Search Results for - Narrowed by: Protection de l'information (Informatique)SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Protection$002bde$002bl$002527information$002b$002528Informatique$002529$002509Protection$002bde$002bl$002527information$002b$002528Informatique$002529$0026ps$003d300?2024-05-26T19:13:05ZMastering cyber intelligence : gain comprehensive knowledge and skills to conduct threat intelligence for effective system defenseent://SD_ILS/0/SD_ILS:23326682024-05-26T19:13:05Z2024-05-26T19:13:05Zby Dahj, Jean Nestor M.<br/><a href="https://learning.oreilly.com/library/view/~/9781800209404">https://learning.oreilly.com/library/view/~/9781800209404</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar">https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800209404/?ar">https://learning.oreilly.com/library/view/~/9781800209404/?ar</a><br/>Format: Electronic Resources<br/>Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000ent://SD_ILS/0/SD_ILS:23320672024-05-26T19:13:05Z2024-05-26T19:13:05Zby International Business Machines Corporation, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406/?ar">https://learning.oreilly.com/library/view/~/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406">https://learning.oreilly.com/library/view/~/9780738460406</a><br/>Format: Electronic Resources<br/>Data Privacy : a Runbook for Engineers.ent://SD_ILS/0/SD_ILS:23316502024-05-26T19:13:05Z2024-05-26T19:13:05Zby Bhajaria, Nishant.<br/><a href="https://learning.oreilly.com/library/view/~/9781617298998/?ar">https://learning.oreilly.com/library/view/~/9781617298998/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617298998/?ar">https://go.oreilly.com/library-access/library/view/-/9781617298998/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617298998">https://learning.oreilly.com/library/view/~/9781617298998</a><br/>Format: Electronic Resources<br/>System and privacy data protection.ent://SD_ILS/0/SD_ILS:23317772024-05-26T19:13:05Z2024-05-26T19:13:05Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a>
<a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format: Video recording<br/>Pro Google cloud automation : with Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkinsent://SD_ILS/0/SD_ILS:23275092024-05-26T19:13:05Z2024-05-26T19:13:05Zby Sabharwal, Navin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265734/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265734/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265734/?ar">https://learning.oreilly.com/library/view/~/9781484265734/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265734">https://learning.oreilly.com/library/view/~/9781484265734</a><br/>Format: Electronic Resources<br/>Secure operations and protectionsent://SD_ILS/0/SD_ILS:23320922024-05-26T19:13:05Z2024-05-26T19:13:05Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format: Video recording<br/>Mastering Active Directory - Third Editionent://SD_ILS/0/SD_ILS:23311052024-05-26T19:13:05Z2024-05-26T19:13:05Zby Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format: Electronic Resources<br/>Big breaches : cybersecurity lessons for everyoneent://SD_ILS/0/SD_ILS:23281262024-05-26T19:13:05Z2024-05-26T19:13:05Zby Daswani, Neil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484266557">https://learning.oreilly.com/library/view/~/9781484266557</a>
<a href="https://learning.oreilly.com/library/view/~/9781484266557/?ar">https://learning.oreilly.com/library/view/~/9781484266557/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar">https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar</a><br/>Format: Electronic Resources<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:23270532024-05-26T19:13:05Z2024-05-26T19:13:05Zby Moschovitis, Christos J. P., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119658740">https://learning.oreilly.com/library/view/~/9781119658740</a>
<a href="https://learning.oreilly.com/library/view/~/9781119658740/?ar">https://learning.oreilly.com/library/view/~/9781119658740/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar">https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar</a><br/>Format: Electronic Resources<br/>Self-sovereign identity : decentralized digital identity and verifiable credentialsent://SD_ILS/0/SD_ILS:23302702024-05-26T19:13:05Z2024-05-26T19:13:05Zby Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format: Electronic Resources<br/>Cryptography : the key to digital security, how it works, and why it mattersent://SD_ILS/0/SD_ILS:23246202024-05-26T19:13:05Z2024-05-26T19:13:05Zby Martin, Keith M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781684579136/?ar">https://go.oreilly.com/library-access/library/view/-/9781684579136/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781684579136/?ar">https://learning.oreilly.com/library/view/~/9781684579136/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781684579136">https://learning.oreilly.com/library/view/~/9781684579136</a><br/>Format: Sound recording<br/>Privileged attack vectors : building effective cyber-defense strategies to protect organizationsent://SD_ILS/0/SD_ILS:23246642024-05-26T19:13:05Z2024-05-26T19:13:05Zby Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146/?ar">https://learning.oreilly.com/library/view/~/9781484259146/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259146">https://learning.oreilly.com/library/view/~/9781484259146</a><br/>Format: Electronic Resources<br/>Protecting Data Privacy Beyond the Trusted System of Recordent://SD_ILS/0/SD_ILS:23239182024-05-26T19:13:05Z2024-05-26T19:13:05Zby White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format: Electronic Resources<br/>The Complete 2020 Ethereum and Solidity Developer Bootcampent://SD_ILS/0/SD_ILS:23234782024-05-26T19:13:05Z2024-05-26T19:13:05Zby Wiesner, Thomas, author.<br/><a href="https://learning.oreilly.com/videos/~/9781800201019/?ar">https://learning.oreilly.com/videos/~/9781800201019/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar">https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781800201019">https://learning.oreilly.com/videos/~/9781800201019</a><br/>Format: Electronic Resources<br/>Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloudent://SD_ILS/0/SD_ILS:23263952024-05-26T19:13:05Z2024-05-26T19:13:05Zby Calles, Miguel A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002/?ar">https://learning.oreilly.com/library/view/~/9781484261002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261002">https://learning.oreilly.com/library/view/~/9781484261002</a><br/>Format: Electronic Resources<br/>Cloud Computing Security, 2nd Editionent://SD_ILS/0/SD_ILS:23311012024-05-26T19:13:05Z2024-05-26T19:13:05Zby Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>Building secure firmware : armoring the foundation of the platforment://SD_ILS/0/SD_ILS:23260202024-05-26T19:13:05Z2024-05-26T19:13:05Zby Yao, Jiewen.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261064">https://learning.oreilly.com/library/view/~/9781484261064</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261064/?ar">https://learning.oreilly.com/library/view/~/9781484261064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar</a><br/>Format: Electronic Resources<br/>Exposed : how revealing your data and eliminating privacy increases trust and liberates humanityent://SD_ILS/0/SD_ILS:23264132024-05-26T19:13:05Z2024-05-26T19:13:05Zby Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a>
<a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format: Electronic Resources<br/>Encryption for organizations and individuals : basics of contemporary and quantum cryptographyent://SD_ILS/0/SD_ILS:23254632024-05-26T19:13:05Z2024-05-26T19:13:05Zby Ciesla, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260562">https://learning.oreilly.com/library/view/~/9781484260562</a>
<a href="https://learning.oreilly.com/library/view/~/9781484260562/?ar">https://learning.oreilly.com/library/view/~/9781484260562/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar</a><br/>Format: Electronic Resources<br/>Advanced ASP.NET Core 3 Security : understanding hacks, attacks, and vulnerabilities to secure your websiteent://SD_ILS/0/SD_ILS:23264242024-05-26T19:13:05Z2024-05-26T19:13:05Zby Norberg, Scott, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260142/?ar">https://learning.oreilly.com/library/view/~/9781484260142/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484260142">https://learning.oreilly.com/library/view/~/9781484260142</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484260142/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260142/?ar</a><br/>Format: Electronic Resources<br/>ISO22301 : a Pocket Guideent://SD_ILS/0/SD_ILS:23252782024-05-26T19:13:05Z2024-05-26T19:13:05Zby Drewitt, Tony, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781016/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781016/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781016/?ar">https://learning.oreilly.com/library/view/~/9781787781016/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781016">https://learning.oreilly.com/library/view/~/9781787781016</a><br/>Format: Electronic Resources<br/>How to choose the right digital leader for your company : Striking the right competence-credibility balance for digital leaders depends largely on how the role of the CDO is defined in a particular companyent://SD_ILS/0/SD_ILS:23212772024-05-26T19:13:05Z2024-05-26T19:13:05Zby Wade, Michael R., author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT60442/?ar">https://learning.oreilly.com/library/view/~/53863MIT60442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT60442">https://learning.oreilly.com/library/view/~/53863MIT60442</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT60442/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT60442/?ar</a><br/>Format: Electronic Resources<br/>How to build privacy and security into deep learning modelsent://SD_ILS/0/SD_ILS:23227912024-05-26T19:13:05Z2024-05-26T19:13:05Zby Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format: Electronic Resources<br/>Mastering Active Directory - Second Editionent://SD_ILS/0/SD_ILS:23239792024-05-26T19:13:05Z2024-05-26T19:13:05Zby Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789800203/?ar">https://learning.oreilly.com/library/view/~/9781789800203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar">https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789800203">https://learning.oreilly.com/library/view/~/9781789800203</a><br/>Format: Electronic Resources<br/>Karma-based API on Apple platforms : building privacy into iOS and macOS appsent://SD_ILS/0/SD_ILS:23220612024-05-26T19:13:05Z2024-05-26T19:13:05Zby Carrasco Molina, Manuel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242919/?ar">https://learning.oreilly.com/library/view/~/9781484242919/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242919/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242919/?ar</a><br/>Format: Electronic Resources<br/>Managing SQL Server encryption certificates : getting started with SQL Server encryptionent://SD_ILS/0/SD_ILS:23213592024-05-26T19:13:05Z2024-05-26T19:13:05Zby Blinn, Eric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484251515/?ar">https://learning.oreilly.com/videos/~/9781484251515/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484251515/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251515/?ar</a><br/>Format: Electronic Resources<br/>Modern defense in depth : an integrated approach to better web application securityent://SD_ILS/0/SD_ILS:23198732024-05-26T19:13:05Z2024-05-26T19:13:05Zby Gates, Stephen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492050360/?ar">https://learning.oreilly.com/library/view/~/9781492050360/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492050360">https://learning.oreilly.com/library/view/~/9781492050360</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar">https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar</a><br/>Format: Electronic Resources<br/>How digital trust drives culture change : privacy is a right, not a privilege : but organizations and leadership often struggle with it comes to adapting their culture toward digital trust and stewardshipent://SD_ILS/0/SD_ILS:23208552024-05-26T19:13:05Z2024-05-26T19:13:05Zby Abraham, Chon, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT60430/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT60430/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT60430/?ar">https://learning.oreilly.com/library/view/~/53863MIT60430/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT60430">https://learning.oreilly.com/library/view/~/53863MIT60430</a><br/>Format: Electronic Resources<br/>Take Control of Your Online Privacy, 4th Editionent://SD_ILS/0/SD_ILS:23210702024-05-26T19:13:05Z2024-05-26T19:13:05Zby Kissell, Joe.<br/><a href="https://learning.oreilly.com/library/view/~/9781947282377">https://learning.oreilly.com/library/view/~/9781947282377</a>
<a href="https://learning.oreilly.com/library/view/~/9781947282377/?ar">https://learning.oreilly.com/library/view/~/9781947282377/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781947282377/?ar">https://go.oreilly.com/library-access/library/view/-/9781947282377/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Enterprise Mobility and Security trainingent://SD_ILS/0/SD_ILS:23195562024-05-26T19:13:05Z2024-05-26T19:13:05Zby Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format: Electronic Resources<br/>Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environmentsent://SD_ILS/0/SD_ILS:23220552024-05-26T19:13:05Z2024-05-26T19:13:05Zby Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers : cybersecurity advice from the best hackers in the worldent://SD_ILS/0/SD_ILS:23214522024-05-26T19:13:05Z2024-05-26T19:13:05Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format: Electronic Resources<br/>Privileged attack vectors : building effective cyber-defense strategies to protect organizationsent://SD_ILS/0/SD_ILS:23148702024-05-26T19:13:05Z2024-05-26T19:13:05Zby Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format: Electronic Resources<br/>IT-Sicherheitsmanagement - Praxiswissen für IT Security Manager, 2. Auflageent://SD_ILS/0/SD_ILS:23201052024-05-26T19:13:05Z2024-05-26T19:13:05Zby Harich, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9783958452756/?ar">https://learning.oreilly.com/library/view/~/9783958452756/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452756">https://learning.oreilly.com/library/view/~/9783958452756</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar</a><br/>Format: Electronic Resources<br/>Securing web applications : building a strategy for defense against malicious botsent://SD_ILS/0/SD_ILS:23192612024-05-26T19:13:05Z2024-05-26T19:13:05Zby Gates, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar">https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492040279">https://learning.oreilly.com/library/view/~/9781492040279</a>
<a href="https://learning.oreilly.com/library/view/~/9781492040279/?ar">https://learning.oreilly.com/library/view/~/9781492040279/?ar</a><br/>Format: Electronic Resources<br/>Take Control of 1Password, 4th Editionent://SD_ILS/0/SD_ILS:23194742024-05-26T19:13:05Z2024-05-26T19:13:05Zby Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format: Electronic Resources<br/>Lessons Learned : How to protect critical information infrastructureent://SD_ILS/0/SD_ILS:23154982024-05-26T19:13:05Z2024-05-26T19:13:05Zby Viira, Toomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849289597/?ar">https://learning.oreilly.com/library/view/~/9781849289597/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849289597/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289597/?ar</a><br/>Format: Electronic Resources<br/>Investigating the Cyber Breach : the digital forensics guide for the network engineerent://SD_ILS/0/SD_ILS:23153452024-05-26T19:13:05Z2024-05-26T19:13:05Zby Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar">https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134755885/?ar">https://learning.oreilly.com/library/view/~/9780134755885/?ar</a><br/>Format: Electronic Resources<br/>IBM QRadar Version 7.3 : planning and installation guideent://SD_ILS/0/SD_ILS:23154742024-05-26T19:13:05Z2024-05-26T19:13:05Zby Carabaguiaz, Elias, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442877/?ar">https://learning.oreilly.com/library/view/~/9780738442877/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar</a><br/>Format: Electronic Resources<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:23161522024-05-26T19:13:05Z2024-05-26T19:13:05Zby Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format: Electronic Resources<br/>The Board's Role in Managing Cybersecurity Risksent://SD_ILS/0/SD_ILS:23207492024-05-26T19:13:05Z2024-05-26T19:13:05Zby Rothrock, Ray, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221/?ar">https://learning.oreilly.com/library/view/~/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221">https://learning.oreilly.com/library/view/~/53863MIT59221</a><br/>Format: Electronic Resources<br/>What is cybersecurity?ent://SD_ILS/0/SD_ILS:23187222024-05-26T19:13:05Z2024-05-26T19:13:05Zby Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format: Electronic Resources<br/>Solving Cyber Risk : Protecting Your Company and Society.ent://SD_ILS/0/SD_ILS:23182822024-05-26T19:13:05Z2024-05-26T19:13:05Zby Coburn, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781119490937">https://learning.oreilly.com/library/view/~/9781119490937</a>
<a href="https://learning.oreilly.com/library/view/~/9781119490937/?ar">https://learning.oreilly.com/library/view/~/9781119490937/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar">https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar</a><br/>Format: Electronic Resources<br/>Cloud computing security : foundations and challengesent://SD_ILS/0/SD_ILS:23115242024-05-26T19:13:05Z2024-05-26T19:13:05Zby Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format: Electronic Resources<br/>Data hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:23116292024-05-26T19:13:05Z2024-05-26T19:13:05Zby Hassan, Nihad Ahmad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128044964/?ar">https://learning.oreilly.com/library/view/~/9780128044964/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128044964/?ar">https://go.oreilly.com/library-access/library/view/-/9780128044964/?ar</a><br/>Format: Electronic Resources<br/>Distributed Networksent://SD_ILS/0/SD_ILS:23199072024-05-26T19:13:05Z2024-05-26T19:13:05Zby Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format: Electronic Resources<br/>Guide: Reporting on an Entity's Cyberse.ent://SD_ILS/0/SD_ILS:23167562024-05-26T19:13:05Z2024-05-26T19:13:05Zby AICPA Staff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781943546725/?ar">https://learning.oreilly.com/library/view/~/9781943546725/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar">https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781943546725">https://learning.oreilly.com/library/view/~/9781943546725</a><br/>Format: Electronic Resources<br/>Die Kunst der Anonymität im Internet : so schützen Sie Ihre Identität und Ihre Datenent://SD_ILS/0/SD_ILS:23150112024-05-26T19:13:05Z2024-05-26T19:13:05Zby Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format: Electronic Resources<br/>Mastering Active Directory : automate tasks by leveraging PowerShell for Active Directory Domain Services 2016ent://SD_ILS/0/SD_ILS:23138092024-05-26T19:13:05Z2024-05-26T19:13:05Zby Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787289352">https://learning.oreilly.com/library/view/~/9781787289352</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar">https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787289352/?ar">https://learning.oreilly.com/library/view/~/9781787289352/?ar</a><br/>Format: Electronic Resources<br/>ISO 37001 : an Introduction to Anti-Bribery Management Systems.ent://SD_ILS/0/SD_ILS:23150202024-05-26T19:13:05Z2024-05-26T19:13:05Zby Field, Alan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559">https://learning.oreilly.com/library/view/~/9781849289559</a>
<a href="https://learning.oreilly.com/library/view/~/9781849289559/?ar">https://learning.oreilly.com/library/view/~/9781849289559/?ar</a><br/>Format: Electronic Resources<br/>OAuth 2 in actionent://SD_ILS/0/SD_ILS:23131852024-05-26T19:13:05Z2024-05-26T19:13:05Zby Richer, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617293276/?ar">https://go.oreilly.com/library-access/library/view/-/9781617293276/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617293276">https://learning.oreilly.com/library/view/~/9781617293276</a>
<a href="https://learning.oreilly.com/library/view/~/9781617293276/?ar">https://learning.oreilly.com/library/view/~/9781617293276/?ar</a><br/>Format: Electronic Resources<br/>Analyzing and securing social networksent://SD_ILS/0/SD_ILS:23133852024-05-26T19:13:05Z2024-05-26T19:13:05Zby Thuraisingham, Bhavani M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar">https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482243284/?ar">https://learning.oreilly.com/library/view/~/9781482243284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482243284">https://learning.oreilly.com/library/view/~/9781482243284</a><br/>Format: Electronic Resources<br/>Data governance : frameworks and strategiesent://SD_ILS/0/SD_ILS:23098712024-05-26T19:13:05Z2024-05-26T19:13:05Zby Adler, John, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar">https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491942352/?ar">https://learning.oreilly.com/videos/~/9781491942352/?ar</a><br/>Format: Electronic Resources<br/>Information security policies, procedures, and standards : a practitioner's referenceent://SD_ILS/0/SD_ILS:23107492024-05-26T19:13:05Z2024-05-26T19:13:05Zby Landoll, Douglas J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482245912/?ar">https://learning.oreilly.com/library/view/~/9781482245912/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar">https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:23102902024-05-26T19:13:05Z2024-05-26T19:13:05Zby Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format: Electronic Resources<br/>Introduction to Hadoop security : a hands-on approach to securing big data clustersent://SD_ILS/0/SD_ILS:23102702024-05-26T19:13:05Z2024-05-26T19:13:05Zby Bean, Jeff, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar">https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771375054/?ar">https://learning.oreilly.com/videos/~/9781771375054/?ar</a><br/>Format: Electronic Resources<br/>You--for sale : protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:23084652024-05-26T19:13:05Z2024-05-26T19:13:05Zby Sumner, Stuart, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034231/?ar">https://learning.oreilly.com/library/view/~/9780128034231/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar</a><br/>Format: Electronic Resources<br/>PCI DSS 3.1 : the standard that killed SSLent://SD_ILS/0/SD_ILS:23084682024-05-26T19:13:05Z2024-05-26T19:13:05Zby Williams, Branden R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128046494">https://learning.oreilly.com/library/view/~/9780128046494</a>
<a href="https://learning.oreilly.com/library/view/~/9780128046494/?ar">https://learning.oreilly.com/library/view/~/9780128046494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar">https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar</a><br/>Format: Electronic Resources<br/>The CISO Handbookent://SD_ILS/0/SD_ILS:23236772024-05-26T19:13:05Z2024-05-26T19:13:05Zby Gentile, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031379">https://learning.oreilly.com/library/view/~/9781420031379</a>
<a href="https://learning.oreilly.com/library/view/~/9781420031379/?ar">https://learning.oreilly.com/library/view/~/9781420031379/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar</a><br/>Format: Electronic Resources<br/>Information theft prevention : theory and practiceent://SD_ILS/0/SD_ILS:23155502024-05-26T19:13:05Z2024-05-26T19:13:05Zby Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format: Electronic Resources<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:23134842024-05-26T19:13:05Z2024-05-26T19:13:05Zby Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format: Electronic Resources<br/>Information Security Management Handbook, Volume 6, 6th Editionent://SD_ILS/0/SD_ILS:23233972024-05-26T19:13:05Z2024-05-26T19:13:05Zby Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a>
<a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format: Electronic Resources<br/>Measuring and managing information risk : a FAIR approachent://SD_ILS/0/SD_ILS:23042452024-05-26T19:13:05Z2024-05-26T19:13:05Zby Freund, Jack, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar">https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124202313/?ar">https://learning.oreilly.com/library/view/~/9780124202313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124202313">https://learning.oreilly.com/library/view/~/9780124202313</a><br/>Format: Electronic Resources<br/>Introduction to information security : LiveLessons (Sneak Peek Video Training)ent://SD_ILS/0/SD_ILS:23063462024-05-26T19:13:05Z2024-05-26T19:13:05Zby Aurnou, Scott, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar">https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134135823/?ar">https://learning.oreilly.com/videos/~/9780134135823/?ar</a><br/>Format: Electronic Resources<br/>Multi-domain master data management : advanced MDM and data governance in practiceent://SD_ILS/0/SD_ILS:23067012024-05-26T19:13:05Z2024-05-26T19:13:05Zby Allen, Mark, 1953- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008355/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008355/?ar">https://learning.oreilly.com/library/view/~/9780128008355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008355">https://learning.oreilly.com/library/view/~/9780128008355</a><br/>Format: Electronic Resources<br/>The cloud security ecosystem : technical, legal, business and management issuesent://SD_ILS/0/SD_ILS:23076492024-05-26T19:13:05Z2024-05-26T19:13:05Zby Ko, Ryan, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar">https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128017807/?ar">https://learning.oreilly.com/library/view/~/9780128017807/?ar</a><br/>Format: Electronic Resources<br/>Application of big data for national security : a practitioner's guide to emerging technologiesent://SD_ILS/0/SD_ILS:23062322024-05-26T19:13:05Z2024-05-26T19:13:05Zby Akhgar, Babak, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128019672/?ar">https://learning.oreilly.com/library/view/~/9780128019672/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128019672/?ar">https://go.oreilly.com/library-access/library/view/-/9780128019672/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128019672">https://learning.oreilly.com/library/view/~/9780128019672</a><br/>Format: Electronic Resources<br/>Hadoop securityent://SD_ILS/0/SD_ILS:23077732024-05-26T19:13:05Z2024-05-26T19:13:05Zby Spivey, Ben, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar">https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491900970/?ar">https://learning.oreilly.com/library/view/~/9781491900970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491900970">https://learning.oreilly.com/library/view/~/9781491900970</a><br/>Format: Electronic Resources<br/>Implementing high availability and disaster recovery in IBM PureApplication Systems V2ent://SD_ILS/0/SD_ILS:23064692024-05-26T19:13:05Z2024-05-26T19:13:05Zby Gadepalli, Venkata, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738440337">https://learning.oreilly.com/library/view/~/0738440337</a>
<a href="https://learning.oreilly.com/library/view/~/0738440337/?ar">https://learning.oreilly.com/library/view/~/0738440337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738440337/?ar">https://go.oreilly.com/library-access/library/view/-/0738440337/?ar</a><br/>Format: Electronic Resources<br/>Learning to love data science : explorations of emerging technologies and platforms for predictive analytics, machine learning, digital manufacturing, and supply chain optimizationent://SD_ILS/0/SD_ILS:23089132024-05-26T19:13:05Z2024-05-26T19:13:05Zby Barlow, Mike (Michael Alan), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491936573">https://learning.oreilly.com/library/view/~/9781491936573</a>
<a href="https://learning.oreilly.com/library/view/~/9781491936573/?ar">https://learning.oreilly.com/library/view/~/9781491936573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491936573/?ar">https://go.oreilly.com/library-access/library/view/-/9781491936573/?ar</a><br/>Format: Electronic Resources<br/>Security, privacy, and governance : protecting data, and using data to protect systemsent://SD_ILS/0/SD_ILS:23077562024-05-26T19:13:05Z2024-05-26T19:13:05Zby Lorica, Ben, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar">https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491931042/?ar">https://learning.oreilly.com/videos/~/9781491931042/?ar</a><br/>Format: Electronic Resources<br/>IT-Sicherheit im Unternehmenent://SD_ILS/0/SD_ILS:23083242024-05-26T19:13:05Z2024-05-26T19:13:05Zby Harich, Thomas W., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958451285/?ar">https://learning.oreilly.com/library/view/~/9783958451285/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958451285">https://learning.oreilly.com/library/view/~/9783958451285</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar">https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar</a><br/>Format: Electronic Resources<br/>Mastering OAuth 2.0 : create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Frameworkent://SD_ILS/0/SD_ILS:23095472024-05-26T19:13:05Z2024-05-26T19:13:05Zby Bihis, Charles, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784395407/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395407/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784395407">https://learning.oreilly.com/library/view/~/9781784395407</a>
<a href="https://learning.oreilly.com/library/view/~/9781784395407/?ar">https://learning.oreilly.com/library/view/~/9781784395407/?ar</a><br/>Format: Electronic Resources<br/>Mastering Python forensics : master the art of digital forensics and analysis with Pythonent://SD_ILS/0/SD_ILS:23092272024-05-26T19:13:05Z2024-05-26T19:13:05Zby Spreitzenbarth, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783988044/?ar">https://learning.oreilly.com/library/view/~/9781783988044/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar">https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783988044">https://learning.oreilly.com/library/view/~/9781783988044</a><br/>Format: Electronic Resources<br/>Risk centric threat modeling : process for attack simulation and threat analysisent://SD_ILS/0/SD_ILS:23087922024-05-26T19:13:05Z2024-05-26T19:13:05Zby Uceda Vélez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format: Electronic Resources<br/>Sharing big data safely : managing data securityent://SD_ILS/0/SD_ILS:23092452024-05-26T19:13:05Z2024-05-26T19:13:05Zby Dunning, Ted, 1956- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491953624/?ar">https://go.oreilly.com/library-access/library/view/-/9781491953624/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491953624/?ar">https://learning.oreilly.com/library/view/~/9781491953624/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491953624">https://learning.oreilly.com/library/view/~/9781491953624</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:23088472024-05-26T19:13:05Z2024-05-26T19:13:05Zby Ticher, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287135/?ar">https://learning.oreilly.com/library/view/~/9781849287135/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar</a><br/>Format: Electronic Resources<br/>Cloud storage security : a practical guideent://SD_ILS/0/SD_ILS:23079352024-05-26T19:13:05Z2024-05-26T19:13:05Zby Wheeler, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029312/?ar">https://learning.oreilly.com/library/view/~/9780128029312/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar</a><br/>Format: Electronic Resources<br/>Security in computingent://SD_ILS/0/SD_ILS:23058972024-05-26T19:13:05Z2024-05-26T19:13:05Zby Pfleeger, Charles P., 1948- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134085074/?ar">https://learning.oreilly.com/library/view/~/9780134085074/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar">https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar</a><br/>Format: Electronic Resources<br/>The privacy engineer's manifesto : getting from policy to code to QA to valueent://SD_ILS/0/SD_ILS:23022962024-05-26T19:13:05Z2024-05-26T19:13:05Zby Dennedy, Michelle Finneran.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263555">https://learning.oreilly.com/library/view/~/9781430263555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430263555/?ar">https://learning.oreilly.com/library/view/~/9781430263555/?ar</a><br/>Format: Electronic Resources<br/>Responsive security : be ready to be secureent://SD_ILS/0/SD_ILS:23006432024-05-26T19:13:05Z2024-05-26T19:13:05Zby Kang, Meng-Chow.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584310/?ar">https://learning.oreilly.com/library/view/~/9781466584310/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar</a><br/>Format: Electronic Resources<br/>Total information risk management : maximizing the value of data and information assetsent://SD_ILS/0/SD_ILS:22998982024-05-26T19:13:05Z2024-05-26T19:13:05Zby Borek, Alexander.<br/><a href="https://learning.oreilly.com/library/view/~/9780124055476/?ar">https://learning.oreilly.com/library/view/~/9780124055476/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar">https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar</a><br/>Format: Electronic Resources<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:23001802024-05-26T19:13:05Z2024-05-26T19:13:05Zby Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format: Electronic Resources<br/>Enterprise architecture and information assurance : developing a secure foundationent://SD_ILS/0/SD_ILS:22992792024-05-26T19:13:05Z2024-05-26T19:13:05Zby Scholz, James A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar">https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439841594/?ar">https://learning.oreilly.com/library/view/~/9781439841594/?ar</a><br/>Format: Electronic Resources<br/>Anti-hacker tool kit.ent://SD_ILS/0/SD_ILS:23036302024-05-26T19:13:05Z2024-05-26T19:13:05Zby Shema, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar">https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071800143/?ar">https://learning.oreilly.com/library/view/~/9780071800143/?ar</a><br/>Format: Electronic Resources<br/>Deployment guide for Infosphere Guardiument://SD_ILS/0/SD_ILS:23040112024-05-26T19:13:05Z2024-05-26T19:13:05Zby Chen, Whei-Jen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738439355/?ar">https://go.oreilly.com/library-access/library/view/-/0738439355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738439355/?ar">https://learning.oreilly.com/library/view/~/0738439355/?ar</a><br/>Format: Electronic Resources<br/>Healthcare information privacy and security : regulatory compliance and data security in the age of electronic health recordsent://SD_ILS/0/SD_ILS:23036462024-05-26T19:13:05Z2024-05-26T19:13:05Zby Robichau, Bernard Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430266778">https://learning.oreilly.com/library/view/~/9781430266778</a>
<a href="https://learning.oreilly.com/library/view/~/9781430266778/?ar">https://learning.oreilly.com/library/view/~/9781430266778/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430266778/?ar">https://go.oreilly.com/library-access/library/view/-/9781430266778/?ar</a><br/>Format: Electronic Resources<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:23034122024-05-26T19:13:05Z2024-05-26T19:13:05Zby Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format: Electronic Resources<br/>Data stewardship : an actionable guide to effective data management and data governanceent://SD_ILS/0/SD_ILS:23014992024-05-26T19:13:05Z2024-05-26T19:13:05Zby Plotkin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780124103894/?ar">https://learning.oreilly.com/library/view/~/9780124103894/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124103894">https://learning.oreilly.com/library/view/~/9780124103894</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar">https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar</a><br/>Format: Electronic Resources<br/>10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacyent://SD_ILS/0/SD_ILS:23048612024-05-26T19:13:05Z2024-05-26T19:13:05Zby Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format: Electronic Resources<br/>Practical Hadoop securityent://SD_ILS/0/SD_ILS:23054222024-05-26T19:13:05Z2024-05-26T19:13:05Zby Lakhe, Bhushan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265450">https://learning.oreilly.com/library/view/~/9781430265450</a>
<a href="https://learning.oreilly.com/library/view/~/9781430265450/?ar">https://learning.oreilly.com/library/view/~/9781430265450/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar</a><br/>Format: Electronic Resources<br/>Dropbox : Sicher speichern und effektiv arbeiten in der Cloudent://SD_ILS/0/SD_ILS:23086012024-05-26T19:13:05Z2024-05-26T19:13:05Zby Schilling, Christian O., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783826687235/?ar">https://learning.oreilly.com/library/view/~/9783826687235/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783826687235/?ar">https://go.oreilly.com/library-access/library/view/-/9783826687235/?ar</a><br/>Format: Electronic Resources<br/>Integrated Security Systems Design, 2nd Editionent://SD_ILS/0/SD_ILS:23209742024-05-26T19:13:05Z2024-05-26T19:13:05Zby Norman, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000229/?ar">https://learning.oreilly.com/library/view/~/9780128000229/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000229">https://learning.oreilly.com/library/view/~/9780128000229</a><br/>Format: Electronic Resources<br/>The Science and Technology of Counterterrorisment://SD_ILS/0/SD_ILS:23199612024-05-26T19:13:05Z2024-05-26T19:13:05Zby Young, Carl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562">https://learning.oreilly.com/library/view/~/9780124200562</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562/?ar">https://learning.oreilly.com/library/view/~/9780124200562/?ar</a><br/>Format: Electronic Resources<br/>Information security management principlesent://SD_ILS/0/SD_ILS:22994512024-05-26T19:13:05Z2024-05-26T19:13:05Zby Alexander, David (Information security practitioner)<br/><a href="https://learning.oreilly.com/library/view/~/9781780171753/?ar">https://learning.oreilly.com/library/view/~/9781780171753/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar">https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780171753">https://learning.oreilly.com/library/view/~/9781780171753</a><br/>Format: Electronic Resources<br/>Introduction to cyber-warfare : a multidisciplinary approachent://SD_ILS/0/SD_ILS:23001962024-05-26T19:13:05Z2024-05-26T19:13:05Zby Shakarian, Paulo.<br/><a href="https://learning.oreilly.com/library/view/~/9780124078147">https://learning.oreilly.com/library/view/~/9780124078147</a>
<a href="https://learning.oreilly.com/library/view/~/9780124078147/?ar">https://learning.oreilly.com/library/view/~/9780124078147/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar">https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar</a><br/>Format: Electronic Resources<br/>Surviving the Top Ten Challenges of Software Testing : a People-Oriented Approachent://SD_ILS/0/SD_ILS:23058322024-05-26T19:13:05Z2024-05-26T19:13:05Zby Rice, William E. Perry. Randall W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163">https://learning.oreilly.com/library/view/~/9780133489163</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489163/?ar">https://learning.oreilly.com/library/view/~/9780133489163/?ar</a><br/>Format: Electronic Resources<br/>ISO27001/ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:23107422024-05-26T19:13:05Z2024-05-26T19:13:05Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285247/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285247/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285247/?ar">https://learning.oreilly.com/library/view/~/9781849285247/?ar</a><br/>Format: Electronic Resources<br/>Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this dayent://SD_ILS/0/SD_ILS:22980532024-05-26T19:13:05Z2024-05-26T19:13:05Zby Yerrid, K. C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960/?ar">https://learning.oreilly.com/library/view/~/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960">https://learning.oreilly.com/library/view/~/9781849519960</a><br/>Format: Electronic Resources<br/>Oracle Data Guard 11gR2 Administration Beginner's Guide : Learn How to Build and Maintain Data Guard Configurations with Real-Life, Practical Examplesent://SD_ILS/0/SD_ILS:22994492024-05-26T19:13:05Z2024-05-26T19:13:05Zby Baransel, Emre.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849687904/?ar">https://go.oreilly.com/library-access/library/view/-/9781849687904/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849687904/?ar">https://learning.oreilly.com/library/view/~/9781849687904/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849687904">https://learning.oreilly.com/library/view/~/9781849687904</a><br/>Format: Electronic Resources<br/>Nine steps to success : an ISO27001:2013 implementation overviewent://SD_ILS/0/SD_ILS:23004362024-05-26T19:13:05Z2024-05-26T19:13:05Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117/?ar">https://learning.oreilly.com/library/view/~/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117">https://learning.oreilly.com/library/view/~/9781849285117</a><br/>Format: Electronic Resources<br/>The PayPal official insider guide to internet security : spot scams and protect your online businessent://SD_ILS/0/SD_ILS:22972592024-05-26T19:13:05Z2024-05-26T19:13:05Zby Savage, Michelle.<br/><a href="https://learning.oreilly.com/library/view/~/9780133154573">https://learning.oreilly.com/library/view/~/9780133154573</a>
<a href="https://learning.oreilly.com/library/view/~/9780133154573/?ar">https://learning.oreilly.com/library/view/~/9780133154573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar">https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:22979662024-05-26T19:13:05Z2024-05-26T19:13:05Zby Brotby, W. Krag.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881538/?ar">https://learning.oreilly.com/library/view/~/9781439881538/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar</a><br/>Format: Electronic Resources<br/>Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:22966162024-05-26T19:13:05Z2024-05-26T19:13:05Zby Raggo, Michael T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format: Electronic Resources<br/>Best Practices for the Formal Software Testing Process : a Menu of Testing Tasksent://SD_ILS/0/SD_ILS:23206912024-05-26T19:13:05Z2024-05-26T19:13:05Zby Drabick, Rodger, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309/?ar">https://learning.oreilly.com/library/view/~/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309">https://learning.oreilly.com/library/view/~/9780133489309</a><br/>Format: Electronic Resources<br/>Strategic Information Management, 3rd Editionent://SD_ILS/0/SD_ILS:23199142024-05-26T19:13:05Z2024-05-26T19:13:05Zby Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format: Electronic Resources<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:23134822024-05-26T19:13:05Z2024-05-26T19:13:05Zby Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format: Electronic Resources<br/>Analyzing computer security : a threat/vulnerability/countermeasure approachent://SD_ILS/0/SD_ILS:22918062024-05-26T19:13:05Z2024-05-26T19:13:05Zby Pfleeger, Charles P., 1948-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar">https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132789493/?ar">https://learning.oreilly.com/library/view/~/9780132789493/?ar</a><br/>Format: Electronic Resources<br/>Information storage and management : storing, managing, and protecting digital information in classic, virtualized, and cloud environmentsent://SD_ILS/0/SD_ILS:22963502024-05-26T19:13:05Z2024-05-26T19:13:05Zby EMC Corporation.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118236963/?ar">https://go.oreilly.com/library-access/library/view/-/9781118236963/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118236963/?ar">https://learning.oreilly.com/library/view/~/9781118236963/?ar</a><br/>Format: Electronic Resources<br/>Once more unto the breach : managing information security in an uncertain worldent://SD_ILS/0/SD_ILS:22980222024-05-26T19:13:05Z2024-05-26T19:13:05Zby Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format: Electronic Resources<br/>The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)ent://SD_ILS/0/SD_ILS:22941702024-05-26T19:13:05Z2024-05-26T19:13:05Zby Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format: Electronic Resources<br/>Getting started with OAuth 2.0ent://SD_ILS/0/SD_ILS:22951502024-05-26T19:13:05Z2024-05-26T19:13:05Zby Boyd, Ryan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449317843/?ar">https://go.oreilly.com/library-access/library/view/-/9781449317843/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449317843">https://learning.oreilly.com/library/view/~/9781449317843</a>
<a href="https://learning.oreilly.com/library/view/~/9781449317843/?ar">https://learning.oreilly.com/library/view/~/9781449317843/?ar</a><br/>Format: Electronic Resources<br/>Data governance : how to design, deploy and sustain an effective data governance programent://SD_ILS/0/SD_ILS:22954852024-05-26T19:13:05Z2024-05-26T19:13:05Zby Ladley, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124158290/?ar">https://go.oreilly.com/library-access/library/view/-/9780124158290/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124158290/?ar">https://learning.oreilly.com/library/view/~/9780124158290/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124158290">https://learning.oreilly.com/library/view/~/9780124158290</a><br/>Format: Electronic Resources<br/>Internet and surveillance : the challenges of Web 2.0 and social mediaent://SD_ILS/0/SD_ILS:22949962024-05-26T19:13:05Z2024-05-26T19:13:05Zby Fuchs, Christian, 1976-<br/><a href="https://learning.oreilly.com/library/view/~/9780415891608/?ar">https://learning.oreilly.com/library/view/~/9780415891608/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780415891608/?ar">https://go.oreilly.com/library-access/library/view/-/9780415891608/?ar</a><br/>Format: Electronic Resources<br/>Auditing cloud computing : a security and privacy guideent://SD_ILS/0/SD_ILS:22922552024-05-26T19:13:05Z2024-05-26T19:13:05Zby Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format: Electronic Resources<br/>Practical risk management for the CIOent://SD_ILS/0/SD_ILS:22913672024-05-26T19:13:05Z2024-05-26T19:13:05Zby Scherling, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856543/?ar">https://learning.oreilly.com/library/view/~/9781439856543/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856543">https://learning.oreilly.com/library/view/~/9781439856543</a><br/>Format: Electronic Resources<br/>CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:22916612024-05-26T19:13:05Z2024-05-26T19:13:05Zby Canavan, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar">https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216/?ar">https://learning.oreilly.com/library/view/~/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216">https://learning.oreilly.com/library/view/~/9780470916216</a><br/>Format: Electronic Resources<br/>The chief information security officer : insights, tools and survival skillsent://SD_ILS/0/SD_ILS:22913842024-05-26T19:13:05Z2024-05-26T19:13:05Zby Kouns, Barry.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281966">https://learning.oreilly.com/library/view/~/9781849281966</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281966/?ar">https://learning.oreilly.com/library/view/~/9781849281966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar</a><br/>Format: Electronic Resources<br/>The security risk assessment handbook : a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:22916532024-05-26T19:13:05Z2024-05-26T19:13:05Zby Landoll, Douglas J.<br/><a href="https://learning.oreilly.com/library/view/~/9781439821497">https://learning.oreilly.com/library/view/~/9781439821497</a>
<a href="https://learning.oreilly.com/library/view/~/9781439821497/?ar">https://learning.oreilly.com/library/view/~/9781439821497/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar">https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar</a><br/>Format: Electronic Resources<br/>IBM system storage solutions for smarter systemsent://SD_ILS/0/SD_ILS:22925552024-05-26T19:13:05Z2024-05-26T19:13:05Zby Dufrasne, Bertrand.<br/><a href="https://learning.oreilly.com/library/view/~/073843583X/?ar">https://learning.oreilly.com/library/view/~/073843583X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/073843583X/?ar">https://go.oreilly.com/library-access/library/view/-/073843583X/?ar</a><br/>Format: Electronic Resources<br/>Expert Oracle and Java security : programming secure Oracle database applications with Javaent://SD_ILS/0/SD_ILS:22932242024-05-26T19:13:05Z2024-05-26T19:13:05Zby Coffin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781430238317">https://learning.oreilly.com/library/view/~/9781430238317</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar">https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430238317/?ar">https://learning.oreilly.com/library/view/~/9781430238317/?ar</a><br/>Format: Electronic Resources<br/>Privacy and Big Data.ent://SD_ILS/0/SD_ILS:22935542024-05-26T19:13:05Z2024-05-26T19:13:05Zby Craig, Terence.<br/><a href="https://learning.oreilly.com/library/view/~/9781449314842">https://learning.oreilly.com/library/view/~/9781449314842</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781449314842/?ar">https://go.oreilly.com/library-access/library/view/-/9781449314842/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449314842/?ar">https://learning.oreilly.com/library/view/~/9781449314842/?ar</a><br/>Format: Electronic Resources<br/>Preventing good people from doing bad things : implementing least privilegeent://SD_ILS/0/SD_ILS:22932782024-05-26T19:13:05Z2024-05-26T19:13:05Zby Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format: Electronic Resources<br/>Mobile device security for dummiesent://SD_ILS/0/SD_ILS:22935152024-05-26T19:13:05Z2024-05-26T19:13:05Zby Campagna, Rich R.<br/><a href="https://learning.oreilly.com/library/view/~/9781118093801/?ar">https://learning.oreilly.com/library/view/~/9781118093801/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar">https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar</a><br/>Format: Electronic Resources<br/>Security de-engineering : solving the problems in information risk managementent://SD_ILS/0/SD_ILS:22959952024-05-26T19:13:05Z2024-05-26T19:13:05Zby Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a>
<a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format: Electronic Resources<br/>IBM System Storage TS7650, TS7650G, and TS7610ent://SD_ILS/0/SD_ILS:23267932024-05-26T19:13:05Z2024-05-26T19:13:05Zby Osuna, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738435848">https://learning.oreilly.com/library/view/~/0738435848</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738435848/?ar">https://go.oreilly.com/library-access/library/view/-/0738435848/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738435848/?ar">https://learning.oreilly.com/library/view/~/0738435848/?ar</a><br/>Format: Electronic Resources<br/>Managing Information Security Breaches : Studies from Real Life.ent://SD_ILS/0/SD_ILS:22906742024-05-26T19:13:05Z2024-05-26T19:13:05Zby Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format: Electronic Resources<br/>PCI compliance : understand and implement effective PCI data security standard compliance.ent://SD_ILS/0/SD_ILS:22886412024-05-26T19:13:05Z2024-05-26T19:13:05Zby Chuvakin, Anton.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494991/?ar">https://learning.oreilly.com/library/view/~/9781597494991/?ar</a><br/>Format: Electronic Resources<br/>Surreptitious software : obfuscation, watermarking, and tamperproofing for software protectionent://SD_ILS/0/SD_ILS:22869822024-05-26T19:13:05Z2024-05-26T19:13:05Zby Collberg, Christian.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591258/?ar">https://learning.oreilly.com/library/view/~/9780321591258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar</a><br/>Format: Electronic Resources<br/>Security strategy : from requirements to realityent://SD_ILS/0/SD_ILS:23216382024-05-26T19:13:05Z2024-05-26T19:13:05Zby Stackpole, Bill. http://viaf.org/viaf/sourceID/LC%7cn2007046244<br/><a href="https://learning.oreilly.com/library/view/~/9781439827345">https://learning.oreilly.com/library/view/~/9781439827345</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar">https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439827345/?ar">https://learning.oreilly.com/library/view/~/9781439827345/?ar</a><br/>Format: Electronic Resources<br/>How to secure and audit Oracle 10g and 11gent://SD_ILS/0/SD_ILS:22863242024-05-26T19:13:05Z2024-05-26T19:13:05Zby Ben-Natan, Ron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar">https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139/?ar">https://learning.oreilly.com/library/view/~/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139">https://learning.oreilly.com/library/view/~/9781420084139</a><br/>Format: Electronic Resources<br/>Data leaks for dummiesent://SD_ILS/0/SD_ILS:22887552024-05-26T19:13:05Z2024-05-26T19:13:05Zby Bunker, Guy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470388433">https://learning.oreilly.com/library/view/~/9780470388433</a>
<a href="https://learning.oreilly.com/library/view/~/9780470388433/?ar">https://learning.oreilly.com/library/view/~/9780470388433/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470388433/?ar">https://go.oreilly.com/library-access/library/view/-/9780470388433/?ar</a><br/>Format: Electronic Resources<br/>How to survive a data breach : a pocket guideent://SD_ILS/0/SD_ILS:22900792024-05-26T19:13:05Z2024-05-26T19:13:05Zby Mitchell, Stewart.<br/><a href="https://learning.oreilly.com/library/view/~/9781905356966">https://learning.oreilly.com/library/view/~/9781905356966</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356966/?ar">https://learning.oreilly.com/library/view/~/9781905356966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar</a><br/>Format: Electronic Resources<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:22866302024-05-26T19:13:05Z2024-05-26T19:13:05Zby Brotby, W. Krag, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar">https://go.oreilly.com/library-access/library/view/-/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862/?ar">https://learning.oreilly.com/library/view/~/9781420052862/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420052862">https://learning.oreilly.com/library/view/~/9781420052862</a><br/>Format: Electronic Resources<br/>Information storage and management : storing, managing, and protecting digital informationent://SD_ILS/0/SD_ILS:22866292024-05-26T19:13:05Z2024-05-26T19:13:05Zby Somasundaram, G.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470294215/?ar">https://go.oreilly.com/library-access/library/view/-/9780470294215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470294215/?ar">https://learning.oreilly.com/library/view/~/9780470294215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470294215">https://learning.oreilly.com/library/view/~/9780470294215</a><br/>Format: Electronic Resources<br/>Oracle data guard 11g handbookent://SD_ILS/0/SD_ILS:22869362024-05-26T19:13:05Z2024-05-26T19:13:05Zby Carpenter, Larry.<br/><a href="https://learning.oreilly.com/library/view/~/9780071621113">https://learning.oreilly.com/library/view/~/9780071621113</a>
<a href="https://learning.oreilly.com/library/view/~/9780071621113/?ar">https://learning.oreilly.com/library/view/~/9780071621113/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071621113/?ar">https://go.oreilly.com/library-access/library/view/-/9780071621113/?ar</a><br/>Format: Electronic Resources<br/>The Prompt Payment Act Answer Bookent://SD_ILS/0/SD_ILS:23152632024-05-26T19:13:05Z2024-05-26T19:13:05Zby Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263336">https://learning.oreilly.com/library/view/~/9781567263336</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263336/?ar">https://learning.oreilly.com/library/view/~/9781567263336/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar</a><br/>Format: Electronic Resources<br/>The Antideficiency Act Answer Bookent://SD_ILS/0/SD_ILS:23152732024-05-26T19:13:05Z2024-05-26T19:13:05Zby Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263343/?ar">https://learning.oreilly.com/library/view/~/9781567263343/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263343">https://learning.oreilly.com/library/view/~/9781567263343</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar</a><br/>Format: Electronic Resources<br/>Microsoftent://SD_ILS/0/SD_ILS:23210692024-05-26T19:13:05Z2024-05-26T19:13:05Zby Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format: Electronic Resources<br/>Mastering System Center Data Protection Manager 2007ent://SD_ILS/0/SD_ILS:22845422024-05-26T19:13:05Z2024-05-26T19:13:05Zby Ganger, Devin L.<br/><a href="https://learning.oreilly.com/library/view/~/9780470181522/?ar">https://learning.oreilly.com/library/view/~/9780470181522/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar">https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470181522">https://learning.oreilly.com/library/view/~/9780470181522</a><br/>Format: Electronic Resources<br/>Netcat power toolsent://SD_ILS/0/SD_ILS:22851562024-05-26T19:13:05Z2024-05-26T19:13:05Zby Kanclirz, Jan.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492577">https://learning.oreilly.com/library/view/~/9781597492577</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492577/?ar">https://learning.oreilly.com/library/view/~/9781597492577/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492577/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492577/?ar</a><br/>Format: Electronic Resources<br/>ISO27001 / ISO27002 : a pocket guide / Alan Calder.ent://SD_ILS/0/SD_ILS:22998172024-05-26T19:13:05Z2024-05-26T19:13:05Zby Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281669/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281669/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285230/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285230/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281669/?ar">https://learning.oreilly.com/library/view/~/9781849281669/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285230/?ar">https://learning.oreilly.com/library/view/~/9781849285230/?ar</a><br/>Format: Electronic Resources<br/>Security and Usability : Designing Secure Systems that People Can Use.ent://SD_ILS/0/SD_ILS:22886102024-05-26T19:13:05Z2024-05-26T19:13:05Zby Cranor, Lorrie Faith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008279/?ar">https://go.oreilly.com/library-access/library/view/-/0596008279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008279/?ar">https://learning.oreilly.com/library/view/~/0596008279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008279">https://learning.oreilly.com/library/view/~/0596008279</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001 : a pocket guideent://SD_ILS/0/SD_ILS:22889322024-05-26T19:13:05Z2024-05-26T19:13:05Zby Watkins, Steve, 1970-<br/><a href="https://learning.oreilly.com/library/view/~/9781905356683">https://learning.oreilly.com/library/view/~/9781905356683</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356683/?ar">https://learning.oreilly.com/library/view/~/9781905356683/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356683/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356683/?ar</a><br/>Format: Electronic Resources<br/>Information security management principles : an ISEB certificateent://SD_ILS/0/SD_ILS:22903002024-05-26T19:13:05Z2024-05-26T19:13:05Zby Taylor, Andy.<br/><a href="https://learning.oreilly.com/library/view/~/9781902505909/?ar">https://learning.oreilly.com/library/view/~/9781902505909/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781902505909/?ar">https://go.oreilly.com/library-access/library/view/-/9781902505909/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781902505909">https://learning.oreilly.com/library/view/~/9781902505909</a><br/>Format: Electronic Resources<br/>Business continuity planning for data centers and systems : a strategic implementation guideent://SD_ILS/0/SD_ILS:22885302024-05-26T19:13:05Z2024-05-26T19:13:05Zby Bowman, Ronald H., 1960-<br/><a href="https://learning.oreilly.com/library/view/~/9780470258613/?ar">https://learning.oreilly.com/library/view/~/9780470258613/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470258613/?ar">https://go.oreilly.com/library-access/library/view/-/9780470258613/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470258613">https://learning.oreilly.com/library/view/~/9780470258613</a><br/>Format: Electronic Resources<br/>Managing catastrophic loss of sensitive dataent://SD_ILS/0/SD_ILS:22846902024-05-26T19:13:05Z2024-05-26T19:13:05Zby Photopoulos, Constantine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492393/?ar">https://learning.oreilly.com/library/view/~/9781597492393/?ar</a><br/>Format: Electronic Resources<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:22852262024-05-26T19:13:05Z2024-05-26T19:13:05Zby Clark, Champ, III.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492249">https://learning.oreilly.com/library/view/~/9781597492249</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492249/?ar">https://learning.oreilly.com/library/view/~/9781597492249/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar</a><br/>Format: Electronic Resources<br/>Deployment guides series. IBM Tivoli Compliance Insight Managerent://SD_ILS/0/SD_ILS:22946672024-05-26T19:13:05Z2024-05-26T19:13:05Zby Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738485705/?ar">https://go.oreilly.com/library-access/library/view/-/0738485705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738485705/?ar">https://learning.oreilly.com/library/view/~/0738485705/?ar</a><br/>Format: Electronic Resources<br/>The shellcoder's handbook : discovering and exploiting security holesent://SD_ILS/0/SD_ILS:22838522024-05-26T19:13:05Z2024-05-26T19:13:05Zby Anley, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780470080238">https://learning.oreilly.com/library/view/~/9780470080238</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar">https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470080238/?ar">https://learning.oreilly.com/library/view/~/9780470080238/?ar</a><br/>Format: Electronic Resources<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:22819912024-05-26T19:13:05Z2024-05-26T19:13:05Zby Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490481">https://learning.oreilly.com/library/view/~/9781597490481</a>
<a href="https://www.sciencedirect.com/science/book/9781597490481">https://www.sciencedirect.com/science/book/9781597490481</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490481/?ar">https://learning.oreilly.com/library/view/~/9781597490481/?ar</a><br/>Format: Electronic Resources<br/>Solving the Enigma : History of Cryptanalytic Bombeent://SD_ILS/0/SD_ILS:23107982024-05-26T19:13:05Z2024-05-26T19:13:05Zby Wilcox, Jennifer.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100015SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100015SI/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/01120100015SI">https://learning.oreilly.com/library/view/~/01120100015SI</a>
<a href="https://learning.oreilly.com/library/view/~/01120100015SI/?ar">https://learning.oreilly.com/library/view/~/01120100015SI/?ar</a><br/>Format: Electronic Resources<br/>Implementing database security and auditing a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:656752024-05-26T19:13:05Z2024-05-26T19:13:05Zby Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:22818232024-05-26T19:13:05Z2024-05-26T19:13:05Zby Kairab, Sudhanshu.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203507230/?ar">https://go.oreilly.com/library-access/library/view/-/9780203507230/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203507230/?ar">https://learning.oreilly.com/library/view/~/9780203507230/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203507230">https://learning.oreilly.com/library/view/~/9780203507230</a><br/>Format: Electronic Resources<br/>The business case for network security : advocacy, governance, and ROIent://SD_ILS/0/SD_ILS:22816462024-05-26T19:13:05Z2024-05-26T19:13:05Zby Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587201216/?ar">https://go.oreilly.com/library-access/library/view/-/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216/?ar">https://learning.oreilly.com/library/view/~/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216">https://learning.oreilly.com/library/view/~/1587201216</a><br/>Format: Electronic Resources<br/>Counter hack reloaded : a step-by-step guide to computer attacks and effective defensesent://SD_ILS/0/SD_ILS:22831032024-05-26T19:13:05Z2024-05-26T19:13:05Zby Skoudis, Ed.<br/><a href="https://learning.oreilly.com/library/view/~/9780131481046/?ar">https://learning.oreilly.com/library/view/~/9780131481046/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar">https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar</a><br/>Format: Electronic Resources<br/>Computer privacy annoyances : how to avoid the most ANNOYING invasions of your personal and online privacyent://SD_ILS/0/SD_ILS:22883512024-05-26T19:13:05Z2024-05-26T19:13:05Zby Tynan, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/0596007752">https://learning.oreilly.com/library/view/~/0596007752</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596007752/?ar">https://go.oreilly.com/library-access/library/view/-/0596007752/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007752/?ar">https://learning.oreilly.com/library/view/~/0596007752/?ar</a><br/>Format: Electronic Resources<br/>Data Protection and Information Lifecycle Management.ent://SD_ILS/0/SD_ILS:22904662024-05-26T19:13:05Z2024-05-26T19:13:05Zby Petrocelli, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0131927574/?ar">https://go.oreilly.com/library-access/library/view/-/0131927574/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131927574/?ar">https://learning.oreilly.com/library/view/~/0131927574/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131927574">https://learning.oreilly.com/library/view/~/0131927574</a><br/>Format: Electronic Resources<br/>Nine steps to success : an ISO 27001 implementation overviewent://SD_ILS/0/SD_ILS:22897432024-05-26T19:13:05Z2024-05-26T19:13:05Zby Calder, Alan, 1957-<br/><a href="https://learning.oreilly.com/library/view/~/9781905356126/?ar">https://learning.oreilly.com/library/view/~/9781905356126/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar</a><br/>Format: Electronic Resources<br/>Digital identityent://SD_ILS/0/SD_ILS:22932882024-05-26T19:13:05Z2024-05-26T19:13:05Zby Windley, Phillip J., 1958-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008783/?ar">https://go.oreilly.com/library-access/library/view/-/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783/?ar">https://learning.oreilly.com/library/view/~/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783">https://learning.oreilly.com/library/view/~/0596008783</a><br/>Format: Electronic Resources<br/>Building a global information assurance programent://SD_ILS/0/SD_ILS:23229162024-05-26T19:13:05Z2024-05-26T19:13:05Zby Curts, Raymond J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780203997550/?ar">https://learning.oreilly.com/library/view/~/9780203997550/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar">https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar</a><br/>Format: Electronic Resources<br/>The shellcoder's handbook : discovering and exploiting security holesent://SD_ILS/0/SD_ILS:22818332024-05-26T19:13:05Z2024-05-26T19:13:05Zby Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9780764544682">https://learning.oreilly.com/library/view/~/9780764544682</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780764544682/?ar">https://go.oreilly.com/library-access/library/view/-/9780764544682/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764544682/?ar">https://learning.oreilly.com/library/view/~/9780764544682/?ar</a><br/>Format: Electronic Resources<br/>Malicious cryptography : exposing cryptovirologyent://SD_ILS/0/SD_ILS:23102812024-05-26T19:13:05Z2024-05-26T19:13:05Zby Young, Adam, 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar">https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764568466">https://learning.oreilly.com/library/view/~/9780764568466</a>
<a href="https://learning.oreilly.com/library/view/~/9780764568466/?ar">https://learning.oreilly.com/library/view/~/9780764568466/?ar</a><br/>Format: Electronic Resources<br/>HIGH-TECH CRIMES REVEALED : CYBERWAR STORIES FROM THE DIGITAL FRONTent://SD_ILS/0/SD_ILS:23206882024-05-26T19:13:05Z2024-05-26T19:13:05Zby Branigan, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321218736/?ar">https://go.oreilly.com/library-access/library/view/-/0321218736/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321218736/?ar">https://learning.oreilly.com/library/view/~/0321218736/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321218736">https://learning.oreilly.com/library/view/~/0321218736</a><br/>Format: Electronic Resources<br/>Mapping security : the corporate security sourcebook for today's global economyent://SD_ILS/0/SD_ILS:23151912024-05-26T19:13:05Z2024-05-26T19:13:05Zby Patterson, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321304527/?ar">https://go.oreilly.com/library-access/library/view/-/0321304527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321304527/?ar">https://learning.oreilly.com/library/view/~/0321304527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321304527">https://learning.oreilly.com/library/view/~/0321304527</a><br/>Format: Electronic Resources<br/>Assessing and Managing Security Risk in IT Systemsent://SD_ILS/0/SD_ILS:23263052024-05-26T19:13:05Z2024-05-26T19:13:05Zby McCumber, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar">https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203490426">https://learning.oreilly.com/library/view/~/9780203490426</a>
<a href="https://learning.oreilly.com/library/view/~/9780203490426/?ar">https://learning.oreilly.com/library/view/~/9780203490426/?ar</a><br/>Format: Electronic Resources<br/>Firewalls and Internet Security : Repelling the Wily Hacker, Second Editionent://SD_ILS/0/SD_ILS:23247852024-05-26T19:13:05Z2024-05-26T19:13:05Zby Cheswick, William, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/020163466X/?ar">https://go.oreilly.com/library-access/library/view/-/020163466X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/020163466X/?ar">https://learning.oreilly.com/library/view/~/020163466X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/020163466X">https://learning.oreilly.com/library/view/~/020163466X</a><br/>Format: Electronic Resources<br/>Security + Study Guide and DVD Training Systement://SD_ILS/0/SD_ILS:23205992024-05-26T19:13:05Z2024-05-26T19:13:05Zby Syngress, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836722">https://learning.oreilly.com/library/view/~/9781931836722</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836722/?ar">https://learning.oreilly.com/library/view/~/9781931836722/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar</a><br/>Format: Electronic Resources<br/>Inside the Security Mind : Making the Tough Decisions.ent://SD_ILS/0/SD_ILS:23225652024-05-26T19:13:05Z2024-05-26T19:13:05Zby Day, Kevin, 1975- author.<br/><a href="https://learning.oreilly.com/library/view/~/0131118293/?ar">https://learning.oreilly.com/library/view/~/0131118293/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131118293">https://learning.oreilly.com/library/view/~/0131118293</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131118293/?ar">https://go.oreilly.com/library-access/library/view/-/0131118293/?ar</a><br/>Format: Electronic Resources<br/>Building an information security awareness programent://SD_ILS/0/SD_ILS:22817822024-05-26T19:13:05Z2024-05-26T19:13:05Zby Desman, Mark B.<br/><a href="https://learning.oreilly.com/library/view/~/9781420000054">https://learning.oreilly.com/library/view/~/9781420000054</a>
<a href="https://learning.oreilly.com/library/view/~/9781420000054/?ar">https://learning.oreilly.com/library/view/~/9781420000054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar">https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar</a><br/>Format: Electronic Resources<br/>Managing Information Security Risks : the OCTAVESM Approachent://SD_ILS/0/SD_ILS:23215822024-05-26T19:13:05Z2024-05-26T19:13:05Zby Alberts, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/0321118863/?ar">https://learning.oreilly.com/library/view/~/0321118863/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321118863/?ar">https://go.oreilly.com/library-access/library/view/-/0321118863/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321118863">https://learning.oreilly.com/library/view/~/0321118863</a><br/>Format: Electronic Resources<br/>Understanding PKI : Concepts, Standards, and Deployment Considerations, Second Editionent://SD_ILS/0/SD_ILS:23216252024-05-26T19:13:05Z2024-05-26T19:13:05Zby Adams, Carlisle, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672323915/?ar">https://go.oreilly.com/library-access/library/view/-/0672323915/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672323915/?ar">https://learning.oreilly.com/library/view/~/0672323915/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672323915">https://learning.oreilly.com/library/view/~/0672323915</a><br/>Format: Electronic Resources<br/>Backing up Oracle : using Tivoli Storage Managementent://SD_ILS/0/SD_ILS:22813652024-05-26T19:13:05Z2024-05-26T19:13:05Zby Hewgill, Deirdre.<br/><a href="https://learning.oreilly.com/library/view/~/0738421855">https://learning.oreilly.com/library/view/~/0738421855</a>
<a href="https://learning.oreilly.com/library/view/~/0738421855/?ar">https://learning.oreilly.com/library/view/~/0738421855/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738421855/?ar">https://go.oreilly.com/library-access/library/view/-/0738421855/?ar</a><br/>Format: Electronic Resources<br/>Writing Information Security Policies.ent://SD_ILS/0/SD_ILS:23107552024-05-26T19:13:05Z2024-05-26T19:13:05Zby Barman, Scott, author.<br/><a href="https://learning.oreilly.com/library/view/~/157870264X/?ar">https://learning.oreilly.com/library/view/~/157870264X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/157870264X/?ar">https://go.oreilly.com/library-access/library/view/-/157870264X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/157870264X">https://learning.oreilly.com/library/view/~/157870264X</a><br/>Format: Electronic Resources<br/>