Search Results for - Narrowed by: Computer crimes -- Prevention. - Computer networks -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes$002b--$002bPrevention.$002509Computer$002bcrimes$002b--$002bPrevention.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue?2024-06-19T22:44:39ZLearning digital identity : design, deploy, and manage identity architecturesent://SD_ILS/0/SD_ILS:23347392024-06-19T22:44:39Z2024-06-19T22:44:39Zby Windley, Phillip J., 1958- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098117689/?ar">https://learning.oreilly.com/library/view/~/9781098117689/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098117689">https://learning.oreilly.com/library/view/~/9781098117689</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar">https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar</a><br/>Format: Electronic Resources<br/>Navigating the cybersecurity career pathent://SD_ILS/0/SD_ILS:23308362024-06-19T22:44:39Z2024-06-19T22:44:39Zby Patton, Helen E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119833420">https://learning.oreilly.com/library/view/~/9781119833420</a>
<a href="https://learning.oreilly.com/library/view/~/9781119833420/?ar">https://learning.oreilly.com/library/view/~/9781119833420/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar">https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar</a><br/>Format: Electronic Resources<br/>How cybersecurity really works : a hands-on guide for total beginnersent://SD_ILS/0/SD_ILS:23280362024-06-19T22:44:39Z2024-06-19T22:44:39Zby Grubb, Sam (Cyber security consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999/?ar">https://learning.oreilly.com/library/view/~/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999">https://learning.oreilly.com/library/view/~/9781098128999</a><br/>Format: Electronic Resources<br/>Cyberjutsu : cybersecurity for the modern ninjaent://SD_ILS/0/SD_ILS:23265412024-06-19T22:44:39Z2024-06-19T22:44:39Zby McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format: Electronic Resources<br/>Cyber smart : five habits to protect your family, money, and identity from cyber criminalsent://SD_ILS/0/SD_ILS:23188682024-06-19T22:44:39Z2024-06-19T22:44:39Zby McDonough, Bart R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469071503/?ar">https://learning.oreilly.com/library/view/~/9781469071503/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar">https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469071503">https://learning.oreilly.com/library/view/~/9781469071503</a><br/>Format: Sound recording<br/>Cyberspace and cybersecurityent://SD_ILS/0/SD_ILS:22607692024-06-19T22:44:39Z2024-06-19T22:44:39Zby Kostopoulos, George K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5110029">Click to View</a><br/>Format: Electronic Resources<br/>Modernizing cybersecurity operations with machine intelligence : advanced threat detection, hunting, and analysisent://SD_ILS/0/SD_ILS:23184562024-06-19T22:44:39Z2024-06-19T22:44:39Zby Guerra, Peter, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar">https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492035992/?ar">https://learning.oreilly.com/library/view/~/9781492035992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492035992">https://learning.oreilly.com/library/view/~/9781492035992</a><br/>Format: Electronic Resources<br/>Practical cyber intelligence : how action-based intelligence can be an effective response to incidentsent://SD_ILS/0/SD_ILS:23163482024-06-19T22:44:39Z2024-06-19T22:44:39Zby Bautista, Wilson, Jr., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788625562">https://learning.oreilly.com/library/view/~/9781788625562</a>
<a href="https://learning.oreilly.com/library/view/~/9781788625562/?ar">https://learning.oreilly.com/library/view/~/9781788625562/?ar</a><br/>Format: Electronic Resources<br/>Cybercrime and business : strategies for global corporate securityent://SD_ILS/0/SD_ILS:22123622024-06-19T22:44:39Z2024-06-19T22:44:39Zby Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4863624">Click to View</a><br/>Format: Electronic Resources<br/>People-centric security : transforming your enterprise security cultureent://SD_ILS/0/SD_ILS:23095172024-06-19T22:44:39Z2024-06-19T22:44:39Zby Hayden, Lance, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071846790/?ar">https://learning.oreilly.com/library/view/~/9780071846790/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar">https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar</a><br/>Format: Electronic Resources<br/>Cyber Threat! : How to Manage the Growing Risk of Cyber Attacks.ent://SD_ILS/0/SD_ILS:12741262024-06-19T22:44:39Z2024-06-19T22:44:39Zby Ulsch, MacDonnell.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1742833">Click to View</a><br/>Format: Electronic Resources<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:22073322024-06-19T22:44:39Z2024-06-19T22:44:39Zby Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1673591">Click to View</a><br/>Format: Electronic Resources<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:23031552024-06-19T22:44:39Z2024-06-19T22:44:39Zby Sood, Aditya K.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar">https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128006047/?ar">https://learning.oreilly.com/library/view/~/9780128006047/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:23015242024-06-19T22:44:39Z2024-06-19T22:44:39Zby Mowbray, Thomas J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar">https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115/?ar">https://learning.oreilly.com/library/view/~/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115">https://learning.oreilly.com/library/view/~/9781118697115</a><br/>Format: Electronic Resources<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:23034482024-06-19T22:44:39Z2024-06-19T22:44:39Zby Ulsch, N. MacDonnell, 1951-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar">https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118935958/?ar">https://learning.oreilly.com/library/view/~/9781118935958/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118935958">https://learning.oreilly.com/library/view/~/9781118935958</a><br/>Format: Electronic Resources<br/>The Basics of Web Hacking : Tools and Techniques to Attack the Web.ent://SD_ILS/0/SD_ILS:12596962024-06-19T22:44:39Z2024-06-19T22:44:39Zby Pauli, Josh.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1222592">Click to View</a><br/>Format: Electronic Resources<br/>Web Application Defender's Cookbook : Battling Hackers and Protecting Users.ent://SD_ILS/0/SD_ILS:22984532024-06-19T22:44:39Z2024-06-19T22:44:39Zby Barnett, Ryan C.<br/><a href="https://learning.oreilly.com/library/view/~/9781118417058/?ar">https://learning.oreilly.com/library/view/~/9781118417058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar">https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118417058">https://learning.oreilly.com/library/view/~/9781118417058</a><br/>Format: Electronic Resources<br/>Hacking exposed : mobile security secrets & solutionsent://SD_ILS/0/SD_ILS:23010162024-06-19T22:44:39Z2024-06-19T22:44:39Zby Bergman, Neil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar">https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071817011/?ar">https://learning.oreilly.com/library/view/~/9780071817011/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071817011">https://learning.oreilly.com/library/view/~/9780071817011</a><br/>Format: Electronic Resources<br/>The basics of web hacking : tools and techniques to attack the webent://SD_ILS/0/SD_ILS:23000582024-06-19T22:44:39Z2024-06-19T22:44:39Zby Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format: Electronic Resources<br/>Hacking Web Apps : Detecting and Preventing Web Application Security Problems.ent://SD_ILS/0/SD_ILS:12476652024-06-19T22:44:39Z2024-06-19T22:44:39Zby Shema, Mike.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1012529">Click to View</a><br/>Format: Electronic Resources<br/>Reverse Deception Organized Cyber Threat Counter-Exploitation.ent://SD_ILS/0/SD_ILS:22950962024-06-19T22:44:39Z2024-06-19T22:44:39Zby Kilger, Dr Max.<br/><a href="https://learning.oreilly.com/library/view/~/9780071772495">https://learning.oreilly.com/library/view/~/9780071772495</a>
<a href="https://learning.oreilly.com/library/view/~/9780071772495/?ar">https://learning.oreilly.com/library/view/~/9780071772495/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar">https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar</a><br/>Format: Electronic Resources<br/>The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)ent://SD_ILS/0/SD_ILS:22941702024-06-19T22:44:39Z2024-06-19T22:44:39Zby Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format: Electronic Resources<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:22897182024-06-19T22:44:39Z2024-06-19T22:44:39Zby Timm, Carl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495455/?ar">https://learning.oreilly.com/library/view/~/9781597495455/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495455">https://learning.oreilly.com/library/view/~/9781597495455</a><br/>Format: Electronic Resources<br/>Seven deadliest web application attacksent://SD_ILS/0/SD_ILS:22895522024-06-19T22:44:39Z2024-06-19T22:44:39Zby Shema, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495431/?ar">https://learning.oreilly.com/library/view/~/9781597495431/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar</a><br/>Format: Electronic Resources<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:22612152024-06-19T22:44:39Z2024-06-19T22:44:39Zby Seigneur, Jean-Marc.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:213582024-06-19T22:44:39Z2024-06-19T22:44:39Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:3402022024-06-19T22:44:39Z2024-06-19T22:44:39Zby Maynor, David.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833</a><br/>Format: Electronic Resources<br/>Digital identityent://SD_ILS/0/SD_ILS:22932882024-06-19T22:44:39Z2024-06-19T22:44:39Zby Windley, Phillip J., 1958-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008783/?ar">https://go.oreilly.com/library-access/library/view/-/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783/?ar">https://learning.oreilly.com/library/view/~/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783">https://learning.oreilly.com/library/view/~/0596008783</a><br/>Format: Electronic Resources<br/>Internet Denial of Service: Attack and Defense Mechanismsent://SD_ILS/0/SD_ILS:23267952024-06-19T22:44:39Z2024-06-19T22:44:39Zby Mirkovic, Jelena, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131475738/?ar">https://learning.oreilly.com/library/view/~/0131475738/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131475738/?ar">https://go.oreilly.com/library-access/library/view/-/0131475738/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131475738">https://learning.oreilly.com/library/view/~/0131475738</a><br/>Format: Electronic Resources<br/>Managing a network vulnerability assessmentent://SD_ILS/0/SD_ILS:22847292024-06-19T22:44:39Z2024-06-19T22:44:39Zby Peltier, Thomas R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203503041/?ar">https://go.oreilly.com/library-access/library/view/-/9780203503041/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203503041/?ar">https://learning.oreilly.com/library/view/~/9780203503041/?ar</a><br/>Format: Electronic Resources<br/>