Search Results for - Narrowed by: Computer Security - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bSecurity$002509Computer$002bSecurity$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2024-09-25T08:15:47ZDesigning secure software : a guide for developersent://SD_ILS/0/SD_ILS:23295942024-09-25T08:15:47Z2024-09-25T08:15:47Zby Kohnfelder, Loren, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129804/?ar">https://learning.oreilly.com/library/view/~/9781098129804/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129804">https://learning.oreilly.com/library/view/~/9781098129804</a><br/>Format: Electronic Resources<br/>Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptionsent://SD_ILS/0/SD_ILS:23297992024-09-25T08:15:47Z2024-09-25T08:15:47Zby Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format: Electronic Resources<br/>Cybersecurity leadership demystified : a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISOent://SD_ILS/0/SD_ILS:23314682024-09-25T08:15:47Z2024-09-25T08:15:47Zby Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801819282/?ar">https://go.oreilly.com/library-access/library/view/-/9781801819282/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801819282/?ar">https://learning.oreilly.com/library/view/~/9781801819282/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801819282">https://learning.oreilly.com/library/view/~/9781801819282</a><br/>Format: Electronic Resources<br/>Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response.ent://SD_ILS/0/SD_ILS:23314912024-09-25T08:15:47Z2024-09-25T08:15:47Zby Hettema, Hinne.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512/?ar">https://learning.oreilly.com/library/view/~/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512">https://learning.oreilly.com/library/view/~/9781801815512</a><br/>Format: Electronic Resources<br/>Threat Intelligence and threat huntingent://SD_ILS/0/SD_ILS:23317792024-09-25T08:15:47Z2024-09-25T08:15:47Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137896301/?ar">https://learning.oreilly.com/videos/~/9780137896301/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar">https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137896301">https://learning.oreilly.com/videos/~/9780137896301</a><br/>Format: Video recording<br/>A hybrid cloud cyber security solution using IBM Spectrum Virtualize for public cloud on Azure and IBM Spectrum Virtualize safeguarded copy.ent://SD_ILS/0/SD_ILS:23317052024-09-25T08:15:47Z2024-09-25T08:15:47Z<a href="https://learning.oreilly.com/library/view/~/9780738460345/?ar">https://learning.oreilly.com/library/view/~/9780738460345/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460345">https://learning.oreilly.com/library/view/~/9780738460345</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar</a><br/>Format: Electronic Resources<br/>CEH Certified Ethical Hacker Cert guideent://SD_ILS/0/SD_ILS:23316212024-09-25T08:15:47Z2024-09-25T08:15:47Zby Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format: Electronic Resources<br/>Case study : how Tools & Solutions survived a ransomware attack.ent://SD_ILS/0/SD_ILS:23323642024-09-25T08:15:47Z2024-09-25T08:15:47Zby Majumdar, Partha, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar">https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0636920673859">https://learning.oreilly.com/library/view/~/0636920673859</a>
<a href="https://learning.oreilly.com/library/view/~/0636920673859/?ar">https://learning.oreilly.com/library/view/~/0636920673859/?ar</a><br/>Format: Video recording<br/>Snowflake access control : mastering the features for data privacy and regulatory complianceent://SD_ILS/0/SD_ILS:23319072024-09-25T08:15:47Z2024-09-25T08:15:47Zby Larson, Jessica Megan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484280386">https://learning.oreilly.com/library/view/~/9781484280386</a>
<a href="https://learning.oreilly.com/library/view/~/9781484280386/?ar">https://learning.oreilly.com/library/view/~/9781484280386/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar">https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar</a><br/>Format: Electronic Resources<br/>Cloud security handbook : find out how to effectively secure cloud environments using AWS, Azure, and GCPent://SD_ILS/0/SD_ILS:23324812024-09-25T08:15:47Z2024-09-25T08:15:47Zby Estrin, Eyal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800569195">https://learning.oreilly.com/library/view/~/9781800569195</a>
<a href="https://learning.oreilly.com/library/view/~/9781800569195/?ar">https://learning.oreilly.com/library/view/~/9781800569195/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar">https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar</a><br/>Format: Electronic Resources<br/>Threat modeling with Owasp Threat Dragon & risk rating a vulnerability.ent://SD_ILS/0/SD_ILS:23325992024-09-25T08:15:47Z2024-09-25T08:15:47Zby Fisher, Derek, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202248/?ar">https://learning.oreilly.com/videos/~/10000MNHV202248/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202248">https://learning.oreilly.com/videos/~/10000MNHV202248</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar</a><br/>Format: Video recording<br/>Navigating the cybersecurity career pathent://SD_ILS/0/SD_ILS:23308362024-09-25T08:15:47Z2024-09-25T08:15:47Zby Patton, Helen E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119833420">https://learning.oreilly.com/library/view/~/9781119833420</a>
<a href="https://learning.oreilly.com/library/view/~/9781119833420/?ar">https://learning.oreilly.com/library/view/~/9781119833420/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar">https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar</a><br/>Format: Electronic Resources<br/>Mastering Defensive Security : Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure.ent://SD_ILS/0/SD_ILS:23308412024-09-25T08:15:47Z2024-09-25T08:15:47Zby Bravo, Cesar.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar">https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800208162/?ar">https://learning.oreilly.com/library/view/~/9781800208162/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800208162">https://learning.oreilly.com/library/view/~/9781800208162</a><br/>Format: Electronic Resources<br/>Python for cybersecurity : using Python for cyber offense and defenseent://SD_ILS/0/SD_ILS:23315742024-09-25T08:15:47Z2024-09-25T08:15:47Zby Poston, Howard E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar">https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649/?ar">https://learning.oreilly.com/library/view/~/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649">https://learning.oreilly.com/library/view/~/9781119850649</a><br/>Format: Electronic Resources<br/>System and privacy data protection.ent://SD_ILS/0/SD_ILS:23317772024-09-25T08:15:47Z2024-09-25T08:15:47Zby Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a>
<a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format: Video recording<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:23316942024-09-25T08:15:47Z2024-09-25T08:15:47Zby Harper, Allen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar">https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781264268955/?ar">https://learning.oreilly.com/library/view/~/9781264268955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781264268955">https://learning.oreilly.com/library/view/~/9781264268955</a><br/>Format: Electronic Resources<br/>Making sense of application security.ent://SD_ILS/0/SD_ILS:23323632024-09-25T08:15:47Z2024-09-25T08:15:47Zby Saikali, Adib, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202229">https://learning.oreilly.com/videos/~/10000MNHV202229</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202229/?ar">https://learning.oreilly.com/videos/~/10000MNHV202229/?ar</a><br/>Format: Video recording<br/>Security Observability with eBPFent://SD_ILS/0/SD_ILS:23325762024-09-25T08:15:47Z2024-09-25T08:15:47Zby Salazar, Jed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492096719">https://learning.oreilly.com/library/view/~/9781492096719</a>
<a href="https://learning.oreilly.com/library/view/~/9781492096719/?ar">https://learning.oreilly.com/library/view/~/9781492096719/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar">https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar</a><br/>Format: Electronic Resources<br/>Finding your cyber security path.ent://SD_ILS/0/SD_ILS:23327012024-09-25T08:15:47Z2024-09-25T08:15:47Zby Miller, Alyssa, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202258">https://learning.oreilly.com/videos/~/10000MNHV202258</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202258/?ar">https://learning.oreilly.com/videos/~/10000MNHV202258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar</a><br/>Format: Video recording<br/>Snowflake security : securing your Snowflake data cloudent://SD_ILS/0/SD_ILS:23302612024-09-25T08:15:47Z2024-09-25T08:15:47Zby Herzberg, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484273890">https://learning.oreilly.com/library/view/~/9781484273890</a>
<a href="https://learning.oreilly.com/library/view/~/9781484273890/?ar">https://learning.oreilly.com/library/view/~/9781484273890/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar">https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar</a><br/>Format: Electronic Resources<br/>Trust in computer systems and the cloudent://SD_ILS/0/SD_ILS:23308502024-09-25T08:15:47Z2024-09-25T08:15:47Zby Bursell, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119692324/?ar">https://learning.oreilly.com/library/view/~/9781119692324/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar">https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119692324">https://learning.oreilly.com/library/view/~/9781119692324</a><br/>Format: Electronic Resources<br/>Fight fire with fire : proactive cybersecurity strategies for today's leadersent://SD_ILS/0/SD_ILS:23309142024-09-25T08:15:47Z2024-09-25T08:15:47Zby Tarun, Renee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119854265/?ar">https://learning.oreilly.com/library/view/~/9781119854265/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119854265">https://learning.oreilly.com/library/view/~/9781119854265</a><br/>Format: Electronic Resources<br/>The CISO evolution : business knowledge for cybersecurity executivesent://SD_ILS/0/SD_ILS:23301022024-09-25T08:15:47Z2024-09-25T08:15:47Zby Sharp, Matthew K., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar">https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119782483/?ar">https://learning.oreilly.com/library/view/~/9781119782483/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119782483">https://learning.oreilly.com/library/view/~/9781119782483</a><br/>Format: Electronic Resources<br/>Hacking : der umfassende Praxis-Guide : inkl. Prüfungsvorbereitung zum CEHv11ent://SD_ILS/0/SD_ILS:23316832024-09-25T08:15:47Z2024-09-25T08:15:47Zby Amberg, Eric, author<br/><a href="https://learning.oreilly.com/library/view/~/9783747504840">https://learning.oreilly.com/library/view/~/9783747504840</a>
<a href="https://learning.oreilly.com/library/view/~/9783747504840/?ar">https://learning.oreilly.com/library/view/~/9783747504840/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar">https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar</a><br/>Format: Electronic Resources<br/>IBM Spectrum Virtualize, IBM FlashSystem, and IBM SAN volume controller security feature checklistent://SD_ILS/0/SD_ILS:23323722024-09-25T08:15:47Z2024-09-25T08:15:47Zby Scales, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460437">https://learning.oreilly.com/library/view/~/9780738460437</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460437/?ar">https://learning.oreilly.com/library/view/~/9780738460437/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar</a><br/>Format: Electronic Resources<br/>Cloud security for dummiesent://SD_ILS/0/SD_ILS:23324972024-09-25T08:15:47Z2024-09-25T08:15:47Zby Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a>
<a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format: Electronic Resources<br/>Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory.ent://SD_ILS/0/SD_ILS:23317872024-09-25T08:15:47Z2024-09-25T08:15:47Zby Ostrovskaya, Svetlana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070331">https://learning.oreilly.com/library/view/~/9781801070331</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070331/?ar">https://learning.oreilly.com/library/view/~/9781801070331/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar</a><br/>Format: Electronic Resources<br/>Getting started with IBM Hyper Protect Data Controllerent://SD_ILS/0/SD_ILS:23314512024-09-25T08:15:47Z2024-09-25T08:15:47Zby White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format: Electronic Resources<br/>Container storage and data protection for applications on Kubernetesent://SD_ILS/0/SD_ILS:23325742024-09-25T08:15:47Z2024-09-25T08:15:47Zby Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127022/?ar">https://learning.oreilly.com/library/view/~/9781098127022/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127022">https://learning.oreilly.com/library/view/~/9781098127022</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar</a><br/>Format: Electronic Resources<br/>The cybersecurity playbook for modern enterprisesent://SD_ILS/0/SD_ILS:23323232024-09-25T08:15:47Z2024-09-25T08:15:47Zby Wittkop, Jeremy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639/?ar">https://learning.oreilly.com/library/view/~/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639">https://learning.oreilly.com/library/view/~/9781803248639</a><br/>Format: Electronic Resources<br/>Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10ent://SD_ILS/0/SD_ILS:23326172024-09-25T08:15:47Z2024-09-25T08:15:47Zby Nita, Stefania Loredana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484281055/?ar">https://learning.oreilly.com/library/view/~/9781484281055/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar">https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484281055">https://learning.oreilly.com/library/view/~/9781484281055</a><br/>Format: Electronic Resources<br/>The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and moreent://SD_ILS/0/SD_ILS:23326302024-09-25T08:15:47Z2024-09-25T08:15:47Zby Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format: Electronic Resources<br/>What is eBPF?ent://SD_ILS/0/SD_ILS:23326312024-09-25T08:15:47Z2024-09-25T08:15:47Zby Rice, Liz (Open Source engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492097266/?ar">https://learning.oreilly.com/library/view/~/9781492097266/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492097266">https://learning.oreilly.com/library/view/~/9781492097266</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar">https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar</a><br/>Format: Electronic Resources<br/>The security culture playbook : an executive guide to reducing risk and developing your human defense layerent://SD_ILS/0/SD_ILS:23324102024-09-25T08:15:47Z2024-09-25T08:15:47Zby Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119875239/?ar">https://learning.oreilly.com/library/view/~/9781119875239/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119875239">https://learning.oreilly.com/library/view/~/9781119875239</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar">https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar</a><br/>Format: Electronic Resources<br/>Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through thement://SD_ILS/0/SD_ILS:23324112024-09-25T08:15:47Z2024-09-25T08:15:47Zby Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format: Electronic Resources<br/>IT security controls : a guide to corporate standards and frameworksent://SD_ILS/0/SD_ILS:23324122024-09-25T08:15:47Z2024-09-25T08:15:47Zby Viegas, Virgilio, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484277997/?ar">https://learning.oreilly.com/library/view/~/9781484277997/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277997">https://learning.oreilly.com/library/view/~/9781484277997</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar</a><br/>Format: Electronic Resources<br/>Phishing and communication channels a guide to identifying and mitigating phishing attacksent://SD_ILS/0/SD_ILS:23310582024-09-25T08:15:47Z2024-09-25T08:15:47Zby Sonowal, Gunikhan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277447/?ar">https://learning.oreilly.com/library/view/~/9781484277447/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277447">https://learning.oreilly.com/library/view/~/9781484277447</a><br/>Format: Electronic Resources<br/>Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linuxent://SD_ILS/0/SD_ILS:23322652024-09-25T08:15:47Z2024-09-25T08:15:47Zby Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar">https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750/?ar">https://learning.oreilly.com/videos/~/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750">https://learning.oreilly.com/videos/~/9781803239750</a><br/>Format: Video recording<br/>WIRELESS SECURITY ARCHITECTURE designing and maintaining secure wireless for enterprise.ent://SD_ILS/0/SD_ILS:23319052024-09-25T08:15:47Z2024-09-25T08:15:47Zby MINELLA, JENNIFER.<br/><a href="https://learning.oreilly.com/library/view/~/9781119883050">https://learning.oreilly.com/library/view/~/9781119883050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119883050/?ar">https://go.oreilly.com/library-access/library/view/-/9781119883050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119883050/?ar">https://learning.oreilly.com/library/view/~/9781119883050/?ar</a><br/>Format: Electronic Resources<br/>Learn man in the middle attacks from scratch.ent://SD_ILS/0/SD_ILS:23322692024-09-25T08:15:47Z2024-09-25T08:15:47Zby Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar">https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245/?ar">https://learning.oreilly.com/videos/~/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245">https://learning.oreilly.com/videos/~/9781803243245</a><br/>Format: Video recording<br/>Shifting left for application security : bridging the divide between DevOps and security with the right security toolsent://SD_ILS/0/SD_ILS:23325752024-09-25T08:15:47Z2024-09-25T08:15:47Zby Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format: Electronic Resources<br/>Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadarent://SD_ILS/0/SD_ILS:23320572024-09-25T08:15:47Z2024-09-25T08:15:47Zby IBM Storage Team, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260/?ar">https://learning.oreilly.com/library/view/~/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260">https://learning.oreilly.com/library/view/~/9780738460260</a><br/>Format: Electronic Resources<br/>Ransomwareent://SD_ILS/0/SD_ILS:23327052024-09-25T08:15:47Z2024-09-25T08:15:47Zby Messdaghi, Chloé, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar">https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641/?ar">https://learning.oreilly.com/videos/~/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641">https://learning.oreilly.com/videos/~/0636920702641</a><br/>Format: Video recording<br/>Offensive shellcode from scratch : get to grips with shellcode countermeasures and discover how to bypass thement://SD_ILS/0/SD_ILS:23325372024-09-25T08:15:47Z2024-09-25T08:15:47Zby Pillay, Rishalin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar">https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803247427">https://learning.oreilly.com/library/view/~/9781803247427</a>
<a href="https://learning.oreilly.com/library/view/~/9781803247427/?ar">https://learning.oreilly.com/library/view/~/9781803247427/?ar</a><br/>Format: Electronic Resources<br/>Cyber security and network securityent://SD_ILS/0/SD_ILS:23325382024-09-25T08:15:47Z2024-09-25T08:15:47Zby Pramanik, Sabyasachi, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119812494">https://learning.oreilly.com/library/view/~/9781119812494</a>
<a href="https://learning.oreilly.com/library/view/~/9781119812494/?ar">https://learning.oreilly.com/library/view/~/9781119812494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar">https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar</a><br/>Format: Electronic Resources<br/>The CISO evolution : business knowledge for cybersecurity executivesent://SD_ILS/0/SD_ILS:23328572024-09-25T08:15:47Z2024-09-25T08:15:47Zby Sharp, Matthew K., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663718556/?ar">https://go.oreilly.com/library-access/library/view/-/9781663718556/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781663718556">https://learning.oreilly.com/library/view/~/9781663718556</a>
<a href="https://learning.oreilly.com/library/view/~/9781663718556/?ar">https://learning.oreilly.com/library/view/~/9781663718556/?ar</a><br/>Format: Sound recording<br/>Cyber threat intelligence : the no-nonsense guide for CISOs and Security Managersent://SD_ILS/0/SD_ILS:23296372024-09-25T08:15:47Z2024-09-25T08:15:47Zby Roberts, Aaron.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272206">https://learning.oreilly.com/library/view/~/9781484272206</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484272206/?ar">https://learning.oreilly.com/library/view/~/9781484272206/?ar</a><br/>Format: Electronic Resources<br/>How cybersecurity really works : a hands-on guide for total beginnersent://SD_ILS/0/SD_ILS:23280362024-09-25T08:15:47Z2024-09-25T08:15:47Zby Grubb, Sam (Cyber security consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999/?ar">https://learning.oreilly.com/library/view/~/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999">https://learning.oreilly.com/library/view/~/9781098128999</a><br/>Format: Electronic Resources<br/>Cybersecurity and Third-Party Risk : Third Party Threat Huntingent://SD_ILS/0/SD_ILS:23290002024-09-25T08:15:47Z2024-09-25T08:15:47Zby Rasner, Gregory C.<br/><a href="https://learning.oreilly.com/library/view/~/9781119809555">https://learning.oreilly.com/library/view/~/9781119809555</a>
<a href="https://learning.oreilly.com/library/view/~/9781119809555/?ar">https://learning.oreilly.com/library/view/~/9781119809555/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar">https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar</a><br/>Format: Electronic Resources<br/>Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflictent://SD_ILS/0/SD_ILS:23290792024-09-25T08:15:47Z2024-09-25T08:15:47Zby Borges, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781801076203/?ar">https://learning.oreilly.com/library/view/~/9781801076203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076203">https://learning.oreilly.com/library/view/~/9781801076203</a><br/>Format: Electronic Resources<br/>Artificial Intelligence, Cybersecurity and Cyber Defenceent://SD_ILS/0/SD_ILS:23283582024-09-25T08:15:47Z2024-09-25T08:15:47Zby Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format: Electronic Resources<br/>Certified ethical hacker (CEH) complete video courseent://SD_ILS/0/SD_ILS:23321462024-09-25T08:15:47Z2024-09-25T08:15:47Zby Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar">https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137446797/?ar">https://learning.oreilly.com/videos/~/9780137446797/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137446797">https://learning.oreilly.com/videos/~/9780137446797</a><br/>Format: Video recording<br/>Azure security handbook : a comprehensive guide for defending your enterprise environmentent://SD_ILS/0/SD_ILS:23298022024-09-25T08:15:47Z2024-09-25T08:15:47Zby Ots, Karl.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272923">https://learning.oreilly.com/library/view/~/9781484272923</a>
<a href="https://learning.oreilly.com/library/view/~/9781484272923/?ar">https://learning.oreilly.com/library/view/~/9781484272923/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar</a><br/>Format: Electronic Resources<br/>Implementing identity management on AWS : a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environmentsent://SD_ILS/0/SD_ILS:23300232024-09-25T08:15:47Z2024-09-25T08:15:47Zby Lehtinen, Jon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800562288">https://learning.oreilly.com/library/view/~/9781800562288</a>
<a href="https://learning.oreilly.com/library/view/~/9781800562288/?ar">https://learning.oreilly.com/library/view/~/9781800562288/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar">https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar</a><br/>Format: Electronic Resources<br/>Getting Started with z/OS Data Set Encryptionent://SD_ILS/0/SD_ILS:23312522024-09-25T08:15:47Z2024-09-25T08:15:47Zby White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format: Electronic Resources<br/>Cyber security on Azure : an it professional's guide to Microsoft Azure securityent://SD_ILS/0/SD_ILS:23271672024-09-25T08:15:47Z2024-09-25T08:15:47Zby Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484265314/?ar">https://learning.oreilly.com/library/view/~/9781484265314/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265314">https://learning.oreilly.com/library/view/~/9781484265314</a><br/>Format: Electronic Resources<br/>Cyberjutsu : cybersecurity for the modern ninjaent://SD_ILS/0/SD_ILS:23265412024-09-25T08:15:47Z2024-09-25T08:15:47Zby McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format: Electronic Resources<br/>A complete guide to Burp Suite : learn to detect application vulnerabilitiesent://SD_ILS/0/SD_ILS:23264302024-09-25T08:15:47Z2024-09-25T08:15:47Zby Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484264027/?ar">https://learning.oreilly.com/library/view/~/9781484264027/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484264027/?ar">https://go.oreilly.com/library-access/library/view/-/9781484264027/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484264027">https://learning.oreilly.com/library/view/~/9781484264027</a><br/>Format: Electronic Resources<br/>Android software internals quick reference : a field manual and security reference guide to Java-based Android componentsent://SD_ILS/0/SD_ILS:23284072024-09-25T08:15:47Z2024-09-25T08:15:47Zby Stevenson, James, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269145/?ar">https://learning.oreilly.com/library/view/~/9781484269145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269145">https://learning.oreilly.com/library/view/~/9781484269145</a><br/>Format: Electronic Resources<br/>Secure edge computing : applications, techniques and challenges.ent://SD_ILS/0/SD_ILS:23292882024-09-25T08:15:47Z2024-09-25T08:15:47Zby Ahmed, Mohiuddin (Computer scientist), editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000427325/?ar">https://learning.oreilly.com/library/view/~/9781000427325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000427325">https://learning.oreilly.com/library/view/~/9781000427325</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar">https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar</a><br/>Format: Electronic Resources<br/>Authentication and access control : practical cryptography methods and toolsent://SD_ILS/0/SD_ILS:23271232024-09-25T08:15:47Z2024-09-25T08:15:47Zby Boonkrong, Sirapat, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265703">https://learning.oreilly.com/library/view/~/9781484265703</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265703/?ar">https://learning.oreilly.com/library/view/~/9781484265703/?ar</a><br/>Format: Electronic Resources<br/>Start-up secure : baking cybersecurity into your company from founding to exitent://SD_ILS/0/SD_ILS:23275242024-09-25T08:15:47Z2024-09-25T08:15:47Zby Castaldo, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119700739">https://learning.oreilly.com/library/view/~/9781119700739</a>
<a href="https://learning.oreilly.com/library/view/~/9781119700739/?ar">https://learning.oreilly.com/library/view/~/9781119700739/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar">https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar</a><br/>Format: Electronic Resources<br/>Choose your InfoSec path : an interactive cybersecurity adventure for beginnersent://SD_ILS/0/SD_ILS:23289902024-09-25T08:15:47Z2024-09-25T08:15:47Zby Roxon, Alexander J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484270363">https://learning.oreilly.com/library/view/~/9781484270363</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270363/?ar">https://learning.oreilly.com/library/view/~/9781484270363/?ar</a><br/>Format: Electronic Resources<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:23270532024-09-25T08:15:47Z2024-09-25T08:15:47Zby Moschovitis, Christos J. P., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119658740">https://learning.oreilly.com/library/view/~/9781119658740</a>
<a href="https://learning.oreilly.com/library/view/~/9781119658740/?ar">https://learning.oreilly.com/library/view/~/9781119658740/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar">https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar</a><br/>Format: Electronic Resources<br/>Protective security : creating military-grade defenses for your digital businessent://SD_ILS/0/SD_ILS:23285792024-09-25T08:15:47Z2024-09-25T08:15:47Zby Seaman, Jim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484269084">https://learning.oreilly.com/library/view/~/9781484269084</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269084/?ar">https://learning.oreilly.com/library/view/~/9781484269084/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar</a><br/>Format: Electronic Resources<br/>Red Hat and IT security : with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditingent://SD_ILS/0/SD_ILS:23265142024-09-25T08:15:47Z2024-09-25T08:15:47Zby Chatterjee, Rithik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484264348">https://learning.oreilly.com/library/view/~/9781484264348</a>
<a href="https://learning.oreilly.com/library/view/~/9781484264348/?ar">https://learning.oreilly.com/library/view/~/9781484264348/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar">https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar</a><br/>Format: Electronic Resources<br/>COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION EXAM GUIDE (EXAM CS0-002)ent://SD_ILS/0/SD_ILS:23265162024-09-25T08:15:47Z2024-09-25T08:15:47Zby Chapman, Brent.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar">https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260464313">https://learning.oreilly.com/library/view/~/9781260464313</a>
<a href="https://learning.oreilly.com/library/view/~/9781260464313/?ar">https://learning.oreilly.com/library/view/~/9781260464313/?ar</a><br/>Format: Electronic Resources<br/>Malware Analysis Techniques : Tricks for the Triage of Adversarial Software.ent://SD_ILS/0/SD_ILS:23291542024-09-25T08:15:47Z2024-09-25T08:15:47Zby Barker, Dylan.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212277">https://learning.oreilly.com/library/view/~/9781839212277</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212277/?ar">https://learning.oreilly.com/library/view/~/9781839212277/?ar</a><br/>Format: Electronic Resources<br/>Enterprise DevOps for Architectsent://SD_ILS/0/SD_ILS:23309782024-09-25T08:15:47Z2024-09-25T08:15:47Zby Mulder, Jeroen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801812153">https://learning.oreilly.com/library/view/~/9781801812153</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812153/?ar">https://learning.oreilly.com/library/view/~/9781801812153/?ar</a><br/>Format: Electronic Resources<br/>CYBER SECURITY AND DIGITAL FORENSICSent://SD_ILS/0/SD_ILS:23314412024-09-25T08:15:47Z2024-09-25T08:15:47Z<a href="https://learning.oreilly.com/library/view/~/9781119795636">https://learning.oreilly.com/library/view/~/9781119795636</a>
<a href="https://learning.oreilly.com/library/view/~/9781119795636/?ar">https://learning.oreilly.com/library/view/~/9781119795636/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar">https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar</a><br/>Format: Electronic Resources<br/>Intro to secure application deployment with Istio on Kubernetes.ent://SD_ILS/0/SD_ILS:23321812024-09-25T08:15:47Z2024-09-25T08:15:47Zby Poddar, Neeraj, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202219">https://learning.oreilly.com/videos/~/10000MNHV202219</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202219/?ar">https://learning.oreilly.com/videos/~/10000MNHV202219/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar</a><br/>Format: Video recording<br/>Securing AI.ent://SD_ILS/0/SD_ILS:23321342024-09-25T08:15:47Z2024-09-25T08:15:47Zby Manjengwa, Shingai, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar">https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920672319/?ar">https://learning.oreilly.com/videos/~/0636920672319/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920672319">https://learning.oreilly.com/videos/~/0636920672319</a><br/>Format: Video recording<br/>Real-world cryptographyent://SD_ILS/0/SD_ILS:23321502024-09-25T08:15:47Z2024-09-25T08:15:47Zby Wong, David, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781617296710VE">https://learning.oreilly.com/videos/~/9781617296710VE</a>
<a href="https://learning.oreilly.com/videos/~/9781617296710VE/?ar">https://learning.oreilly.com/videos/~/9781617296710VE/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar</a><br/>Format: Video recording<br/>Self-sovereign identity : decentralized digital identity and verifiable credentialsent://SD_ILS/0/SD_ILS:23302702024-09-25T08:15:47Z2024-09-25T08:15:47Zby Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format: Electronic Resources<br/>Real-world cryptographyent://SD_ILS/0/SD_ILS:23303832024-09-25T08:15:47Z2024-09-25T08:15:47Zby Wong, David (Cryptography engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710">https://learning.oreilly.com/library/view/~/9781617296710</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710/?ar">https://learning.oreilly.com/library/view/~/9781617296710/?ar</a><br/>Format: Electronic Resources<br/>8 steps to better security : a simple cyber resilience guide for businessent://SD_ILS/0/SD_ILS:23308352024-09-25T08:15:47Z2024-09-25T08:15:47Zby Crawley, Kim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119811237/?ar">https://learning.oreilly.com/library/view/~/9781119811237/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119811237">https://learning.oreilly.com/library/view/~/9781119811237</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar">https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar</a><br/>Format: Electronic Resources<br/>Cyber Crisisent://SD_ILS/0/SD_ILS:23313162024-09-25T08:15:47Z2024-09-25T08:15:47Zby Cole, Eric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666125313">https://learning.oreilly.com/library/view/~/9781666125313</a>
<a href="https://learning.oreilly.com/library/view/~/9781666125313/?ar">https://learning.oreilly.com/library/view/~/9781666125313/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar">https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar</a><br/>Format: Electronic Resources<br/>Cryptoent://SD_ILS/0/SD_ILS:23313232024-09-25T08:15:47Z2024-09-25T08:15:47Zby Levy, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar">https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781666117615">https://learning.oreilly.com/library/view/~/9781666117615</a>
<a href="https://learning.oreilly.com/library/view/~/9781666117615/?ar">https://learning.oreilly.com/library/view/~/9781666117615/?ar</a><br/>Format: Electronic Resources<br/>Real-world cryptographyent://SD_ILS/0/SD_ILS:23328082024-09-25T08:15:47Z2024-09-25T08:15:47Zby Wong, David (Cryptography engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617296710AU">https://learning.oreilly.com/library/view/~/9781617296710AU</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710AU/?ar">https://learning.oreilly.com/library/view/~/9781617296710AU/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar</a><br/>Format: Sound recording<br/>Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browserent://SD_ILS/0/SD_ILS:23315702024-09-25T08:15:47Z2024-09-25T08:15:47Zby Segala, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar">https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801075336/?ar">https://learning.oreilly.com/library/view/~/9781801075336/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801075336">https://learning.oreilly.com/library/view/~/9781801075336</a><br/>Format: Electronic Resources<br/>Threat modeling a practical guide for developing teamsent://SD_ILS/0/SD_ILS:23311562024-09-25T08:15:47Z2024-09-25T08:15:47Zby Tarandach, Izar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056546/?ar">https://learning.oreilly.com/library/view/~/9781492056546/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492056546">https://learning.oreilly.com/library/view/~/9781492056546</a><br/>Format: Electronic Resources<br/>Strategy, leadership, and AI in the cyber ecosystem : the role of digital societies in information governance and decision makingent://SD_ILS/0/SD_ILS:23264552024-09-25T08:15:47Z2024-09-25T08:15:47Zby Jahankhani, Hamid.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128214596/?ar">https://go.oreilly.com/library-access/library/view/-/9780128214596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128214596/?ar">https://learning.oreilly.com/library/view/~/9780128214596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128214596">https://learning.oreilly.com/library/view/~/9780128214596</a><br/>Format: Electronic Resources<br/>Cybersecurity in the COVID-19 pandemicent://SD_ILS/0/SD_ILS:23277302024-09-25T08:15:47Z2024-09-25T08:15:47Zby Okereafor, Kenneth, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781000357653/?ar">https://learning.oreilly.com/library/view/~/9781000357653/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar">https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000357653">https://learning.oreilly.com/library/view/~/9781000357653</a><br/>Format: Electronic Resources<br/>Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environmentent://SD_ILS/0/SD_ILS:23303152024-09-25T08:15:47Z2024-09-25T08:15:47Zby Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800202092/?ar">https://learning.oreilly.com/library/view/~/9781800202092/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202092">https://learning.oreilly.com/library/view/~/9781800202092</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar</a><br/>Format: Electronic Resources<br/>SECURING CLOUD SERVICES;A PRAGMATIC APPROACH, SECOND EDITION.ent://SD_ILS/0/SD_ILS:23280812024-09-25T08:15:47Z2024-09-25T08:15:47Zby LEE NEWCOMBE.<br/><a href="https://learning.oreilly.com/library/view/~/9781787782075">https://learning.oreilly.com/library/view/~/9781787782075</a>
<a href="https://learning.oreilly.com/library/view/~/9781787782075/?ar">https://learning.oreilly.com/library/view/~/9781787782075/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar">https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar</a><br/>Format: Electronic Resources<br/>JSON web tokens and alternatives.ent://SD_ILS/0/SD_ILS:23326932024-09-25T08:15:47Z2024-09-25T08:15:47Zby Madden, Neil, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202163/?ar">https://learning.oreilly.com/videos/~/10000MNLV202163/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNLV202163">https://learning.oreilly.com/videos/~/10000MNLV202163</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar</a><br/>Format: Video recording<br/>Learn Kubernetes security : securely orchestrate, scale, and manage your microservices in Kubernetes deploymentsent://SD_ILS/0/SD_ILS:23259702024-09-25T08:15:47Z2024-09-25T08:15:47Zby Huang, Kaizhe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216503">https://learning.oreilly.com/library/view/~/9781839216503</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839216503/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216503/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216503/?ar">https://learning.oreilly.com/library/view/~/9781839216503/?ar</a><br/>Format: Electronic Resources<br/>Mastering VMware NSX for vSphereent://SD_ILS/0/SD_ILS:23273022024-09-25T08:15:47Z2024-09-25T08:15:47Zby Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119513544">https://learning.oreilly.com/library/view/~/9781119513544</a>
<a href="https://learning.oreilly.com/library/view/~/9781119513544/?ar">https://learning.oreilly.com/library/view/~/9781119513544/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar">https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar</a><br/>Format: Electronic Resources<br/>IT auditing : using controls to protect information assetsent://SD_ILS/0/SD_ILS:23221262024-09-25T08:15:47Z2024-09-25T08:15:47Zby Kegerreis, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260453232/?ar">https://learning.oreilly.com/library/view/~/9781260453232/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar">https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity for space : protecting the final frontierent://SD_ILS/0/SD_ILS:23237812024-09-25T08:15:47Z2024-09-25T08:15:47Zby Oakley, Jacob G.<br/><a href="https://learning.oreilly.com/library/view/~/9781484257326/?ar">https://learning.oreilly.com/library/view/~/9781484257326/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484257326/?ar">https://go.oreilly.com/library-access/library/view/-/9781484257326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484257326">https://learning.oreilly.com/library/view/~/9781484257326</a><br/>Format: Electronic Resources<br/>Mastering Linux Security and Hardening - Second Editionent://SD_ILS/0/SD_ILS:23241672024-09-25T08:15:47Z2024-09-25T08:15:47Zby Tevault, Donald A.<br/><a href="https://learning.oreilly.com/library/view/~/9781838981778/?ar">https://learning.oreilly.com/library/view/~/9781838981778/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar">https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838981778">https://learning.oreilly.com/library/view/~/9781838981778</a><br/>Format: Electronic Resources<br/>Decoding blockchain for business : understand the tech and prepare for the blockchain futureent://SD_ILS/0/SD_ILS:23254622024-09-25T08:15:47Z2024-09-25T08:15:47Zby Hijfte, Stijn van, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261378/?ar">https://learning.oreilly.com/library/view/~/9781484261378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261378">https://learning.oreilly.com/library/view/~/9781484261378</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261378/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261378/?ar</a><br/>Format: Electronic Resources<br/>Rational cybersecurity for business : the security leaders' guide to business alignmentent://SD_ILS/0/SD_ILS:23254882024-09-25T08:15:47Z2024-09-25T08:15:47Zby Blum, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781484259528">https://learning.oreilly.com/library/view/~/9781484259528</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484259528/?ar">https://learning.oreilly.com/library/view/~/9781484259528/?ar</a><br/>Format: Electronic Resources<br/>Firewalls don't stop dragons : a step-by-step guide to computer security for non-techiesent://SD_ILS/0/SD_ILS:23257732024-09-25T08:15:47Z2024-09-25T08:15:47Zby Parker, Carey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261897">https://learning.oreilly.com/library/view/~/9781484261897</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261897/?ar">https://learning.oreilly.com/library/view/~/9781484261897/?ar</a><br/>Format: Electronic Resources<br/>Hands on hackingent://SD_ILS/0/SD_ILS:23254522024-09-25T08:15:47Z2024-09-25T08:15:47Zby Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format: Electronic Resources<br/>Building secure firmware : armoring the foundation of the platforment://SD_ILS/0/SD_ILS:23260202024-09-25T08:15:47Z2024-09-25T08:15:47Zby Yao, Jiewen.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261064">https://learning.oreilly.com/library/view/~/9781484261064</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261064/?ar">https://learning.oreilly.com/library/view/~/9781484261064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar</a><br/>Format: Electronic Resources<br/>Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malwareent://SD_ILS/0/SD_ILS:23258472024-09-25T08:15:47Z2024-09-25T08:15:47Zby Mohanta, Abhijit.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261934">https://learning.oreilly.com/library/view/~/9781484261934</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261934/?ar">https://learning.oreilly.com/library/view/~/9781484261934/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar</a><br/>Format: Electronic Resources<br/>PCI DSS : an integrated data security standard guideent://SD_ILS/0/SD_ILS:23243862024-09-25T08:15:47Z2024-09-25T08:15:47Zby Seaman, Jim.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258088">https://learning.oreilly.com/library/view/~/9781484258088</a>
<a href="https://learning.oreilly.com/library/view/~/9781484258088/?ar">https://learning.oreilly.com/library/view/~/9781484258088/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar</a><br/>Format: Electronic Resources<br/>Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safeent://SD_ILS/0/SD_ILS:23248022024-09-25T08:15:47Z2024-09-25T08:15:47Zby Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format: Electronic Resources<br/>Cloud Computing Security, 2nd Editionent://SD_ILS/0/SD_ILS:23311012024-09-25T08:15:47Z2024-09-25T08:15:47Zby Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>Exposed : how revealing your data and eliminating privacy increases trust and liberates humanityent://SD_ILS/0/SD_ILS:23264132024-09-25T08:15:47Z2024-09-25T08:15:47Zby Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a>
<a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format: Electronic Resources<br/>PoC GTFO. Volume IIIent://SD_ILS/0/SD_ILS:23271492024-09-25T08:15:47Z2024-09-25T08:15:47Zby Laphroaig, Manul.<br/><a href="https://learning.oreilly.com/library/view/~/9781098125691/?ar">https://learning.oreilly.com/library/view/~/9781098125691/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125691">https://learning.oreilly.com/library/view/~/9781098125691</a><br/>Format: Electronic Resources<br/>Data breaches : crisis and opportunityent://SD_ILS/0/SD_ILS:23222222024-09-25T08:15:47Z2024-09-25T08:15:47Zby Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format: Electronic Resources<br/>Applied incident responseent://SD_ILS/0/SD_ILS:23228262024-09-25T08:15:47Z2024-09-25T08:15:47Zby Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781119560265">https://learning.oreilly.com/library/view/~/9781119560265</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560265/?ar">https://learning.oreilly.com/library/view/~/9781119560265/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar</a><br/>Format: Electronic Resources<br/>Temenos on IBM LinuxONE Best Practices Guideent://SD_ILS/0/SD_ILS:23234402024-09-25T08:15:47Z2024-09-25T08:15:47Zby Coble, Deana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458458">https://learning.oreilly.com/library/view/~/9780738458458</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458458/?ar">https://learning.oreilly.com/library/view/~/9780738458458/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar</a><br/>Format: Electronic Resources<br/>Cyber Warfare - Truth, Tactics, and Strategiesent://SD_ILS/0/SD_ILS:23236672024-09-25T08:15:47Z2024-09-25T08:15:47Zby Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format: Electronic Resources<br/>IBM Security Key Lifecycle Managerent://SD_ILS/0/SD_ILS:23239822024-09-25T08:15:47Z2024-09-25T08:15:47Zby Chen, An, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458786/?ar">https://learning.oreilly.com/library/view/~/9780738458786/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458786">https://learning.oreilly.com/library/view/~/9780738458786</a><br/>Format: Electronic Resources<br/>Security engineering 101 : when good design and security work togetherent://SD_ILS/0/SD_ILS:23244332024-09-25T08:15:47Z2024-09-25T08:15:47Zby Everette, Wendy Knox, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920342960/?ar">https://go.oreilly.com/library-access/library/view/-/0636920342960/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920342960/?ar">https://learning.oreilly.com/videos/~/0636920342960/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920342960">https://learning.oreilly.com/videos/~/0636920342960</a><br/>Format: Electronic Resources<br/>DevSecOps for .NET core : securing modern software applicationsent://SD_ILS/0/SD_ILS:23246122024-09-25T08:15:47Z2024-09-25T08:15:47Zby Zeeshan, Afzaal Ahmad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258507/?ar">https://learning.oreilly.com/library/view/~/9781484258507/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484258507">https://learning.oreilly.com/library/view/~/9781484258507</a><br/>Format: Electronic Resources<br/>Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurityent://SD_ILS/0/SD_ILS:23254512024-09-25T08:15:47Z2024-09-25T08:15:47Zby Carey, Marcus J. (Cybersecurity professional)<br/><a href="https://learning.oreilly.com/library/view/~/9781119643418">https://learning.oreilly.com/library/view/~/9781119643418</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643418/?ar">https://learning.oreilly.com/library/view/~/9781119643418/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar</a><br/>Format: Electronic Resources<br/>Demystifying Internet of Things security : successful IoT device/edge and platform security deploymentent://SD_ILS/0/SD_ILS:23216962024-09-25T08:15:47Z2024-09-25T08:15:47Zby Cheruvu, Sunil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484228968/?ar">https://learning.oreilly.com/library/view/~/9781484228968/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228968">https://learning.oreilly.com/library/view/~/9781484228968</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484228968/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228968/?ar</a><br/>Format: Electronic Resources<br/>Incident response primer : how to keep from getting pwned too hardent://SD_ILS/0/SD_ILS:23233162024-09-25T08:15:47Z2024-09-25T08:15:47Zby Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format: Electronic Resources<br/>Cybersecurity for dummiesent://SD_ILS/0/SD_ILS:23228392024-09-25T08:15:47Z2024-09-25T08:15:47Zby Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560326/?ar">https://learning.oreilly.com/library/view/~/9781119560326/?ar</a><br/>Format: Electronic Resources<br/>Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsuent://SD_ILS/0/SD_ILS:23326572024-09-25T08:15:47Z2024-09-25T08:15:47Zby Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format: Electronic Resources<br/>Identity attack vectors : implementing an effective identity and access management solutionent://SD_ILS/0/SD_ILS:23227372024-09-25T08:15:47Z2024-09-25T08:15:47Zby Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484251652/?ar">https://learning.oreilly.com/library/view/~/9781484251652/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484251652">https://learning.oreilly.com/library/view/~/9781484251652</a><br/>Format: Electronic Resources<br/>Designing a HIPAA-compliant security operations center : a guide to detecting and responding to healthcare breaches and eventsent://SD_ILS/0/SD_ILS:23233332024-09-25T08:15:47Z2024-09-25T08:15:47Zby Thompson, Eric C.<br/><a href="https://learning.oreilly.com/library/view/~/9781484256084">https://learning.oreilly.com/library/view/~/9781484256084</a>
<a href="https://learning.oreilly.com/library/view/~/9781484256084/?ar">https://learning.oreilly.com/library/view/~/9781484256084/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics basics : a practical guide using Windows OSent://SD_ILS/0/SD_ILS:23198132024-09-25T08:15:47Z2024-09-25T08:15:47Zby Hassan, Nihad A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238387/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238387/?ar">https://learning.oreilly.com/library/view/~/9781484238387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238387">https://learning.oreilly.com/library/view/~/9781484238387</a><br/>Format: Electronic Resources<br/>Computer security : art and scienceent://SD_ILS/0/SD_ILS:23184522024-09-25T08:15:47Z2024-09-25T08:15:47Zby Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format: Electronic Resources<br/>Hands-on Spring security 5.1.1ent://SD_ILS/0/SD_ILS:23191102024-09-25T08:15:47Z2024-09-25T08:15:47Zby Lelek, Tomasz, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789802931/?ar">https://learning.oreilly.com/videos/~/9781789802931/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789802931/?ar">https://go.oreilly.com/library-access/library/view/-/9781789802931/?ar</a><br/>Format: Electronic Resources<br/>My online privacy for seniorsent://SD_ILS/0/SD_ILS:23194122024-09-25T08:15:47Z2024-09-25T08:15:47Zby Rich, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135381281/?ar">https://learning.oreilly.com/library/view/~/9780135381281/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar">https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:23192202024-09-25T08:15:47Z2024-09-25T08:15:47Zby Tanner, Nadean H., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar">https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119552932/?ar">https://learning.oreilly.com/library/view/~/9781119552932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119552932">https://learning.oreilly.com/library/view/~/9781119552932</a><br/>Format: Electronic Resources<br/>Digital asset valuation and cyber risk measurement : principles of cybernomicsent://SD_ILS/0/SD_ILS:23204622024-09-25T08:15:47Z2024-09-25T08:15:47Zby Ruan, Keyun, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128123287">https://learning.oreilly.com/library/view/~/9780128123287</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128123287/?ar">https://go.oreilly.com/library-access/library/view/-/9780128123287/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128123287/?ar">https://learning.oreilly.com/library/view/~/9780128123287/?ar</a><br/>Format: Electronic Resources<br/>Mastering Malware Analysis : the Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks.ent://SD_ILS/0/SD_ILS:23209222024-09-25T08:15:47Z2024-09-25T08:15:47Zby Kleymenov, Alexey.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar">https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789610789">https://learning.oreilly.com/library/view/~/9781789610789</a>
<a href="https://learning.oreilly.com/library/view/~/9781789610789/?ar">https://learning.oreilly.com/library/view/~/9781789610789/?ar</a><br/>Format: Electronic Resources<br/>Threat and vulnerability assessment for enterprisesent://SD_ILS/0/SD_ILS:23192772024-09-25T08:15:47Z2024-09-25T08:15:47Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781838559205/?ar">https://learning.oreilly.com/videos/~/9781838559205/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar">https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar</a><br/>Format: Electronic Resources<br/>Linux basics for hackers : getting started with networking, scripting, and security in Kalient://SD_ILS/0/SD_ILS:23185542024-09-25T08:15:47Z2024-09-25T08:15:47Zby OccupyTheWeb, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492069485/?ar">https://learning.oreilly.com/library/view/~/9781492069485/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492069485">https://learning.oreilly.com/library/view/~/9781492069485</a><br/>Format: Electronic Resources<br/>Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualizationent://SD_ILS/0/SD_ILS:23189382024-09-25T08:15:47Z2024-09-25T08:15:47Zby Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134807614/?ar">https://learning.oreilly.com/library/view/~/9780134807614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807614">https://learning.oreilly.com/library/view/~/9780134807614</a><br/>Format: Electronic Resources<br/>Professional Red teaming : conducting successful cybersecurity engagementsent://SD_ILS/0/SD_ILS:23189772024-09-25T08:15:47Z2024-09-25T08:15:47Zby Oakley, Jacob G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243091/?ar">https://learning.oreilly.com/library/view/~/9781484243091/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243091">https://learning.oreilly.com/library/view/~/9781484243091</a><br/>Format: Electronic Resources<br/>Exam ref MS-101 Microsoft 365 Mobility and Securityent://SD_ILS/0/SD_ILS:23212712024-09-25T08:15:47Z2024-09-25T08:15:47Zby Svidergol, Brian, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135574843/?ar">https://go.oreilly.com/library-access/library/view/-/9780135574843/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135574843/?ar">https://learning.oreilly.com/library/view/~/9780135574843/?ar</a><br/>Format: Electronic Resources<br/>Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessonsent://SD_ILS/0/SD_ILS:23215502024-09-25T08:15:47Z2024-09-25T08:15:47Zby Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format: Electronic Resources<br/>Informationssicherheit und Datenschutz : Handbuch für Praktiker und Begleitbuch zum T.I.S.P.ent://SD_ILS/0/SD_ILS:23221892024-09-25T08:15:47Z2024-09-25T08:15:47Zby Domnick, André, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar">https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098123659/?ar">https://learning.oreilly.com/library/view/~/9781098123659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098123659">https://learning.oreilly.com/library/view/~/9781098123659</a><br/>Format: Electronic Resources<br/>Foundations of information security : a straightforward introductionent://SD_ILS/0/SD_ILS:23223132024-09-25T08:15:47Z2024-09-25T08:15:47Zby Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098122546/?ar">https://learning.oreilly.com/library/view/~/9781098122546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122546">https://learning.oreilly.com/library/view/~/9781098122546</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar</a><br/>Format: Electronic Resources<br/>Getting Started with Ghidraent://SD_ILS/0/SD_ILS:23226052024-09-25T08:15:47Z2024-09-25T08:15:47Zby Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar">https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265/?ar">https://learning.oreilly.com/library/view/~/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265">https://learning.oreilly.com/library/view/~/9781098115265</a><br/>Format: Electronic Resources<br/>Data analytics for IT networks : developing innovative use casesent://SD_ILS/0/SD_ILS:23175592024-09-25T08:15:47Z2024-09-25T08:15:47Zby Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format: Electronic Resources<br/>Practical security : simple practices for defending your systemsent://SD_ILS/0/SD_ILS:23194022024-09-25T08:15:47Z2024-09-25T08:15:47Zby Zabicki, Roman, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar">https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679">https://learning.oreilly.com/library/view/~/9781680506679</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679/?ar">https://learning.oreilly.com/library/view/~/9781680506679/?ar</a><br/>Format: Electronic Resources<br/>Becoming the hacker : the playbook for getting inside the mind of an attackerent://SD_ILS/0/SD_ILS:23191292024-09-25T08:15:47Z2024-09-25T08:15:47Zby Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Electronic Resources<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:23195342024-09-25T08:15:47Z2024-09-25T08:15:47Zby Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a>
<a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testingent://SD_ILS/0/SD_ILS:23198472024-09-25T08:15:47Z2024-09-25T08:15:47Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format: Electronic Resources<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:23215742024-09-25T08:15:47Z2024-09-25T08:15:47Zby Quade, Phil.<br/><a href="https://learning.oreilly.com/library/view/~/9781119617365">https://learning.oreilly.com/library/view/~/9781119617365</a>
<a href="https://learning.oreilly.com/library/view/~/9781119617365/?ar">https://learning.oreilly.com/library/view/~/9781119617365/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar">https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar</a><br/>Format: Electronic Resources<br/>Cyber smart : five habits to protect your family, money, and identity from cyber criminalsent://SD_ILS/0/SD_ILS:23188682024-09-25T08:15:47Z2024-09-25T08:15:47Zby McDonough, Bart R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469071503/?ar">https://learning.oreilly.com/library/view/~/9781469071503/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar">https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469071503">https://learning.oreilly.com/library/view/~/9781469071503</a><br/>Format: Sound recording<br/>Dynamic SQL : applications, performance, and security in Microsoft SQL serverent://SD_ILS/0/SD_ILS:23182952024-09-25T08:15:47Z2024-09-25T08:15:47Zby Pollack, Edward, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243183/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243183/?ar">https://learning.oreilly.com/library/view/~/9781484243183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243183">https://learning.oreilly.com/library/view/~/9781484243183</a><br/>Format: Electronic Resources<br/>Zabbix 4 network monitoring : monitor the performance of your network devices and applications using the all-new Zabbix 4.0ent://SD_ILS/0/SD_ILS:23190102024-09-25T08:15:47Z2024-09-25T08:15:47Zby Uytterhoeven, Patrik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340266/?ar">https://learning.oreilly.com/library/view/~/9781789340266/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar</a><br/>Format: Electronic Resources<br/>Cyber operations : building, defending, and attacking modern computer networksent://SD_ILS/0/SD_ILS:23189142024-09-25T08:15:47Z2024-09-25T08:15:47Zby O'Leary, Mike, 1968- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242940">https://learning.oreilly.com/library/view/~/9781484242940</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242940/?ar">https://learning.oreilly.com/library/view/~/9781484242940/?ar</a><br/>Format: Electronic Resources<br/>Solving identity management in modern applications : demystifying OAuth 2.0, OpenID Connect, and SAML 2.0ent://SD_ILS/0/SD_ILS:23227232024-09-25T08:15:47Z2024-09-25T08:15:47Zby Wilson, Yvonne.<br/><a href="https://learning.oreilly.com/library/view/~/9781484250952/?ar">https://learning.oreilly.com/library/view/~/9781484250952/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484250952">https://learning.oreilly.com/library/view/~/9781484250952</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar</a><br/>Format: Electronic Resources<br/>Machine Learning et sécuritéent://SD_ILS/0/SD_ILS:23260752024-09-25T08:15:47Z2024-09-25T08:15:47Zby Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar">https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9782412043561">https://learning.oreilly.com/library/view/~/9782412043561</a>
<a href="https://learning.oreilly.com/library/view/~/9782412043561/?ar">https://learning.oreilly.com/library/view/~/9782412043561/?ar</a><br/>Format: Electronic Resources<br/>Qi ye shen tou ce shi he chi xu jian kong.ent://SD_ILS/0/SD_ILS:23322892024-09-25T08:15:47Z2024-09-25T08:15:47Zby Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format: Video recording<br/>The complete Metasploit guide : explore effective penetration testing techniques with Metasploitent://SD_ILS/0/SD_ILS:23270772024-09-25T08:15:47Z2024-09-25T08:15:47Zby Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477">https://learning.oreilly.com/library/view/~/9781838822477</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477/?ar">https://learning.oreilly.com/library/view/~/9781838822477/?ar</a><br/>Format: Electronic Resources<br/>The cybersecurity playbook : how every leader and employee can contribute to a culture of securityent://SD_ILS/0/SD_ILS:23215682024-09-25T08:15:47Z2024-09-25T08:15:47Zby Cerra, Allison, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar">https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196/?ar">https://learning.oreilly.com/library/view/~/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196">https://learning.oreilly.com/library/view/~/9781119442196</a><br/>Format: Electronic Resources<br/>We have root : even more advice from Schneier on securityent://SD_ILS/0/SD_ILS:23215732024-09-25T08:15:47Z2024-09-25T08:15:47Zby Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643012">https://learning.oreilly.com/library/view/~/9781119643012</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643012/?ar">https://learning.oreilly.com/library/view/~/9781119643012/?ar</a><br/>Format: Electronic Resources<br/>Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacksent://SD_ILS/0/SD_ILS:23224002024-09-25T08:15:47Z2024-09-25T08:15:47Zby Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242551/?ar">https://learning.oreilly.com/library/view/~/9781484242551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242551">https://learning.oreilly.com/library/view/~/9781484242551</a><br/>Format: Electronic Resources<br/>Fraud detection without feature engineeringent://SD_ILS/0/SD_ILS:23224342024-09-25T08:15:47Z2024-09-25T08:15:47Zby Vagata, Pamela, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540/?ar">https://learning.oreilly.com/videos/~/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540">https://learning.oreilly.com/videos/~/0636920339540</a><br/>Format: Electronic Resources<br/>Cyber-Vigilance and Digital Trustent://SD_ILS/0/SD_ILS:23248692024-09-25T08:15:47Z2024-09-25T08:15:47Zby Tounsi, Wiem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786304483">https://learning.oreilly.com/library/view/~/9781786304483</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304483/?ar">https://learning.oreilly.com/library/view/~/9781786304483/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar</a><br/>Format: Electronic Resources<br/>Securing your cloud : IBM security for LinuxONEent://SD_ILS/0/SD_ILS:23215972024-09-25T08:15:47Z2024-09-25T08:15:47Zby Alves, Edi Lopes, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457949/?ar">https://learning.oreilly.com/library/view/~/9780738457949/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar</a><br/>Format: Electronic Resources<br/>Security principles for the working architectent://SD_ILS/0/SD_ILS:23226912024-09-25T08:15:47Z2024-09-25T08:15:47Zby Woods, Eoin, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338215/?ar">https://learning.oreilly.com/videos/~/0636920338215/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920338215">https://learning.oreilly.com/videos/~/0636920338215</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar</a><br/>Format: Electronic Resources<br/>How cyber security can protect your business : a guide for all stakeholdersent://SD_ILS/0/SD_ILS:23230602024-09-25T08:15:47Z2024-09-25T08:15:47Zby Wright, Christopher, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781979/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781979/?ar">https://learning.oreilly.com/library/view/~/9781787781979/?ar</a><br/>Format: Electronic Resources<br/>Serverless security : protect functions using the CLAD security modelent://SD_ILS/0/SD_ILS:23230662024-09-25T08:15:47Z2024-09-25T08:15:47Zby Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar">https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538/?ar">https://learning.oreilly.com/library/view/~/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538">https://learning.oreilly.com/library/view/~/9781492082538</a><br/>Format: Electronic Resources<br/>Oracle cloud user security : providing for separation of duties and appropriate access by job function.ent://SD_ILS/0/SD_ILS:23229662024-09-25T08:15:47Z2024-09-25T08:15:47Zby Malcher, Michelle, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar">https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484255643/?ar">https://learning.oreilly.com/videos/~/9781484255643/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484255643">https://learning.oreilly.com/videos/~/9781484255643</a><br/>Format: Electronic Resources<br/>How to build privacy and security into deep learning modelsent://SD_ILS/0/SD_ILS:23227912024-09-25T08:15:47Z2024-09-25T08:15:47Zby Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format: Electronic Resources<br/>The Complete Ethical Hacking Courseent://SD_ILS/0/SD_ILS:23231852024-09-25T08:15:47Z2024-09-25T08:15:47Zby Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format: Electronic Resources<br/>Linux troubleshooting course with real life examplesent://SD_ILS/0/SD_ILS:23232382024-09-25T08:15:47Z2024-09-25T08:15:47Zby Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tacticsent://SD_ILS/0/SD_ILS:23157062024-09-25T08:15:47Z2024-09-25T08:15:47Zby Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Azure security centerent://SD_ILS/0/SD_ILS:23167782024-09-25T08:15:47Z2024-09-25T08:15:47Zby Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format: Electronic Resources<br/>Windows security monitoring : scenarios and patternsent://SD_ILS/0/SD_ILS:23159452024-09-25T08:15:47Z2024-09-25T08:15:47Zby Miroshnikov, Andrei, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar">https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119390640/?ar">https://learning.oreilly.com/library/view/~/9781119390640/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119390640">https://learning.oreilly.com/library/view/~/9781119390640</a><br/>Format: Electronic Resources<br/>Open source intelligence methods and tools : a practical guide to online intelligenceent://SD_ILS/0/SD_ILS:23169162024-09-25T08:15:47Z2024-09-25T08:15:47Zby Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232132">https://learning.oreilly.com/library/view/~/9781484232132</a>
<a href="https://learning.oreilly.com/library/view/~/9781484232132/?ar">https://learning.oreilly.com/library/view/~/9781484232132/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar</a><br/>Format: Electronic Resources<br/>Firewalls don't stop dragons : a step-by-step guide to computer security for non-techiesent://SD_ILS/0/SD_ILS:23172282024-09-25T08:15:47Z2024-09-25T08:15:47Zby Parker, Carey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484238523">https://learning.oreilly.com/library/view/~/9781484238523</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238523/?ar">https://learning.oreilly.com/library/view/~/9781484238523/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484238523/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238523/?ar</a><br/>Format: Electronic Resources<br/>Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysisent://SD_ILS/0/SD_ILS:23172312024-09-25T08:15:47Z2024-09-25T08:15:47Zby Bramwell, Phil, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295666">https://learning.oreilly.com/library/view/~/9781788295666</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295666/?ar">https://learning.oreilly.com/library/view/~/9781788295666/?ar</a><br/>Format: Electronic Resources<br/>Hands-on Spring Security 5 for Reactive applications : learn effective ways to secure your applications with Spring and Spring WebFluxent://SD_ILS/0/SD_ILS:23172372024-09-25T08:15:47Z2024-09-25T08:15:47Zby John, Tomcy, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788995979/?ar">https://learning.oreilly.com/library/view/~/9781788995979/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788995979/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995979/?ar</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploitent://SD_ILS/0/SD_ILS:23167902024-09-25T08:15:47Z2024-09-25T08:15:47Zby Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788990615/?ar">https://learning.oreilly.com/library/view/~/9781788990615/?ar</a><br/>Format: Electronic Resources<br/>An introduction to cyber modeling and simulationent://SD_ILS/0/SD_ILS:23170812024-09-25T08:15:47Z2024-09-25T08:15:47Zby Couretas, Jerry M., 1966- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119420873">https://learning.oreilly.com/library/view/~/9781119420873</a>
<a href="https://learning.oreilly.com/library/view/~/9781119420873/?ar">https://learning.oreilly.com/library/view/~/9781119420873/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119420873/?ar">https://go.oreilly.com/library-access/library/view/-/9781119420873/?ar</a><br/>Format: Electronic Resources<br/>Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchainent://SD_ILS/0/SD_ILS:23170922024-09-25T08:15:47Z2024-09-25T08:15:47Zby Gupta, Rajneesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990189">https://learning.oreilly.com/library/view/~/9781788990189</a>
<a href="https://learning.oreilly.com/library/view/~/9781788990189/?ar">https://learning.oreilly.com/library/view/~/9781788990189/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar</a><br/>Format: Electronic Resources<br/>Securing Office 365 : masterminding MDM and compliance in the cloudent://SD_ILS/0/SD_ILS:23185642024-09-25T08:15:47Z2024-09-25T08:15:47Zby Katzer, Matthew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484242308/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242308/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242308/?ar">https://learning.oreilly.com/library/view/~/9781484242308/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242308">https://learning.oreilly.com/library/view/~/9781484242308</a><br/>Format: Electronic Resources<br/>Hands-on machine learning for cybersecurity : safeguard your system by making your machines intelligent using the Python ecosystement://SD_ILS/0/SD_ILS:23185882024-09-25T08:15:47Z2024-09-25T08:15:47Zby Halder, Soma, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788992282/?ar">https://go.oreilly.com/library-access/library/view/-/9781788992282/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788992282/?ar">https://learning.oreilly.com/library/view/~/9781788992282/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788992282">https://learning.oreilly.com/library/view/~/9781788992282</a><br/>Format: Electronic Resources<br/>Digital forensics and cyber crime with Kali Linux fundamentalsent://SD_ILS/0/SD_ILS:23140432024-09-25T08:15:47Z2024-09-25T08:15:47Zby Muniz, Joseph, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar">https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134693644/?ar">https://learning.oreilly.com/videos/~/9780134693644/?ar</a><br/>Format: Electronic Resources<br/>Cracking codes with Python : an introduction to building and breaking ciphersent://SD_ILS/0/SD_ILS:23143592024-09-25T08:15:47Z2024-09-25T08:15:47Zby Sweigart, Al, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067498">https://learning.oreilly.com/library/view/~/9781492067498</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067498/?ar">https://learning.oreilly.com/library/view/~/9781492067498/?ar</a><br/>Format: Electronic Resources<br/>Security penetration testing (The art of hacking series)ent://SD_ILS/0/SD_ILS:23141022024-09-25T08:15:47Z2024-09-25T08:15:47Zby Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar">https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134833989/?ar">https://learning.oreilly.com/videos/~/9780134833989/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking : orchestrating attacksent://SD_ILS/0/SD_ILS:23185102024-09-25T08:15:47Z2024-09-25T08:15:47Zby Gupta, Sunil, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484243404/?ar">https://learning.oreilly.com/videos/~/9781484243404/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking : networks and websitesent://SD_ILS/0/SD_ILS:23185112024-09-25T08:15:47Z2024-09-25T08:15:47Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243411/?ar">https://learning.oreilly.com/videos/~/9781484243411/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar</a><br/>Format: Electronic Resources<br/>Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threatsent://SD_ILS/0/SD_ILS:23155282024-09-25T08:15:47Z2024-09-25T08:15:47Zby Tevault, Donald A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788620307/?ar">https://go.oreilly.com/library-access/library/view/-/9781788620307/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788620307/?ar">https://learning.oreilly.com/library/view/~/9781788620307/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788620307">https://learning.oreilly.com/library/view/~/9781788620307</a><br/>Format: Electronic Resources<br/>Cyber security : endpoint defenseent://SD_ILS/0/SD_ILS:23166132024-09-25T08:15:47Z2024-09-25T08:15:47Zby Dewey, Gary, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788990981/?ar">https://learning.oreilly.com/videos/~/9781788990981/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar</a><br/>Format: Electronic Resources<br/>Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malwareent://SD_ILS/0/SD_ILS:23170502024-09-25T08:15:47Z2024-09-25T08:15:47Zby K. A., Monnappa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar">https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788392501/?ar">https://learning.oreilly.com/library/view/~/9781788392501/?ar</a><br/>Format: Electronic Resources<br/>Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessusent://SD_ILS/0/SD_ILS:23167002024-09-25T08:15:47Z2024-09-25T08:15:47Zby Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format: Electronic Resources<br/>Asset attack vectors : building effective vulnerability management strategies to protect organizationsent://SD_ILS/0/SD_ILS:23167202024-09-25T08:15:47Z2024-09-25T08:15:47Zby Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484236277/?ar">https://learning.oreilly.com/library/view/~/9781484236277/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484236277/?ar">https://go.oreilly.com/library-access/library/view/-/9781484236277/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484236277">https://learning.oreilly.com/library/view/~/9781484236277</a><br/>Format: Electronic Resources<br/>Getting started with z/OS data set encryptionent://SD_ILS/0/SD_ILS:23169372024-09-25T08:15:47Z2024-09-25T08:15:47Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738456874/?ar">https://learning.oreilly.com/library/view/~/9780738456874/?ar</a><br/>Format: Electronic Resources<br/>NIST cybersecurity framework : a pocket guideent://SD_ILS/0/SD_ILS:23175352024-09-25T08:15:47Z2024-09-25T08:15:47Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787780422/?ar">https://go.oreilly.com/library-access/library/view/-/9781787780422/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787780422/?ar">https://learning.oreilly.com/library/view/~/9781787780422/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787780422">https://learning.oreilly.com/library/view/~/9781787780422</a><br/>Format: Electronic Resources<br/>Linux® hardening in hostile networks : server security from TLS to TORent://SD_ILS/0/SD_ILS:23141772024-09-25T08:15:47Z2024-09-25T08:15:47Zby Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format: Electronic Resources<br/>Securing open source libraries : managing vulnerabilities in open source code packagesent://SD_ILS/0/SD_ILS:23148902024-09-25T08:15:47Z2024-09-25T08:15:47Zby Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996980/?ar">https://learning.oreilly.com/library/view/~/9781491996980/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996980">https://learning.oreilly.com/library/view/~/9781491996980</a><br/>Format: Electronic Resources<br/>Cybersecurity attacks (Red Team activity)ent://SD_ILS/0/SD_ILS:23159862024-09-25T08:15:47Z2024-09-25T08:15:47Zby Nesterenko, Sergii, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781788478878/?ar">https://learning.oreilly.com/videos/~/9781788478878/?ar</a><br/>Format: Electronic Resources<br/>Social engineering : the science of human hackingent://SD_ILS/0/SD_ILS:23168382024-09-25T08:15:47Z2024-09-25T08:15:47Zby Hadnagy, Christopher, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119433385/?ar">https://go.oreilly.com/library-access/library/view/-/9781119433385/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119433385/?ar">https://learning.oreilly.com/library/view/~/9781119433385/?ar</a><br/>Format: Electronic Resources<br/>Malware data science : attack detection and attributionent://SD_ILS/0/SD_ILS:23173882024-09-25T08:15:47Z2024-09-25T08:15:47Zby Saxe, Joshua, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067672">https://learning.oreilly.com/library/view/~/9781492067672</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067672/?ar">https://learning.oreilly.com/library/view/~/9781492067672/?ar</a><br/>Format: Electronic Resources<br/>What is cybersecurity?ent://SD_ILS/0/SD_ILS:23187222024-09-25T08:15:47Z2024-09-25T08:15:47Zby Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format: Electronic Resources<br/>Machine learning and security : protecting systems with data and algorithmsent://SD_ILS/0/SD_ILS:23158812024-09-25T08:15:47Z2024-09-25T08:15:47Zby Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar">https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491979891/?ar">https://learning.oreilly.com/library/view/~/9781491979891/?ar</a><br/>Format: Electronic Resources<br/>Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threatsent://SD_ILS/0/SD_ILS:23160162024-09-25T08:15:47Z2024-09-25T08:15:47Zby Donaldson, Scott E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232583/?ar">https://learning.oreilly.com/library/view/~/9781484232583/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484232583">https://learning.oreilly.com/library/view/~/9781484232583</a><br/>Format: Electronic Resources<br/>Integrated security technologies and solutions. Volume I, Cisco Security Solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content securityent://SD_ILS/0/SD_ILS:23163882024-09-25T08:15:47Z2024-09-25T08:15:47Zby Woland, Aaron T., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807577/?ar">https://learning.oreilly.com/library/view/~/9780134807577/?ar</a><br/>Format: Electronic Resources<br/>Penetration Testing mit Metasploit : Praxiswissen für mehr IT-Sicherheitent://SD_ILS/0/SD_ILS:23162552024-09-25T08:15:47Z2024-09-25T08:15:47Zby Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958455979/?ar">https://learning.oreilly.com/library/view/~/9783958455979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958455979">https://learning.oreilly.com/library/view/~/9783958455979</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar">https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar</a><br/>Format: Electronic Resources<br/>Hei ke wang luo ying yong : wang luo qin ru ying yong.ent://SD_ILS/0/SD_ILS:23322882024-09-25T08:15:47Z2024-09-25T08:15:47Zby Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a>
<a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format: Video recording<br/>Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systemsent://SD_ILS/0/SD_ILS:23116092024-09-25T08:15:47Z2024-09-25T08:15:47Zby Griffor, Edward R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128038383/?ar">https://learning.oreilly.com/library/view/~/9780128038383/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar">https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128038383">https://learning.oreilly.com/library/view/~/9780128038383</a><br/>Format: Electronic Resources<br/>Agile application security : enabling security in a continuous delivery pipelineent://SD_ILS/0/SD_ILS:23123602024-09-25T08:15:47Z2024-09-25T08:15:47Zby Bell, Laura, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491938836">https://learning.oreilly.com/library/view/~/9781491938836</a>
<a href="https://learning.oreilly.com/library/view/~/9781491938836/?ar">https://learning.oreilly.com/library/view/~/9781491938836/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491938836/?ar">https://go.oreilly.com/library-access/library/view/-/9781491938836/?ar</a><br/>Format: Electronic Resources<br/>Hacking exposed : malware and rootkits : security secrets & solutionsent://SD_ILS/0/SD_ILS:23123622024-09-25T08:15:47Z2024-09-25T08:15:47Zby Davis, Michael, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071825757">https://learning.oreilly.com/library/view/~/9780071825757</a>
<a href="https://learning.oreilly.com/library/view/~/9780071825757/?ar">https://learning.oreilly.com/library/view/~/9780071825757/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar">https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar</a><br/>Format: Electronic Resources<br/>Cloud computing security : foundations and challengesent://SD_ILS/0/SD_ILS:23115242024-09-25T08:15:47Z2024-09-25T08:15:47Zby Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format: Electronic Resources<br/>An quan shen tou ce shi.ent://SD_ILS/0/SD_ILS:23324372024-09-25T08:15:47Z2024-09-25T08:15:47Zby Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882021010401/?ar">https://learning.oreilly.com/videos/~/8882021010401/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010401">https://learning.oreilly.com/videos/~/8882021010401</a>
<a href="https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar</a><br/>Format: Video recording<br/>Building a HIPAA-compliant cybersecurity program : using NIST 800-30 and CSF to secure protected health informationent://SD_ILS/0/SD_ILS:23181282024-09-25T08:15:47Z2024-09-25T08:15:47Zby Thompson, Eric C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230602/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230602/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230602/?ar">https://learning.oreilly.com/library/view/~/9781484230602/?ar</a><br/>Format: Electronic Resources<br/>Digital privacy and security using windows : a practical guideent://SD_ILS/0/SD_ILS:23136582024-09-25T08:15:47Z2024-09-25T08:15:47Zby Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484227985/?ar">https://learning.oreilly.com/library/view/~/9781484227985/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484227985/?ar">https://go.oreilly.com/library-access/library/view/-/9781484227985/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484227985">https://learning.oreilly.com/library/view/~/9781484227985</a><br/>Format: Electronic Resources<br/>Kali Linux network scanning cookbook : take your penetration-testing skills to the next levelent://SD_ILS/0/SD_ILS:23134992024-09-25T08:15:47Z2024-09-25T08:15:47Zby Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format: Electronic Resources<br/>Industrial cybersecurity : efficiently secure critical infrastructure systemsent://SD_ILS/0/SD_ILS:23146742024-09-25T08:15:47Z2024-09-25T08:15:47Zby Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788395151/?ar">https://learning.oreilly.com/library/view/~/9781788395151/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar">https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788395151">https://learning.oreilly.com/library/view/~/9781788395151</a><br/>Format: Electronic Resources<br/>Die Kunst der Anonymität im Internet : so schützen Sie Ihre Identität und Ihre Datenent://SD_ILS/0/SD_ILS:23150112024-09-25T08:15:47Z2024-09-25T08:15:47Zby Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format: Electronic Resources<br/>Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attackent://SD_ILS/0/SD_ILS:23155292024-09-25T08:15:47Z2024-09-25T08:15:47Zby Buchanan, Cameron, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788831925/?ar">https://go.oreilly.com/library-access/library/view/-/9781788831925/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788831925/?ar">https://learning.oreilly.com/library/view/~/9781788831925/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux cookbook : effective penetration testing solutionsent://SD_ILS/0/SD_ILS:23142702024-09-25T08:15:47Z2024-09-25T08:15:47Zby Schultz, Corey P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390303/?ar">https://learning.oreilly.com/library/view/~/9781784390303/?ar</a><br/>Format: Electronic Resources<br/>Metasploit for beginners : create a threat-free environment with the best-in-class toolent://SD_ILS/0/SD_ILS:23138402024-09-25T08:15:47Z2024-09-25T08:15:47Zby Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970/?ar">https://learning.oreilly.com/library/view/~/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970">https://learning.oreilly.com/library/view/~/9781788295970</a><br/>Format: Electronic Resources<br/>Windows virus and malware troubleshootingent://SD_ILS/0/SD_ILS:23129372024-09-25T08:15:47Z2024-09-25T08:15:47Zby Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format: Electronic Resources<br/>Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategiesent://SD_ILS/0/SD_ILS:23118332024-09-25T08:15:47Z2024-09-25T08:15:47Zby Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128093658/?ar">https://learning.oreilly.com/library/view/~/9780128093658/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar">https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128093658">https://learning.oreilly.com/library/view/~/9780128093658</a><br/>Format: Electronic Resources<br/>Gray hat C# : a hacker's guide to creating and automating security toolsent://SD_ILS/0/SD_ILS:23125692024-09-25T08:15:47Z2024-09-25T08:15:47Zby Perry, Brandon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492023449">https://learning.oreilly.com/library/view/~/9781492023449</a>
<a href="https://learning.oreilly.com/library/view/~/9781492023449/?ar">https://learning.oreilly.com/library/view/~/9781492023449/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492023449/?ar">https://go.oreilly.com/library-access/library/view/-/9781492023449/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing essentials.ent://SD_ILS/0/SD_ILS:23119552024-09-25T08:15:47Z2024-09-25T08:15:47Zby Oriyano, Sean-Philip.<br/><a href="https://learning.oreilly.com/library/view/~/9781119235309">https://learning.oreilly.com/library/view/~/9781119235309</a>
<a href="https://learning.oreilly.com/library/view/~/9781119235309/?ar">https://learning.oreilly.com/library/view/~/9781119235309/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar">https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar</a><br/>Format: Electronic Resources<br/>Securing the internet of thingsent://SD_ILS/0/SD_ILS:23123482024-09-25T08:15:47Z2024-09-25T08:15:47Zby Li, Shancang, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045053">https://learning.oreilly.com/library/view/~/9780128045053</a>
<a href="https://learning.oreilly.com/library/view/~/9780128045053/?ar">https://learning.oreilly.com/library/view/~/9780128045053/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar</a><br/>Format: Electronic Resources<br/>Spring Security LDAP integration and SAML extensionent://SD_ILS/0/SD_ILS:23139432024-09-25T08:15:47Z2024-09-25T08:15:47Zby Mishra, Ankit, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781787285538/?ar">https://learning.oreilly.com/videos/~/9781787285538/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar">https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar</a><br/>Format: Electronic Resources<br/>Spring Security : secure your web applications, RESTful services, and microservice architecturesent://SD_ILS/0/SD_ILS:23150672024-09-25T08:15:47Z2024-09-25T08:15:47Zby Knutson, Mick, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787129511/?ar">https://go.oreilly.com/library-access/library/view/-/9781787129511/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787129511/?ar">https://learning.oreilly.com/library/view/~/9781787129511/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutionsent://SD_ILS/0/SD_ILS:23146832024-09-25T08:15:47Z2024-09-25T08:15:47Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a>
<a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format: Electronic Resources<br/>Security from first principles : a practical guide to the information security practice principlesent://SD_ILS/0/SD_ILS:23144252024-09-25T08:15:47Z2024-09-25T08:15:47Zby Jackson, Craig, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996911/?ar">https://learning.oreilly.com/library/view/~/9781491996911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996911">https://learning.oreilly.com/library/view/~/9781491996911</a><br/>Format: Electronic Resources<br/>Cyber security : a practitioner's guideent://SD_ILS/0/SD_ILS:23137632024-09-25T08:15:47Z2024-09-25T08:15:47Zby Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format: Electronic Resources<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:21109522024-09-25T08:15:47Z2024-09-25T08:15:47Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4009415">Click to View</a><br/>Format: Electronic Resources<br/>Intro to secure software : building security systemsent://SD_ILS/0/SD_ILS:23101562024-09-25T08:15:47Z2024-09-25T08:15:47Zby Sletten, Brian, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781491943595/?ar">https://learning.oreilly.com/videos/~/9781491943595/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491943595/?ar">https://go.oreilly.com/library-access/library/view/-/9781491943595/?ar</a><br/>Format: Electronic Resources<br/>Essential cybersecurity science : build, test, and evaluate secure systemsent://SD_ILS/0/SD_ILS:23091932024-09-25T08:15:47Z2024-09-25T08:15:47Zby Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:23092962024-09-25T08:15:47Z2024-09-25T08:15:47Zby Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format: Electronic Resources<br/>The current security threat landscape.ent://SD_ILS/0/SD_ILS:23093322024-09-25T08:15:47Z2024-09-25T08:15:47Zby Santos, Omar, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9780134466279/?ar">https://learning.oreilly.com/videos/~/9780134466279/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134466279/?ar">https://go.oreilly.com/library-access/library/view/-/9780134466279/?ar</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:23102902024-09-25T08:15:47Z2024-09-25T08:15:47Zby Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format: Electronic Resources<br/>A study of black hole attack solutions : on AODV routing protocol in MANETent://SD_ILS/0/SD_ILS:23090382024-09-25T08:15:47Z2024-09-25T08:15:47Zby Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format: Electronic Resources<br/>People-centric security : transforming your enterprise security cultureent://SD_ILS/0/SD_ILS:23095172024-09-25T08:15:47Z2024-09-25T08:15:47Zby Hayden, Lance, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071846790/?ar">https://learning.oreilly.com/library/view/~/9780071846790/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar">https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar</a><br/>Format: Electronic Resources<br/>Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldent://SD_ILS/0/SD_ILS:23110272024-09-25T08:15:47Z2024-09-25T08:15:47Zby Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785889639">https://learning.oreilly.com/library/view/~/9781785889639</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889639/?ar">https://learning.oreilly.com/library/view/~/9781785889639/?ar</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploitent://SD_ILS/0/SD_ILS:23116042024-09-25T08:15:47Z2024-09-25T08:15:47Zby Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786463166/?ar">https://go.oreilly.com/library-access/library/view/-/9781786463166/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786463166/?ar">https://learning.oreilly.com/library/view/~/9781786463166/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786463166">https://learning.oreilly.com/library/view/~/9781786463166</a><br/>Format: Electronic Resources<br/>Cybersecurity for hospitals and healthcare facilities : a guide to detection and preventionent://SD_ILS/0/SD_ILS:23116102024-09-25T08:15:47Z2024-09-25T08:15:47Zby Ayala, Luis, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484221556/?ar">https://go.oreilly.com/library-access/library/view/-/9781484221556/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484221556/?ar">https://learning.oreilly.com/library/view/~/9781484221556/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484221556">https://learning.oreilly.com/library/view/~/9781484221556</a><br/>Format: Electronic Resources<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:23108042024-09-25T08:15:47Z2024-09-25T08:15:47Zby Fowler, Kevvie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034507/?ar">https://learning.oreilly.com/library/view/~/9780128034507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128034507">https://learning.oreilly.com/library/view/~/9780128034507</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128034507/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034507/?ar</a><br/>Format: Electronic Resources<br/>Mastering the Microsoft Deployment Toolkit : take a deep dive into the world of Windows desktop deployment using the Microsoft Deployment Toolkitent://SD_ILS/0/SD_ILS:23108132024-09-25T08:15:47Z2024-09-25T08:15:47Zby Stokes, Jeff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782172499/?ar">https://learning.oreilly.com/library/view/~/9781782172499/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782172499">https://learning.oreilly.com/library/view/~/9781782172499</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782172499/?ar">https://go.oreilly.com/library-access/library/view/-/9781782172499/?ar</a><br/>Format: Electronic Resources<br/>Fluent 2016 : San Francisco, California video compilationent://SD_ILS/0/SD_ILS:23102542024-09-25T08:15:47Z2024-09-25T08:15:47Zby Fluent. ( 2016 : San Francisco, California)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491944585/?ar">https://go.oreilly.com/library-access/library/view/-/9781491944585/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491944585/?ar">https://learning.oreilly.com/videos/~/9781491944585/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackersent://SD_ILS/0/SD_ILS:23110062024-09-25T08:15:47Z2024-09-25T08:15:47Zby Halton, Wolf, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782168492/?ar">https://learning.oreilly.com/library/view/~/9781782168492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782168492">https://learning.oreilly.com/library/view/~/9781782168492</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:23100182024-09-25T08:15:47Z2024-09-25T08:15:47Zby Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar">https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128033357/?ar">https://learning.oreilly.com/library/view/~/9780128033357/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third editionent://SD_ILS/0/SD_ILS:23116552024-09-25T08:15:47Z2024-09-25T08:15:47Zby Johansen, Gerard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785888427/?ar">https://learning.oreilly.com/library/view/~/9781785888427/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar">https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar</a><br/>Format: Electronic Resources<br/>Threat forecasting : leveraging big data for predictive analysisent://SD_ILS/0/SD_ILS:23106292024-09-25T08:15:47Z2024-09-25T08:15:47Zby Pirc, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128004784/?ar">https://learning.oreilly.com/library/view/~/9780128004784/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar">https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128004784">https://learning.oreilly.com/library/view/~/9780128004784</a><br/>Format: Electronic Resources<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:23134842024-09-25T08:15:47Z2024-09-25T08:15:47Zby Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format: Electronic Resources<br/>Machine Learning Forensics for Law Enforcement, Security, and Intelligenceent://SD_ILS/0/SD_ILS:23135632024-09-25T08:15:47Z2024-09-25T08:15:47Zby Mena, Jesus, author<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439860700/?ar">https://go.oreilly.com/library-access/library/view/-/9781439860700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439860700">https://learning.oreilly.com/library/view/~/9781439860700</a>
<a href="https://learning.oreilly.com/library/view/~/9781439860700/?ar">https://learning.oreilly.com/library/view/~/9781439860700/?ar</a><br/>Format: Electronic Resources<br/>Data Mining and Machine Learning in Cybersecurityent://SD_ILS/0/SD_ILS:23135572024-09-25T08:15:47Z2024-09-25T08:15:47Zby Dua, Sumeet, author<br/><a href="https://learning.oreilly.com/library/view/~/9781439839430/?ar">https://learning.oreilly.com/library/view/~/9781439839430/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439839430/?ar">https://go.oreilly.com/library-access/library/view/-/9781439839430/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439839430">https://learning.oreilly.com/library/view/~/9781439839430</a><br/>Format: Electronic Resources<br/>Information theft prevention : theory and practiceent://SD_ILS/0/SD_ILS:23155502024-09-25T08:15:47Z2024-09-25T08:15:47Zby Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format: Electronic Resources<br/>Cybersecurity for Industrial Control Systems : SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:23135652024-09-25T08:15:47Z2024-09-25T08:15:47Zby Macaulay, Tyson, author<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439801987/?ar">https://go.oreilly.com/library-access/library/view/-/9781439801987/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439801987/?ar">https://learning.oreilly.com/library/view/~/9781439801987/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439801987">https://learning.oreilly.com/library/view/~/9781439801987</a><br/>Format: Electronic Resources<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:23144162024-09-25T08:15:47Z2024-09-25T08:15:47Zby Bose, S., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789332579125/?ar">https://learning.oreilly.com/library/view/~/9789332579125/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar">https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9789332579125">https://learning.oreilly.com/library/view/~/9789332579125</a><br/>Format: Electronic Resources<br/>Encryption : toward secure systemsent://SD_ILS/0/SD_ILS:23108272024-09-25T08:15:47Z2024-09-25T08:15:47Zby Sletten, Brian, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491944363/?ar">https://go.oreilly.com/library-access/library/view/-/9781491944363/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491944363/?ar">https://learning.oreilly.com/videos/~/9781491944363/?ar</a><br/>Format: Electronic Resources<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:23109912024-09-25T08:15:47Z2024-09-25T08:15:47Zby Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format: Electronic Resources<br/>Enterprise Mac security : El Capitanent://SD_ILS/0/SD_ILS:23097402024-09-25T08:15:47Z2024-09-25T08:15:47Zby Edge, Charles S., Jr., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484217122/?ar">https://go.oreilly.com/library-access/library/view/-/9781484217122/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484217122/?ar">https://learning.oreilly.com/library/view/~/9781484217122/?ar</a><br/>Format: Electronic Resources<br/>VCP6-DCV official cert guide : (exam #2VO-621)ent://SD_ILS/0/SD_ILS:23105692024-09-25T08:15:47Z2024-09-25T08:15:47Zby Davis, John A. (Software consultant), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134392974/?ar">https://learning.oreilly.com/library/view/~/9780134392974/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134392974/?ar">https://go.oreilly.com/library-access/library/view/-/9780134392974/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134392974">https://learning.oreilly.com/library/view/~/9780134392974</a><br/>Format: Electronic Resources<br/>Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipesent://SD_ILS/0/SD_ILS:23105852024-09-25T08:15:47Z2024-09-25T08:15:47Zby Kalsi, Tajinder, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785286421/?ar">https://learning.oreilly.com/library/view/~/9781785286421/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785286421/?ar">https://go.oreilly.com/library-access/library/view/-/9781785286421/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785286421">https://learning.oreilly.com/library/view/~/9781785286421</a><br/>Format: Electronic Resources<br/>Practical Windows forensics : leverage the power of digital forensics for Windows systemsent://SD_ILS/0/SD_ILS:23110212024-09-25T08:15:47Z2024-09-25T08:15:47Zby Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format: Electronic Resources<br/>The Complete Guide to Cybersecurity Risks and Controlsent://SD_ILS/0/SD_ILS:23245242024-09-25T08:15:47Z2024-09-25T08:15:47Zby Kohnke, Anne, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar">https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579/?ar">https://learning.oreilly.com/library/view/~/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579">https://learning.oreilly.com/library/view/~/9781498740579</a><br/>Format: Electronic Resources<br/>Computer Security Literacyent://SD_ILS/0/SD_ILS:23234262024-09-25T08:15:47Z2024-09-25T08:15:47Zby Jacobson, Douglas, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856192/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856192/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856192/?ar">https://learning.oreilly.com/library/view/~/9781439856192/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856192">https://learning.oreilly.com/library/view/~/9781439856192</a><br/>Format: Electronic Resources<br/>Honeypots and routers : collecting internet attacksent://SD_ILS/0/SD_ILS:23222732024-09-25T08:15:47Z2024-09-25T08:15:47Zby Mohammed, Mohssen, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781498702201">https://learning.oreilly.com/library/view/~/9781498702201</a>
<a href="https://learning.oreilly.com/library/view/~/9781498702201/?ar">https://learning.oreilly.com/library/view/~/9781498702201/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781498702201/?ar">https://go.oreilly.com/library-access/library/view/-/9781498702201/?ar</a><br/>Format: Electronic Resources<br/>Crafting the InfoSec playbookent://SD_ILS/0/SD_ILS:23073922024-09-25T08:15:47Z2024-09-25T08:15:47Zby Bollinger, Jeff, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar">https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491913598">https://learning.oreilly.com/library/view/~/9781491913598</a>
<a href="https://learning.oreilly.com/library/view/~/9781491913598/?ar">https://learning.oreilly.com/library/view/~/9781491913598/?ar</a><br/>Format: Electronic Resources<br/>Healthcare information security and privacyent://SD_ILS/0/SD_ILS:23065092024-09-25T08:15:47Z2024-09-25T08:15:47Zby Murphy, Sean P. (Sean Patrick), 1968- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071831796/?ar">https://go.oreilly.com/library-access/library/view/-/9780071831796/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071831796">https://learning.oreilly.com/library/view/~/9780071831796</a>
<a href="https://learning.oreilly.com/library/view/~/9780071831796/?ar">https://learning.oreilly.com/library/view/~/9780071831796/?ar</a><br/>Format: Electronic Resources<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:23065102024-09-25T08:15:47Z2024-09-25T08:15:47Zby Regalado, Daniel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071832380/?ar">https://learning.oreilly.com/library/view/~/9780071832380/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar">https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar</a><br/>Format: Electronic Resources<br/>Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:23059412024-09-25T08:15:47Z2024-09-25T08:15:47Zby Knapp, Eric D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124201149/?ar">https://learning.oreilly.com/library/view/~/9780124201149/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124201149/?ar">https://go.oreilly.com/library-access/library/view/-/9780124201149/?ar</a><br/>Format: Electronic Resources<br/>Microsoft security fundamentals LiveLessonsent://SD_ILS/0/SD_ILS:23057252024-09-25T08:15:47Z2024-09-25T08:15:47Zby Lieberman, Ed, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780133949445/?ar">https://learning.oreilly.com/videos/~/9780133949445/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar">https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar</a><br/>Format: Electronic Resources<br/>Designing and building a security operations centerent://SD_ILS/0/SD_ILS:23053052024-09-25T08:15:47Z2024-09-25T08:15:47Zby Nathans, David, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008997/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008997/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008997/?ar">https://learning.oreilly.com/library/view/~/9780128008997/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008997">https://learning.oreilly.com/library/view/~/9780128008997</a><br/>Format: Electronic Resources<br/>Securing Windows networks : from system security basics to monitoring and auditingent://SD_ILS/0/SD_ILS:23085612024-09-25T08:15:47Z2024-09-25T08:15:47Zby Long, Mark, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar">https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771374903/?ar">https://learning.oreilly.com/videos/~/9781771374903/?ar</a><br/>Format: Electronic Resources<br/>Infosec management fundamentalsent://SD_ILS/0/SD_ILS:23080392024-09-25T08:15:47Z2024-09-25T08:15:47Zby Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar">https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128041871/?ar">https://learning.oreilly.com/library/view/~/9780128041871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128041871">https://learning.oreilly.com/library/view/~/9780128041871</a><br/>Format: Electronic Resources<br/>Securing social media in the enterpriseent://SD_ILS/0/SD_ILS:23080412024-09-25T08:15:47Z2024-09-25T08:15:47Zby Dalziel, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128041963">https://learning.oreilly.com/library/view/~/9780128041963</a>
<a href="https://learning.oreilly.com/library/view/~/9780128041963/?ar">https://learning.oreilly.com/library/view/~/9780128041963/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128041963/?ar">https://go.oreilly.com/library-access/library/view/-/9780128041963/?ar</a><br/>Format: Electronic Resources<br/>Advanced malware analysisent://SD_ILS/0/SD_ILS:23088652024-09-25T08:15:47Z2024-09-25T08:15:47Zby Elisan, Christopher C., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071819756">https://learning.oreilly.com/library/view/~/9780071819756</a>
<a href="https://learning.oreilly.com/library/view/~/9780071819756/?ar">https://learning.oreilly.com/library/view/~/9780071819756/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar">https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar</a><br/>Format: Electronic Resources<br/>Mehr Hacking mit Python : eigene Tools entwickeln für Hacker and Pentesterent://SD_ILS/0/SD_ILS:23087772024-09-25T08:15:47Z2024-09-25T08:15:47Zby Seitz, Justin, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457196140">https://learning.oreilly.com/library/view/~/9781457196140</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457196140/?ar">https://go.oreilly.com/library-access/library/view/-/9781457196140/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457196140/?ar">https://learning.oreilly.com/library/view/~/9781457196140/?ar</a><br/>Format: Electronic Resources<br/>Reduce risk and improve security on IBM mainframes. Volume 3, Mainframe subsystem and application securityent://SD_ILS/0/SD_ILS:23089712024-09-25T08:15:47Z2024-09-25T08:15:47Zby Bücker, Axel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738441023/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441023/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738441023/?ar">https://learning.oreilly.com/library/view/~/9780738441023/?ar</a><br/>Format: Electronic Resources<br/>Secrets and lies : digital security in a networked worldent://SD_ILS/0/SD_ILS:23087532024-09-25T08:15:47Z2024-09-25T08:15:47Zby Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119092438">https://learning.oreilly.com/library/view/~/9781119092438</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar">https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119092438/?ar">https://learning.oreilly.com/library/view/~/9781119092438/?ar</a><br/>Format: Electronic Resources<br/>Mastering Python forensics : master the art of digital forensics and analysis with Pythonent://SD_ILS/0/SD_ILS:23092272024-09-25T08:15:47Z2024-09-25T08:15:47Zby Spreitzenbarth, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783988044/?ar">https://learning.oreilly.com/library/view/~/9781783988044/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar">https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783988044">https://learning.oreilly.com/library/view/~/9781783988044</a><br/>Format: Electronic Resources<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:23046822024-09-25T08:15:47Z2024-09-25T08:15:47Zby Hexmoor, Henry, 1960- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008911/?ar">https://learning.oreilly.com/library/view/~/9780128008911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008911">https://learning.oreilly.com/library/view/~/9780128008911</a><br/>Format: Electronic Resources<br/>Security in computingent://SD_ILS/0/SD_ILS:23058972024-09-25T08:15:47Z2024-09-25T08:15:47Zby Pfleeger, Charles P., 1948- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134085074/?ar">https://learning.oreilly.com/library/view/~/9780134085074/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar">https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar</a><br/>Format: Electronic Resources<br/>Introduction to information security : LiveLessons (Sneak Peek Video Training)ent://SD_ILS/0/SD_ILS:23063462024-09-25T08:15:47Z2024-09-25T08:15:47Zby Aurnou, Scott, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar">https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134135823/?ar">https://learning.oreilly.com/videos/~/9780134135823/?ar</a><br/>Format: Electronic Resources<br/>Getting started with cybersecurity scienceent://SD_ILS/0/SD_ILS:23081502024-09-25T08:15:47Z2024-09-25T08:15:47Zby Dykstra, Josiah, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491936528/?ar">https://go.oreilly.com/library-access/library/view/-/9781491936528/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491936528/?ar">https://learning.oreilly.com/videos/~/9781491936528/?ar</a><br/>Format: Electronic Resources<br/>How to attack and defend your websiteent://SD_ILS/0/SD_ILS:23059342024-09-25T08:15:47Z2024-09-25T08:15:47Zby Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027325/?ar">https://learning.oreilly.com/library/view/~/9780128027325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027325">https://learning.oreilly.com/library/view/~/9780128027325</a><br/>Format: Electronic Resources<br/>The Architecture of Privacy : On Engineering Technologies that Can Deliver Trustworthy Safeguardsent://SD_ILS/0/SD_ILS:23082072024-09-25T08:15:47Z2024-09-25T08:15:47Zby Bowman, Courtney, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491904503/?ar">https://learning.oreilly.com/library/view/~/9781491904503/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491904503/?ar">https://go.oreilly.com/library-access/library/view/-/9781491904503/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491904503">https://learning.oreilly.com/library/view/~/9781491904503</a><br/>Format: Electronic Resources<br/>Security for web developers : using JavaScript, HTML, and CSSent://SD_ILS/0/SD_ILS:23090222024-09-25T08:15:47Z2024-09-25T08:15:47Zby Mueller, John, 1958- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491928684/?ar">https://go.oreilly.com/library-access/library/view/-/9781491928684/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491928684/?ar">https://learning.oreilly.com/library/view/~/9781491928684/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491928684">https://learning.oreilly.com/library/view/~/9781491928684</a><br/>Format: Electronic Resources<br/>Reduce risk and improve security on IBM mainframes. Volume 2, Mainframe communication and networking securityent://SD_ILS/0/SD_ILS:23086222024-09-25T08:15:47Z2024-09-25T08:15:47Zby Bücker, Axel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738440941/?ar">https://learning.oreilly.com/library/view/~/9780738440941/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738440941/?ar">https://go.oreilly.com/library-access/library/view/-/9780738440941/?ar</a><br/>Format: Electronic Resources<br/>ASP.NET web API security essentials : take the security of your ASP.NET web API to the next level using some of the most amazing security techniques aroundent://SD_ILS/0/SD_ILS:23092982024-09-25T08:15:47Z2024-09-25T08:15:47Zby Gunasundaram, Rajesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785882210/?ar">https://learning.oreilly.com/library/view/~/9781785882210/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785882210">https://learning.oreilly.com/library/view/~/9781785882210</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785882210/?ar">https://go.oreilly.com/library-access/library/view/-/9781785882210/?ar</a><br/>Format: Electronic Resources<br/>Implementing NetScaler VPX : implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platformsent://SD_ILS/0/SD_ILS:23098322024-09-25T08:15:47Z2024-09-25T08:15:47Zby Sandbu, Marius, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785288982">https://learning.oreilly.com/library/view/~/9781785288982</a>
<a href="https://learning.oreilly.com/library/view/~/9781785288982/?ar">https://learning.oreilly.com/library/view/~/9781785288982/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785288982/?ar">https://go.oreilly.com/library-access/library/view/-/9781785288982/?ar</a><br/>Format: Electronic Resources<br/>Application security in the ISO 27001:2013 environmentent://SD_ILS/0/SD_ILS:23090732024-09-25T08:15:47Z2024-09-25T08:15:47Zby Vasudevan, Vinod, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287692/?ar">https://learning.oreilly.com/library/view/~/9781849287692/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar</a><br/>Format: Electronic Resources<br/>Risk centric threat modeling : process for attack simulation and threat analysisent://SD_ILS/0/SD_ILS:23087922024-09-25T08:15:47Z2024-09-25T08:15:47Zby Uceda Vélez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format: Electronic Resources<br/>Web application security is a stack : how to CYA (cover your apps) completelyent://SD_ILS/0/SD_ILS:23088452024-09-25T08:15:47Z2024-09-25T08:15:47Zby MacVittie, Lori A., 1969- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287050/?ar">https://learning.oreilly.com/library/view/~/9781849287050/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar</a><br/>Format: Electronic Resources<br/>Once more unto the breach : managing information security in an uncertain worldent://SD_ILS/0/SD_ILS:23088462024-09-25T08:15:47Z2024-09-25T08:15:47Zby Simmons, Andrea C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849287098/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287098/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849287098/?ar">https://learning.oreilly.com/library/view/~/9781849287098/?ar</a><br/>Format: Electronic Resources<br/>Information security : a practical guide : bridging the gap between IT and managementent://SD_ILS/0/SD_ILS:23088522024-09-25T08:15:47Z2024-09-25T08:15:47Zby Mooney, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849287418/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287418/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849287418/?ar">https://learning.oreilly.com/library/view/~/9781849287418/?ar</a><br/>Format: Electronic Resources<br/>Fluent conference 2015 : complete video compilationent://SD_ILS/0/SD_ILS:23075302024-09-25T08:15:47Z2024-09-25T08:15:47Zby Fluent. San Francisco, April 20-25<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491927786/?ar">https://go.oreilly.com/library-access/library/view/-/9781491927786/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491927786/?ar">https://learning.oreilly.com/videos/~/9781491927786/?ar</a><br/>Format: Electronic Resources<br/>Network attacks and exploitation : a frameworkent://SD_ILS/0/SD_ILS:23077172024-09-25T08:15:47Z2024-09-25T08:15:47Zby Monte, Matthew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118987124">https://learning.oreilly.com/library/view/~/9781118987124</a>
<a href="https://learning.oreilly.com/library/view/~/9781118987124/?ar">https://learning.oreilly.com/library/view/~/9781118987124/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118987124/?ar">https://go.oreilly.com/library-access/library/view/-/9781118987124/?ar</a><br/>Format: Electronic Resources<br/>Beyond cybersecurity : protecting your digital businessent://SD_ILS/0/SD_ILS:23069342024-09-25T08:15:47Z2024-09-25T08:15:47Zby Kaplan, James M., 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119026846">https://learning.oreilly.com/library/view/~/9781119026846</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar">https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119026846/?ar">https://learning.oreilly.com/library/view/~/9781119026846/?ar</a><br/>Format: Electronic Resources<br/>Anomaly detection for monitoring : a statistical approach to time series anomaly detectionent://SD_ILS/0/SD_ILS:23169072024-09-25T08:15:47Z2024-09-25T08:15:47Zby Jinka, Preetam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042341">https://learning.oreilly.com/library/view/~/9781492042341</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042341/?ar">https://learning.oreilly.com/library/view/~/9781492042341/?ar</a><br/>Format: Electronic Resources<br/>Mastering the Nmap scripting engine : master the Nmap scripting engine and the art of developing NSE scriptsent://SD_ILS/0/SD_ILS:23066302024-09-25T08:15:47Z2024-09-25T08:15:47Zby Pale, Paulino Calderon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782168317/?ar">https://learning.oreilly.com/library/view/~/9781782168317/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782168317/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168317/?ar</a><br/>Format: Electronic Resources<br/>Agile security : an introduction for developersent://SD_ILS/0/SD_ILS:23163802024-09-25T08:15:47Z2024-09-25T08:15:47Zby Brunton-Spall, Michael, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492037699/?ar">https://learning.oreilly.com/videos/~/9781492037699/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492037699/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037699/?ar</a><br/>Format: Electronic Resources<br/>Official (ISC)2 guide to the CSSLP CBKent://SD_ILS/0/SD_ILS:23003032024-09-25T08:15:47Z2024-09-25T08:15:47Zby Paul, Mano.<br/><a href="https://learning.oreilly.com/library/view/~/9781466571273">https://learning.oreilly.com/library/view/~/9781466571273</a>
<a href="https://learning.oreilly.com/library/view/~/9781466571273/?ar">https://learning.oreilly.com/library/view/~/9781466571273/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar">https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar</a><br/>Format: Electronic Resources<br/>Intrusion detection networks : a key to collaborative securityent://SD_ILS/0/SD_ILS:23011122024-09-25T08:15:47Z2024-09-25T08:15:47Zby Fung, Carol, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564121/?ar">https://learning.oreilly.com/library/view/~/9781466564121/?ar</a><br/>Format: Electronic Resources<br/>Mastering Windows Server 2012 R2ent://SD_ILS/0/SD_ILS:23011522024-09-25T08:15:47Z2024-09-25T08:15:47Zby Minasi, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar">https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118289426/?ar">https://learning.oreilly.com/library/view/~/9781118289426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118289426">https://learning.oreilly.com/library/view/~/9781118289426</a><br/>Format: Electronic Resources<br/>The basics of IT audit : Purposes, processes, and practical information.ent://SD_ILS/0/SD_ILS:23015012024-09-25T08:15:47Z2024-09-25T08:15:47Zby Gantz, Stephen D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596/?ar">https://learning.oreilly.com/library/view/~/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596">https://learning.oreilly.com/library/view/~/9780124171596</a><br/>Format: Electronic Resources<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:23011502024-09-25T08:15:47Z2024-09-25T08:15:47Zby Cherry, Denny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113/?ar">https://learning.oreilly.com/library/view/~/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113">https://learning.oreilly.com/library/view/~/9780128000113</a><br/>Format: Electronic Resources<br/>Security management : a critical thinking approachent://SD_ILS/0/SD_ILS:23015622024-09-25T08:15:47Z2024-09-25T08:15:47Zby Land, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781466561779">https://learning.oreilly.com/library/view/~/9781466561779</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466561779/?ar">https://go.oreilly.com/library-access/library/view/-/9781466561779/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466561779/?ar">https://learning.oreilly.com/library/view/~/9781466561779/?ar</a><br/>Format: Electronic Resources<br/>Hacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:23026232024-09-25T08:15:47Z2024-09-25T08:15:47Zby Gomzin, Slava, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118810071/?ar">https://learning.oreilly.com/library/view/~/9781118810071/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810071">https://learning.oreilly.com/library/view/~/9781118810071</a><br/>Format: Electronic Resources<br/>Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscationent://SD_ILS/0/SD_ILS:23026252024-09-25T08:15:47Z2024-09-25T08:15:47Zby Dang, Bruce, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118787397/?ar">https://learning.oreilly.com/library/view/~/9781118787397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar">https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118787397">https://learning.oreilly.com/library/view/~/9781118787397</a><br/>Format: Electronic Resources<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:23026262024-09-25T08:15:47Z2024-09-25T08:15:47Zby Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:23032942024-09-25T08:15:47Z2024-09-25T08:15:47Zby Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approachent://SD_ILS/0/SD_ILS:23034752024-09-25T08:15:47Z2024-09-25T08:15:47Zby Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar">https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782162223/?ar">https://learning.oreilly.com/library/view/~/9781782162223/?ar</a><br/>Format: Electronic Resources<br/>Anonymizing health data : case studies and methods to get you startedent://SD_ILS/0/SD_ILS:23015932024-09-25T08:15:47Z2024-09-25T08:15:47Zby El Emam, Khaled.<br/><a href="https://learning.oreilly.com/library/view/~/9781449363062">https://learning.oreilly.com/library/view/~/9781449363062</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781449363062/?ar">https://go.oreilly.com/library-access/library/view/-/9781449363062/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449363062/?ar">https://learning.oreilly.com/library/view/~/9781449363062/?ar</a><br/>Format: Electronic Resources<br/>Black hat Python : Python programming for hackers and pentestersent://SD_ILS/0/SD_ILS:23056592024-09-25T08:15:47Z2024-09-25T08:15:47Zby Seitz, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar">https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457189807/?ar">https://learning.oreilly.com/library/view/~/9781457189807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457189807">https://learning.oreilly.com/library/view/~/9781457189807</a><br/>Format: Electronic Resources<br/>Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environmentent://SD_ILS/0/SD_ILS:23040392024-09-25T08:15:47Z2024-09-25T08:15:47Zby Mehan, Julie E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285728/?ar">https://learning.oreilly.com/library/view/~/9781849285728/?ar</a><br/>Format: Electronic Resources<br/>Securing cloud servicesent://SD_ILS/0/SD_ILS:23061212024-09-25T08:15:47Z2024-09-25T08:15:47Zby Miller, David, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar">https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771373340/?ar">https://learning.oreilly.com/videos/~/9781771373340/?ar</a><br/>Format: Electronic Resources<br/>