Search Results for - Narrowed by: COMPUTERS -- Networking -- Security. - Sécurité informatique.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$002509COMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300$0026isd$003dtrue?
2024-09-22T19:49:24Z
Secure edge computing : applications, techniques and challenges.
ent://SD_ILS/0/SD_ILS:2329288
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Ahmed, Mohiuddin (Computer scientist), editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000427325/?ar">https://learning.oreilly.com/library/view/~/9781000427325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000427325">https://learning.oreilly.com/library/view/~/9781000427325</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar">https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar</a><br/>Format: Electronic Resources<br/>
Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing
ent://SD_ILS/0/SD_ILS:2319847
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format: Electronic Resources<br/>
Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
ent://SD_ILS/0/SD_ILS:2317092
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Gupta, Rajneesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990189">https://learning.oreilly.com/library/view/~/9781788990189</a>
<a href="https://learning.oreilly.com/library/view/~/9781788990189/?ar">https://learning.oreilly.com/library/view/~/9781788990189/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar</a><br/>Format: Electronic Resources<br/>
Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world
ent://SD_ILS/0/SD_ILS:2311027
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785889639">https://learning.oreilly.com/library/view/~/9781785889639</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889639/?ar">https://learning.oreilly.com/library/view/~/9781785889639/?ar</a><br/>Format: Electronic Resources<br/>
Essential cybersecurity science : build, test, and evaluate secure systems
ent://SD_ILS/0/SD_ILS:2309193
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2309318
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar">https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119154686/?ar">https://learning.oreilly.com/library/view/~/9781119154686/?ar</a><br/>Format: Electronic Resources<br/>
Web security : a whitehat perspective
ent://SD_ILS/0/SD_ILS:2306712
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Wu, Hanqing, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592612/?ar">https://learning.oreilly.com/library/view/~/9781466592612/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466592612/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592612/?ar</a><br/>Format: Electronic Resources<br/>
Information security analytics : finding security insights, patterns, and anomalies in big data
ent://SD_ILS/0/SD_ILS:2305164
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Talabis, Mark Ryan M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128002070/?ar">https://go.oreilly.com/library-access/library/view/-/9780128002070/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128002070/?ar">https://learning.oreilly.com/library/view/~/9780128002070/?ar</a><br/>Format: Electronic Resources<br/>
Infosec management fundamentals
ent://SD_ILS/0/SD_ILS:2308039
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar">https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128041871/?ar">https://learning.oreilly.com/library/view/~/9780128041871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128041871">https://learning.oreilly.com/library/view/~/9780128041871</a><br/>Format: Electronic Resources<br/>
Intrusion detection networks : a key to collaborative security
ent://SD_ILS/0/SD_ILS:2301112
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Fung, Carol, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564121/?ar">https://learning.oreilly.com/library/view/~/9781466564121/?ar</a><br/>Format: Electronic Resources<br/>
Core software security : security at the source
ent://SD_ILS/0/SD_ILS:2301641
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Ransome, James F., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466560963">https://learning.oreilly.com/library/view/~/9781466560963</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar">https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466560963/?ar">https://learning.oreilly.com/library/view/~/9781466560963/?ar</a><br/>Format: Electronic Resources<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:2303267
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Stapleton, Jeffrey James.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592155">https://learning.oreilly.com/library/view/~/9781466592155</a>
<a href="https://learning.oreilly.com/library/view/~/9781466592155/?ar">https://learning.oreilly.com/library/view/~/9781466592155/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar</a><br/>Format: Electronic Resources<br/>
The basics of digital privacy : simple tools to protect your personal information and your identity online
ent://SD_ILS/0/SD_ILS:2301150
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Cherry, Denny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113/?ar">https://learning.oreilly.com/library/view/~/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113">https://learning.oreilly.com/library/view/~/9780128000113</a><br/>Format: Electronic Resources<br/>
Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation
ent://SD_ILS/0/SD_ILS:2302625
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Dang, Bruce, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118787397/?ar">https://learning.oreilly.com/library/view/~/9781118787397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar">https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118787397">https://learning.oreilly.com/library/view/~/9781118787397</a><br/>Format: Electronic Resources<br/>
Threat modeling : designing for security
ent://SD_ILS/0/SD_ILS:2302626
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format: Electronic Resources<br/>
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:2303294
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format: Electronic Resources<br/>
Black hat Python : Python programming for hackers and pentesters
ent://SD_ILS/0/SD_ILS:2305659
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Seitz, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar">https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457189807/?ar">https://learning.oreilly.com/library/view/~/9781457189807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457189807">https://learning.oreilly.com/library/view/~/9781457189807</a><br/>Format: Electronic Resources<br/>
Intelligent systems for security informatics
ent://SD_ILS/0/SD_ILS:2297534
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Yang, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047020">https://learning.oreilly.com/library/view/~/9780124047020</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124047020/?ar">https://learning.oreilly.com/library/view/~/9780124047020/?ar</a><br/>Format: Electronic Resources<br/>
Web Application Defender's Cookbook : Battling Hackers and Protecting Users.
ent://SD_ILS/0/SD_ILS:2298453
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Barnett, Ryan C.<br/><a href="https://learning.oreilly.com/library/view/~/9781118417058/?ar">https://learning.oreilly.com/library/view/~/9781118417058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar">https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118417058">https://learning.oreilly.com/library/view/~/9781118417058</a><br/>Format: Electronic Resources<br/>
Practical anonymity : hiding in plain sight online
ent://SD_ILS/0/SD_ILS:2299515
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Loshin, Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar">https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124104044/?ar">https://learning.oreilly.com/library/view/~/9780124104044/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2298336
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar">https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118380956/?ar">https://learning.oreilly.com/library/view/~/9781118380956/?ar</a><br/>Format: Electronic Resources<br/>
Logging and log management : the authoritative guide to understanding the concepts surrounding logging and log management
ent://SD_ILS/0/SD_ILS:2296851
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Chuvakin, Anton A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496353/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496353/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496353/?ar">https://learning.oreilly.com/library/view/~/9781597496353/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496353">https://learning.oreilly.com/library/view/~/9781597496353</a><br/>Format: Electronic Resources<br/>
Handbook of SCADA/control systems security
ent://SD_ILS/0/SD_ILS:2297537
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Radvanovsky, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502260/?ar">https://learning.oreilly.com/library/view/~/9781466502260/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466502260">https://learning.oreilly.com/library/view/~/9781466502260</a><br/>Format: Electronic Resources<br/>
The tangled Web : a guide to securing modern Web applications
ent://SD_ILS/0/SD_ILS:2293949
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Zalewski, Michal.<br/><a href="https://learning.oreilly.com/library/view/~/9781593273880">https://learning.oreilly.com/library/view/~/9781593273880</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273880/?ar">https://learning.oreilly.com/library/view/~/9781593273880/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar</a><br/>Format: Electronic Resources<br/>
Security and privacy for Microsoft Office 2010 users.
ent://SD_ILS/0/SD_ILS:2294210
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Tulloch, Mitch.<br/><a href="https://learning.oreilly.com/library/view/~/9780735668829">https://learning.oreilly.com/library/view/~/9780735668829</a>
<a href="https://learning.oreilly.com/library/view/~/9780735668829/?ar">https://learning.oreilly.com/library/view/~/9780735668829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar">https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar</a><br/>Format: Electronic Resources<br/>
The web application hacker's handbook : finding and exploiting security flaws
ent://SD_ILS/0/SD_ILS:2292844
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Stuttard, Dafydd, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9781118026472/?ar">https://learning.oreilly.com/library/view/~/9781118026472/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118026472/?ar">https://go.oreilly.com/library-access/library/view/-/9781118026472/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118026472">https://learning.oreilly.com/library/view/~/9781118026472</a><br/>Format: Electronic Resources<br/>
Web commerce security : design and development
ent://SD_ILS/0/SD_ILS:2292686
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Nahari, Hadi.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar">https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470624463/?ar">https://learning.oreilly.com/library/view/~/9780470624463/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470624463">https://learning.oreilly.com/library/view/~/9780470624463</a><br/>Format: Electronic Resources<br/>
Web application obfuscation : '-/WAFs.evasion.filters//alert (/obfuscation/)-'
ent://SD_ILS/0/SD_ILS:2290508
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Heiderich, Mario.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496049/?ar">https://learning.oreilly.com/library/view/~/9781597496049/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496049/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496049/?ar</a><br/>Format: Electronic Resources<br/>
Social engineering : the art of human hacking
ent://SD_ILS/0/SD_ILS:2291334
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Hadnagy, Christopher.<br/><a href="https://learning.oreilly.com/library/view/~/9780470639535/?ar">https://learning.oreilly.com/library/view/~/9780470639535/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470639535/?ar">https://go.oreilly.com/library-access/library/view/-/9780470639535/?ar</a><br/>Format: Electronic Resources<br/>
The chief information security officer : insights, tools and survival skills
ent://SD_ILS/0/SD_ILS:2291384
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Kouns, Barry.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281966">https://learning.oreilly.com/library/view/~/9781849281966</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281966/?ar">https://learning.oreilly.com/library/view/~/9781849281966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar</a><br/>Format: Electronic Resources<br/>
Ninja hacking : unconventional penetration testing tactics and techniques
ent://SD_ILS/0/SD_ILS:2290304
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Wilhelm, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495899">https://learning.oreilly.com/library/view/~/9781597495899</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495899/?ar">https://learning.oreilly.com/library/view/~/9781597495899/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar</a><br/>Format: Electronic Resources<br/>
Managed code rootkits : hooking into runtime environments
ent://SD_ILS/0/SD_ILS:2290307
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Metula, Erez.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495752/?ar">https://learning.oreilly.com/library/view/~/9781597495752/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495752">https://learning.oreilly.com/library/view/~/9781597495752</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495752/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495752/?ar</a><br/>Format: Electronic Resources<br/>
IT auditing : using controls to protect information assets
ent://SD_ILS/0/SD_ILS:2291226
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Davis, Chris (Christopher Michael)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071742382/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071742382/?ar">https://learning.oreilly.com/library/view/~/9780071742382/?ar</a><br/>Format: Electronic Resources<br/>
Mobile device security for dummies
ent://SD_ILS/0/SD_ILS:2293515
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Campagna, Rich R.<br/><a href="https://learning.oreilly.com/library/view/~/9781118093801/?ar">https://learning.oreilly.com/library/view/~/9781118093801/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar">https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar</a><br/>Format: Electronic Resources<br/>
BackTrack 4 : assuring security by penetration testing
ent://SD_ILS/0/SD_ILS:2293871
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Ali, Shakeel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar">https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849513944/?ar">https://learning.oreilly.com/library/view/~/9781849513944/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849513944">https://learning.oreilly.com/library/view/~/9781849513944</a><br/>Format: Electronic Resources<br/>
A bug hunter's diary : a guided tour through the wilds of software security
ent://SD_ILS/0/SD_ILS:2293946
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273859/?ar">https://learning.oreilly.com/library/view/~/9781593273859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273859">https://learning.oreilly.com/library/view/~/9781593273859</a><br/>Format: Electronic Resources<br/>
Securing SQL server : protecting your database from attackers
ent://SD_ILS/0/SD_ILS:2290991
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Cherry, Denny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496254">https://learning.oreilly.com/library/view/~/9781597496254</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496254/?ar">https://learning.oreilly.com/library/view/~/9781597496254/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496254/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496254/?ar</a><br/>Format: Electronic Resources<br/>
Programming Windows Identity Foundation
ent://SD_ILS/0/SD_ILS:2290015
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Bertocci, Vittorio.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735652040/?ar">https://go.oreilly.com/library-access/library/view/-/9780735652040/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735652040/?ar">https://learning.oreilly.com/library/view/~/9780735652040/?ar</a><br/>Format: Electronic Resources<br/>
Hacking exposed : web applications : web application security secrets and solutions
ent://SD_ILS/0/SD_ILS:2290273
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Scambray, Joel.<br/><a href="https://learning.oreilly.com/library/view/~/9780071740647/?ar">https://learning.oreilly.com/library/view/~/9780071740647/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar">https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar</a><br/>Format: Electronic Resources<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:2290821
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Harper, Allen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071742559/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742559/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071742559/?ar">https://learning.oreilly.com/library/view/~/9780071742559/?ar</a><br/>Format: Electronic Resources<br/>
Honeypot : a new paradigm to information security
ent://SD_ILS/0/SD_ILS:2292506
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Joshi, R. C.<br/><a href="https://learning.oreilly.com/library/view/~/9781578087082">https://learning.oreilly.com/library/view/~/9781578087082</a>
<a href="https://learning.oreilly.com/library/view/~/9781578087082/?ar">https://learning.oreilly.com/library/view/~/9781578087082/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar">https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar</a><br/>Format: Electronic Resources<br/>
Official (ISC)2 guide to the CSSLP
ent://SD_ILS/0/SD_ILS:2292921
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Paul, Mano.<br/><a href="https://learning.oreilly.com/library/view/~/9781439826058/?ar">https://learning.oreilly.com/library/view/~/9781439826058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439826058/?ar">https://go.oreilly.com/library-access/library/view/-/9781439826058/?ar</a><br/>Format: Electronic Resources<br/>
Applied Oracle security : developing secure database and middleware environments
ent://SD_ILS/0/SD_ILS:2287303
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Knox, David (David C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar">https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071613705/?ar">https://learning.oreilly.com/library/view/~/9780071613705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071613705">https://learning.oreilly.com/library/view/~/9780071613705</a><br/>Format: Electronic Resources<br/>
Mac Security Bible.
ent://SD_ILS/0/SD_ILS:2287722
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Kissell, Joe.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar">https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198/?ar">https://learning.oreilly.com/library/view/~/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198">https://learning.oreilly.com/library/view/~/9780470474198</a><br/>Format: Electronic Resources<br/>
24 deadly sins of software security : programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:2287176
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780071626750/?ar">https://learning.oreilly.com/library/view/~/9780071626750/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar">https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071626750">https://learning.oreilly.com/library/view/~/9780071626750</a><br/>Format: Electronic Resources<br/>
Secure and resilient software development
ent://SD_ILS/0/SD_ILS:2289816
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Merkow, Mark S.<br/><a href="https://learning.oreilly.com/library/view/~/9781439826973/?ar">https://learning.oreilly.com/library/view/~/9781439826973/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar">https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar</a><br/>Format: Electronic Resources<br/>
IT induction and information security awareness : a pocket guide
ent://SD_ILS/0/SD_ILS:2292243
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Maddock, Valerie.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281195">https://learning.oreilly.com/library/view/~/9781849281195</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281195/?ar">https://learning.oreilly.com/library/view/~/9781849281195/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2287972
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar">https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470550939/?ar">https://learning.oreilly.com/library/view/~/9780470550939/?ar</a><br/>Format: Electronic Resources<br/>
Cloud Security and Governance : Who's on your cloud?.
ent://SD_ILS/0/SD_ILS:2290671
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Blount, Sumner.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280983">https://learning.oreilly.com/library/view/~/9781849280983</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280983/?ar">https://learning.oreilly.com/library/view/~/9781849280983/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar</a><br/>Format: Electronic Resources<br/>
Computer forensics : a pocket guide
ent://SD_ILS/0/SD_ILS:2289616
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format: Electronic Resources<br/>
Managing Information Security Breaches : Studies from Real Life.
ent://SD_ILS/0/SD_ILS:2290674
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format: Electronic Resources<br/>
E-mail Security : a Pocket Guide.
ent://SD_ILS/0/SD_ILS:2290676
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Furnell, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280976">https://learning.oreilly.com/library/view/~/9781849280976</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280976/?ar">https://learning.oreilly.com/library/view/~/9781849280976/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar</a><br/>Format: Electronic Resources<br/>
Enterprise Mac security : MAC OS X Snow Leopard
ent://SD_ILS/0/SD_ILS:2290421
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Edge, Charles S., Jr.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar">https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430227304/?ar">https://learning.oreilly.com/library/view/~/9781430227304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430227304">https://learning.oreilly.com/library/view/~/9781430227304</a><br/>Format: Electronic Resources<br/>
IT Governance to Drive High Performance : Lessons from Accenture.
ent://SD_ILS/0/SD_ILS:2288636
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Kress, Robert E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281188/?ar">https://learning.oreilly.com/library/view/~/9781849281188/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281188">https://learning.oreilly.com/library/view/~/9781849281188</a><br/>Format: Electronic Resources<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:2288720
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Haines, Brad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417/?ar">https://learning.oreilly.com/library/view/~/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417">https://learning.oreilly.com/library/view/~/9781597495417</a><br/>Format: Electronic Resources<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:2288721
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Anderson, Brian (Brian James)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547/?ar">https://learning.oreilly.com/library/view/~/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547">https://learning.oreilly.com/library/view/~/9781597495547</a><br/>Format: Electronic Resources<br/>
Cloud security : a comprehensive guide to secure cloud computing
ent://SD_ILS/0/SD_ILS:2289708
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Krutz, Ronald L., 1938-<br/><a href="https://learning.oreilly.com/library/view/~/9780470589878/?ar">https://learning.oreilly.com/library/view/~/9780470589878/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar">https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470589878">https://learning.oreilly.com/library/view/~/9780470589878</a><br/>Format: Electronic Resources<br/>
How to secure and audit Oracle 10g and 11g
ent://SD_ILS/0/SD_ILS:2286324
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Ben-Natan, Ron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar">https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139/?ar">https://learning.oreilly.com/library/view/~/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139">https://learning.oreilly.com/library/view/~/9781420084139</a><br/>Format: Electronic Resources<br/>
The Mac hacker's handbook
ent://SD_ILS/0/SD_ILS:2286341
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Miller, Charles, 1951-<br/><a href="https://learning.oreilly.com/library/view/~/9781118080337/?ar">https://learning.oreilly.com/library/view/~/9781118080337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118080337/?ar">https://go.oreilly.com/library-access/library/view/-/9781118080337/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118080337">https://learning.oreilly.com/library/view/~/9781118080337</a><br/>Format: Electronic Resources<br/>
Mac OS X, iPod, and iPhone forensic analysis DVD toolkit
ent://SD_ILS/0/SD_ILS:2287201
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Kubasiak, Ryan R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080949185/?ar">https://learning.oreilly.com/library/view/~/9780080949185/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080949185">https://learning.oreilly.com/library/view/~/9780080949185</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar">https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar</a><br/>Format: Electronic Resources<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:2286804
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a>
<a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security and privacy
ent://SD_ILS/0/SD_ILS:2287451
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Mather, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806453/?ar">https://learning.oreilly.com/library/view/~/9780596806453/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596806453">https://learning.oreilly.com/library/view/~/9780596806453</a><br/>Format: Electronic Resources<br/>
Security testing handbook for banking applications
ent://SD_ILS/0/SD_ILS:2288620
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Doraiswamy, Arvind.<br/><a href="https://learning.oreilly.com/library/view/~/9781905356829/?ar">https://learning.oreilly.com/library/view/~/9781905356829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356829/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281089">https://learning.oreilly.com/library/view/~/9781849281089</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356829">https://learning.oreilly.com/library/view/~/9781905356829</a><br/>Format: Electronic Resources<br/>
Gray hat Python : Python programming for hackers and reverse engineers
ent://SD_ILS/0/SD_ILS:2287862
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Seitz, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/9781593271923">https://learning.oreilly.com/library/view/~/9781593271923</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593271923/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271923/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593271923/?ar">https://learning.oreilly.com/library/view/~/9781593271923/?ar</a><br/>Format: Electronic Resources<br/>
Beautiful security
ent://SD_ILS/0/SD_ILS:2286888
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Oram, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780596801786/?ar">https://learning.oreilly.com/library/view/~/9780596801786/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596801786">https://learning.oreilly.com/library/view/~/9780596801786</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar">https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar</a><br/>Format: Electronic Resources<br/>
Next generation SSH2 implementation : securing data in motion
ent://SD_ILS/0/SD_ILS:2285986
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format: Electronic Resources<br/>
The myths of security : what the computer security industry doesn't want you to know
ent://SD_ILS/0/SD_ILS:2286938
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Viega, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar">https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596803957/?ar">https://learning.oreilly.com/library/view/~/9780596803957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596803957">https://learning.oreilly.com/library/view/~/9780596803957</a><br/>Format: Electronic Resources<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:2284222
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Harris, Shon.<br/><a href="https://learning.oreilly.com/library/view/~/9780071495684/?ar">https://learning.oreilly.com/library/view/~/9780071495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar">https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft forefront security administration guide
ent://SD_ILS/0/SD_ILS:2284517
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Varsalone, Jesse.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492447">https://learning.oreilly.com/library/view/~/9781597492447</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492447/?ar">https://learning.oreilly.com/library/view/~/9781597492447/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar</a><br/>Format: Electronic Resources<br/>
OS X exploits and defense
ent://SD_ILS/0/SD_ILS:2285157
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Baccas, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492546/?ar">https://learning.oreilly.com/library/view/~/9781597492546/?ar</a><br/>Format: Electronic Resources<br/>
OSSEC host-based intrusion detection guide
ent://SD_ILS/0/SD_ILS:2285140
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Hay, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492409">https://learning.oreilly.com/library/view/~/9781597492409</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492409/?ar">https://learning.oreilly.com/library/view/~/9781597492409/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar</a><br/>Format: Electronic Resources<br/>
Securing Windows server 2008 : prevent attacks from outside and inside your organization.
ent://SD_ILS/0/SD_ILS:2285141
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
<a href="https://learning.oreilly.com/library/view/~/9781597492805">https://learning.oreilly.com/library/view/~/9781597492805</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492805/?ar">https://learning.oreilly.com/library/view/~/9781597492805/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar</a><br/>Format: Electronic Resources<br/>
Scene of the cybercrime.
ent://SD_ILS/0/SD_ILS:2285149
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492768">https://learning.oreilly.com/library/view/~/9781597492768</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492768/?ar">https://learning.oreilly.com/library/view/~/9781597492768/?ar</a><br/>Format: Electronic Resources<br/>
Computer forensics for dummies
ent://SD_ILS/0/SD_ILS:2285672
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Volonino, Linda.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470371916/?ar">https://learning.oreilly.com/library/view/~/9780470371916/?ar</a><br/>Format: Electronic Resources<br/>
No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing
ent://SD_ILS/0/SD_ILS:2285143
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Long, Johnny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492157/?ar">https://learning.oreilly.com/library/view/~/9781597492157/?ar</a><br/>Format: Electronic Resources<br/>
Hacking : the art of exploitation
ent://SD_ILS/0/SD_ILS:2287983
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Erickson, Jon, 1977-<br/><a href="https://learning.oreilly.com/library/view/~/9781593271442">https://learning.oreilly.com/library/view/~/9781593271442</a>
<a href="https://learning.oreilly.com/library/view/~/9781593271442/?ar">https://learning.oreilly.com/library/view/~/9781593271442/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar</a><br/>Format: Electronic Resources<br/>
Infosecurity 2008 threat analysis
ent://SD_ILS/0/SD_ILS:2285226
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Clark, Champ, III.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492249">https://learning.oreilly.com/library/view/~/9781597492249</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492249/?ar">https://learning.oreilly.com/library/view/~/9781597492249/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar</a><br/>Format: Electronic Resources<br/>
The web application hacker's handbook : discovering and exploiting security flaws
ent://SD_ILS/0/SD_ILS:2288534
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Stuttard, Dafydd, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470170779/?ar">https://learning.oreilly.com/library/view/~/9780470170779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar">https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470170779">https://learning.oreilly.com/library/view/~/9780470170779</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2282490
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format: Electronic Resources<br/>
Computer security and cryptography
ent://SD_ILS/0/SD_ILS:2283057
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Konheim, Alan G., 1934-<br/><a href="https://learning.oreilly.com/library/view/~/9780471947837">https://learning.oreilly.com/library/view/~/9780471947837</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar">https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780471947837/?ar">https://learning.oreilly.com/library/view/~/9780471947837/?ar</a><br/>Format: Electronic Resources<br/>
WarDriving & wireless penetration testing
ent://SD_ILS/0/SD_ILS:2282518
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Hurley, Chris.<br/><a href="https://www.sciencedirect.com/science/book/9781597491112">https://www.sciencedirect.com/science/book/9781597491112</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491112">https://learning.oreilly.com/library/view/~/9781597491112</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491112/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491112/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491112/?ar">https://learning.oreilly.com/library/view/~/9781597491112/?ar</a><br/>Format: Electronic Resources<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:2282873
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597490610">https://learning.oreilly.com/library/view/~/9781597490610</a>
<a href="https://www.sciencedirect.com/science/book/9781597490610">https://www.sciencedirect.com/science/book/9781597490610</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490610/?ar">https://learning.oreilly.com/library/view/~/9781597490610/?ar</a><br/>Format: Electronic Resources<br/>
The shellcoder's handbook : discovering and exploiting security holes
ent://SD_ILS/0/SD_ILS:2283852
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Anley, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780470080238">https://learning.oreilly.com/library/view/~/9780470080238</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar">https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470080238/?ar">https://learning.oreilly.com/library/view/~/9780470080238/?ar</a><br/>Format: Electronic Resources<br/>
Web application vulnerabilities : detect, exploit, prevent
ent://SD_ILS/0/SD_ILS:2285642
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492096/?ar">https://learning.oreilly.com/library/view/~/9781597492096/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492096/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492096/?ar</a><br/>Format: Electronic Resources<br/>
Zen and the art of information security
ent://SD_ILS/0/SD_ILS:2283974
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Winkler, Ira.<br/><a href="https://learning.oreilly.com/library/view/~/9780080554747">https://learning.oreilly.com/library/view/~/9780080554747</a>
<a href="https://learning.oreilly.com/library/view/~/9780080554747/?ar">https://learning.oreilly.com/library/view/~/9780080554747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080554747/?ar">https://go.oreilly.com/library-access/library/view/-/9780080554747/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>
How to cheat at securing your network
ent://SD_ILS/0/SD_ILS:2284630
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Dubrawsky, Ido.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317/?ar">https://learning.oreilly.com/library/view/~/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317">https://learning.oreilly.com/library/view/~/9781597492317</a><br/>Format: Electronic Resources<br/>
Security power tools
ent://SD_ILS/0/SD_ILS:2283951
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Burns, Bryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780596009632">https://learning.oreilly.com/library/view/~/9780596009632</a>
<a href="https://learning.oreilly.com/library/view/~/9780596009632/?ar">https://learning.oreilly.com/library/view/~/9780596009632/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar">https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar</a><br/>Format: Electronic Resources<br/>
Metasploit toolkit for penetration testing, exploit development, and vulnerability research
ent://SD_ILS/0/SD_ILS:2284167
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Maynor, David.<br/><a href="https://www.sciencedirect.com/science/book/9781597490740">https://www.sciencedirect.com/science/book/9781597490740</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490740/?ar">https://learning.oreilly.com/library/view/~/9781597490740/?ar</a><br/>Format: Electronic Resources<br/>
Snort : IDS and IPS toolkit
ent://SD_ILS/0/SD_ILS:2289130
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Beale, Jay.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490993/?ar">https://learning.oreilly.com/library/view/~/9781597490993/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Electronic Resources<br/>
Botnets : the killer web app
ent://SD_ILS/0/SD_ILS:2283565
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Schiller, Craig A.<br/><a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491358/?ar">https://learning.oreilly.com/library/view/~/9781597491358/?ar</a><br/>Format: Electronic Resources<br/>
The security development lifecycle : SDL, a process for developing demonstrably more secure software
ent://SD_ILS/0/SD_ILS:2282462
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/0735622140">https://learning.oreilly.com/library/view/~/0735622140</a>
<a href="https://learning.oreilly.com/library/view/~/0735622140/?ar">https://learning.oreilly.com/library/view/~/0735622140/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0735622140/?ar">https://go.oreilly.com/library-access/library/view/-/0735622140/?ar</a><br/>Format: Electronic Resources<br/>
Insider threat : protecting the enterprise from sabotage, spying, and theft
ent://SD_ILS/0/SD_ILS:2281991
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490481">https://learning.oreilly.com/library/view/~/9781597490481</a>
<a href="https://www.sciencedirect.com/science/book/9781597490481">https://www.sciencedirect.com/science/book/9781597490481</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490481/?ar">https://learning.oreilly.com/library/view/~/9781597490481/?ar</a><br/>Format: Electronic Resources<br/>
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
ent://SD_ILS/0/SD_ILS:2284090
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Contos, Brian T.<br/><a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491297">https://learning.oreilly.com/library/view/~/9781597491297</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491297/?ar">https://learning.oreilly.com/library/view/~/9781597491297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491297/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491297/?ar</a><br/>Format: Electronic Resources<br/>
Combating spyware in the enterprise
ent://SD_ILS/0/SD_ILS:2287800
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Baskin, Brian.<br/><a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490641/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490641/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490641/?ar">https://learning.oreilly.com/library/view/~/9781597490641/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490641">https://learning.oreilly.com/library/view/~/9781597490641</a><br/>Format: Electronic Resources<br/>
Internet forensics
ent://SD_ILS/0/SD_ILS:2282055
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Jones, Robert, 1957 July 15-<br/><a href="https://learning.oreilly.com/library/view/~/059610006X">https://learning.oreilly.com/library/view/~/059610006X</a>
<a href="https://learning.oreilly.com/library/view/~/059610006X/?ar">https://learning.oreilly.com/library/view/~/059610006X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/059610006X/?ar">https://go.oreilly.com/library-access/library/view/-/059610006X/?ar</a><br/>Format: Electronic Resources<br/>
Network security hacks
ent://SD_ILS/0/SD_ILS:2282983
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596527632/?ar">https://go.oreilly.com/library-access/library/view/-/0596527632/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596527632">https://learning.oreilly.com/library/view/~/0596527632</a>
<a href="https://learning.oreilly.com/library/view/~/0596527632/?ar">https://learning.oreilly.com/library/view/~/0596527632/?ar</a><br/>Format: Electronic Resources<br/>
Snort cookbook
ent://SD_ILS/0/SD_ILS:2282585
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/0596007914">https://learning.oreilly.com/library/view/~/0596007914</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596007914/?ar">https://go.oreilly.com/library-access/library/view/-/0596007914/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007914/?ar">https://learning.oreilly.com/library/view/~/0596007914/?ar</a><br/>Format: Electronic Resources<br/>
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
ent://SD_ILS/0/SD_ILS:2282685
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Foster, James C.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490054/?ar">https://learning.oreilly.com/library/view/~/9781597490054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490054/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490054/?ar</a><br/>Format: Electronic Resources<br/>
Linux server security
ent://SD_ILS/0/SD_ILS:2281596
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Bauer, Michael D.<br/><a href="https://learning.oreilly.com/library/view/~/0596006705">https://learning.oreilly.com/library/view/~/0596006705</a>
<a href="https://learning.oreilly.com/library/view/~/0596006705/?ar">https://learning.oreilly.com/library/view/~/0596006705/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006705/?ar">https://go.oreilly.com/library-access/library/view/-/0596006705/?ar</a><br/>Format: Electronic Resources<br/>
The database hacker's handbook : defending database servers
ent://SD_ILS/0/SD_ILS:2282264
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Litchfield, David, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780764578014/?ar">https://learning.oreilly.com/library/view/~/9780764578014/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar">https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764578014">https://learning.oreilly.com/library/view/~/9780764578014</a><br/>Format: Electronic Resources<br/>
The art of intrusion the real stories behind the exploits of hackers, intruders & deceivers
ent://SD_ILS/0/SD_ILS:334708
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Mitnick, Kevin D. (Kevin David), 1963-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892</a><br/>Format: Electronic Resources<br/>
Mastering FreeBSD and OpenBSD security
ent://SD_ILS/0/SD_ILS:2289327
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Korff, Yanek.<br/><a href="https://learning.oreilly.com/library/view/~/0596006268">https://learning.oreilly.com/library/view/~/0596006268</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006268/?ar">https://go.oreilly.com/library-access/library/view/-/0596006268/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006268/?ar">https://learning.oreilly.com/library/view/~/0596006268/?ar</a><br/>Format: Electronic Resources<br/>
Cryptography in C and C++
ent://SD_ILS/0/SD_ILS:2282126
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Welschenbach, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781590595022">https://learning.oreilly.com/library/view/~/9781590595022</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781590595022/?ar">https://go.oreilly.com/library-access/library/view/-/9781590595022/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781590595022/?ar">https://learning.oreilly.com/library/view/~/9781590595022/?ar</a><br/>Format: Electronic Resources<br/>
The art of intrusion : the real stories behind the exploits of hackers, intruders & deceivers
ent://SD_ILS/0/SD_ILS:2281569
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Mitnick, Kevin D. (Kevin David), 1963-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar">https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470503829/?ar">https://learning.oreilly.com/library/view/~/9780470503829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470503829">https://learning.oreilly.com/library/view/~/9780470503829</a><br/>Format: Electronic Resources<br/>
Aggressive network self-defense
ent://SD_ILS/0/SD_ILS:2282271
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Wyler, Neil R.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836203">https://learning.oreilly.com/library/view/~/9781931836203</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836203/?ar">https://learning.oreilly.com/library/view/~/9781931836203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836203/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836203/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781931836203">https://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Electronic Resources<br/>
Silence on the wire : a field guide to passive reconnaissance and indirect attacks
ent://SD_ILS/0/SD_ILS:2287377
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Zalewski, Michal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1593270461/?ar">https://go.oreilly.com/library-access/library/view/-/1593270461/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1593270461/?ar">https://learning.oreilly.com/library/view/~/1593270461/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1593270461">https://learning.oreilly.com/library/view/~/1593270461</a><br/>Format: Electronic Resources<br/>
Managing security with Snort and IDS tools
ent://SD_ILS/0/SD_ILS:2291450
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Cox, Kerry.<br/><a href="https://learning.oreilly.com/library/view/~/0596006616">https://learning.oreilly.com/library/view/~/0596006616</a>
<a href="https://learning.oreilly.com/library/view/~/0596006616/?ar">https://learning.oreilly.com/library/view/~/0596006616/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006616/?ar">https://go.oreilly.com/library-access/library/view/-/0596006616/?ar</a><br/>Format: Electronic Resources<br/>
HP Nonstop server security : a practical handbook
ent://SD_ILS/0/SD_ILS:2281922
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Hill, Terri.<br/><a href="https://learning.oreilly.com/library/view/~/9781555583149">https://learning.oreilly.com/library/view/~/9781555583149</a>
<a href="https://learning.oreilly.com/library/view/~/9781555583149/?ar">https://learning.oreilly.com/library/view/~/9781555583149/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781555583149/?ar">https://go.oreilly.com/library-access/library/view/-/9781555583149/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781555583149">https://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Electronic Resources<br/>
Practical UNIX and Internet security
ent://SD_ILS/0/SD_ILS:2281256
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596003234">https://learning.oreilly.com/library/view/~/0596003234</a>
<a href="https://learning.oreilly.com/library/view/~/0596003234/?ar">https://learning.oreilly.com/library/view/~/0596003234/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596003234/?ar">https://go.oreilly.com/library-access/library/view/-/0596003234/?ar</a><br/>Format: Electronic Resources<br/>
Incident response & computer forensics
ent://SD_ILS/0/SD_ILS:2280958
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Prosise, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780072226966">https://learning.oreilly.com/library/view/~/9780072226966</a>
<a href="https://learning.oreilly.com/library/view/~/9780072226966/?ar">https://learning.oreilly.com/library/view/~/9780072226966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar">https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar</a><br/>Format: Electronic Resources<br/>
Security for Microsoft Visual Basic .NET
ent://SD_ILS/0/SD_ILS:2281971
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Robinson, Ed, 1967-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735619190/?ar">https://go.oreilly.com/library-access/library/view/-/0735619190/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735619190/?ar">https://learning.oreilly.com/library/view/~/0735619190/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735619190">https://learning.oreilly.com/library/view/~/0735619190</a><br/>Format: Electronic Resources<br/>
Intrusion detection with Snort
ent://SD_ILS/0/SD_ILS:2281704
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/157870281X">https://learning.oreilly.com/library/view/~/157870281X</a>
<a href="https://learning.oreilly.com/library/view/~/157870281X/?ar">https://learning.oreilly.com/library/view/~/157870281X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/157870281X/?ar">https://go.oreilly.com/library-access/library/view/-/157870281X/?ar</a><br/>Format: Electronic Resources<br/>
Mastering network security
ent://SD_ILS/0/SD_ILS:2287799
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Brenton, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar">https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780782141429/?ar">https://learning.oreilly.com/library/view/~/9780782141429/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780782141429">https://learning.oreilly.com/library/view/~/9780782141429</a><br/>Format: Electronic Resources<br/>
Hack proofing your network
ent://SD_ILS/0/SD_ILS:2280760
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Ahmad, David R. Mirza.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994701">https://learning.oreilly.com/library/view/~/9781928994701</a>
<a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994701/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994701/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781928994701/?ar">https://learning.oreilly.com/library/view/~/9781928994701/?ar</a><br/>Format: Electronic Resources<br/>
Privacy defended : protecting yourself online
ent://SD_ILS/0/SD_ILS:2280776
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Bahadur, Gary.<br/><a href="https://learning.oreilly.com/library/view/~/078972605X">https://learning.oreilly.com/library/view/~/078972605X</a>
<a href="https://learning.oreilly.com/library/view/~/078972605X/?ar">https://learning.oreilly.com/library/view/~/078972605X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/078972605X/?ar">https://go.oreilly.com/library-access/library/view/-/078972605X/?ar</a><br/>Format: Electronic Resources<br/>
Building an information security awareness program
ent://SD_ILS/0/SD_ILS:2281782
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Desman, Mark B.<br/><a href="https://learning.oreilly.com/library/view/~/9781420000054">https://learning.oreilly.com/library/view/~/9781420000054</a>
<a href="https://learning.oreilly.com/library/view/~/9781420000054/?ar">https://learning.oreilly.com/library/view/~/9781420000054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar">https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar</a><br/>Format: Electronic Resources<br/>
The art of deception : controlling the human element of security
ent://SD_ILS/0/SD_ILS:2280746
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780764542800/?ar">https://learning.oreilly.com/library/view/~/9780764542800/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780764542800/?ar">https://go.oreilly.com/library-access/library/view/-/9780764542800/?ar</a><br/>Format: Electronic Resources<br/>
Java security
ent://SD_ILS/0/SD_ILS:2286384
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Oaks, Scott.<br/><a href="https://learning.oreilly.com/library/view/~/0596001576/?ar">https://learning.oreilly.com/library/view/~/0596001576/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596001576">https://learning.oreilly.com/library/view/~/0596001576</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596001576/?ar">https://go.oreilly.com/library-access/library/view/-/0596001576/?ar</a><br/>Format: Electronic Resources<br/>
Java security handbook
ent://SD_ILS/0/SD_ILS:2281327
2024-09-22T19:49:24Z
2024-09-22T19:49:24Z
by Jaworski, Jamie.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672316021/?ar">https://go.oreilly.com/library-access/library/view/-/0672316021/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672316021">https://learning.oreilly.com/library/view/~/0672316021</a>
<a href="https://learning.oreilly.com/library/view/~/0672316021/?ar">https://learning.oreilly.com/library/view/~/0672316021/?ar</a><br/>Format: Electronic Resources<br/>