Search Results for - Narrowed by: Computer crimes -- Prevention. - Computer networks -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes$002b--$002bPrevention.$002509Computer$002bcrimes$002b--$002bPrevention.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue? 2024-06-19T22:44:39Z Learning digital identity : design, deploy, and manage identity architectures ent://SD_ILS/0/SD_ILS:2334739 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Windley, Phillip J., 1958- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098117689/?ar">https://learning.oreilly.com/library/view/~/9781098117689/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098117689">https://learning.oreilly.com/library/view/~/9781098117689</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar">https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar</a><br/>Format:&#160;Electronic Resources<br/> Navigating the cybersecurity career path ent://SD_ILS/0/SD_ILS:2330836 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Patton, Helen E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119833420">https://learning.oreilly.com/library/view/~/9781119833420</a> <a href="https://learning.oreilly.com/library/view/~/9781119833420/?ar">https://learning.oreilly.com/library/view/~/9781119833420/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar">https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar</a><br/>Format:&#160;Electronic Resources<br/> How cybersecurity really works : a hands-on guide for total beginners ent://SD_ILS/0/SD_ILS:2328036 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Grubb, Sam (Cyber security consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098128999/?ar">https://learning.oreilly.com/library/view/~/9781098128999/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098128999">https://learning.oreilly.com/library/view/~/9781098128999</a><br/>Format:&#160;Electronic Resources<br/> Cyberjutsu : cybersecurity for the modern ninja ent://SD_ILS/0/SD_ILS:2326541 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a> <a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber smart : five habits to protect your family, money, and identity from cyber criminals ent://SD_ILS/0/SD_ILS:2318868 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;McDonough, Bart R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469071503/?ar">https://learning.oreilly.com/library/view/~/9781469071503/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar">https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781469071503">https://learning.oreilly.com/library/view/~/9781469071503</a><br/>Format:&#160;Sound recording<br/> Cyberspace and cybersecurity ent://SD_ILS/0/SD_ILS:2260769 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Kostopoulos, George K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5110029">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Modernizing cybersecurity operations with machine intelligence : advanced threat detection, hunting, and analysis ent://SD_ILS/0/SD_ILS:2318456 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Guerra, Peter, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar">https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492035992/?ar">https://learning.oreilly.com/library/view/~/9781492035992/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492035992">https://learning.oreilly.com/library/view/~/9781492035992</a><br/>Format:&#160;Electronic Resources<br/> Practical cyber intelligence : how action-based intelligence can be an effective response to incidents ent://SD_ILS/0/SD_ILS:2316348 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Bautista, Wilson, Jr., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788625562">https://learning.oreilly.com/library/view/~/9781788625562</a> <a href="https://learning.oreilly.com/library/view/~/9781788625562/?ar">https://learning.oreilly.com/library/view/~/9781788625562/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime and business : strategies for global corporate security ent://SD_ILS/0/SD_ILS:2212362 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4863624">Click to View</a><br/>Format:&#160;Electronic Resources<br/> People-centric security : transforming your enterprise security culture ent://SD_ILS/0/SD_ILS:2309517 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Hayden, Lance, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071846790/?ar">https://learning.oreilly.com/library/view/~/9780071846790/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar">https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber Threat! : How to Manage the Growing Risk of Cyber Attacks. ent://SD_ILS/0/SD_ILS:1274126 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Ulsch, MacDonnell.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1742833">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:2207332 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1673591">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:2303155 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Sood, Aditya K.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar">https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128006047/?ar">https://learning.oreilly.com/library/view/~/9780128006047/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity : managing systems, conducting testing, and investigating intrusions ent://SD_ILS/0/SD_ILS:2301524 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Mowbray, Thomas J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar">https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118697115/?ar">https://learning.oreilly.com/library/view/~/9781118697115/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118697115">https://learning.oreilly.com/library/view/~/9781118697115</a><br/>Format:&#160;Electronic Resources<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:2303448 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Ulsch, N. MacDonnell, 1951-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar">https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118935958/?ar">https://learning.oreilly.com/library/view/~/9781118935958/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118935958">https://learning.oreilly.com/library/view/~/9781118935958</a><br/>Format:&#160;Electronic Resources<br/> The Basics of Web Hacking : Tools and Techniques to Attack the Web. ent://SD_ILS/0/SD_ILS:1259696 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Pauli, Josh.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1222592">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web Application Defender's Cookbook : Battling Hackers and Protecting Users. ent://SD_ILS/0/SD_ILS:2298453 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Barnett, Ryan C.<br/><a href="https://learning.oreilly.com/library/view/~/9781118417058/?ar">https://learning.oreilly.com/library/view/~/9781118417058/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar">https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118417058">https://learning.oreilly.com/library/view/~/9781118417058</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed : mobile security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2301016 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Bergman, Neil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar">https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071817011/?ar">https://learning.oreilly.com/library/view/~/9780071817011/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071817011">https://learning.oreilly.com/library/view/~/9780071817011</a><br/>Format:&#160;Electronic Resources<br/> The basics of web hacking : tools and techniques to attack the web ent://SD_ILS/0/SD_ILS:2300058 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking Web Apps : Detecting and Preventing Web Application Security Problems. ent://SD_ILS/0/SD_ILS:1247665 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Shema, Mike.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Reverse Deception Organized Cyber Threat Counter-Exploitation. ent://SD_ILS/0/SD_ILS:2295096 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Kilger, Dr Max.<br/><a href="https://learning.oreilly.com/library/view/~/9780071772495">https://learning.oreilly.com/library/view/~/9780071772495</a> <a href="https://learning.oreilly.com/library/view/~/9780071772495/?ar">https://learning.oreilly.com/library/view/~/9780071772495/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar">https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar</a><br/>Format:&#160;Electronic Resources<br/> The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) ent://SD_ILS/0/SD_ILS:2294170 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:2289718 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Timm, Carl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495455/?ar">https://learning.oreilly.com/library/view/~/9781597495455/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495455">https://learning.oreilly.com/library/view/~/9781597495455</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:2289552 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Shema, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495431/?ar">https://learning.oreilly.com/library/view/~/9781597495431/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar</a><br/>Format:&#160;Electronic Resources<br/> Collaborative computer security and trust management ent://SD_ILS/0/SD_ILS:2261215 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Seigneur, Jean-Marc.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format:&#160;Electronic Resources<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:21358 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:340202 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Maynor, David.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833</a><br/>Format:&#160;Electronic Resources<br/> Digital identity ent://SD_ILS/0/SD_ILS:2293288 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Windley, Phillip J., 1958-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008783/?ar">https://go.oreilly.com/library-access/library/view/-/0596008783/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008783/?ar">https://learning.oreilly.com/library/view/~/0596008783/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008783">https://learning.oreilly.com/library/view/~/0596008783</a><br/>Format:&#160;Electronic Resources<br/> Internet Denial of Service: Attack and Defense Mechanisms ent://SD_ILS/0/SD_ILS:2326795 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Mirkovic, Jelena, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131475738/?ar">https://learning.oreilly.com/library/view/~/0131475738/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131475738/?ar">https://go.oreilly.com/library-access/library/view/-/0131475738/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131475738">https://learning.oreilly.com/library/view/~/0131475738</a><br/>Format:&#160;Electronic Resources<br/> Managing a network vulnerability assessment ent://SD_ILS/0/SD_ILS:2284729 2024-06-19T22:44:39Z 2024-06-19T22:44:39Z by&#160;Peltier, Thomas R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203503041/?ar">https://go.oreilly.com/library-access/library/view/-/9780203503041/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780203503041/?ar">https://learning.oreilly.com/library/view/~/9780203503041/?ar</a><br/>Format:&#160;Electronic Resources<br/>