Search Results for - Narrowed by: COMPUTERS -- Internet -- Security. - Réseaux d'ordinateurs -- Sécurité -- Mesures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bInternet$002b--$002bSecurity.$002509COMPUTERS$002b--$002bInternet$002b--$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300$0026isd$003dtrue?
2024-06-20T05:46:03Z
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:2313301
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128039298">https://learning.oreilly.com/library/view/~/9780128039298</a>
<a href="https://learning.oreilly.com/library/view/~/9780128039298/?ar">https://learning.oreilly.com/library/view/~/9780128039298/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar">https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2309318
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar">https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119154686/?ar">https://learning.oreilly.com/library/view/~/9781119154686/?ar</a><br/>Format: Electronic Resources<br/>
Wireless communications security : solutions for the internet of things
ent://SD_ILS/0/SD_ILS:2311624
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Penttinen, Jyrki T. J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119084396/?ar">https://learning.oreilly.com/library/view/~/9781119084396/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar">https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar</a><br/>Format: Electronic Resources<br/>
Hacking with Kali : practical penetration testing techniques
ent://SD_ILS/0/SD_ILS:2301946
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Broad, James.<br/><a href="https://learning.oreilly.com/library/view/~/9780124077492">https://learning.oreilly.com/library/view/~/9780124077492</a>
<a href="https://learning.oreilly.com/library/view/~/9780124077492/?ar">https://learning.oreilly.com/library/view/~/9780124077492/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar">https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar</a><br/>Format: Electronic Resources<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:2303267
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Stapleton, Jeffrey James.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592155">https://learning.oreilly.com/library/view/~/9781466592155</a>
<a href="https://learning.oreilly.com/library/view/~/9781466592155/?ar">https://learning.oreilly.com/library/view/~/9781466592155/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar</a><br/>Format: Electronic Resources<br/>
The basics of digital privacy : simple tools to protect your personal information and your identity online
ent://SD_ILS/0/SD_ILS:2301150
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Cherry, Denny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113/?ar">https://learning.oreilly.com/library/view/~/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113">https://learning.oreilly.com/library/view/~/9780128000113</a><br/>Format: Electronic Resources<br/>
Intrusion detection networks : a key to collaborative security
ent://SD_ILS/0/SD_ILS:2301112
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Fung, Carol, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564121/?ar">https://learning.oreilly.com/library/view/~/9781466564121/?ar</a><br/>Format: Electronic Resources<br/>
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:2303294
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format: Electronic Resources<br/>
Conducting network penetration and espionage in a global environment
ent://SD_ILS/0/SD_ILS:2303092
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Middleton, Bruce, 1953- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482206470">https://learning.oreilly.com/library/view/~/9781482206470</a>
<a href="https://learning.oreilly.com/library/view/~/9781482206470/?ar">https://learning.oreilly.com/library/view/~/9781482206470/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar">https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar</a><br/>Format: Electronic Resources<br/>
Managing information security
ent://SD_ILS/0/SD_ILS:2300537
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Vacca, John R., editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166882/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166882/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124166882/?ar">https://learning.oreilly.com/library/view/~/9780124166882/?ar</a><br/>Format: Electronic Resources<br/>
Threat modeling : designing for security
ent://SD_ILS/0/SD_ILS:2302626
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format: Electronic Resources<br/>
Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day
ent://SD_ILS/0/SD_ILS:2298053
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Yerrid, K. C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960/?ar">https://learning.oreilly.com/library/view/~/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960">https://learning.oreilly.com/library/view/~/9781849519960</a><br/>Format: Electronic Resources<br/>
Intelligent systems for security informatics
ent://SD_ILS/0/SD_ILS:2297534
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Yang, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047020">https://learning.oreilly.com/library/view/~/9780124047020</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124047020/?ar">https://learning.oreilly.com/library/view/~/9780124047020/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2298336
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar">https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118380956/?ar">https://learning.oreilly.com/library/view/~/9781118380956/?ar</a><br/>Format: Electronic Resources<br/>
Iris biometric model for secured network access
ent://SD_ILS/0/SD_ILS:2298466
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by El Khoury, Franjieh.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502147/?ar">https://learning.oreilly.com/library/view/~/9781466502147/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466502147">https://learning.oreilly.com/library/view/~/9781466502147</a><br/>Format: Electronic Resources<br/>
Handbook of SCADA/control systems security
ent://SD_ILS/0/SD_ILS:2297537
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Radvanovsky, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502260/?ar">https://learning.oreilly.com/library/view/~/9781466502260/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466502260">https://learning.oreilly.com/library/view/~/9781466502260</a><br/>Format: Electronic Resources<br/>
Web Application Defender's Cookbook : Battling Hackers and Protecting Users.
ent://SD_ILS/0/SD_ILS:2298453
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Barnett, Ryan C.<br/><a href="https://learning.oreilly.com/library/view/~/9781118417058/?ar">https://learning.oreilly.com/library/view/~/9781118417058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar">https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118417058">https://learning.oreilly.com/library/view/~/9781118417058</a><br/>Format: Electronic Resources<br/>
UTM security with Fortinet : Mastering FortiOS
ent://SD_ILS/0/SD_ILS:2296617
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Tam, Kenneth.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497473/?ar">https://learning.oreilly.com/library/view/~/9781597497473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497473">https://learning.oreilly.com/library/view/~/9781597497473</a><br/>Format: Electronic Resources<br/>
Security risks in social media technologies : safe practices in public service applications
ent://SD_ILS/0/SD_ILS:2301076
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Oxley, Alan.<br/><a href="https://learning.oreilly.com/library/view/~/9781843347149">https://learning.oreilly.com/library/view/~/9781843347149</a>
<a href="https://learning.oreilly.com/library/view/~/9781843347149/?ar">https://learning.oreilly.com/library/view/~/9781843347149/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781843347149/?ar">https://go.oreilly.com/library-access/library/view/-/9781843347149/?ar</a><br/>Format: Electronic Resources<br/>
Applied network security monitoring : collection, detection, and analysis
ent://SD_ILS/0/SD_ILS:2301151
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Sanders, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar">https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124172081/?ar">https://learning.oreilly.com/library/view/~/9780124172081/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124172081">https://learning.oreilly.com/library/view/~/9780124172081</a><br/>Format: Electronic Resources<br/>
Security patterns in practice : designing secure architectures using software patterns
ent://SD_ILS/0/SD_ILS:2300767
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Fernandez, Eduardo B., 1936-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar">https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119970484/?ar">https://learning.oreilly.com/library/view/~/9781119970484/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119970484">https://learning.oreilly.com/library/view/~/9781119970484</a><br/>Format: Electronic Resources<br/>
Practical anonymity : hiding in plain sight online
ent://SD_ILS/0/SD_ILS:2299515
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Loshin, Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar">https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124104044/?ar">https://learning.oreilly.com/library/view/~/9780124104044/?ar</a><br/>Format: Electronic Resources<br/>
The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
ent://SD_ILS/0/SD_ILS:2296625
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Winterfeld, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047372/?ar">https://learning.oreilly.com/library/view/~/9780124047372/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124047372">https://learning.oreilly.com/library/view/~/9780124047372</a><br/>Format: Electronic Resources<br/>
Penetration testing : protecting networks and systems
ent://SD_ILS/0/SD_ILS:2295898
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Henry, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283731">https://learning.oreilly.com/library/view/~/9781849283731</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283731/?ar">https://learning.oreilly.com/library/view/~/9781849283731/?ar</a><br/>Format: Electronic Resources<br/>
The tangled Web : a guide to securing modern Web applications
ent://SD_ILS/0/SD_ILS:2293949
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Zalewski, Michal.<br/><a href="https://learning.oreilly.com/library/view/~/9781593273880">https://learning.oreilly.com/library/view/~/9781593273880</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273880/?ar">https://learning.oreilly.com/library/view/~/9781593273880/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar</a><br/>Format: Electronic Resources<br/>
Web commerce security : design and development
ent://SD_ILS/0/SD_ILS:2292686
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Nahari, Hadi.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar">https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470624463/?ar">https://learning.oreilly.com/library/view/~/9780470624463/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470624463">https://learning.oreilly.com/library/view/~/9780470624463</a><br/>Format: Electronic Resources<br/>
Implementing SSL/TLS using cryptography and PKI
ent://SD_ILS/0/SD_ILS:2290966
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Davies, Joshua A. (Joshua Aaron)<br/><a href="https://learning.oreilly.com/library/view/~/9780470920411/?ar">https://learning.oreilly.com/library/view/~/9780470920411/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar">https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470920411">https://learning.oreilly.com/library/view/~/9780470920411</a><br/>Format: Electronic Resources<br/>
Honeypot : a new paradigm to information security
ent://SD_ILS/0/SD_ILS:2292506
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Joshi, R. C.<br/><a href="https://learning.oreilly.com/library/view/~/9781578087082">https://learning.oreilly.com/library/view/~/9781578087082</a>
<a href="https://learning.oreilly.com/library/view/~/9781578087082/?ar">https://learning.oreilly.com/library/view/~/9781578087082/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar">https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar</a><br/>Format: Electronic Resources<br/>
Hacking exposed : web applications : web application security secrets and solutions
ent://SD_ILS/0/SD_ILS:2290273
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Scambray, Joel.<br/><a href="https://learning.oreilly.com/library/view/~/9780071740647/?ar">https://learning.oreilly.com/library/view/~/9780071740647/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar">https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar</a><br/>Format: Electronic Resources<br/>
CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
ent://SD_ILS/0/SD_ILS:2291661
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Canavan, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar">https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216/?ar">https://learning.oreilly.com/library/view/~/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216">https://learning.oreilly.com/library/view/~/9780470916216</a><br/>Format: Electronic Resources<br/>
IT auditing : using controls to protect information assets
ent://SD_ILS/0/SD_ILS:2291226
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Davis, Chris (Christopher Michael)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071742382/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071742382/?ar">https://learning.oreilly.com/library/view/~/9780071742382/?ar</a><br/>Format: Electronic Resources<br/>
Deploying Microsoft Forefront Protection 2010 for Exchange Server
ent://SD_ILS/0/SD_ILS:2290701
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656734/?ar">https://learning.oreilly.com/library/view/~/9780735656734/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar</a><br/>Format: Electronic Resources<br/>
Deploying Microsoft Forefront Threat Management Gateway 2010
ent://SD_ILS/0/SD_ILS:2290730
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656741/?ar">https://learning.oreilly.com/library/view/~/9780735656741/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar</a><br/>Format: Electronic Resources<br/>
Information security risk management for ISO27001/ISO27002
ent://SD_ILS/0/SD_ILS:2291936
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281492/?ar">https://learning.oreilly.com/library/view/~/9781849281492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281492">https://learning.oreilly.com/library/view/~/9781849281492</a><br/>Format: Electronic Resources<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:2288720
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Haines, Brad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417/?ar">https://learning.oreilly.com/library/view/~/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417">https://learning.oreilly.com/library/view/~/9781597495417</a><br/>Format: Electronic Resources<br/>
Designing an IAM framework with Oracle Identity and access management suite
ent://SD_ILS/0/SD_ILS:2289729
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Scheidel, Jeff.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar">https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071741378/?ar">https://learning.oreilly.com/library/view/~/9780071741378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071741378">https://learning.oreilly.com/library/view/~/9780071741378</a><br/>Format: Electronic Resources<br/>
24 deadly sins of software security : programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:2287176
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780071626750/?ar">https://learning.oreilly.com/library/view/~/9780071626750/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar">https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071626750">https://learning.oreilly.com/library/view/~/9780071626750</a><br/>Format: Electronic Resources<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:2288721
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Anderson, Brian (Brian James)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547/?ar">https://learning.oreilly.com/library/view/~/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547">https://learning.oreilly.com/library/view/~/9781597495547</a><br/>Format: Electronic Resources<br/>
Seven deadliest web application attacks
ent://SD_ILS/0/SD_ILS:2289552
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Shema, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495431/?ar">https://learning.oreilly.com/library/view/~/9781597495431/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar</a><br/>Format: Electronic Resources<br/>
Mac Security Bible.
ent://SD_ILS/0/SD_ILS:2287722
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Kissell, Joe.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar">https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198/?ar">https://learning.oreilly.com/library/view/~/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198">https://learning.oreilly.com/library/view/~/9780470474198</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2287972
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar">https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470550939/?ar">https://learning.oreilly.com/library/view/~/9780470550939/?ar</a><br/>Format: Electronic Resources<br/>
Computer forensics : a pocket guide
ent://SD_ILS/0/SD_ILS:2289616
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format: Electronic Resources<br/>
Network and system security
ent://SD_ILS/0/SD_ILS:2288837
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495356">https://learning.oreilly.com/library/view/~/9781597495356</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495356/?ar">https://learning.oreilly.com/library/view/~/9781597495356/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar</a><br/>Format: Electronic Resources<br/>
Deploying Microsoft Forefront Unified Access Gateway 2010
ent://SD_ILS/0/SD_ILS:2290710
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Diogenes, Yuri.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735656758/?ar">https://learning.oreilly.com/library/view/~/9780735656758/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security and privacy
ent://SD_ILS/0/SD_ILS:2287451
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Mather, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806453/?ar">https://learning.oreilly.com/library/view/~/9780596806453/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596806453">https://learning.oreilly.com/library/view/~/9780596806453</a><br/>Format: Electronic Resources<br/>
Beautiful security
ent://SD_ILS/0/SD_ILS:2286888
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Oram, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780596801786/?ar">https://learning.oreilly.com/library/view/~/9780596801786/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596801786">https://learning.oreilly.com/library/view/~/9780596801786</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar">https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar</a><br/>Format: Electronic Resources<br/>
Cisco router and switch forensics : investigating and analyzing malicious network activity
ent://SD_ILS/0/SD_ILS:2287180
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494182">https://learning.oreilly.com/library/view/~/9781597494182</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494182/?ar">https://learning.oreilly.com/library/view/~/9781597494182/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar</a><br/>Format: Electronic Resources<br/>
Apache : receptury
ent://SD_ILS/0/SD_ILS:2296868
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Bowen, Richard Cooper, 1971-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176425/?ar">https://learning.oreilly.com/library/view/~/9781457176425/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176425">https://learning.oreilly.com/library/view/~/9781457176425</a><br/>Format: Electronic Resources<br/>
Next generation SSH2 implementation : securing data in motion
ent://SD_ILS/0/SD_ILS:2285986
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format: Electronic Resources<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:2286804
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a>
<a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format: Electronic Resources<br/>
Screenos cookbook
ent://SD_ILS/0/SD_ILS:2285572
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Brunner, Stefan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596510039/?ar">https://go.oreilly.com/library-access/library/view/-/9780596510039/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596510039">https://learning.oreilly.com/library/view/~/9780596510039</a>
<a href="https://learning.oreilly.com/library/view/~/9780596510039/?ar">https://learning.oreilly.com/library/view/~/9780596510039/?ar</a><br/>Format: Electronic Resources<br/>
Network security : know it all
ent://SD_ILS/0/SD_ILS:2285962
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Joshi, James B. D.<br/><a href="https://learning.oreilly.com/library/view/~/9780080560151">https://learning.oreilly.com/library/view/~/9780080560151</a>
<a href="https://learning.oreilly.com/library/view/~/9780080560151/?ar">https://learning.oreilly.com/library/view/~/9780080560151/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080560151/?ar">https://go.oreilly.com/library-access/library/view/-/9780080560151/?ar</a><br/>Format: Electronic Resources<br/>
Hacking : the art of exploitation
ent://SD_ILS/0/SD_ILS:2287983
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Erickson, Jon, 1977-<br/><a href="https://learning.oreilly.com/library/view/~/9781593271442">https://learning.oreilly.com/library/view/~/9781593271442</a>
<a href="https://learning.oreilly.com/library/view/~/9781593271442/?ar">https://learning.oreilly.com/library/view/~/9781593271442/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar</a><br/>Format: Electronic Resources<br/>
Implementing NAP and NAC security technologies : the complete guide to network access control
ent://SD_ILS/0/SD_ILS:2284693
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Hoffman, Daniel (Daniel V.), 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470238387/?ar">https://learning.oreilly.com/library/view/~/9780470238387/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar">https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470238387">https://learning.oreilly.com/library/view/~/9780470238387</a><br/>Format: Electronic Resources<br/>
Integrating ISA Server 2006 with Microsoft Exchange 2007
ent://SD_ILS/0/SD_ILS:2285147
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Strachan, Fergus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492751/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492751/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492751/?ar">https://learning.oreilly.com/library/view/~/9781597492751/?ar</a><br/>Format: Electronic Resources<br/>
Scene of the cybercrime.
ent://SD_ILS/0/SD_ILS:2285149
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492768">https://learning.oreilly.com/library/view/~/9781597492768</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492768/?ar">https://learning.oreilly.com/library/view/~/9781597492768/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft forefront security administration guide
ent://SD_ILS/0/SD_ILS:2284517
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Varsalone, Jesse.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492447">https://learning.oreilly.com/library/view/~/9781597492447</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492447/?ar">https://learning.oreilly.com/library/view/~/9781597492447/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar</a><br/>Format: Electronic Resources<br/>
OSSEC host-based intrusion detection guide
ent://SD_ILS/0/SD_ILS:2285140
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Hay, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492409">https://learning.oreilly.com/library/view/~/9781597492409</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492409/?ar">https://learning.oreilly.com/library/view/~/9781597492409/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar</a><br/>Format: Electronic Resources<br/>
Netcat power tools
ent://SD_ILS/0/SD_ILS:2285156
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Kanclirz, Jan.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492577">https://learning.oreilly.com/library/view/~/9781597492577</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492577/?ar">https://learning.oreilly.com/library/view/~/9781597492577/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492577/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492577/?ar</a><br/>Format: Electronic Resources<br/>
Apache cookbook
ent://SD_ILS/0/SD_ILS:2284338
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Coar, Ken A. L.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596529949/?ar">https://go.oreilly.com/library-access/library/view/-/9780596529949/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596529949">https://learning.oreilly.com/library/view/~/9780596529949</a>
<a href="https://learning.oreilly.com/library/view/~/9780596529949/?ar">https://learning.oreilly.com/library/view/~/9780596529949/?ar</a><br/>Format: Electronic Resources<br/>
Windows Server 2008 PKI and certificate security
ent://SD_ILS/0/SD_ILS:2284892
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Komar, Brian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735625167/?ar">https://go.oreilly.com/library-access/library/view/-/9780735625167/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735625167">https://learning.oreilly.com/library/view/~/9780735625167</a>
<a href="https://learning.oreilly.com/library/view/~/9780735625167/?ar">https://learning.oreilly.com/library/view/~/9780735625167/?ar</a><br/>Format: Electronic Resources<br/>
Botnets the killer web app
ent://SD_ILS/0/SD_ILS:340160
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Schiller, Craig A.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406</a><br/>Format: Electronic Resources<br/>
Snort : IDS and IPS toolkit
ent://SD_ILS/0/SD_ILS:2289130
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Beale, Jay.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490993/?ar">https://learning.oreilly.com/library/view/~/9781597490993/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Electronic Resources<br/>
How to cheat at securing your network
ent://SD_ILS/0/SD_ILS:2284630
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Dubrawsky, Ido.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317/?ar">https://learning.oreilly.com/library/view/~/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317">https://learning.oreilly.com/library/view/~/9781597492317</a><br/>Format: Electronic Resources<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:2282873
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597490610">https://learning.oreilly.com/library/view/~/9781597490610</a>
<a href="https://www.sciencedirect.com/science/book/9781597490610">https://www.sciencedirect.com/science/book/9781597490610</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490610/?ar">https://learning.oreilly.com/library/view/~/9781597490610/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2282490
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format: Electronic Resources<br/>
Botnets : the killer web app
ent://SD_ILS/0/SD_ILS:2283565
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Schiller, Craig A.<br/><a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491358/?ar">https://learning.oreilly.com/library/view/~/9781597491358/?ar</a><br/>Format: Electronic Resources<br/>
Security power tools
ent://SD_ILS/0/SD_ILS:2283951
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Burns, Bryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780596009632">https://learning.oreilly.com/library/view/~/9780596009632</a>
<a href="https://learning.oreilly.com/library/view/~/9780596009632/?ar">https://learning.oreilly.com/library/view/~/9780596009632/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar">https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar</a><br/>Format: Electronic Resources<br/>
AVIEN malware defense guide for the Enterprise
ent://SD_ILS/0/SD_ILS:2284510
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Harley, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491648">https://learning.oreilly.com/library/view/~/9781597491648</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491648/?ar">https://learning.oreilly.com/library/view/~/9781597491648/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar</a><br/>Format: Electronic Resources<br/>
PCI compliance : implementing effective PCI data security standards
ent://SD_ILS/0/SD_ILS:2285657
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Bradley, Tony, 1969-<br/><a href="https://learning.oreilly.com/library/view/~/9781597491655">https://learning.oreilly.com/library/view/~/9781597491655</a>
<a href="https://www.sciencedirect.com/science/book/9781597491655">https://www.sciencedirect.com/science/book/9781597491655</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491655/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491655/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491655/?ar">https://learning.oreilly.com/library/view/~/9781597491655/?ar</a><br/>Format: Electronic Resources<br/>
Handbook of information security . Volume 1, Key concepts, infrastructure, standards, and protocols
ent://SD_ILS/0/SD_ILS:2289169
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Bidgoli, Hossein.<br/><a href="https://learning.oreilly.com/library/view/~/9780471648307">https://learning.oreilly.com/library/view/~/9780471648307</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780471648307/?ar">https://go.oreilly.com/library-access/library/view/-/9780471648307/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780471648307/?ar">https://learning.oreilly.com/library/view/~/9780471648307/?ar</a><br/>Format: Electronic Resources<br/>
Firewall policies and VPN configurations
ent://SD_ILS/0/SD_ILS:2287814
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Henmi, Anne.<br/><a href="https://learning.oreilly.com/library/view/~/1597490881/?ar">https://learning.oreilly.com/library/view/~/1597490881/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1597490881/?ar">https://go.oreilly.com/library-access/library/view/-/1597490881/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1597490881">https://learning.oreilly.com/library/view/~/1597490881</a>
<a href="https://www.sciencedirect.com/science/book/9781597490887">https://www.sciencedirect.com/science/book/9781597490887</a><br/>Format: Electronic Resources<br/>
Insider threat : protecting the enterprise from sabotage, spying, and theft
ent://SD_ILS/0/SD_ILS:2281991
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490481">https://learning.oreilly.com/library/view/~/9781597490481</a>
<a href="https://www.sciencedirect.com/science/book/9781597490481">https://www.sciencedirect.com/science/book/9781597490481</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490481/?ar">https://learning.oreilly.com/library/view/~/9781597490481/?ar</a><br/>Format: Electronic Resources<br/>
Security log management : identifying patterns in the chaos
ent://SD_ILS/0/SD_ILS:2282003
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Babbin, Jacob.<br/><a href="https://learning.oreilly.com/library/view/~/1597490423/?ar">https://learning.oreilly.com/library/view/~/1597490423/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1597490423/?ar">https://go.oreilly.com/library-access/library/view/-/1597490423/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1597490423">https://learning.oreilly.com/library/view/~/1597490423</a>
<a href="https://www.sciencedirect.com/science/book/9781597490429">https://www.sciencedirect.com/science/book/9781597490429</a><br/>Format: Electronic Resources<br/>
Handbook of information security. Volume 3, Threats, vulnerabilities, prevention, detection, and management
ent://SD_ILS/0/SD_ILS:2285126
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Bidgoli, Hossein.<br/><a href="https://learning.oreilly.com/library/view/~/9780471648321">https://learning.oreilly.com/library/view/~/9780471648321</a>
<a href="https://learning.oreilly.com/library/view/~/9780471648321/?ar">https://learning.oreilly.com/library/view/~/9780471648321/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780471648321/?ar">https://go.oreilly.com/library-access/library/view/-/9780471648321/?ar</a><br/>Format: Electronic Resources<br/>
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
ent://SD_ILS/0/SD_ILS:2284090
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Contos, Brian T.<br/><a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491297">https://learning.oreilly.com/library/view/~/9781597491297</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491297/?ar">https://learning.oreilly.com/library/view/~/9781597491297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491297/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491297/?ar</a><br/>Format: Electronic Resources<br/>
Network security hacks
ent://SD_ILS/0/SD_ILS:2282983
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596527632/?ar">https://go.oreilly.com/library-access/library/view/-/0596527632/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596527632">https://learning.oreilly.com/library/view/~/0596527632</a>
<a href="https://learning.oreilly.com/library/view/~/0596527632/?ar">https://learning.oreilly.com/library/view/~/0596527632/?ar</a><br/>Format: Electronic Resources<br/>
Silence on the wire : a field guide to passive reconnaissance and indirect attacks
ent://SD_ILS/0/SD_ILS:2287377
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Zalewski, Michal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1593270461/?ar">https://go.oreilly.com/library-access/library/view/-/1593270461/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1593270461/?ar">https://learning.oreilly.com/library/view/~/1593270461/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1593270461">https://learning.oreilly.com/library/view/~/1593270461</a><br/>Format: Electronic Resources<br/>
Digital identity
ent://SD_ILS/0/SD_ILS:2293288
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Windley, Phillip J., 1958-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008783/?ar">https://go.oreilly.com/library-access/library/view/-/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783/?ar">https://learning.oreilly.com/library/view/~/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783">https://learning.oreilly.com/library/view/~/0596008783</a><br/>Format: Electronic Resources<br/>
Nessus, Snort, & Ethereal power tools : customizing open source security applications
ent://SD_ILS/0/SD_ILS:2281994
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Archibald, Neil.<br/><a href="https://www.sciencedirect.com/science/book/9781597490207">https://www.sciencedirect.com/science/book/9781597490207</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490207">https://learning.oreilly.com/library/view/~/9781597490207</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490207/?ar">https://learning.oreilly.com/library/view/~/9781597490207/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar</a><br/>Format: Electronic Resources<br/>
Configuring Check Point NGX VPN-1/FireWall-1
ent://SD_ILS/0/SD_ILS:2282000
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Stephens, Robert (Information security consultant)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490313/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490313/?ar">https://learning.oreilly.com/library/view/~/9781597490313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490313">https://learning.oreilly.com/library/view/~/9781597490313</a><br/>Format: Electronic Resources<br/>
The database hacker's handbook : defending database servers
ent://SD_ILS/0/SD_ILS:2282264
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Litchfield, David, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780764578014/?ar">https://learning.oreilly.com/library/view/~/9780764578014/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar">https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764578014">https://learning.oreilly.com/library/view/~/9780764578014</a><br/>Format: Electronic Resources<br/>
Snort cookbook
ent://SD_ILS/0/SD_ILS:2282585
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/0596007914">https://learning.oreilly.com/library/view/~/0596007914</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596007914/?ar">https://go.oreilly.com/library-access/library/view/-/0596007914/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007914/?ar">https://learning.oreilly.com/library/view/~/0596007914/?ar</a><br/>Format: Electronic Resources<br/>
Managing security with Snort and IDS tools
ent://SD_ILS/0/SD_ILS:2291450
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Cox, Kerry.<br/><a href="https://learning.oreilly.com/library/view/~/0596006616">https://learning.oreilly.com/library/view/~/0596006616</a>
<a href="https://learning.oreilly.com/library/view/~/0596006616/?ar">https://learning.oreilly.com/library/view/~/0596006616/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006616/?ar">https://go.oreilly.com/library-access/library/view/-/0596006616/?ar</a><br/>Format: Electronic Resources<br/>
Ethereal : packet sniffing
ent://SD_ILS/0/SD_ILS:2281331
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266825">https://learning.oreilly.com/library/view/~/9781932266825</a>
<a href="https://www.sciencedirect.com/science/book/9781932266825">https://www.sciencedirect.com/science/book/9781932266825</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266825/?ar">https://learning.oreilly.com/library/view/~/9781932266825/?ar</a><br/>Format: Electronic Resources<br/>
Security warrior
ent://SD_ILS/0/SD_ILS:2283903
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Peikari, Cyrus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596005458/?ar">https://go.oreilly.com/library-access/library/view/-/0596005458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596005458/?ar">https://learning.oreilly.com/library/view/~/0596005458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596005458">https://learning.oreilly.com/library/view/~/0596005458</a><br/>Format: Electronic Resources<br/>
Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ent://SD_ILS/0/SD_ILS:2281670
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Rosenberg, Jonathan B., 1956-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672326515/?ar">https://go.oreilly.com/library-access/library/view/-/0672326515/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672326515/?ar">https://learning.oreilly.com/library/view/~/0672326515/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672326515">https://learning.oreilly.com/library/view/~/0672326515</a><br/>Format: Electronic Resources<br/>
Assessing network security
ent://SD_ILS/0/SD_ILS:2281759
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Lam, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735620334/?ar">https://go.oreilly.com/library-access/library/view/-/0735620334/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735620334/?ar">https://learning.oreilly.com/library/view/~/0735620334/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735620334">https://learning.oreilly.com/library/view/~/0735620334</a><br/>Format: Electronic Resources<br/>
Managing a network vulnerability assessment
ent://SD_ILS/0/SD_ILS:2284729
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Peltier, Thomas R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203503041/?ar">https://go.oreilly.com/library-access/library/view/-/9780203503041/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203503041/?ar">https://learning.oreilly.com/library/view/~/9780203503041/?ar</a><br/>Format: Electronic Resources<br/>
Mastering network security
ent://SD_ILS/0/SD_ILS:2287799
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Brenton, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar">https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780782141429/?ar">https://learning.oreilly.com/library/view/~/9780782141429/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780782141429">https://learning.oreilly.com/library/view/~/9780782141429</a><br/>Format: Electronic Resources<br/>
Linux security cookbook
ent://SD_ILS/0/SD_ILS:2281262
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Barrett, Daniel J.<br/><a href="https://learning.oreilly.com/library/view/~/0596003919/?ar">https://learning.oreilly.com/library/view/~/0596003919/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596003919/?ar">https://go.oreilly.com/library-access/library/view/-/0596003919/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596003919">https://learning.oreilly.com/library/view/~/0596003919</a><br/>Format: Electronic Resources<br/>
Intrusion detection with Snort
ent://SD_ILS/0/SD_ILS:2281704
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/157870281X">https://learning.oreilly.com/library/view/~/157870281X</a>
<a href="https://learning.oreilly.com/library/view/~/157870281X/?ar">https://learning.oreilly.com/library/view/~/157870281X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/157870281X/?ar">https://go.oreilly.com/library-access/library/view/-/157870281X/?ar</a><br/>Format: Electronic Resources<br/>
Programming .NET security
ent://SD_ILS/0/SD_ILS:2281268
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Freeman, Adam.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596004427/?ar">https://go.oreilly.com/library-access/library/view/-/0596004427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596004427/?ar">https://learning.oreilly.com/library/view/~/0596004427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596004427">https://learning.oreilly.com/library/view/~/0596004427</a><br/>Format: Electronic Resources<br/>
Hardening Cisco routers
ent://SD_ILS/0/SD_ILS:2293283
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Akin, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/0596001665/?ar">https://learning.oreilly.com/library/view/~/0596001665/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596001665">https://learning.oreilly.com/library/view/~/0596001665</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596001665/?ar">https://go.oreilly.com/library-access/library/view/-/0596001665/?ar</a><br/>Format: Electronic Resources<br/>
Managing Cisco network security
ent://SD_ILS/0/SD_ILS:2280758
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Knipp, Eric.<br/><a href="https://www.sciencedirect.com/science/book/9781931836562">https://www.sciencedirect.com/science/book/9781931836562</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836562">https://learning.oreilly.com/library/view/~/9781931836562</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836562/?ar">https://learning.oreilly.com/library/view/~/9781931836562/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836562/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836562/?ar</a><br/>Format: Electronic Resources<br/>
Hack proofing your network
ent://SD_ILS/0/SD_ILS:2280760
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Ahmad, David R. Mirza.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994701">https://learning.oreilly.com/library/view/~/9781928994701</a>
<a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994701/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994701/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781928994701/?ar">https://learning.oreilly.com/library/view/~/9781928994701/?ar</a><br/>Format: Electronic Resources<br/>
Privacy defended : protecting yourself online
ent://SD_ILS/0/SD_ILS:2280776
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Bahadur, Gary.<br/><a href="https://learning.oreilly.com/library/view/~/078972605X">https://learning.oreilly.com/library/view/~/078972605X</a>
<a href="https://learning.oreilly.com/library/view/~/078972605X/?ar">https://learning.oreilly.com/library/view/~/078972605X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/078972605X/?ar">https://go.oreilly.com/library-access/library/view/-/078972605X/?ar</a><br/>Format: Electronic Resources<br/>
Building Internet Firewalls : Internet and Web security
ent://SD_ILS/0/SD_ILS:2293287
2024-06-20T05:46:03Z
2024-06-20T05:46:03Z
by Zwicky, Elizabeth D.<br/><a href="https://learning.oreilly.com/library/view/~/1565928717">https://learning.oreilly.com/library/view/~/1565928717</a>
<a href="https://learning.oreilly.com/library/view/~/1565928717/?ar">https://learning.oreilly.com/library/view/~/1565928717/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1565928717/?ar">https://go.oreilly.com/library-access/library/view/-/1565928717/?ar</a><br/>Format: Electronic Resources<br/>