Search Results for - Narrowed by: Computer networks -- Security measures. - 2007 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026ps$003d300? 2024-05-25T05:29:38Z How to cheat at VoIP security ent://SD_ILS/0/SD_ILS:2304097 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Porter, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491693/?ar">https://learning.oreilly.com/library/view/~/9781597491693/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491693/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491693/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI compliance implementing effective PCI data security standards ent://SD_ILS/0/SD_ILS:64326 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Bradley, Tony, 1969-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Windows Forensic Analysis DVD Toolkit. ent://SD_ILS/0/SD_ILS:1196518 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Carvey, Harlan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328624">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring Juniper Networks NetScreen &amp; SSG firewalls ent://SD_ILS/0/SD_ILS:64175 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Cameron, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at configuring Open Source security tools ent://SD_ILS/0/SD_ILS:64178 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Alder, Raven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Security Data Visualization : Graphical Techniques for Network Analysis. ent://SD_ILS/0/SD_ILS:1291613 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Conti, Greg.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3017625">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Misuse of Information Systems : The Impact of Security Countermeasures. ent://SD_ILS/0/SD_ILS:1291177 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;D'Arcy, John P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3016826">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security in Distributed and Networking Systems. ent://SD_ILS/0/SD_ILS:1258327 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Xiao, Yang.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1193126">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:343201 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Wiles, Jack.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at Voip security ent://SD_ILS/0/SD_ILS:64226 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Porter, Thomas, PhD.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Asterisk hacking ent://SD_ILS/0/SD_ILS:64237 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Brashars, Joshua.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Network security assessment from vulnerability to patch ent://SD_ILS/0/SD_ILS:64284 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Manzuik, Steve.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Botnets the killer web app ent://SD_ILS/0/SD_ILS:64257 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Schiller, Craig A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Integrated security systems design concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:64294 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Norman, Thomas, CSC.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">An electronic book accessible through the World Wide Web; click for information</a> Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip074/2006038020.html">http://www.loc.gov/catdir/toc/ecip074/2006038020.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0703/2006038020-d.html">http://www.loc.gov/catdir/enhancements/fy0703/2006038020-d.html</a><br/>Format:&#160;Electronic Resources<br/> Techno Security's guide to managing risks for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:64259 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Snort IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:64163 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Beale, Jay<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490993">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:64238 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Botnets the killer web app ent://SD_ILS/0/SD_ILS:340160 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Schiller, Craig A.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406</a><br/>Format:&#160;Electronic Resources<br/> Teori ve uygulamalar ile TCP/IP ağ g&uuml;venliği / Can Okan Dirican. ent://SD_ILS/0/SD_ILS:79009 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Dirican, Can Okan.<br/>Format:&#160;Books<br/> Toward a Safer and More Secure Cyberspace. ent://SD_ILS/0/SD_ILS:1320138 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Committee on Improving Cybersecurity Research in the United States, National Research Council.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3378311">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:2289130 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Beale, Jay.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490993/?ar">https://learning.oreilly.com/library/view/~/9781597490993/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:2284630 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Dubrawsky, Ido.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492317/?ar">https://learning.oreilly.com/library/view/~/9781597492317/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492317">https://learning.oreilly.com/library/view/~/9781597492317</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:2287682 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Bayles, Aaron W.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492133/?ar">https://learning.oreilly.com/library/view/~/9781597492133/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492133/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492133/?ar</a><br/>Format:&#160;Electronic Resources<br/> Configuring Juniper Networks NetScreen &amp; SSG firewalls ent://SD_ILS/0/SD_ILS:2286184 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Cameron, Rob.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491181/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491181/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491181/?ar">https://learning.oreilly.com/library/view/~/9781597491181/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco firewall technology ent://SD_ILS/0/SD_ILS:2282843 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781587053290/?ar">https://learning.oreilly.com/library/view/~/9781587053290/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587053290">https://learning.oreilly.com/library/view/~/9781587053290</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587053290/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053290/?ar</a><br/>Format:&#160;Electronic Resources<br/> Botnets : the killer web app ent://SD_ILS/0/SD_ILS:2283565 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Schiller, Craig A.<br/><a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491358/?ar">https://learning.oreilly.com/library/view/~/9781597491358/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco ASA, PIX, and FWSM firewall handbook ent://SD_ILS/0/SD_ILS:2283808 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Hucaby, Dave.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587054570/?ar">https://go.oreilly.com/library-access/library/view/-/9781587054570/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587054570/?ar">https://learning.oreilly.com/library/view/~/9781587054570/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587054570">https://learning.oreilly.com/library/view/~/9781587054570</a><br/>Format:&#160;Electronic Resources<br/> Web services security and e-business ent://SD_ILS/0/SD_ILS:2262045 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Radhamani, G., 1968-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1</a><br/>Format:&#160;Electronic Resources<br/> Network security assessment ent://SD_ILS/0/SD_ILS:2283925 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;McNab, Chris (Chris R.), 1980-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596510305/?ar">https://go.oreilly.com/library-access/library/view/-/9780596510305/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596510305/?ar">https://learning.oreilly.com/library/view/~/9780596510305/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596510305">https://learning.oreilly.com/library/view/~/9780596510305</a><br/>Format:&#160;Electronic Resources<br/> AVIEN malware defense guide for the Enterprise ent://SD_ILS/0/SD_ILS:2284510 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Harley, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491648">https://learning.oreilly.com/library/view/~/9781597491648</a> <a href="https://learning.oreilly.com/library/view/~/9781597491648/?ar">https://learning.oreilly.com/library/view/~/9781597491648/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar</a><br/>Format:&#160;Electronic Resources<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:2284514 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492232">https://learning.oreilly.com/library/view/~/9781597492232</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492232/?ar">https://learning.oreilly.com/library/view/~/9781597492232/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI compliance : implementing effective PCI data security standards ent://SD_ILS/0/SD_ILS:2285657 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Bradley, Tony, 1969-<br/><a href="https://learning.oreilly.com/library/view/~/9781597491655">https://learning.oreilly.com/library/view/~/9781597491655</a> <a href="https://www.sciencedirect.com/science/book/9781597491655">https://www.sciencedirect.com/science/book/9781597491655</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491655/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491655/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491655/?ar">https://learning.oreilly.com/library/view/~/9781597491655/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco NAC appliance : enforcing host security with clean access ent://SD_ILS/0/SD_ILS:2283801 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Heary, Jamey.<br/><a href="https://learning.oreilly.com/library/view/~/9781587053061">https://learning.oreilly.com/library/view/~/9781587053061</a> <a href="https://learning.oreilly.com/library/view/~/9781587053061/?ar">https://learning.oreilly.com/library/view/~/9781587053061/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587053061/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053061/?ar</a><br/>Format:&#160;Electronic Resources<br/> End-to-end network security : defense-in-depth ent://SD_ILS/0/SD_ILS:2284052 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Santos, Omar.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587053320/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053320/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587053320/?ar">https://learning.oreilly.com/library/view/~/9781587053320/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587053320">https://learning.oreilly.com/library/view/~/9781587053320</a><br/>Format:&#160;Electronic Resources<br/> Network security assessment : from vulnerability to patch ent://SD_ILS/0/SD_ILS:2286242 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Manzuik, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491013/?ar">https://learning.oreilly.com/library/view/~/9781597491013/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491013/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491013/?ar</a><br/>Format:&#160;Electronic Resources<br/> Exploiting online games : cheating massively distributed systems ent://SD_ILS/0/SD_ILS:2283933 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Hoglund, Greg.<br/><a href="https://learning.oreilly.com/library/view/~/9780132271912/?ar">https://learning.oreilly.com/library/view/~/9780132271912/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780132271912/?ar">https://go.oreilly.com/library-access/library/view/-/9780132271912/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132271912">https://learning.oreilly.com/library/view/~/9780132271912</a><br/>Format:&#160;Electronic Resources<br/> Integrated Security Systems Design : Concepts, Specifications, and Implementation. ent://SD_ILS/0/SD_ILS:2286958 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Norman, Thomas L.<br/><a href="https://learning.oreilly.com/library/view/~/9780750679091/?ar">https://learning.oreilly.com/library/view/~/9780750679091/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780750679091/?ar">https://go.oreilly.com/library-access/library/view/-/9780750679091/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2282490 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security monitoring with Cisco security MARS ent://SD_ILS/0/SD_ILS:2283784 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Halleen, Gary.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587052705/?ar">https://go.oreilly.com/library-access/library/view/-/9781587052705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587052705/?ar">https://learning.oreilly.com/library/view/~/9781587052705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587052705">https://learning.oreilly.com/library/view/~/9781587052705</a><br/>Format:&#160;Electronic Resources<br/> Business continuity &amp; disaster recovery for IT professionals ent://SD_ILS/0/SD_ILS:2283997 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Snedaker, Susan.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491723/?ar">https://learning.oreilly.com/library/view/~/9781597491723/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491723/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491723/?ar</a><br/>Format:&#160;Electronic Resources<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:2282873 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597490610">https://learning.oreilly.com/library/view/~/9781597490610</a> <a href="https://www.sciencedirect.com/science/book/9781597490610">https://www.sciencedirect.com/science/book/9781597490610</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490610/?ar">https://learning.oreilly.com/library/view/~/9781597490610/?ar</a><br/>Format:&#160;Electronic Resources<br/> Endpoint security ent://SD_ILS/0/SD_ILS:2283117 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Kadrich, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9780321436955/?ar">https://learning.oreilly.com/library/view/~/9780321436955/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321436955/?ar">https://go.oreilly.com/library-access/library/view/-/9780321436955/?ar</a><br/>Format:&#160;Electronic Resources<br/> Fuzzing : brute force vulnerabilty discovery ent://SD_ILS/0/SD_ILS:2283451 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Sutton, Michael, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9780321446114">https://learning.oreilly.com/library/view/~/9780321446114</a> <a href="https://learning.oreilly.com/library/view/~/9780321446114/?ar">https://learning.oreilly.com/library/view/~/9780321446114/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar">https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar</a><br/>Format:&#160;Electronic Resources<br/> Elsevier's dictionary of information security in English, German, French and Russian ent://SD_ILS/0/SD_ILS:2283476 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Manoilov, G.<br/><a href="https://learning.oreilly.com/library/view/~/9780080488806">https://learning.oreilly.com/library/view/~/9780080488806</a> <a href="https://learning.oreilly.com/library/view/~/9780080488806/?ar">https://learning.oreilly.com/library/view/~/9780080488806/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080488806/?ar">https://go.oreilly.com/library-access/library/view/-/9780080488806/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security power tools ent://SD_ILS/0/SD_ILS:2283951 2024-05-25T05:29:38Z 2024-05-25T05:29:38Z by&#160;Burns, Bryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780596009632">https://learning.oreilly.com/library/view/~/9780596009632</a> <a href="https://learning.oreilly.com/library/view/~/9780596009632/?ar">https://learning.oreilly.com/library/view/~/9780596009632/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar">https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar</a><br/>Format:&#160;Electronic Resources<br/>