639878</a><br/>Format: Video recording<br/>Cyber security for absolute beginners, Part 01.ent://SD_ILS/0/SD_ILS:23355252024-05-23T14:51:05Z2024-05-23T14:51:05Zby Oni, Alexander, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837630943/?ar">https://learning.oreilly.com/videos/~/9781837630943/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837630943">https://learning.oreilly.com/videos/~/9781837630943</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar">https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar</a><br/>Format: Video recording<br/>Mastering Windows security and hardening : secure and protect your Windows environment from cyber threats using zero-trust security principlesent://SD_ILS/0/SD_ILS:23341562024-05-23T14:51:05Z2024-05-23T14:51:05Zby Dunkerley, Mark, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar">https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803236544/?ar">https://learning.oreilly.com/library/view/~/9781803236544/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803236544">https://learning.oreilly.com/library/view/~/9781803236544</a><br/>Format: Electronic Resources<br/>Mastering malware analysis : a malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacksent://SD_ILS/0/SD_ILS:23347332024-05-23T14:51:05Z2024-05-23T14:51:05Zby Kleymenov, Alexey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803240244/?ar">https://learning.oreilly.com/library/view/~/9781803240244/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240244">https://learning.oreilly.com/library/view/~/9781803240244</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar</a><br/>Format: Electronic Resources<br/>Identity and access management fundamentals.ent://SD_ILS/0/SD_ILS:23352772024-05-23T14:51:05Z2024-05-23T14:51:05Zby Kohli, Harpreet, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671145/?ar">https://learning.oreilly.com/videos/~/0636920671145/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920671145">https://learning.oreilly.com/videos/~/0636920671145</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar</a><br/>Format: Video recording<br/>Web hacking expert : full-stack exploitation mastery.ent://SD_ILS/0/SD_ILS:23352782024-05-23T14:51:05Z2024-05-23T14:51:05Zby Czagan, Dawid, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717">https://learning.oreilly.com/videos/~/9781837639717</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717/?ar">https://learning.oreilly.com/videos/~/9781837639717/?ar</a><br/>Format: Video recording<br/>Designing secure software : a guide for developersent://SD_ILS/0/SD_ILS:23295942024-05-23T14:51:05Z2024-05-23T14:51:05Zby Kohnfelder, Loren, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129804/?ar">https://learning.oreilly.com/library/view/~/9781098129804/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129804">https://learning.oreilly.com/library/view/~/9781098129804</a><br/>Format: Electronic Resources<br/>Mastering Defensive Security : Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure.ent://SD_ILS/0/SD_ILS:23308412024-05-23T14:51:05Z2024-05-23T14:51:05Zby Bravo, Cesar.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar">https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800208162/?ar">https://learning.oreilly.com/library/view/~/9781800208162/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800208162">https://learning.oreilly.com/library/view/~/9781800208162</a><br/>Format: Electronic Resources<br/>Trust in computer systems and the cloudent://SD_ILS/0/SD_ILS:23308502024-05-23T14:51:05Z2024-05-23T14:51:05Zby Bursell, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119692324/?ar">https://learning.oreilly.com/library/view/~/9781119692324/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar">https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119692324">https://learning.oreilly.com/library/view/~/9781119692324</a><br/>Format: Electronic Resources<br/>Cybersecurity For Dummiesent://SD_ILS/0/SD_ILS:23328722024-05-23T14:51:05Z2024-05-23T14:51:05Zby Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119867180">https://learning.oreilly.com/library/view/~/9781119867180</a>
<a href="https://learning.oreilly.com/library/view/~/9781119867180/?ar">https://learning.oreilly.com/library/view/~/9781119867180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar">https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar</a><br/>Format: Electronic Resources<br/>Security awareness for dummiesent://SD_ILS/0/SD_ILS:23328742024-05-23T14:51:05Z2024-05-23T14:51:05Zby Winkler, Ira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar">https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119720928">https://learning.oreilly.com/library/view/~/9781119720928</a>
<a href="https://learning.oreilly.com/library/view/~/9781119720928/?ar">https://learning.oreilly.com/library/view/~/9781119720928/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity leadership demystified : a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISOent://SD_ILS/0/SD_ILS:23314682024-05-23T14:51:05Z2024-05-23T14:51:05Zby Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801819282/?ar">https://go.oreilly.com/library-access/library/view/-/9781801819282/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801819282/?ar">https://learning.oreilly.com/library/view/~/9781801819282/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801819282">https://learning.oreilly.com/library/view/~/9781801819282</a><br/>Format: Electronic Resources<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:23316942024-05-23T14:51:05Z2024-05-23T14:51:05Zby Harper, Allen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar">https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781264268955/?ar">https://learning.oreilly.com/library/view/~/9781264268955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781264268955">https://learning.oreilly.com/library/view/~/9781264268955</a><br/>Format: Electronic Resources<br/>WIRELESS SECURITY ARCHITECTURE designing and maintaining secure wireless for enterprise.ent://SD_ILS/0/SD_ILS:23319052024-05-23T14:51:05Z2024-05-23T14:51:05Zby MINELLA, JENNIFER.<br/><a href="https://learning.oreilly.com/library/view/~/9781119883050">https://learning.oreilly.com/library/view/~/9781119883050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119883050/?ar">https://go.oreilly.com/library-access/library/view/-/9781119883050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119883050/?ar">https://learning.oreilly.com/library/view/~/9781119883050/?ar</a><br/>Format: Electronic Resources<br/>Snowflake access control : mastering the features for data privacy and regulatory complianceent://SD_ILS/0/SD_ILS:23319072024-05-23T14:51:05Z2024-05-23T14:51:05Zby Larson, Jessica Megan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484280386">https://learning.oreilly.com/library/view/~/9781484280386</a>
<a href="https://learning.oreilly.com/library/view/~/9781484280386/?ar">https://learning.oreilly.com/library/view/~/9781484280386/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar">https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar</a><br/>Format: Electronic Resources<br/>Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linuxent://SD_ILS/0/SD_ILS:23322652024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar">https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750/?ar">https://learning.oreilly.com/videos/~/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750">https://learning.oreilly.com/videos/~/9781803239750</a><br/>Format: Video recording<br/>Practical fraud prevention : fraud and AML analytics for Fintech and eCommerce, using SQL and Pythonent://SD_ILS/0/SD_ILS:23323482024-05-23T14:51:05Z2024-05-23T14:51:05Zby Saporta, Gilit, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492093312/?ar">https://go.oreilly.com/library-access/library/view/-/9781492093312/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492093312/?ar">https://learning.oreilly.com/library/view/~/9781492093312/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492093312">https://learning.oreilly.com/library/view/~/9781492093312</a><br/>Format: Electronic Resources<br/>IBM Spectrum Virtualize, IBM FlashSystem, and IBM SAN volume controller security feature checklistent://SD_ILS/0/SD_ILS:23323722024-05-23T14:51:05Z2024-05-23T14:51:05Zby Scales, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460437">https://learning.oreilly.com/library/view/~/9780738460437</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460437/?ar">https://learning.oreilly.com/library/view/~/9780738460437/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar</a><br/>Format: Electronic Resources<br/>Container storage and data protection for applications on Kubernetesent://SD_ILS/0/SD_ILS:23325742024-05-23T14:51:05Z2024-05-23T14:51:05Zby Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127022/?ar">https://learning.oreilly.com/library/view/~/9781098127022/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127022">https://learning.oreilly.com/library/view/~/9781098127022</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar</a><br/>Format: Electronic Resources<br/>Shifting left for application security : bridging the divide between DevOps and security with the right security toolsent://SD_ILS/0/SD_ILS:23325752024-05-23T14:51:05Z2024-05-23T14:51:05Zby Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format: Electronic Resources<br/>Security Observability with eBPFent://SD_ILS/0/SD_ILS:23325762024-05-23T14:51:05Z2024-05-23T14:51:05Zby Salazar, Jed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492096719">https://learning.oreilly.com/library/view/~/9781492096719</a>
<a href="https://learning.oreilly.com/library/view/~/9781492096719/?ar">https://learning.oreilly.com/library/view/~/9781492096719/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar">https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar</a><br/>Format: Electronic Resources<br/>Ransomwareent://SD_ILS/0/SD_ILS:23327052024-05-23T14:51:05Z2024-05-23T14:51:05Zby Messdaghi, Chloé, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar">https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641/?ar">https://learning.oreilly.com/videos/~/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641">https://learning.oreilly.com/videos/~/0636920702641</a><br/>Format: Video recording<br/>Security awareness for dummiesent://SD_ILS/0/SD_ILS:23330932024-05-23T14:51:05Z2024-05-23T14:51:05Zby Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666174175/?ar">https://learning.oreilly.com/library/view/~/9781666174175/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781666174175/?ar">https://go.oreilly.com/library-access/library/view/-/9781666174175/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781666174175">https://learning.oreilly.com/library/view/~/9781666174175</a><br/>Format: Sound recording<br/>A hybrid cloud cyber security solution using IBM Spectrum Virtualize for public cloud on Azure and IBM Spectrum Virtualize safeguarded copy.ent://SD_ILS/0/SD_ILS:23317052024-05-23T14:51:05Z2024-05-23T14:51:05Z<a href="https://learning.oreilly.com/library/view/~/9780738460345/?ar">https://learning.oreilly.com/library/view/~/9780738460345/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460345">https://learning.oreilly.com/library/view/~/9780738460345</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar</a><br/>Format: Electronic Resources<br/>Offensive shellcode from scratch : get to grips with shellcode countermeasures and discover how to bypass thement://SD_ILS/0/SD_ILS:23325372024-05-23T14:51:05Z2024-05-23T14:51:05Zby Pillay, Rishalin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar">https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803247427">https://learning.oreilly.com/library/view/~/9781803247427</a>
<a href="https://learning.oreilly.com/library/view/~/9781803247427/?ar">https://learning.oreilly.com/library/view/~/9781803247427/?ar</a><br/>Format: Electronic Resources<br/>Cyber security and network securityent://SD_ILS/0/SD_ILS:23325382024-05-23T14:51:05Z2024-05-23T14:51:05Zby Pramanik, Sabyasachi, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119812494">https://learning.oreilly.com/library/view/~/9781119812494</a>
<a href="https://learning.oreilly.com/library/view/~/9781119812494/?ar">https://learning.oreilly.com/library/view/~/9781119812494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar">https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar</a><br/>Format: Electronic Resources<br/>Cybercrime : protecting your business, your family and yourselfent://SD_ILS/0/SD_ILS:23325452024-05-23T14:51:05Z2024-05-23T14:51:05Zby Wade, Todd author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175874/?ar">https://learning.oreilly.com/library/view/~/9781780175874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175874">https://learning.oreilly.com/library/view/~/9781780175874</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar</a><br/>Format: Electronic Resources<br/>Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through thement://SD_ILS/0/SD_ILS:23324112024-05-23T14:51:05Z2024-05-23T14:51:05Zby Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format: Electronic Resources<br/>IT security controls : a guide to corporate standards and frameworksent://SD_ILS/0/SD_ILS:23324122024-05-23T14:51:05Z2024-05-23T14:51:05Zby Viegas, Virgilio, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484277997/?ar">https://learning.oreilly.com/library/view/~/9781484277997/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277997">https://learning.oreilly.com/library/view/~/9781484277997</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar</a><br/>Format: Electronic Resources<br/>The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and moreent://SD_ILS/0/SD_ILS:23326302024-05-23T14:51:05Z2024-05-23T14:51:05Zby Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format: Electronic Resources<br/>What is eBPF?ent://SD_ILS/0/SD_ILS:23326312024-05-23T14:51:05Z2024-05-23T14:51:05Zby Rice, Liz (Open Source engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492097266/?ar">https://learning.oreilly.com/library/view/~/9781492097266/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492097266">https://learning.oreilly.com/library/view/~/9781492097266</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar">https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar</a><br/>Format: Electronic Resources<br/>Penetration Testing mit Metasploit : Praxiswissen für mehr IT-Sicherheitent://SD_ILS/0/SD_ILS:23339632024-05-23T14:51:05Z2024-05-23T14:51:05Zby Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783747505649">https://learning.oreilly.com/library/view/~/9783747505649</a>
<a href="https://learning.oreilly.com/library/view/~/9783747505649/?ar">https://learning.oreilly.com/library/view/~/9783747505649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar">https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar</a><br/>Format: Electronic Resources<br/>The complete cybersecurity bootcampent://SD_ILS/0/SD_ILS:23334072024-05-23T14:51:05Z2024-05-23T14:51:05Zby Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137949397">https://learning.oreilly.com/videos/~/9780137949397</a>
<a href="https://learning.oreilly.com/videos/~/9780137949397/?ar">https://learning.oreilly.com/videos/~/9780137949397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar">https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar</a><br/>Format: Video recording<br/>Cybersecurity leadership demystified : a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISOent://SD_ILS/0/SD_ILS:23346912024-05-23T14:51:05Z2024-05-23T14:51:05Zby Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781804619827/?ar">https://go.oreilly.com/library-access/library/view/-/9781804619827/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781804619827/?ar">https://learning.oreilly.com/library/view/~/9781804619827/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781804619827">https://learning.oreilly.com/library/view/~/9781804619827</a><br/>Format: Sound recording<br/>IoT system testing : an IoT journey from devices to analytics and the edgeent://SD_ILS/0/SD_ILS:23345922024-05-23T14:51:05Z2024-05-23T14:51:05Zby Hagar, Jon Duncan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar">https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484282762/?ar">https://learning.oreilly.com/library/view/~/9781484282762/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484282762">https://learning.oreilly.com/library/view/~/9781484282762</a><br/>Format: Electronic Resources<br/>Cybersecurity : attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your systement://SD_ILS/0/SD_ILS:23347412024-05-23T14:51:05Z2024-05-23T14:51:05Zby Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803248776/?ar">https://learning.oreilly.com/library/view/~/9781803248776/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248776">https://learning.oreilly.com/library/view/~/9781803248776</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803248776/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248776/?ar</a><br/>Format: Electronic Resources<br/>Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflictent://SD_ILS/0/SD_ILS:23346962024-05-23T14:51:05Z2024-05-23T14:51:05Zby Borges, Dan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818/?ar">https://learning.oreilly.com/library/view/~/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818">https://learning.oreilly.com/library/view/~/9781801812818</a><br/>Format: Sound recording<br/>Red Hat OpenShift container platform for IBM zCXent://SD_ILS/0/SD_ILS:23349112024-05-23T14:51:05Z2024-05-23T14:51:05Zby Parziale, Lydia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460871/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460871/?ar">https://learning.oreilly.com/library/view/~/9780738460871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460871">https://learning.oreilly.com/library/view/~/9780738460871</a><br/>Format: Electronic Resources<br/>Cyber security : the complete guide to cyber threats and protectionent://SD_ILS/0/SD_ILS:23351942024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sutton, David (Information security practitioner), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175973">https://learning.oreilly.com/library/view/~/9781780175973</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175973/?ar">https://learning.oreilly.com/library/view/~/9781780175973/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar</a><br/>Format: Electronic Resources<br/>Cyber security for absolute beginners. Part 02.ent://SD_ILS/0/SD_ILS:23355132024-05-23T14:51:05Z2024-05-23T14:51:05Zby Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639403/?ar">https://learning.oreilly.com/videos/~/9781837639403/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639403">https://learning.oreilly.com/videos/~/9781837639403</a><br/>Format: Video recording<br/>Practical cyber hacking skills for beginners.ent://SD_ILS/0/SD_ILS:23355142024-05-23T14:51:05Z2024-05-23T14:51:05Zby Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar">https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181">https://learning.oreilly.com/videos/~/9781837636181</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181/?ar">https://learning.oreilly.com/videos/~/9781837636181/?ar</a><br/>Format: Video recording<br/>Ransomware protection playbookent://SD_ILS/0/SD_ILS:23300902024-05-23T14:51:05Z2024-05-23T14:51:05Zby Grimes, Roger A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119849124">https://learning.oreilly.com/library/view/~/9781119849124</a>
<a href="https://learning.oreilly.com/library/view/~/9781119849124/?ar">https://learning.oreilly.com/library/view/~/9781119849124/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar">https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar</a><br/>Format: Electronic Resources<br/>Snowflake security : securing your Snowflake data cloudent://SD_ILS/0/SD_ILS:23302612024-05-23T14:51:05Z2024-05-23T14:51:05Zby Herzberg, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484273890">https://learning.oreilly.com/library/view/~/9781484273890</a>
<a href="https://learning.oreilly.com/library/view/~/9781484273890/?ar">https://learning.oreilly.com/library/view/~/9781484273890/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar">https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar</a><br/>Format: Electronic Resources<br/>CEH v11 : certified ethical hacker version 11 practice testsent://SD_ILS/0/SD_ILS:23303852024-05-23T14:51:05Z2024-05-23T14:51:05Zby Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar">https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119824510/?ar">https://learning.oreilly.com/library/view/~/9781119824510/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119824510">https://learning.oreilly.com/library/view/~/9781119824510</a><br/>Format: Electronic Resources<br/>Navigating the cybersecurity career pathent://SD_ILS/0/SD_ILS:23308362024-05-23T14:51:05Z2024-05-23T14:51:05Zby Patton, Helen E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119833420">https://learning.oreilly.com/library/view/~/9781119833420</a>
<a href="https://learning.oreilly.com/library/view/~/9781119833420/?ar">https://learning.oreilly.com/library/view/~/9781119833420/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar">https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar</a><br/>Format: Electronic Resources<br/>Single sign-on and passwordless authentication : an overview.ent://SD_ILS/0/SD_ILS:23335582024-05-23T14:51:05Z2024-05-23T14:51:05Zby Ovcharov, Andrey, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202294">https://learning.oreilly.com/videos/~/10000MNHV202294</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202294/?ar">https://learning.oreilly.com/videos/~/10000MNHV202294/?ar</a><br/>Format: Video recording<br/>Common types of attackent://SD_ILS/0/SD_ILS:23338552024-05-23T14:51:05Z2024-05-23T14:51:05Zby Assemble You, publisher.<br/><a href="https://learning.oreilly.com/library/view/~/125053AYPOD">https://learning.oreilly.com/library/view/~/125053AYPOD</a>
<a href="https://go.oreilly.com/library-access/library/view/-/125053AYPOD/?ar">https://go.oreilly.com/library-access/library/view/-/125053AYPOD/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/125053AYPOD/?ar">https://learning.oreilly.com/library/view/~/125053AYPOD/?ar</a><br/>Format: Sound recording<br/>Computer science security : concepts and toolsent://SD_ILS/0/SD_ILS:23340352024-05-23T14:51:05Z2024-05-23T14:51:05Zby Zaidoun, Ameur Salem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786307552/?ar">https://learning.oreilly.com/library/view/~/9781786307552/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar">https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786307552">https://learning.oreilly.com/library/view/~/9781786307552</a><br/>Format: Electronic Resources<br/>Infrastructure & ops hour with Sam Newman. eBPF with Liz Riceent://SD_ILS/0/SD_ILS:23341442024-05-23T14:51:05Z2024-05-23T14:51:05Zby Newman, Sam, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920788362/?ar">https://go.oreilly.com/library-access/library/view/-/0636920788362/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920788362">https://learning.oreilly.com/videos/~/0636920788362</a>
<a href="https://learning.oreilly.com/videos/~/0636920788362/?ar">https://learning.oreilly.com/videos/~/0636920788362/?ar</a><br/>Format: Video recording<br/>Learn computer forensics : your one-stop guide to searching, analyzing, acquiring, and securing digital evidenceent://SD_ILS/0/SD_ILS:23339472024-05-23T14:51:05Z2024-05-23T14:51:05Zby Oettinger, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803238302/?ar">https://learning.oreilly.com/library/view/~/9781803238302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238302">https://learning.oreilly.com/library/view/~/9781803238302</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803238302/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238302/?ar</a><br/>Format: Electronic Resources<br/>Getting started with cybersecurity scienceent://SD_ILS/0/SD_ILS:23333812024-05-23T14:51:05Z2024-05-23T14:51:05Zby Dykstra, Josiah, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920670926">https://learning.oreilly.com/videos/~/0636920670926</a>
<a href="https://learning.oreilly.com/videos/~/0636920670926/?ar">https://learning.oreilly.com/videos/~/0636920670926/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar">https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar</a><br/>Format: Video recording<br/>Hands-on threat modelingent://SD_ILS/0/SD_ILS:23333832024-05-23T14:51:05Z2024-05-23T14:51:05Zby Deleersnyder, Sebastien, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671268">https://learning.oreilly.com/videos/~/0636920671268</a>
<a href="https://learning.oreilly.com/videos/~/0636920671268/?ar">https://learning.oreilly.com/videos/~/0636920671268/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar</a><br/>Format: Video recording<br/>Windows Network security fundamentalsent://SD_ILS/0/SD_ILS:23333842024-05-23T14:51:05Z2024-05-23T14:51:05Zby Weadock, Glenn E., presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206">https://learning.oreilly.com/videos/~/0636920671206</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206/?ar">https://learning.oreilly.com/videos/~/0636920671206/?ar</a><br/>Format: Video recording<br/>Cloud security for dummiesent://SD_ILS/0/SD_ILS:23324972024-05-23T14:51:05Z2024-05-23T14:51:05Zby Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a>
<a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format: Electronic Resources<br/>Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptionsent://SD_ILS/0/SD_ILS:23297992024-05-23T14:51:05Z2024-05-23T14:51:05Zby Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format: Electronic Resources<br/>Hackingent://SD_ILS/0/SD_ILS:23328862024-05-23T14:51:05Z2024-05-23T14:51:05Zby Beaver, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119872191">https://learning.oreilly.com/library/view/~/9781119872191</a>
<a href="https://learning.oreilly.com/library/view/~/9781119872191/?ar">https://learning.oreilly.com/library/view/~/9781119872191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar">https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar</a><br/>Format: Electronic Resources<br/>Digital Earth : cyber threats, privacy and ethics in an age of paranoiaent://SD_ILS/0/SD_ILS:23328962024-05-23T14:51:05Z2024-05-23T14:51:05Zby Katz, Sarah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783614">https://learning.oreilly.com/library/view/~/9781787783614</a>
<a href="https://learning.oreilly.com/library/view/~/9781787783614/?ar">https://learning.oreilly.com/library/view/~/9781787783614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar</a><br/>Format: Electronic Resources<br/>Python for cybersecurity : using Python for cyber offense and defenseent://SD_ILS/0/SD_ILS:23315742024-05-23T14:51:05Z2024-05-23T14:51:05Zby Poston, Howard E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar">https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649/?ar">https://learning.oreilly.com/library/view/~/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649">https://learning.oreilly.com/library/view/~/9781119850649</a><br/>Format: Electronic Resources<br/>System and privacy data protection.ent://SD_ILS/0/SD_ILS:23317772024-05-23T14:51:05Z2024-05-23T14:51:05Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a>
<a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format: Video recording<br/>Threat Intelligence and threat huntingent://SD_ILS/0/SD_ILS:23317792024-05-23T14:51:05Z2024-05-23T14:51:05Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137896301/?ar">https://learning.oreilly.com/videos/~/9780137896301/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar">https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137896301">https://learning.oreilly.com/videos/~/9780137896301</a><br/>Format: Video recording<br/>Making sense of application security.ent://SD_ILS/0/SD_ILS:23323632024-05-23T14:51:05Z2024-05-23T14:51:05Zby Saikali, Adib, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202229">https://learning.oreilly.com/videos/~/10000MNHV202229</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202229/?ar">https://learning.oreilly.com/videos/~/10000MNHV202229/?ar</a><br/>Format: Video recording<br/>Case study : how Tools & Solutions survived a ransomware attack.ent://SD_ILS/0/SD_ILS:23323642024-05-23T14:51:05Z2024-05-23T14:51:05Zby Majumdar, Partha, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar">https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0636920673859">https://learning.oreilly.com/library/view/~/0636920673859</a>
<a href="https://learning.oreilly.com/library/view/~/0636920673859/?ar">https://learning.oreilly.com/library/view/~/0636920673859/?ar</a><br/>Format: Video recording<br/>Hacking : der umfassende Praxis-Guide : inkl. Prüfungsvorbereitung zum CEHv11ent://SD_ILS/0/SD_ILS:23316832024-05-23T14:51:05Z2024-05-23T14:51:05Zby Amberg, Eric, author<br/><a href="https://learning.oreilly.com/library/view/~/9783747504840">https://learning.oreilly.com/library/view/~/9783747504840</a>
<a href="https://learning.oreilly.com/library/view/~/9783747504840/?ar">https://learning.oreilly.com/library/view/~/9783747504840/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar">https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar</a><br/>Format: Electronic Resources<br/>Cloud security for dummiesent://SD_ILS/0/SD_ILS:23329362024-05-23T14:51:05Z2024-05-23T14:51:05Zby Coombs, Ted, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar">https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9798765008096/?ar">https://learning.oreilly.com/library/view/~/9798765008096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9798765008096">https://learning.oreilly.com/library/view/~/9798765008096</a><br/>Format: Sound recording<br/>Cloud security handbook : find out how to effectively secure cloud environments using AWS, Azure, and GCPent://SD_ILS/0/SD_ILS:23324812024-05-23T14:51:05Z2024-05-23T14:51:05Zby Estrin, Eyal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800569195">https://learning.oreilly.com/library/view/~/9781800569195</a>
<a href="https://learning.oreilly.com/library/view/~/9781800569195/?ar">https://learning.oreilly.com/library/view/~/9781800569195/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar">https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar</a><br/>Format: Electronic Resources<br/>The cybersecurity playbook for modern enterprisesent://SD_ILS/0/SD_ILS:23323232024-05-23T14:51:05Z2024-05-23T14:51:05Zby Wittkop, Jeremy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639/?ar">https://learning.oreilly.com/library/view/~/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639">https://learning.oreilly.com/library/view/~/9781803248639</a><br/>Format: Electronic Resources<br/>PRACTICAL INDUSTRIAL CYBERSECURITY ICS, Industry 4.0, and IIoTent://SD_ILS/0/SD_ILS:23330702024-05-23T14:51:05Z2024-05-23T14:51:05Zby Brooks, Charles J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119883029/?ar">https://go.oreilly.com/library-access/library/view/-/9781119883029/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119883029/?ar">https://learning.oreilly.com/library/view/~/9781119883029/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119883029">https://learning.oreilly.com/library/view/~/9781119883029</a><br/>Format: Electronic Resources<br/>Operationalizing Threat Intelligence : a Guide to Developing and Operationalizing Cyber Threat Intelligence Programs.ent://SD_ILS/0/SD_ILS:23330752024-05-23T14:51:05Z2024-05-23T14:51:05Zby Wilhoit, Kyle.<br/><a href="https://learning.oreilly.com/library/view/~/9781801814683">https://learning.oreilly.com/library/view/~/9781801814683</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801814683/?ar">https://go.oreilly.com/library-access/library/view/-/9781801814683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801814683/?ar">https://learning.oreilly.com/library/view/~/9781801814683/?ar</a><br/>Format: Electronic Resources<br/>Finding your cyber security path.ent://SD_ILS/0/SD_ILS:23327012024-05-23T14:51:05Z2024-05-23T14:51:05Zby Miller, Alyssa, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202258">https://learning.oreilly.com/videos/~/10000MNHV202258</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202258/?ar">https://learning.oreilly.com/videos/~/10000MNHV202258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar</a><br/>Format: Video recording<br/>CYBERSECURITY IN SMART HOMES architectures, solutions and technologies.ent://SD_ILS/0/SD_ILS:23331682024-05-23T14:51:05Z2024-05-23T14:51:05Zby KHATOUN, RIDA.<br/><a href="https://learning.oreilly.com/library/view/~/9781789450866">https://learning.oreilly.com/library/view/~/9781789450866</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789450866/?ar">https://go.oreilly.com/library-access/library/view/-/9781789450866/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789450866/?ar">https://learning.oreilly.com/library/view/~/9781789450866/?ar</a><br/>Format: Electronic Resources<br/>Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10ent://SD_ILS/0/SD_ILS:23326172024-05-23T14:51:05Z2024-05-23T14:51:05Zby Nita, Stefania Loredana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484281055/?ar">https://learning.oreilly.com/library/view/~/9781484281055/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar">https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484281055">https://learning.oreilly.com/library/view/~/9781484281055</a><br/>Format: Electronic Resources<br/>CEH : Certified Ethical Hacker Practice Examsent://SD_ILS/0/SD_ILS:23336352024-05-23T14:51:05Z2024-05-23T14:51:05Zby Walker, Matthew.<br/><a href="https://learning.oreilly.com/library/view/~/9781264269976">https://learning.oreilly.com/library/view/~/9781264269976</a>
<a href="https://learning.oreilly.com/library/view/~/9781264269976/?ar">https://learning.oreilly.com/library/view/~/9781264269976/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar">https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar</a><br/>Format: Electronic Resources<br/>The ransomware dilemma : the decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attackent://SD_ILS/0/SD_ILS:23335592024-05-23T14:51:05Z2024-05-23T14:51:05Zby Leo, Philipp, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63419">https://learning.oreilly.com/library/view/~/53863MIT63419</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT63419/?ar">https://learning.oreilly.com/library/view/~/53863MIT63419/?ar</a><br/>Format: Electronic Resources<br/>Building cyber resilience before the next attack occurs : companies that are most successful in responding to cyberattacks leverage distributed leadership, crisis experience, and consistent communicationent://SD_ILS/0/SD_ILS:23335602024-05-23T14:51:05Z2024-05-23T14:51:05Zby Hepfer, Manuel, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63431/?ar">https://learning.oreilly.com/library/view/~/53863MIT63431/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT63431">https://learning.oreilly.com/library/view/~/53863MIT63431</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63431/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63431/?ar</a><br/>Format: Electronic Resources<br/>The unbreakable one-time pad cipher.ent://SD_ILS/0/SD_ILS:23335622024-05-23T14:51:05Z2024-05-23T14:51:05Zby Rubin, Frank (Cryptographer), presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202291/?ar">https://learning.oreilly.com/videos/~/10000MNHV202291/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202291">https://learning.oreilly.com/videos/~/10000MNHV202291</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202291/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202291/?ar</a><br/>Format: Video recording<br/>Executive's guide to cyber risk : securing the future todayent://SD_ILS/0/SD_ILS:23332112024-05-23T14:51:05Z2024-05-23T14:51:05Zby Moyo, Siegfried, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119863113">https://learning.oreilly.com/library/view/~/9781119863113</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar">https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119863113/?ar">https://learning.oreilly.com/library/view/~/9781119863113/?ar</a><br/>Format: Electronic Resources<br/>Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloudent://SD_ILS/0/SD_ILS:23337922024-05-23T14:51:05Z2024-05-23T14:51:05Zby Berkouwer, Sander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar">https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242507/?ar">https://learning.oreilly.com/library/view/~/9781803242507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242507">https://learning.oreilly.com/library/view/~/9781803242507</a><br/>Format: Electronic Resources<br/>Deploying a modern security data lakeent://SD_ILS/0/SD_ILS:23339652024-05-23T14:51:05Z2024-05-23T14:51:05Zby Baum, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098134983/?ar">https://learning.oreilly.com/library/view/~/9781098134983/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar">https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098134983">https://learning.oreilly.com/library/view/~/9781098134983</a><br/>Format: Electronic Resources<br/>AWS security : compliance and observability setup and AWS account bootstrap walkthrough.ent://SD_ILS/0/SD_ILS:23342412024-05-23T14:51:05Z2024-05-23T14:51:05Zby Kascic, Eric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNCS2022141/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNCS2022141/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNCS2022141/?ar">https://learning.oreilly.com/videos/~/10000MNCS2022141/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNCS2022141">https://learning.oreilly.com/videos/~/10000MNCS2022141</a><br/>Format: Video recording<br/>Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response.ent://SD_ILS/0/SD_ILS:23314912024-05-23T14:51:05Z2024-05-23T14:51:05Zby Hettema, Hinne.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512/?ar">https://learning.oreilly.com/library/view/~/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512">https://learning.oreilly.com/library/view/~/9781801815512</a><br/>Format: Electronic Resources<br/>Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory.ent://SD_ILS/0/SD_ILS:23317872024-05-23T14:51:05Z2024-05-23T14:51:05Zby Ostrovskaya, Svetlana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070331">https://learning.oreilly.com/library/view/~/9781801070331</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070331/?ar">https://learning.oreilly.com/library/view/~/9781801070331/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Defender for Cloud Cookbook : Protect Multicloud and Hybrid Cloud Environments, Manage Compliance and Strengthen Security Postureent://SD_ILS/0/SD_ILS:23335922024-05-23T14:51:05Z2024-05-23T14:51:05Zby Kranjac, Sasha.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801076135/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076135/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076135">https://learning.oreilly.com/library/view/~/9781801076135</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076135/?ar">https://learning.oreilly.com/library/view/~/9781801076135/?ar</a><br/>Format: Electronic Resources<br/>IF IT'S SMART, IT'S VULNERABLEent://SD_ILS/0/SD_ILS:23336012024-05-23T14:51:05Z2024-05-23T14:51:05Zby Hypponen, Mikko, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119895183/?ar">https://go.oreilly.com/library-access/library/view/-/9781119895183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119895183/?ar">https://learning.oreilly.com/library/view/~/9781119895183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119895183">https://learning.oreilly.com/library/view/~/9781119895183</a><br/>Format: Electronic Resources<br/>ETHICAL GUIDE TO CYBER ANONYMITY concepts, tools,and techniques to be anonymous from criminals, unethical hackers, and governmentsent://SD_ILS/0/SD_ILS:23351532024-05-23T14:51:05Z2024-05-23T14:51:05Zby Gunawardana, Kushantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801810210">https://learning.oreilly.com/library/view/~/9781801810210</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801810210/?ar">https://go.oreilly.com/library-access/library/view/-/9781801810210/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801810210/?ar">https://learning.oreilly.com/library/view/~/9781801810210/?ar</a><br/>Format: Electronic Resources<br/>Fight fire with fire : proactive cybersecurity strategies for today's leadersent://SD_ILS/0/SD_ILS:23309142024-05-23T14:51:05Z2024-05-23T14:51:05Zby Tarun, Renee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119854265/?ar">https://learning.oreilly.com/library/view/~/9781119854265/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119854265">https://learning.oreilly.com/library/view/~/9781119854265</a><br/>Format: Electronic Resources<br/>Cybersecurity and local governmentent://SD_ILS/0/SD_ILS:23317462024-05-23T14:51:05Z2024-05-23T14:51:05Zby Norris, Donald F., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119788287/?ar">https://learning.oreilly.com/library/view/~/9781119788287/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119788287">https://learning.oreilly.com/library/view/~/9781119788287</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119788287/?ar">https://go.oreilly.com/library-access/library/view/-/9781119788287/?ar</a><br/>Format: Electronic Resources<br/>Mastering Azure security : keeping your Microsoft Azure workloads safeent://SD_ILS/0/SD_ILS:23329272024-05-23T14:51:05Z2024-05-23T14:51:05Zby Toroman, Mustafa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803238555">https://learning.oreilly.com/library/view/~/9781803238555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238555/?ar">https://learning.oreilly.com/library/view/~/9781803238555/?ar</a><br/>Format: Electronic Resources<br/>Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadarent://SD_ILS/0/SD_ILS:23320572024-05-23T14:51:05Z2024-05-23T14:51:05Zby IBM Storage Team, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260/?ar">https://learning.oreilly.com/library/view/~/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260">https://learning.oreilly.com/library/view/~/9780738460260</a><br/>Format: Electronic Resources<br/>CEH Certified Ethical Hacker Cert guideent://SD_ILS/0/SD_ILS:23316212024-05-23T14:51:05Z2024-05-23T14:51:05Zby Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format: Electronic Resources<br/>Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacksent://SD_ILS/0/SD_ILS:23299412024-05-23T14:51:05Z2024-05-23T14:51:05Zby Peiris, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119804062/?ar">https://learning.oreilly.com/library/view/~/9781119804062/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar">https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119804062">https://learning.oreilly.com/library/view/~/9781119804062</a><br/>Format: Electronic Resources<br/>The CISO evolution : business knowledge for cybersecurity executivesent://SD_ILS/0/SD_ILS:23301022024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sharp, Matthew K., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar">https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119782483/?ar">https://learning.oreilly.com/library/view/~/9781119782483/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119782483">https://learning.oreilly.com/library/view/~/9781119782483</a><br/>Format: Electronic Resources<br/>The CISO evolution : business knowledge for cybersecurity executivesent://SD_ILS/0/SD_ILS:23328572024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sharp, Matthew K., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663718556/?ar">https://go.oreilly.com/library-access/library/view/-/9781663718556/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781663718556">https://learning.oreilly.com/library/view/~/9781663718556</a>
<a href="https://learning.oreilly.com/library/view/~/9781663718556/?ar">https://learning.oreilly.com/library/view/~/9781663718556/?ar</a><br/>Format: Sound recording<br/>Phishing and communication channels a guide to identifying and mitigating phishing attacksent://SD_ILS/0/SD_ILS:23310582024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sonowal, Gunikhan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277447/?ar">https://learning.oreilly.com/library/view/~/9781484277447/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277447">https://learning.oreilly.com/library/view/~/9781484277447</a><br/>Format: Electronic Resources<br/>Getting started with IBM Hyper Protect Data Controllerent://SD_ILS/0/SD_ILS:23314512024-05-23T14:51:05Z2024-05-23T14:51:05Zby White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format: Electronic Resources<br/>Security superstream : security in the cloud.ent://SD_ILS/0/SD_ILS:23349232024-05-23T14:51:05Z2024-05-23T14:51:05Zby Messdaghi, Chloé, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920835578/?ar">https://go.oreilly.com/library-access/library/view/-/0636920835578/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920835578/?ar">https://learning.oreilly.com/videos/~/0636920835578/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920835578">https://learning.oreilly.com/videos/~/0636920835578</a><br/>Format: Video recording<br/>Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidenceent://SD_ILS/0/SD_ILS:23353332024-05-23T14:51:05Z2024-05-23T14:51:05Zby Oettinger, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781837632503">https://learning.oreilly.com/library/view/~/9781837632503</a>
<a href="https://learning.oreilly.com/library/view/~/9781837632503/?ar">https://learning.oreilly.com/library/view/~/9781837632503/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837632503/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632503/?ar</a><br/>Format: Sound recording<br/>Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environmentent://SD_ILS/0/SD_ILS:23567612024-05-23T14:51:05Z2024-05-23T14:51:05Zby Ackerman, Pascal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6730157">Click to View</a><br/>Format: Electronic Resources<br/>Data analytics : systems engineering - cybersecurity - project managementent://SD_ILS/0/SD_ILS:22750842024-05-23T14:51:05Z2024-05-23T14:51:05Zby Greco, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6457843">Click to View</a><br/>Format: Electronic Resources<br/>Alice and Bob learn application security.ent://SD_ILS/0/SD_ILS:23259582024-05-23T14:51:05Z2024-05-23T14:51:05Zby Janca, Tanya.<br/><a href="https://learning.oreilly.com/library/view/~/9781119687351">https://learning.oreilly.com/library/view/~/9781119687351</a>
<a href="https://learning.oreilly.com/library/view/~/9781119687351/?ar">https://learning.oreilly.com/library/view/~/9781119687351/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar">https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar</a><br/>Format: Electronic Resources<br/>Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering (CCE)ent://SD_ILS/0/SD_ILS:23263232024-05-23T14:51:05Z2024-05-23T14:51:05Zby Bochman, Andrew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781000292978/?ar">https://go.oreilly.com/library-access/library/view/-/9781000292978/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000292978/?ar">https://learning.oreilly.com/library/view/~/9781000292978/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000292978">https://learning.oreilly.com/library/view/~/9781000292978</a><br/>Format: Electronic Resources<br/>Artificial Intelligence, Cybersecurity and Cyber Defenceent://SD_ILS/0/SD_ILS:23283582024-05-23T14:51:05Z2024-05-23T14:51:05Zby Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format: Electronic Resources<br/>How cybersecurity really works : a hands-on guide for total beginnersent://SD_ILS/0/SD_ILS:23280362024-05-23T14:51:05Z2024-05-23T14:51:05Zby Grubb, Sam (Cyber security consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999/?ar">https://learning.oreilly.com/library/view/~/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999">https://learning.oreilly.com/library/view/~/9781098128999</a><br/>Format: Electronic Resources<br/>Start-up secure : baking cybersecurity into your company from founding to exitent://SD_ILS/0/SD_ILS:23275242024-05-23T14:51:05Z2024-05-23T14:51:05Zby Castaldo, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119700739">https://learning.oreilly.com/library/view/~/9781119700739</a>
<a href="https://learning.oreilly.com/library/view/~/9781119700739/?ar">https://learning.oreilly.com/library/view/~/9781119700739/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar">https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar</a><br/>Format: Electronic Resources<br/>Securing AI.ent://SD_ILS/0/SD_ILS:23321342024-05-23T14:51:05Z2024-05-23T14:51:05Zby Manjengwa, Shingai, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar">https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920672319/?ar">https://learning.oreilly.com/videos/~/0636920672319/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920672319">https://learning.oreilly.com/videos/~/0636920672319</a><br/>Format: Video recording<br/>Intro to secure application deployment with Istio on Kubernetes.ent://SD_ILS/0/SD_ILS:23321812024-05-23T14:51:05Z2024-05-23T14:51:05Zby Poddar, Neeraj, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202219">https://learning.oreilly.com/videos/~/10000MNHV202219</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202219/?ar">https://learning.oreilly.com/videos/~/10000MNHV202219/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar</a><br/>Format: Video recording<br/>Lifecycle IoT Security for Engineers.ent://SD_ILS/0/SD_ILS:23372492024-05-23T14:51:05Z2024-05-23T14:51:05Zby Kaustubh, Dhondge.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6805253">Click to View</a><br/>Format: Electronic Resources<br/>Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidentsent://SD_ILS/0/SD_ILS:23517642024-05-23T14:51:05Z2024-05-23T14:51:05Zby Singh, Glen D., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6824393">Click to View</a><br/>Format: Electronic Resources<br/>Protective security : creating military-grade defenses for your digital businessent://SD_ILS/0/SD_ILS:23285792024-05-23T14:51:05Z2024-05-23T14:51:05Zby Seaman, Jim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484269084">https://learning.oreilly.com/library/view/~/9781484269084</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269084/?ar">https://learning.oreilly.com/library/view/~/9781484269084/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar</a><br/>Format: Electronic Resources<br/>Comptia security+ certification practice exams, (Exam SY0-601).ent://SD_ILS/0/SD_ILS:23271372024-05-23T14:51:05Z2024-05-23T14:51:05Zby Lachance, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781260467987/?ar">https://learning.oreilly.com/library/view/~/9781260467987/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar">https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260467987">https://learning.oreilly.com/library/view/~/9781260467987</a><br/>Format: Electronic Resources<br/>Cyber security on Azure : an it professional's guide to Microsoft Azure securityent://SD_ILS/0/SD_ILS:23271672024-05-23T14:51:05Z2024-05-23T14:51:05Zby Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484265314/?ar">https://learning.oreilly.com/library/view/~/9781484265314/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265314">https://learning.oreilly.com/library/view/~/9781484265314</a><br/>Format: Electronic Resources<br/>Red Hat and IT security : with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditingent://SD_ILS/0/SD_ILS:23265142024-05-23T14:51:05Z2024-05-23T14:51:05Zby Chatterjee, Rithik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484264348">https://learning.oreilly.com/library/view/~/9781484264348</a>
<a href="https://learning.oreilly.com/library/view/~/9781484264348/?ar">https://learning.oreilly.com/library/view/~/9781484264348/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar">https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar</a><br/>Format: Electronic Resources<br/>COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION EXAM GUIDE (EXAM CS0-002)ent://SD_ILS/0/SD_ILS:23265162024-05-23T14:51:05Z2024-05-23T14:51:05Zby Chapman, Brent.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar">https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260464313">https://learning.oreilly.com/library/view/~/9781260464313</a>
<a href="https://learning.oreilly.com/library/view/~/9781260464313/?ar">https://learning.oreilly.com/library/view/~/9781260464313/?ar</a><br/>Format: Electronic Resources<br/>Authentication and access control : practical cryptography methods and toolsent://SD_ILS/0/SD_ILS:23271232024-05-23T14:51:05Z2024-05-23T14:51:05Zby Boonkrong, Sirapat, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265703">https://learning.oreilly.com/library/view/~/9781484265703</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265703/?ar">https://learning.oreilly.com/library/view/~/9781484265703/?ar</a><br/>Format: Electronic Resources<br/>Information Risk Management : A practitioner's guide.ent://SD_ILS/0/SD_ILS:23370732024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sutton, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6733537">Click to View</a><br/>Format: Electronic Resources<br/>Android software internals quick reference : a field manual and security reference guide to Java-based Android componentsent://SD_ILS/0/SD_ILS:23284072024-05-23T14:51:05Z2024-05-23T14:51:05Zby Stevenson, James, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269145/?ar">https://learning.oreilly.com/library/view/~/9781484269145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269145">https://learning.oreilly.com/library/view/~/9781484269145</a><br/>Format: Electronic Resources<br/>You can stop stupid : stopping losses from accidental and malicious actionsent://SD_ILS/0/SD_ILS:23289682024-05-23T14:51:05Z2024-05-23T14:51:05Zby Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469078045">https://learning.oreilly.com/library/view/~/9781469078045</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469078045/?ar">https://go.oreilly.com/library-access/library/view/-/9781469078045/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469078045/?ar">https://learning.oreilly.com/library/view/~/9781469078045/?ar</a><br/>Format: Sound recording<br/>Choose your InfoSec path : an interactive cybersecurity adventure for beginnersent://SD_ILS/0/SD_ILS:23289902024-05-23T14:51:05Z2024-05-23T14:51:05Zby Roxon, Alexander J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484270363">https://learning.oreilly.com/library/view/~/9781484270363</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270363/?ar">https://learning.oreilly.com/library/view/~/9781484270363/?ar</a><br/>Format: Electronic Resources<br/>Big breaches : cybersecurity lessons for everyoneent://SD_ILS/0/SD_ILS:23281262024-05-23T14:51:05Z2024-05-23T14:51:05Zby Daswani, Neil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484266557">https://learning.oreilly.com/library/view/~/9781484266557</a>
<a href="https://learning.oreilly.com/library/view/~/9781484266557/?ar">https://learning.oreilly.com/library/view/~/9781484266557/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar">https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar</a><br/>Format: Electronic Resources<br/>Enterprise DevOps for Architectsent://SD_ILS/0/SD_ILS:23309782024-05-23T14:51:05Z2024-05-23T14:51:05Zby Mulder, Jeroen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801812153">https://learning.oreilly.com/library/view/~/9781801812153</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812153/?ar">https://learning.oreilly.com/library/view/~/9781801812153/?ar</a><br/>Format: Electronic Resources<br/>Certified ethical hacker (CEH) complete video courseent://SD_ILS/0/SD_ILS:23321462024-05-23T14:51:05Z2024-05-23T14:51:05Zby Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar">https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137446797/?ar">https://learning.oreilly.com/videos/~/9780137446797/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137446797">https://learning.oreilly.com/videos/~/9780137446797</a><br/>Format: Video recording<br/>Real-world cryptographyent://SD_ILS/0/SD_ILS:23328082024-05-23T14:51:05Z2024-05-23T14:51:05Zby Wong, David (Cryptography engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617296710AU">https://learning.oreilly.com/library/view/~/9781617296710AU</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710AU/?ar">https://learning.oreilly.com/library/view/~/9781617296710AU/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar</a><br/>Format: Sound recording<br/>Cybersecurity ABCs : delivering awareness, behaviours and culture changeent://SD_ILS/0/SD_ILS:23339262024-05-23T14:51:05Z2024-05-23T14:51:05Zby Barker, Jessica (Cyber security), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780174266/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174266/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780174266/?ar">https://learning.oreilly.com/library/view/~/9781780174266/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780174266">https://learning.oreilly.com/library/view/~/9781780174266</a><br/>Format: Electronic Resources<br/>Malware Analysis Techniques : Tricks for the Triage of Adversarial Software.ent://SD_ILS/0/SD_ILS:23291542024-05-23T14:51:05Z2024-05-23T14:51:05Zby Barker, Dylan.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212277">https://learning.oreilly.com/library/view/~/9781839212277</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212277/?ar">https://learning.oreilly.com/library/view/~/9781839212277/?ar</a><br/>Format: Electronic Resources<br/>Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflictent://SD_ILS/0/SD_ILS:23290792024-05-23T14:51:05Z2024-05-23T14:51:05Zby Borges, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781801076203/?ar">https://learning.oreilly.com/library/view/~/9781801076203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076203">https://learning.oreilly.com/library/view/~/9781801076203</a><br/>Format: Electronic Resources<br/>Cyber threat intelligence : the no-nonsense guide for CISOs and Security Managersent://SD_ILS/0/SD_ILS:23296372024-05-23T14:51:05Z2024-05-23T14:51:05Zby Roberts, Aaron.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272206">https://learning.oreilly.com/library/view/~/9781484272206</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484272206/?ar">https://learning.oreilly.com/library/view/~/9781484272206/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity and Third-Party Risk : Third Party Threat Huntingent://SD_ILS/0/SD_ILS:23290002024-05-23T14:51:05Z2024-05-23T14:51:05Zby Rasner, Gregory C.<br/><a href="https://learning.oreilly.com/library/view/~/9781119809555">https://learning.oreilly.com/library/view/~/9781119809555</a>
<a href="https://learning.oreilly.com/library/view/~/9781119809555/?ar">https://learning.oreilly.com/library/view/~/9781119809555/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar">https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar</a><br/>Format: Electronic Resources<br/>Real-world cryptographyent://SD_ILS/0/SD_ILS:23303832024-05-23T14:51:05Z2024-05-23T14:51:05Zby Wong, David (Cryptography engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710">https://learning.oreilly.com/library/view/~/9781617296710</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710/?ar">https://learning.oreilly.com/library/view/~/9781617296710/?ar</a><br/>Format: Electronic Resources<br/>Self-sovereign identity : decentralized digital identity and verifiable credentialsent://SD_ILS/0/SD_ILS:23302702024-05-23T14:51:05Z2024-05-23T14:51:05Zby Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format: Electronic Resources<br/>8 steps to better security : a simple cyber resilience guide for businessent://SD_ILS/0/SD_ILS:23308352024-05-23T14:51:05Z2024-05-23T14:51:05Zby Crawley, Kim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119811237/?ar">https://learning.oreilly.com/library/view/~/9781119811237/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119811237">https://learning.oreilly.com/library/view/~/9781119811237</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar">https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar</a><br/>Format: Electronic Resources<br/>Kubernetes security : attacking and defending Kubernetesent://SD_ILS/0/SD_ILS:23333862024-05-23T14:51:05Z2024-05-23T14:51:05Zby Martin, Andrew, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920668794/?ar">https://go.oreilly.com/library-access/library/view/-/0636920668794/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920668794/?ar">https://learning.oreilly.com/videos/~/0636920668794/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920668794">https://learning.oreilly.com/videos/~/0636920668794</a><br/>Format: Video recording<br/>The official (ISC)2 CCSP CBK referenceent://SD_ILS/0/SD_ILS:23293052024-05-23T14:51:05Z2024-05-23T14:51:05Zby Fife, Leslie, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119603436/?ar">https://go.oreilly.com/library-access/library/view/-/9781119603436/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119603436/?ar">https://learning.oreilly.com/library/view/~/9781119603436/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119603436">https://learning.oreilly.com/library/view/~/9781119603436</a><br/>Format: Electronic Resources<br/>(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests.ent://SD_ILS/0/SD_ILS:23295712024-05-23T14:51:05Z2024-05-23T14:51:05Zby Chapple, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781119787631">https://learning.oreilly.com/library/view/~/9781119787631</a>
<a href="https://learning.oreilly.com/library/view/~/9781119787631/?ar">https://learning.oreilly.com/library/view/~/9781119787631/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119787631/?ar">https://go.oreilly.com/library-access/library/view/-/9781119787631/?ar</a><br/>Format: Electronic Resources<br/>Azure security handbook : a comprehensive guide for defending your enterprise environmentent://SD_ILS/0/SD_ILS:23298022024-05-23T14:51:05Z2024-05-23T14:51:05Zby Ots, Karl.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272923">https://learning.oreilly.com/library/view/~/9781484272923</a>
<a href="https://learning.oreilly.com/library/view/~/9781484272923/?ar">https://learning.oreilly.com/library/view/~/9781484272923/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar</a><br/>Format: Electronic Resources<br/>Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environmentent://SD_ILS/0/SD_ILS:23303152024-05-23T14:51:05Z2024-05-23T14:51:05Zby Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800202092/?ar">https://learning.oreilly.com/library/view/~/9781800202092/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202092">https://learning.oreilly.com/library/view/~/9781800202092</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar</a><br/>Format: Electronic Resources<br/>Getting Started with z/OS Data Set Encryptionent://SD_ILS/0/SD_ILS:23312522024-05-23T14:51:05Z2024-05-23T14:51:05Zby White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format: Electronic Resources<br/>Threat modeling a practical guide for developing teamsent://SD_ILS/0/SD_ILS:23311562024-05-23T14:51:05Z2024-05-23T14:51:05Zby Tarandach, Izar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056546/?ar">https://learning.oreilly.com/library/view/~/9781492056546/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492056546">https://learning.oreilly.com/library/view/~/9781492056546</a><br/>Format: Electronic Resources<br/>Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browserent://SD_ILS/0/SD_ILS:23315702024-05-23T14:51:05Z2024-05-23T14:51:05Zby Segala, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar">https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801075336/?ar">https://learning.oreilly.com/library/view/~/9781801075336/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801075336">https://learning.oreilly.com/library/view/~/9781801075336</a><br/>Format: Electronic Resources<br/>Cyber Crisisent://SD_ILS/0/SD_ILS:23313162024-05-23T14:51:05Z2024-05-23T14:51:05Zby Cole, Eric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666125313">https://learning.oreilly.com/library/view/~/9781666125313</a>
<a href="https://learning.oreilly.com/library/view/~/9781666125313/?ar">https://learning.oreilly.com/library/view/~/9781666125313/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar">https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar</a><br/>Format: Electronic Resources<br/>Cryptoent://SD_ILS/0/SD_ILS:23313232024-05-23T14:51:05Z2024-05-23T14:51:05Zby Levy, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar">https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781666117615">https://learning.oreilly.com/library/view/~/9781666117615</a>
<a href="https://learning.oreilly.com/library/view/~/9781666117615/?ar">https://learning.oreilly.com/library/view/~/9781666117615/?ar</a><br/>Format: Electronic Resources<br/>Cyberjutsu : cybersecurity for the modern ninjaent://SD_ILS/0/SD_ILS:23265412024-05-23T14:51:05Z2024-05-23T14:51:05Zby McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format: Electronic Resources<br/>Strategy, leadership, and AI in the cyber ecosystem : the role of digital societies in information governance and decision makingent://SD_ILS/0/SD_ILS:23264552024-05-23T14:51:05Z2024-05-23T14:51:05Zby Jahankhani, Hamid.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128214596/?ar">https://go.oreilly.com/library-access/library/view/-/9780128214596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128214596/?ar">https://learning.oreilly.com/library/view/~/9780128214596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128214596">https://learning.oreilly.com/library/view/~/9780128214596</a><br/>Format: Electronic Resources<br/>A complete guide to Burp Suite : learn to detect application vulnerabilitiesent://SD_ILS/0/SD_ILS:23264302024-05-23T14:51:05Z2024-05-23T14:51:05Zby Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484264027/?ar">https://learning.oreilly.com/library/view/~/9781484264027/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484264027/?ar">https://go.oreilly.com/library-access/library/view/-/9781484264027/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484264027">https://learning.oreilly.com/library/view/~/9781484264027</a><br/>Format: Electronic Resources<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:23270532024-05-23T14:51:05Z2024-05-23T14:51:05Zby Moschovitis, Christos J. P., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119658740">https://learning.oreilly.com/library/view/~/9781119658740</a>
<a href="https://learning.oreilly.com/library/view/~/9781119658740/?ar">https://learning.oreilly.com/library/view/~/9781119658740/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar">https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity Manager's Guideent://SD_ILS/0/SD_ILS:23270202024-05-23T14:51:05Z2024-05-23T14:51:05Zby Barnum, Todd.<br/><a href="https://learning.oreilly.com/library/view/~/9781492076209">https://learning.oreilly.com/library/view/~/9781492076209</a>
<a href="https://learning.oreilly.com/library/view/~/9781492076209/?ar">https://learning.oreilly.com/library/view/~/9781492076209/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar">https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar</a><br/>Format: Electronic Resources<br/>Threat hunting with elastic stack : solve complex security challenges with integrated prevention, detection, and responseent://SD_ILS/0/SD_ILS:23294692024-05-23T14:51:05Z2024-05-23T14:51:05Zby Pease, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801073783/?ar">https://go.oreilly.com/library-access/library/view/-/9781801073783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801073783">https://learning.oreilly.com/library/view/~/9781801073783</a>
<a href="https://learning.oreilly.com/library/view/~/9781801073783/?ar">https://learning.oreilly.com/library/view/~/9781801073783/?ar</a><br/>Format: Electronic Resources<br/>Information Risk Management A practitioner's guideent://SD_ILS/0/SD_ILS:23302972024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sutton, David author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175751">https://learning.oreilly.com/library/view/~/9781780175751</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175751/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175751/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175751/?ar">https://learning.oreilly.com/library/view/~/9781780175751/?ar</a><br/>Format: Electronic Resources<br/>CYBER SECURITY AND DIGITAL FORENSICSent://SD_ILS/0/SD_ILS:23314412024-05-23T14:51:05Z2024-05-23T14:51:05Z<a href="https://learning.oreilly.com/library/view/~/9781119795636">https://learning.oreilly.com/library/view/~/9781119795636</a>
<a href="https://learning.oreilly.com/library/view/~/9781119795636/?ar">https://learning.oreilly.com/library/view/~/9781119795636/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar">https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar</a><br/>Format: Electronic Resources<br/>Real-world cryptographyent://SD_ILS/0/SD_ILS:23321502024-05-23T14:51:05Z2024-05-23T14:51:05Zby Wong, David, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781617296710VE">https://learning.oreilly.com/videos/~/9781617296710VE</a>
<a href="https://learning.oreilly.com/videos/~/9781617296710VE/?ar">https://learning.oreilly.com/videos/~/9781617296710VE/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar</a><br/>Format: Video recording<br/>Cybersecurity in the COVID-19 pandemicent://SD_ILS/0/SD_ILS:23277302024-05-23T14:51:05Z2024-05-23T14:51:05Zby Okereafor, Kenneth, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781000357653/?ar">https://learning.oreilly.com/library/view/~/9781000357653/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar">https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000357653">https://learning.oreilly.com/library/view/~/9781000357653</a><br/>Format: Electronic Resources<br/>Secure edge computing : applications, techniques and challenges.ent://SD_ILS/0/SD_ILS:23292882024-05-23T14:51:05Z2024-05-23T14:51:05Zby Ahmed, Mohiuddin (Computer scientist), editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000427325/?ar">https://learning.oreilly.com/library/view/~/9781000427325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000427325">https://learning.oreilly.com/library/view/~/9781000427325</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar">https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar</a><br/>Format: Electronic Resources<br/>Art of attack : attacker mindset for security professionals.ent://SD_ILS/0/SD_ILS:23294332024-05-23T14:51:05Z2024-05-23T14:51:05Zby Reynolds, Maxie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119805465/?ar">https://learning.oreilly.com/library/view/~/9781119805465/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119805465">https://learning.oreilly.com/library/view/~/9781119805465</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar">https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar</a><br/>Format: Electronic Resources<br/>CISSP (ISC)2 certification practice exams and tests : over 1000 practice questions and explanations covering all 8 CISSP domains for exam version May 2021ent://SD_ILS/0/SD_ILS:23296342024-05-23T14:51:05Z2024-05-23T14:51:05Zby Jordan, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800561373">https://learning.oreilly.com/library/view/~/9781800561373</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800561373/?ar">https://go.oreilly.com/library-access/library/view/-/9781800561373/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800561373/?ar">https://learning.oreilly.com/library/view/~/9781800561373/?ar</a><br/>Format: Electronic Resources<br/>Implementing identity management on AWS : a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environmentsent://SD_ILS/0/SD_ILS:23300232024-05-23T14:51:05Z2024-05-23T14:51:05Zby Lehtinen, Jon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800562288">https://learning.oreilly.com/library/view/~/9781800562288</a>
<a href="https://learning.oreilly.com/library/view/~/9781800562288/?ar">https://learning.oreilly.com/library/view/~/9781800562288/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar">https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar</a><br/>Format: Electronic Resources<br/>Information security in education and practiceent://SD_ILS/0/SD_ILS:23513692024-05-23T14:51:05Z2024-05-23T14:51:05Zby Kaloyanova, Kalinka., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6424050">Click to View</a><br/>Format: Electronic Resources<br/>Practical threat intelligence and data-driven threat huntingx : Practical threat intelligence and data-driven threat hunting : a hands-on guide to threat hunting with the ATT&CK framework and open source toolsent://SD_ILS/0/SD_ILS:23536262024-05-23T14:51:05Z2024-05-23T14:51:05Zby Palacin, Valentina, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6462896">Click to View</a><br/>Format: Electronic Resources<br/>Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflictent://SD_ILS/0/SD_ILS:23537352024-05-23T14:51:05Z2024-05-23T14:51:05Zby Borges, Dan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6640534">Click to View</a><br/>Format: Electronic Resources<br/>Artificial intelligence and data mining approaches in security frameworksent://SD_ILS/0/SD_ILS:23581812024-05-23T14:51:05Z2024-05-23T14:51:05Zby Bhargava, Neeraj, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6693036">Click to View</a><br/>Format: Electronic Resources<br/>The deviant security practices of cyber crimeent://SD_ILS/0/SD_ILS:23567332024-05-23T14:51:05Z2024-05-23T14:51:05Zby Van de Sandt, Erik H.A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6697091">Click to View</a><br/>Format: Electronic Resources<br/>Computer security and encryption : an introductionent://SD_ILS/0/SD_ILS:22376602024-05-23T14:51:05Z2024-05-23T14:51:05Zby Chauhan, S. R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6404902">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity and resilience in the arcticent://SD_ILS/0/SD_ILS:22423152024-05-23T14:51:05Z2024-05-23T14:51:05Zby Trump, Benjamin D., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6355988">Click to View</a><br/>Format: Electronic Resources<br/>Medical device cybersecurity for engineers and manufacturersent://SD_ILS/0/SD_ILS:22423372024-05-23T14:51:05Z2024-05-23T14:51:05Zby Wirth, Axel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6371470">Click to View</a><br/>Format: Electronic Resources<br/>Security operations in practiceent://SD_ILS/0/SD_ILS:22742232024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sheward, Mike, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6123931">Click to View</a><br/>Format: Electronic Resources<br/>Data privacy and GDPR handbookent://SD_ILS/0/SD_ILS:22739352024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sharma, Sanjay, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986738">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security : essential principles to secure your organisationent://SD_ILS/0/SD_ILS:22214562024-05-23T14:51:05Z2024-05-23T14:51:05Zby Calder, Alan, 1957- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6176700">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity : a self-teaching introductionent://SD_ILS/0/SD_ILS:22213842024-05-23T14:51:05Z2024-05-23T14:51:05Zby Gupta, C. P., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6142332">Click to View</a><br/>Format: Electronic Resources<br/>Security controls evaluation, testing, and assessment handbookent://SD_ILS/0/SD_ILS:22179062024-05-23T14:51:05Z2024-05-23T14:51:05Zby Johnson, Leighton, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986757">Click to View</a><br/>Format: Electronic Resources<br/>Successful cybersecurity professionals : how to change your behavior to protect your organizationent://SD_ILS/0/SD_ILS:22375912024-05-23T14:51:05Z2024-05-23T14:51:05Zby Brown, Steven, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6352009">Click to View</a><br/>Format: Electronic Resources<br/>Ensuring network security through the use of the honeypot techniqueent://SD_ILS/0/SD_ILS:22331462024-05-23T14:51:05Z2024-05-23T14:51:05Zby Selvaraj, Rajalakshmi, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5994500">Click to View</a><br/>Format: Electronic Resources<br/>Developing a cybersecurity immune system for industry 4.0ent://SD_ILS/0/SD_ILS:22373492024-05-23T14:51:05Z2024-05-23T14:51:05Zby Petrenko, Sergei, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6241958">Click to View</a><br/>Format: Electronic Resources<br/>Security and privacy in the internet of things : challenges and solutionsent://SD_ILS/0/SD_ILS:22334122024-05-23T14:51:05Z2024-05-23T14:51:05Zby Hernández Ramos, José Luis, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6143723">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Windows security and hardening : secure and protect your Windows environment from intruders, malware attacks, and other cyber threats.ent://SD_ILS/0/SD_ILS:23259662024-05-23T14:51:05Z2024-05-23T14:51:05Zby Dunkerley, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216411">https://learning.oreilly.com/library/view/~/9781839216411</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216411/?ar">https://learning.oreilly.com/library/view/~/9781839216411/?ar</a><br/>Format: Electronic Resources<br/>Penetration Testing For Dummiesent://SD_ILS/0/SD_ILS:23272182024-05-23T14:51:05Z2024-05-23T14:51:05Zby Shimonski, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119577485/?ar">https://learning.oreilly.com/library/view/~/9781119577485/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119577485/?ar">https://go.oreilly.com/library-access/library/view/-/9781119577485/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119577485">https://learning.oreilly.com/library/view/~/9781119577485</a><br/>Format: Electronic Resources<br/>Building secure firmware : armoring the foundation of the platforment://SD_ILS/0/SD_ILS:23260202024-05-23T14:51:05Z2024-05-23T14:51:05Zby Yao, Jiewen.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261064">https://learning.oreilly.com/library/view/~/9781484261064</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261064/?ar">https://learning.oreilly.com/library/view/~/9781484261064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar</a><br/>Format: Electronic Resources<br/>CompTIA Security+ SY0-601 Certification Guide - Second Editionent://SD_ILS/0/SD_ILS:23279712024-05-23T14:51:05Z2024-05-23T14:51:05Zby Neil, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781800564244">https://learning.oreilly.com/library/view/~/9781800564244</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar">https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800564244/?ar">https://learning.oreilly.com/library/view/~/9781800564244/?ar</a><br/>Format: Electronic Resources<br/>SECURING CLOUD SERVICES;A PRAGMATIC APPROACH, SECOND EDITION.ent://SD_ILS/0/SD_ILS:23280812024-05-23T14:51:05Z2024-05-23T14:51:05Zby LEE NEWCOMBE.<br/><a href="https://learning.oreilly.com/library/view/~/9781787782075">https://learning.oreilly.com/library/view/~/9781787782075</a>
<a href="https://learning.oreilly.com/library/view/~/9781787782075/?ar">https://learning.oreilly.com/library/view/~/9781787782075/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar">https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadershipent://SD_ILS/0/SD_ILS:23235892024-05-23T14:51:05Z2024-05-23T14:51:05Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format: Electronic Resources<br/>Cybersecurity for space : protecting the final frontierent://SD_ILS/0/SD_ILS:23237812024-05-23T14:51:05Z2024-05-23T14:51:05Zby Oakley, Jacob G.<br/><a href="https://learning.oreilly.com/library/view/~/9781484257326/?ar">https://learning.oreilly.com/library/view/~/9781484257326/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484257326/?ar">https://go.oreilly.com/library-access/library/view/-/9781484257326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484257326">https://learning.oreilly.com/library/view/~/9781484257326</a><br/>Format: Electronic Resources<br/>Security engineering 101 : when good design and security work togetherent://SD_ILS/0/SD_ILS:23244332024-05-23T14:51:05Z2024-05-23T14:51:05Zby Everette, Wendy Knox, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920342960/?ar">https://go.oreilly.com/library-access/library/view/-/0636920342960/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920342960/?ar">https://learning.oreilly.com/videos/~/0636920342960/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920342960">https://learning.oreilly.com/videos/~/0636920342960</a><br/>Format: Electronic Resources<br/>The Cyber Security Handbook - Prepare for, Respond to and Recover from Cyber Attacksent://SD_ILS/0/SD_ILS:23271502024-05-23T14:51:05Z2024-05-23T14:51:05Zby Calder, Alan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787782624/?ar">https://go.oreilly.com/library-access/library/view/-/9781787782624/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787782624">https://learning.oreilly.com/library/view/~/9781787782624</a>
<a href="https://learning.oreilly.com/library/view/~/9781787782624/?ar">https://learning.oreilly.com/library/view/~/9781787782624/?ar</a><br/>Format: Electronic Resources<br/>Hacking : der umfassende Praxis-Guide: inkl. Prüfungsvorbereitung zum CEHv10ent://SD_ILS/0/SD_ILS:23259462024-05-23T14:51:05Z2024-05-23T14:51:05Zby Amberg, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206/?ar">https://learning.oreilly.com/library/view/~/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206">https://learning.oreilly.com/library/view/~/9783958452206</a><br/>Format: Electronic Resources<br/>IT auditing : using controls to protect information assetsent://SD_ILS/0/SD_ILS:23221262024-05-23T14:51:05Z2024-05-23T14:51:05Zby Kegerreis, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260453232/?ar">https://learning.oreilly.com/library/view/~/9781260453232/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar">https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar</a><br/>Format: Electronic Resources<br/>Data privacy and GDPR handbookent://SD_ILS/0/SD_ILS:23225582024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sharma, Sanjay (Financial executive), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119594246">https://learning.oreilly.com/library/view/~/9781119594246</a>
<a href="https://learning.oreilly.com/library/view/~/9781119594246/?ar">https://learning.oreilly.com/library/view/~/9781119594246/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar">https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar</a><br/>Format: Electronic Resources<br/>Mastering Linux Security and Hardening - Second Editionent://SD_ILS/0/SD_ILS:23241672024-05-23T14:51:05Z2024-05-23T14:51:05Zby Tevault, Donald A.<br/><a href="https://learning.oreilly.com/library/view/~/9781838981778/?ar">https://learning.oreilly.com/library/view/~/9781838981778/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar">https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838981778">https://learning.oreilly.com/library/view/~/9781838981778</a><br/>Format: Electronic Resources<br/>PCI DSS : an integrated data security standard guideent://SD_ILS/0/SD_ILS:23243862024-05-23T14:51:05Z2024-05-23T14:51:05Zby Seaman, Jim.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258088">https://learning.oreilly.com/library/view/~/9781484258088</a>
<a href="https://learning.oreilly.com/library/view/~/9781484258088/?ar">https://learning.oreilly.com/library/view/~/9781484258088/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar</a><br/>Format: Electronic Resources<br/>IBM Security Key Lifecycle Managerent://SD_ILS/0/SD_ILS:23239822024-05-23T14:51:05Z2024-05-23T14:51:05Zby Chen, An, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458786/?ar">https://learning.oreilly.com/library/view/~/9780738458786/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458786">https://learning.oreilly.com/library/view/~/9780738458786</a><br/>Format: Electronic Resources<br/>Cyber Warfare - Truth, Tactics, and Strategiesent://SD_ILS/0/SD_ILS:23236672024-05-23T14:51:05Z2024-05-23T14:51:05Zby Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format: Electronic Resources<br/>Generative malware outbreak detectionent://SD_ILS/0/SD_ILS:23251582024-05-23T14:51:05Z2024-05-23T14:51:05Zby Park, Sean, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar">https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452/?ar">https://learning.oreilly.com/videos/~/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452">https://learning.oreilly.com/videos/~/0636920373452</a><br/>Format: Electronic Resources<br/>Cybersecurity threats, malware trends, and strategies : mitigate exploits, malware, phishing, and other social engineering attacksent://SD_ILS/0/SD_ILS:23246092024-05-23T14:51:05Z2024-05-23T14:51:05Zby Rains, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800206014/?ar">https://learning.oreilly.com/library/view/~/9781800206014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800206014">https://learning.oreilly.com/library/view/~/9781800206014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar">https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurityent://SD_ILS/0/SD_ILS:23254512024-05-23T14:51:05Z2024-05-23T14:51:05Zby Carey, Marcus J. (Cybersecurity professional)<br/><a href="https://learning.oreilly.com/library/view/~/9781119643418">https://learning.oreilly.com/library/view/~/9781119643418</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643418/?ar">https://learning.oreilly.com/library/view/~/9781119643418/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar</a><br/>Format: Electronic Resources<br/>Hands on hackingent://SD_ILS/0/SD_ILS:23254522024-05-23T14:51:05Z2024-05-23T14:51:05Zby Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format: Electronic Resources<br/>Rational cybersecurity for business : the security leaders' guide to business alignmentent://SD_ILS/0/SD_ILS:23254882024-05-23T14:51:05Z2024-05-23T14:51:05Zby Blum, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781484259528">https://learning.oreilly.com/library/view/~/9781484259528</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259528/?ar">https://learning.oreilly.com/library/view/~/9781484259528/?ar</a><br/>Format: Electronic Resources<br/>Security operations in practiceent://SD_ILS/0/SD_ILS:23339292024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175089/?ar">https://learning.oreilly.com/library/view/~/9781780175089/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175089">https://learning.oreilly.com/library/view/~/9781780175089</a><br/>Format: Electronic Resources<br/>Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsuent://SD_ILS/0/SD_ILS:23326572024-05-23T14:51:05Z2024-05-23T14:51:05Zby Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format: Electronic Resources<br/>JSON web tokens and alternatives.ent://SD_ILS/0/SD_ILS:23326932024-05-23T14:51:05Z2024-05-23T14:51:05Zby Madden, Neil, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202163/?ar">https://learning.oreilly.com/videos/~/10000MNLV202163/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202163">https://learning.oreilly.com/videos/~/10000MNLV202163</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar</a><br/>Format: Video recording<br/>Mission impossible : DevSecOps.ent://SD_ILS/0/SD_ILS:23336792024-05-23T14:51:05Z2024-05-23T14:51:05Zby Kuenzli, Stephen, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202146/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202146/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202146">https://learning.oreilly.com/videos/~/10000MNLV202146</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202146/?ar">https://learning.oreilly.com/videos/~/10000MNLV202146/?ar</a><br/>Format: Video recording<br/>Applied incident responseent://SD_ILS/0/SD_ILS:23228262024-05-23T14:51:05Z2024-05-23T14:51:05Zby Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781119560265">https://learning.oreilly.com/library/view/~/9781119560265</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560265/?ar">https://learning.oreilly.com/library/view/~/9781119560265/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar</a><br/>Format: Electronic Resources<br/>Build Your Own Cybersecurity Testing Lab : Low-cost Solutions for Testing in Virtual and Cloud-based Environmentsent://SD_ILS/0/SD_ILS:23234382024-05-23T14:51:05Z2024-05-23T14:51:05Zby Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260458329">https://learning.oreilly.com/library/view/~/9781260458329</a>
<a href="https://learning.oreilly.com/library/view/~/9781260458329/?ar">https://learning.oreilly.com/library/view/~/9781260458329/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar">https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar</a><br/>Format: Electronic Resources<br/>Exposed : how revealing your data and eliminating privacy increases trust and liberates humanityent://SD_ILS/0/SD_ILS:23264132024-05-23T14:51:05Z2024-05-23T14:51:05Zby Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a>
<a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format: Electronic Resources<br/>PoC GTFO. Volume IIIent://SD_ILS/0/SD_ILS:23271492024-05-23T14:51:05Z2024-05-23T14:51:05Zby Laphroaig, Manul.<br/><a href="https://learning.oreilly.com/library/view/~/9781098125691/?ar">https://learning.oreilly.com/library/view/~/9781098125691/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125691">https://learning.oreilly.com/library/view/~/9781098125691</a><br/>Format: Electronic Resources<br/>Protecting Data Privacy Beyond the Trusted System of Recordent://SD_ILS/0/SD_ILS:23239182024-05-23T14:51:05Z2024-05-23T14:51:05Zby White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format: Electronic Resources<br/>Demystifying Internet of Things security : successful IoT device/edge and platform security deploymentent://SD_ILS/0/SD_ILS:23216962024-05-23T14:51:05Z2024-05-23T14:51:05Zby Cheruvu, Sunil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484228968/?ar">https://learning.oreilly.com/library/view/~/9781484228968/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228968">https://learning.oreilly.com/library/view/~/9781484228968</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484228968/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228968/?ar</a><br/>Format: Electronic Resources<br/>Data breaches : crisis and opportunityent://SD_ILS/0/SD_ILS:23222222024-05-23T14:51:05Z2024-05-23T14:51:05Zby Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format: Electronic Resources<br/>Temenos on IBM LinuxONE Best Practices Guideent://SD_ILS/0/SD_ILS:23234402024-05-23T14:51:05Z2024-05-23T14:51:05Zby Coble, Deana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458458">https://learning.oreilly.com/library/view/~/9780738458458</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458458/?ar">https://learning.oreilly.com/library/view/~/9780738458458/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar</a><br/>Format: Electronic Resources<br/>Incident response primer : how to keep from getting pwned too hardent://SD_ILS/0/SD_ILS:23233162024-05-23T14:51:05Z2024-05-23T14:51:05Zby Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format: Electronic Resources<br/>Designing a HIPAA-compliant security operations center : a guide to detecting and responding to healthcare breaches and eventsent://SD_ILS/0/SD_ILS:23233332024-05-23T14:51:05Z2024-05-23T14:51:05Zby Thompson, Eric C.<br/><a href="https://learning.oreilly.com/library/view/~/9781484256084">https://learning.oreilly.com/library/view/~/9781484256084</a>
<a href="https://learning.oreilly.com/library/view/~/9781484256084/?ar">https://learning.oreilly.com/library/view/~/9781484256084/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar</a><br/>Format: Electronic Resources<br/>DevSecOps for .NET core : securing modern software applicationsent://SD_ILS/0/SD_ILS:23246122024-05-23T14:51:05Z2024-05-23T14:51:05Zby Zeeshan, Afzaal Ahmad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258507/?ar">https://learning.oreilly.com/library/view/~/9781484258507/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484258507">https://learning.oreilly.com/library/view/~/9781484258507</a><br/>Format: Electronic Resources<br/>Microsoft Azure security centerent://SD_ILS/0/SD_ILS:23220532024-05-23T14:51:05Z2024-05-23T14:51:05Zby Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format: Electronic Resources<br/>Advanced API Security : OAuth 2. 0 and Beyondent://SD_ILS/0/SD_ILS:23227342024-05-23T14:51:05Z2024-05-23T14:51:05Zby Siriwardena, Prabath.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220504">https://learning.oreilly.com/library/view/~/9781484220504</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220504/?ar">https://learning.oreilly.com/library/view/~/9781484220504/?ar</a><br/>Format: Electronic Resources<br/>Identity attack vectors : implementing an effective identity and access management solutionent://SD_ILS/0/SD_ILS:23227372024-05-23T14:51:05Z2024-05-23T14:51:05Zby Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484251652/?ar">https://learning.oreilly.com/library/view/~/9781484251652/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484251652">https://learning.oreilly.com/library/view/~/9781484251652</a><br/>Format: Electronic Resources<br/>Cybersecurity for dummiesent://SD_ILS/0/SD_ILS:23228392024-05-23T14:51:05Z2024-05-23T14:51:05Zby Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560326/?ar">https://learning.oreilly.com/library/view/~/9781119560326/?ar</a><br/>Format: Electronic Resources<br/>Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safeent://SD_ILS/0/SD_ILS:23248022024-05-23T14:51:05Z2024-05-23T14:51:05Zby Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format: Electronic Resources<br/>Decoding blockchain for business : understand the tech and prepare for the blockchain futureent://SD_ILS/0/SD_ILS:23254622024-05-23T14:51:05Z2024-05-23T14:51:05Zby Hijfte, Stijn van, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261378/?ar">https://learning.oreilly.com/library/view/~/9781484261378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261378">https://learning.oreilly.com/library/view/~/9781484261378</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261378/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261378/?ar</a><br/>Format: Electronic Resources<br/>Mastering VMware NSX for vSphereent://SD_ILS/0/SD_ILS:23273022024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119513544">https://learning.oreilly.com/library/view/~/9781119513544</a>
<a href="https://learning.oreilly.com/library/view/~/9781119513544/?ar">https://learning.oreilly.com/library/view/~/9781119513544/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar">https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar</a><br/>Format: Electronic Resources<br/>Firewalls don't stop dragons : a step-by-step guide to computer security for non-techiesent://SD_ILS/0/SD_ILS:23257732024-05-23T14:51:05Z2024-05-23T14:51:05Zby Parker, Carey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261897">https://learning.oreilly.com/library/view/~/9781484261897</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261897/?ar">https://learning.oreilly.com/library/view/~/9781484261897/?ar</a><br/>Format: Electronic Resources<br/>CompTIA security+ certification study guide : network security essentialsent://SD_ILS/0/SD_ILS:23258122024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sheikh, Ahmed F.<br/><a href="https://learning.oreilly.com/library/view/~/9781484262344">https://learning.oreilly.com/library/view/~/9781484262344</a>
<a href="https://learning.oreilly.com/library/view/~/9781484262344/?ar">https://learning.oreilly.com/library/view/~/9781484262344/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484262344/?ar">https://go.oreilly.com/library-access/library/view/-/9781484262344/?ar</a><br/>Format: Electronic Resources<br/>Cloud Computing Security, 2nd Editionent://SD_ILS/0/SD_ILS:23311012024-05-23T14:51:05Z2024-05-23T14:51:05Zby Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>Encryption for organizations and individuals : basics of contemporary and quantum cryptographyent://SD_ILS/0/SD_ILS:23254632024-05-23T14:51:05Z2024-05-23T14:51:05Zby Ciesla, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260562">https://learning.oreilly.com/library/view/~/9781484260562</a>
<a href="https://learning.oreilly.com/library/view/~/9781484260562/?ar">https://learning.oreilly.com/library/view/~/9781484260562/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar</a><br/>Format: Electronic Resources<br/>Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malwareent://SD_ILS/0/SD_ILS:23258472024-05-23T14:51:05Z2024-05-23T14:51:05Zby Mohanta, Abhijit.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261934">https://learning.oreilly.com/library/view/~/9781484261934</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261934/?ar">https://learning.oreilly.com/library/view/~/9781484261934/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar</a><br/>Format: Electronic Resources<br/>Learn Kubernetes security : securely orchestrate, scale, and manage your microservices in Kubernetes deploymentsent://SD_ILS/0/SD_ILS:23259702024-05-23T14:51:05Z2024-05-23T14:51:05Zby Huang, Kaizhe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216503">https://learning.oreilly.com/library/view/~/9781839216503</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839216503/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216503/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216503/?ar">https://learning.oreilly.com/library/view/~/9781839216503/?ar</a><br/>Format: Electronic Resources<br/>CCISO Certified Chief Information Security Officer All-In-One Exam Guide.ent://SD_ILS/0/SD_ILS:23265272024-05-23T14:51:05Z2024-05-23T14:51:05Zby Bennett, Steve.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260463934/?ar">https://go.oreilly.com/library-access/library/view/-/9781260463934/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260463934/?ar">https://learning.oreilly.com/library/view/~/9781260463934/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260463934">https://learning.oreilly.com/library/view/~/9781260463934</a><br/>Format: Electronic Resources<br/>Cybersecurity for information professionals : concepts and applicationsent://SD_ILS/0/SD_ILS:23563482024-05-23T14:51:05Z2024-05-23T14:51:05Zby Chang, Xiaqing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6232193">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity : the beginner's guide : a comprehensive guide to getting started in cybersecurityent://SD_ILS/0/SD_ILS:22681972024-05-23T14:51:05Z2024-05-23T14:51:05Zby Ozkaya, Erdal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5781046">Click to View</a><br/>Format: Electronic Resources<br/>Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomaliesent://SD_ILS/0/SD_ILS:22682902024-05-23T14:51:05Z2024-05-23T14:51:05Zby Parisi, Alessandro, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5847212">Click to View</a><br/>Format: Electronic Resources<br/>Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoTent://SD_ILS/0/SD_ILS:22734392024-05-23T14:51:05Z2024-05-23T14:51:05Zby Tounsi, Wiem, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5763061">Click to View</a><br/>Format: Electronic Resources<br/>Understanding security issuesent://SD_ILS/0/SD_ILS:21445942024-05-23T14:51:05Z2024-05-23T14:51:05Zby Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157542">Click to View</a><br/>Format: Electronic Resources<br/>The business of cybersecurity : foundations and ideologiesent://SD_ILS/0/SD_ILS:21569012024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5770273">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity law : protect yourself and your customersent://SD_ILS/0/SD_ILS:21567852024-05-23T14:51:05Z2024-05-23T14:51:05Zby Brathwaite, Shimon, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5719658">Click to View</a><br/>Format: Electronic Resources<br/>How cyber security can protect your business : a guide for all stakeholdersent://SD_ILS/0/SD_ILS:22178302024-05-23T14:51:05Z2024-05-23T14:51:05Zby Wright, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5979597">Click to View</a><br/>Format: Electronic Resources<br/>Digital asset valuation and cyber risk measurement : principles of cybernomicsent://SD_ILS/0/SD_ILS:22168082024-05-23T14:51:05Z2024-05-23T14:51:05Zby Ruan, Keyun, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5780982">Click to View</a><br/>Format: Electronic Resources<br/>Hardware security : a hands-on learning approachent://SD_ILS/0/SD_ILS:22165442024-05-23T14:51:05Z2024-05-23T14:51:05Zby Bhunia, Swarup, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5754491">Click to View</a><br/>Format: Electronic Resources<br/>Engineering secure and dependable software systemsent://SD_ILS/0/SD_ILS:22175252024-05-23T14:51:05Z2024-05-23T14:51:05Zby Pretschner, Alexander, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5899580">Click to View</a><br/>Format: Electronic Resources<br/>Cyber resilienceent://SD_ILS/0/SD_ILS:22329512024-05-23T14:51:05Z2024-05-23T14:51:05Zby Petrenko, Sergei, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5963879">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:23192202024-05-23T14:51:05Z2024-05-23T14:51:05Zby Tanner, Nadean H., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar">https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119552932/?ar">https://learning.oreilly.com/library/view/~/9781119552932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119552932">https://learning.oreilly.com/library/view/~/9781119552932</a><br/>Format: Electronic Resources<br/>Digital asset valuation and cyber risk measurement : principles of cybernomicsent://SD_ILS/0/SD_ILS:23204622024-05-23T14:51:05Z2024-05-23T14:51:05Zby Ruan, Keyun, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128123287">https://learning.oreilly.com/library/view/~/9780128123287</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128123287/?ar">https://go.oreilly.com/library-access/library/view/-/9780128123287/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128123287/?ar">https://learning.oreilly.com/library/view/~/9780128123287/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics basics : a practical guide using Windows OSent://SD_ILS/0/SD_ILS:23198132024-05-23T14:51:05Z2024-05-23T14:51:05Zby Hassan, Nihad A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238387/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238387/?ar">https://learning.oreilly.com/library/view/~/9781484238387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238387">https://learning.oreilly.com/library/view/~/9781484238387</a><br/>Format: Electronic Resources<br/>Cybersecurity and privacy in cyber physical systemsent://SD_ILS/0/SD_ILS:23471872024-05-23T14:51:05Z2024-05-23T14:51:05Zby Maleh, Yassine, 1987- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5764472">Click to View</a><br/>Format: Electronic Resources<br/>Investigating Cryptocurrencies : Understanding, Extracting, and Analyzing Blockchain Evidenceent://SD_ILS/0/SD_ILS:23255782024-05-23T14:51:05Z2024-05-23T14:51:05Zby Furneaux, Nick.<br/><a href="https://learning.oreilly.com/library/view/~/9781469076607/?ar">https://learning.oreilly.com/library/view/~/9781469076607/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469076607/?ar">https://go.oreilly.com/library-access/library/view/-/9781469076607/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469076607">https://learning.oreilly.com/library/view/~/9781469076607</a><br/>Format: Sound recording<br/>Exam ref MS-101 Microsoft 365 Mobility and Securityent://SD_ILS/0/SD_ILS:23212712024-05-23T14:51:05Z2024-05-23T14:51:05Zby Svidergol, Brian, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135574843/?ar">https://go.oreilly.com/library-access/library/view/-/9780135574843/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135574843/?ar">https://learning.oreilly.com/library/view/~/9780135574843/?ar</a><br/>Format: Electronic Resources<br/>Cyber resiliency solution for IBM Spectrum Scaleent://SD_ILS/0/SD_ILS:23221452024-05-23T14:51:05Z2024-05-23T14:51:05Zby IBM Storage Team, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457963/?ar">https://learning.oreilly.com/library/view/~/9780738457963/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar</a><br/>Format: Electronic Resources<br/>Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomaliesent://SD_ILS/0/SD_ILS:23215102024-05-23T14:51:05Z2024-05-23T14:51:05Zby Parisi, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789804027/?ar">https://go.oreilly.com/library-access/library/view/-/9781789804027/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789804027">https://learning.oreilly.com/library/view/~/9781789804027</a>
<a href="https://learning.oreilly.com/library/view/~/9781789804027/?ar">https://learning.oreilly.com/library/view/~/9781789804027/?ar</a><br/>Format: Electronic Resources<br/>Beginning security with Microsoft technologies : protecting Office 365, devices, and dataent://SD_ILS/0/SD_ILS:23221232024-05-23T14:51:05Z2024-05-23T14:51:05Zby Lakshmi, Vasantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484248539/?ar">https://learning.oreilly.com/library/view/~/9781484248539/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar">https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar</a><br/>Format: Electronic Resources<br/>Qi ye shen tou ce shi he chi xu jian kong.ent://SD_ILS/0/SD_ILS:23322892024-05-23T14:51:05Z2024-05-23T14:51:05Zby Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format: Video recording<br/>Practical cloud security.ent://SD_ILS/0/SD_ILS:23346162024-05-23T14:51:05Z2024-05-23T14:51:05Zby Dotson, Chris, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar">https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727">https://learning.oreilly.com/videos/~/9781492060727</a>
<a href="https://learning.oreilly.com/videos/~/9781492060727/?ar">https://learning.oreilly.com/videos/~/9781492060727/?ar</a><br/>Format: Video recording<br/>Linux essentials for cybersecurity lab manualent://SD_ILS/0/SD_ILS:23175582024-05-23T14:51:05Z2024-05-23T14:51:05Zby Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format: Electronic Resources<br/>Data analytics for IT networks : developing innovative use casesent://SD_ILS/0/SD_ILS:23175592024-05-23T14:51:05Z2024-05-23T14:51:05Zby Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format: Electronic Resources<br/>Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualizationent://SD_ILS/0/SD_ILS:23189382024-05-23T14:51:05Z2024-05-23T14:51:05Zby Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134807614/?ar">https://learning.oreilly.com/library/view/~/9780134807614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807614">https://learning.oreilly.com/library/view/~/9780134807614</a><br/>Format: Electronic Resources<br/>Cyber smart : five habits to protect your family, money, and identity from cyber criminalsent://SD_ILS/0/SD_ILS:23188682024-05-23T14:51:05Z2024-05-23T14:51:05Zby McDonough, Bart R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469071503/?ar">https://learning.oreilly.com/library/view/~/9781469071503/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar">https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469071503">https://learning.oreilly.com/library/view/~/9781469071503</a><br/>Format: Sound recording<br/>Microsoft Enterprise Mobility and Security trainingent://SD_ILS/0/SD_ILS:23195562024-05-23T14:51:05Z2024-05-23T14:51:05Zby Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format: Electronic Resources<br/>Computer security : art and scienceent://SD_ILS/0/SD_ILS:23184522024-05-23T14:51:05Z2024-05-23T14:51:05Zby Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format: Electronic Resources<br/>Linux basics for hackers : getting started with networking, scripting, and security in Kalient://SD_ILS/0/SD_ILS:23185542024-05-23T14:51:05Z2024-05-23T14:51:05Zby OccupyTheWeb, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492069485/?ar">https://learning.oreilly.com/library/view/~/9781492069485/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492069485">https://learning.oreilly.com/library/view/~/9781492069485</a><br/>Format: Electronic Resources<br/>Dynamic SQL : applications, performance, and security in Microsoft SQL serverent://SD_ILS/0/SD_ILS:23182952024-05-23T14:51:05Z2024-05-23T14:51:05Zby Pollack, Edward, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243183/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243183/?ar">https://learning.oreilly.com/library/view/~/9781484243183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243183">https://learning.oreilly.com/library/view/~/9781484243183</a><br/>Format: Electronic Resources<br/>Professional Red teaming : conducting successful cybersecurity engagementsent://SD_ILS/0/SD_ILS:23189772024-05-23T14:51:05Z2024-05-23T14:51:05Zby Oakley, Jacob G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243091/?ar">https://learning.oreilly.com/library/view/~/9781484243091/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243091">https://learning.oreilly.com/library/view/~/9781484243091</a><br/>Format: Electronic Resources<br/>Cyber operations : building, defending, and attacking modern computer networksent://SD_ILS/0/SD_ILS:23189142024-05-23T14:51:05Z2024-05-23T14:51:05Zby O'Leary, Mike, 1968- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242940">https://learning.oreilly.com/library/view/~/9781484242940</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242940/?ar">https://learning.oreilly.com/library/view/~/9781484242940/?ar</a><br/>Format: Electronic Resources<br/>The cybersecurity playbook : how every leader and employee can contribute to a culture of securityent://SD_ILS/0/SD_ILS:23215682024-05-23T14:51:05Z2024-05-23T14:51:05Zby Cerra, Allison, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar">https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196/?ar">https://learning.oreilly.com/library/view/~/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196">https://learning.oreilly.com/library/view/~/9781119442196</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testingent://SD_ILS/0/SD_ILS:23198472024-05-23T14:51:05Z2024-05-23T14:51:05Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format: Electronic Resources<br/>Practical security : simple practices for defending your systemsent://SD_ILS/0/SD_ILS:23194022024-05-23T14:51:05Z2024-05-23T14:51:05Zby Zabicki, Roman, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar">https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679">https://learning.oreilly.com/library/view/~/9781680506679</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679/?ar">https://learning.oreilly.com/library/view/~/9781680506679/?ar</a><br/>Format: Electronic Resources<br/>Rootkits and bootkits : reversing modern malware and next generation threatsent://SD_ILS/0/SD_ILS:23143572024-05-23T14:51:05Z2024-05-23T14:51:05Zby Matrosov, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492071259/?ar">https://learning.oreilly.com/library/view/~/9781492071259/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar">https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492071259">https://learning.oreilly.com/library/view/~/9781492071259</a><br/>Format: Electronic Resources<br/>Threat and vulnerability assessment for enterprisesent://SD_ILS/0/SD_ILS:23192772024-05-23T14:51:05Z2024-05-23T14:51:05Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781838559205/?ar">https://learning.oreilly.com/videos/~/9781838559205/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar">https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar</a><br/>Format: Electronic Resources<br/>Hands-on Spring security 5.1.1ent://SD_ILS/0/SD_ILS:23191102024-05-23T14:51:05Z2024-05-23T14:51:05Zby Lelek, Tomasz, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789802931/?ar">https://learning.oreilly.com/videos/~/9781789802931/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789802931/?ar">https://go.oreilly.com/library-access/library/view/-/9781789802931/?ar</a><br/>Format: Electronic Resources<br/>Learning Python for forensics : leverage the power of Python in forensic investigationsent://SD_ILS/0/SD_ILS:23191162024-05-23T14:51:05Z2024-05-23T14:51:05Zby Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format: Electronic Resources<br/>We have root : even more advice from Schneier on securityent://SD_ILS/0/SD_ILS:23215732024-05-23T14:51:05Z2024-05-23T14:51:05Zby Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643012">https://learning.oreilly.com/library/view/~/9781119643012</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643012/?ar">https://learning.oreilly.com/library/view/~/9781119643012/?ar</a><br/>Format: Electronic Resources<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:23215742024-05-23T14:51:05Z2024-05-23T14:51:05Zby Quade, Phil.<br/><a href="https://learning.oreilly.com/library/view/~/9781119617365">https://learning.oreilly.com/library/view/~/9781119617365</a>
<a href="https://learning.oreilly.com/library/view/~/9781119617365/?ar">https://learning.oreilly.com/library/view/~/9781119617365/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar">https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar</a><br/>Format: Electronic Resources<br/>Securing your cloud : IBM security for LinuxONEent://SD_ILS/0/SD_ILS:23215972024-05-23T14:51:05Z2024-05-23T14:51:05Zby Alves, Edi Lopes, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457949/?ar">https://learning.oreilly.com/library/view/~/9780738457949/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar</a><br/>Format: Electronic Resources<br/>Security with AI and machine learning : using advanced tools to improve application security at the edgeent://SD_ILS/0/SD_ILS:23190582024-05-23T14:51:05Z2024-05-23T14:51:05Zby Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format: Electronic Resources<br/>Cybersecurity Ops with bash : attack, defend, and analyze from the command lineent://SD_ILS/0/SD_ILS:23192522024-05-23T14:51:05Z2024-05-23T14:51:05Zby Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format: Electronic Resources<br/>Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessonsent://SD_ILS/0/SD_ILS:23215502024-05-23T14:51:05Z2024-05-23T14:51:05Zby Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format: Electronic Resources<br/>The Iot hacker's handbook : a practical guide to hacking the internet of thingsent://SD_ILS/0/SD_ILS:23191972024-05-23T14:51:05Z2024-05-23T14:51:05Zby Gupta, Aditya.<br/><a href="https://learning.oreilly.com/library/view/~/9781484243008">https://learning.oreilly.com/library/view/~/9781484243008</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243008/?ar">https://learning.oreilly.com/library/view/~/9781484243008/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243008/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243008/?ar</a><br/>Format: Electronic Resources<br/>My online privacy for seniorsent://SD_ILS/0/SD_ILS:23194122024-05-23T14:51:05Z2024-05-23T14:51:05Zby Rich, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135381281/?ar">https://learning.oreilly.com/library/view/~/9780135381281/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar">https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar</a><br/>Format: Electronic Resources<br/>PowerShell and Python together : targeting digital investigationsent://SD_ILS/0/SD_ILS:23191832024-05-23T14:51:05Z2024-05-23T14:51:05Zby Hosmer, Chet, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484245040/?ar">https://learning.oreilly.com/library/view/~/9781484245040/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484245040">https://learning.oreilly.com/library/view/~/9781484245040</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484245040/?ar">https://go.oreilly.com/library-access/library/view/-/9781484245040/?ar</a><br/>Format: Electronic Resources<br/>Zabbix 4 network monitoring : monitor the performance of your network devices and applications using the all-new Zabbix 4.0ent://SD_ILS/0/SD_ILS:23190102024-05-23T14:51:05Z2024-05-23T14:51:05Zby Uytterhoeven, Patrik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340266/?ar">https://learning.oreilly.com/library/view/~/9781789340266/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar</a><br/>Format: Electronic Resources<br/>Hands-on cryptography with Javaent://SD_ILS/0/SD_ILS:23191242024-05-23T14:51:05Z2024-05-23T14:51:05Zby Costlow, Erik, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar">https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838554972/?ar">https://learning.oreilly.com/videos/~/9781838554972/?ar</a><br/>Format: Electronic Resources<br/>Becoming the hacker : the playbook for getting inside the mind of an attackerent://SD_ILS/0/SD_ILS:23191292024-05-23T14:51:05Z2024-05-23T14:51:05Zby Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Electronic Resources<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:23195342024-05-23T14:51:05Z2024-05-23T14:51:05Zby Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a>
<a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format: Electronic Resources<br/>Web hacking : become a professional web pentesterent://SD_ILS/0/SD_ILS:23198312024-05-23T14:51:05Z2024-05-23T14:51:05Zby Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format: Electronic Resources<br/>The art of hacking (video collection)ent://SD_ILS/0/SD_ILS:23198842024-05-23T14:51:05Z2024-05-23T14:51:05Zby Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar">https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780135767849/?ar">https://learning.oreilly.com/videos/~/9780135767849/?ar</a><br/>Format: Electronic Resources<br/>Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacksent://SD_ILS/0/SD_ILS:23224002024-05-23T14:51:05Z2024-05-23T14:51:05Zby Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242551/?ar">https://learning.oreilly.com/library/view/~/9781484242551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242551">https://learning.oreilly.com/library/view/~/9781484242551</a><br/>Format: Electronic Resources<br/>Solving identity management in modern applications : demystifying OAuth 2.0, OpenID Connect, and SAML 2.0ent://SD_ILS/0/SD_ILS:23227232024-05-23T14:51:05Z2024-05-23T14:51:05Zby Wilson, Yvonne.<br/><a href="https://learning.oreilly.com/library/view/~/9781484250952/?ar">https://learning.oreilly.com/library/view/~/9781484250952/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484250952">https://learning.oreilly.com/library/view/~/9781484250952</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar</a><br/>Format: Electronic Resources<br/>Getting Started with Ghidraent://SD_ILS/0/SD_ILS:23226052024-05-23T14:51:05Z2024-05-23T14:51:05Zby Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar">https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265/?ar">https://learning.oreilly.com/library/view/~/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265">https://learning.oreilly.com/library/view/~/9781098115265</a><br/>Format: Electronic Resources<br/>Fraud detection without feature engineeringent://SD_ILS/0/SD_ILS:23224342024-05-23T14:51:05Z2024-05-23T14:51:05Zby Vagata, Pamela, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540/?ar">https://learning.oreilly.com/videos/~/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540">https://learning.oreilly.com/videos/~/0636920339540</a><br/>Format: Electronic Resources<br/>How to build privacy and security into deep learning modelsent://SD_ILS/0/SD_ILS:23227912024-05-23T14:51:05Z2024-05-23T14:51:05Zby Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format: Electronic Resources<br/>The complete Metasploit guide : explore effective penetration testing techniques with Metasploitent://SD_ILS/0/SD_ILS:23270772024-05-23T14:51:05Z2024-05-23T14:51:05Zby Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477">https://learning.oreilly.com/library/view/~/9781838822477</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477/?ar">https://learning.oreilly.com/library/view/~/9781838822477/?ar</a><br/>Format: Electronic Resources<br/>Penetration Testing mit mimikatz : Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführenent://SD_ILS/0/SD_ILS:23213482024-05-23T14:51:05Z2024-05-23T14:51:05Zby Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958459700">https://learning.oreilly.com/library/view/~/9783958459700</a>
<a href="https://learning.oreilly.com/library/view/~/9783958459700/?ar">https://learning.oreilly.com/library/view/~/9783958459700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar">https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurityent://SD_ILS/0/SD_ILS:23214482024-05-23T14:51:05Z2024-05-23T14:51:05Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643326">https://learning.oreilly.com/library/view/~/9781119643326</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643326/?ar">https://learning.oreilly.com/library/view/~/9781119643326/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing : a guide for business and it managers.ent://SD_ILS/0/SD_ILS:23217082024-05-23T14:51:05Z2024-05-23T14:51:05Z<a href="https://learning.oreilly.com/library/view/~/9781780174082/?ar">https://learning.oreilly.com/library/view/~/9781780174082/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780174082/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174082/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780174082">https://learning.oreilly.com/library/view/~/9781780174082</a><br/>Format: Electronic Resources<br/>Practical cyber forensics : an incident-based approach to forensic investigationsent://SD_ILS/0/SD_ILS:23215212024-05-23T14:51:05Z2024-05-23T14:51:05Zby Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format: Electronic Resources<br/>