Search Results for - Narrowed by: Computer networks -- Security measures. - 2016 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092016$0025092016$0026ps$003d300? 2024-05-31T01:14:41Z Network security with NetFlow and IPFIX : big data analytics for information security ent://SD_ILS/0/SD_ILS:2308401 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Santos, Omar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134033549/?ar">https://go.oreilly.com/library-access/library/view/-/9780134033549/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134033549/?ar">https://learning.oreilly.com/library/view/~/9780134033549/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134033549">https://learning.oreilly.com/library/view/~/9780134033549</a><br/>Format:&#160;Electronic Resources<br/> Foundations of modern networking : SDN, NFV, QoE, IoT, and Cloud ent://SD_ILS/0/SD_ILS:2308800 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Stallings, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134175478/?ar">https://learning.oreilly.com/library/view/~/9780134175478/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar">https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices ent://SD_ILS/0/SD_ILS:2311174 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Steadman, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785283925/?ar">https://learning.oreilly.com/library/view/~/9781785283925/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785283925">https://learning.oreilly.com/library/view/~/9781785283925</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785283925/?ar">https://go.oreilly.com/library-access/library/view/-/9781785283925/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2309318 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar">https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119154686/?ar">https://learning.oreilly.com/library/view/~/9781119154686/?ar</a><br/>Format:&#160;Electronic Resources<br/> Thinking security : stopping next year's hackers ent://SD_ILS/0/SD_ILS:2308932 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Bellovin, Steven M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar">https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134278223">https://learning.oreilly.com/library/view/~/9780134278223</a> <a href="https://learning.oreilly.com/library/view/~/9780134278223/?ar">https://learning.oreilly.com/library/view/~/9780134278223/?ar</a><br/>Format:&#160;Electronic Resources<br/> Understanding the Cisco ASA firewall : learning to install, configure, and manage Cisco firewalls and advanced VPN solutions ent://SD_ILS/0/SD_ILS:2311543 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Larsson, Jimmy, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491969656/?ar">https://go.oreilly.com/library-access/library/view/-/9781491969656/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491969656/?ar">https://learning.oreilly.com/videos/~/9781491969656/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Enterprise LANs using the Junos OS : defending and protecting Juniper based corporate networks ent://SD_ILS/0/SD_ILS:2311107 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Brown, Martin, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491962503/?ar">https://learning.oreilly.com/videos/~/9781491962503/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491962503/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962503/?ar</a><br/>Format:&#160;Electronic Resources<br/> The O'Reilly Security Conference, New York, NY, 2016. ent://SD_ILS/0/SD_ILS:2311881 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Adkins, Heather, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491960035/?ar">https://go.oreilly.com/library-access/library/view/-/9781491960035/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491960035/?ar">https://learning.oreilly.com/videos/~/9781491960035/?ar</a><br/>Format:&#160;Electronic Resources<br/> Essential cybersecurity science : build, test, and evaluate secure systems ent://SD_ILS/0/SD_ILS:2309193 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format:&#160;Electronic Resources<br/> The current security threat landscape. ent://SD_ILS/0/SD_ILS:2309332 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Santos, Omar, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9780134466279/?ar">https://learning.oreilly.com/videos/~/9780134466279/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134466279/?ar">https://go.oreilly.com/library-access/library/view/-/9780134466279/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:2311050 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Chapman, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128036013">https://learning.oreilly.com/library/view/~/9780128036013</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128036013/?ar">https://go.oreilly.com/library-access/library/view/-/9780128036013/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128036013/?ar">https://learning.oreilly.com/library/view/~/9780128036013/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it ent://SD_ILS/0/SD_ILS:2311529 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Cardwell, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar">https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785883491/?ar">https://learning.oreilly.com/library/view/~/9781785883491/?ar</a><br/>Format:&#160;Electronic Resources<br/> O'Reilly Security Conference 2016, Amsterdam, Netherlands. ent://SD_ILS/0/SD_ILS:2312072 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;O'Reilly Security Conference (2016 : Amsterdam, Netherlands)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491976128/?ar">https://go.oreilly.com/library-access/library/view/-/9781491976128/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491976128/?ar">https://learning.oreilly.com/videos/~/9781491976128/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing : a complete pentesting guide facilitating smooth backtracking for working hackers : a course in three modules. ent://SD_ILS/0/SD_ILS:2312619 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287839/?ar">https://learning.oreilly.com/library/view/~/9781787287839/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques ent://SD_ILS/0/SD_ILS:2310274 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Fadyushin, Vyacheslav, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785283154">https://learning.oreilly.com/library/view/~/9781785283154</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785283154/?ar">https://go.oreilly.com/library-access/library/view/-/9781785283154/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785283154/?ar">https://learning.oreilly.com/library/view/~/9781785283154/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:2310018 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar">https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128033357/?ar">https://learning.oreilly.com/library/view/~/9780128033357/?ar</a><br/>Format:&#160;Electronic Resources<br/> Are your bits flipped? : overcoming tech misconceptions ent://SD_ILS/0/SD_ILS:2310599 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Kissell, Joe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar">https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492017172/?ar">https://learning.oreilly.com/library/view/~/9781492017172/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:2310991 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format:&#160;Electronic Resources<br/> Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0 ent://SD_ILS/0/SD_ILS:2311316 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Olups, Rihards, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782161288/?ar">https://learning.oreilly.com/library/view/~/9781782161288/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782161288/?ar">https://go.oreilly.com/library-access/library/view/-/9781782161288/?ar</a><br/>Format:&#160;Electronic Resources<br/> Identity and data security for web development : best practices ent://SD_ILS/0/SD_ILS:2310821 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;LeBlanc, Jonathan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491937006">https://learning.oreilly.com/library/view/~/9781491937006</a> <a href="https://learning.oreilly.com/library/view/~/9781491937006/?ar">https://learning.oreilly.com/library/view/~/9781491937006/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491937006/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937006/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering identity and access management with Microsoft Azure : start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments ent://SD_ILS/0/SD_ILS:2311745 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Nickel, Jochen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785889448/?ar">https://learning.oreilly.com/library/view/~/9781785889448/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785889448">https://learning.oreilly.com/library/view/~/9781785889448</a><br/>Format:&#160;Electronic Resources<br/> Wireless communications security : solutions for the internet of things ent://SD_ILS/0/SD_ILS:2311624 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Penttinen, Jyrki T. J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119084396/?ar">https://learning.oreilly.com/library/view/~/9781119084396/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar">https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering modern web penetration testing : master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does! ent://SD_ILS/0/SD_ILS:2311896 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Prasad, Prakhar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar">https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785284588">https://learning.oreilly.com/library/view/~/9781785284588</a> <a href="https://learning.oreilly.com/library/view/~/9781785284588/?ar">https://learning.oreilly.com/library/view/~/9781785284588/?ar</a><br/>Format:&#160;Electronic Resources<br/> The second economy : the race for trust, treasure and time in the cybersecurity war ent://SD_ILS/0/SD_ILS:2312552 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information theft prevention : theory and practice ent://SD_ILS/0/SD_ILS:2315550 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format:&#160;Electronic Resources<br/> Understanding intrusion detection systems : detecting attackers and incidents inside your hosts and networks ent://SD_ILS/0/SD_ILS:2311136 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Messier, Ric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491962701/?ar">https://learning.oreilly.com/videos/~/9781491962701/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491962701/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962701/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity lexicon ent://SD_ILS/0/SD_ILS:2311137 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Ayala, Luis, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220689/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220689/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484220689/?ar">https://learning.oreilly.com/library/view/~/9781484220689/?ar</a><br/>Format:&#160;Electronic Resources<br/> DevOpsSec : securing software through continuous delivery ent://SD_ILS/0/SD_ILS:2311196 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Bird, Jim, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491971413/?ar">https://go.oreilly.com/library-access/library/view/-/9781491971413/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491971413/?ar">https://learning.oreilly.com/library/view/~/9781491971413/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491971413">https://learning.oreilly.com/library/view/~/9781491971413</a><br/>Format:&#160;Electronic Resources<br/> Advanced penetration testing for highly-secured environments : employee the most advanced pentesting techniques and tools to build highly-secured systems and environments ent://SD_ILS/0/SD_ILS:2310257 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Allen, Lee (Information security specialist), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784395810/?ar">https://learning.oreilly.com/library/view/~/9781784395810/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781784395810/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395810/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:2310804 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Fowler, Kevvie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034507/?ar">https://learning.oreilly.com/library/view/~/9780128034507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128034507">https://learning.oreilly.com/library/view/~/9780128034507</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128034507/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034507/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Windows forensics : leverage the power of digital forensics for Windows systems ent://SD_ILS/0/SD_ILS:2311021 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format:&#160;Electronic Resources<br/> Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools ent://SD_ILS/0/SD_ILS:2311022 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Rehim, Rejah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar">https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785280696/?ar">https://learning.oreilly.com/library/view/~/9781785280696/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785280696">https://learning.oreilly.com/library/view/~/9781785280696</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world ent://SD_ILS/0/SD_ILS:2311027 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785889639">https://learning.oreilly.com/library/view/~/9781785889639</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785889639/?ar">https://learning.oreilly.com/library/view/~/9781785889639/?ar</a><br/>Format:&#160;Electronic Resources<br/> A study of black hole attack solutions : on AODV routing protocol in MANET ent://SD_ILS/0/SD_ILS:2309038 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux ent://SD_ILS/0/SD_ILS:2310036 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Sak, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785285561">https://learning.oreilly.com/library/view/~/9781785285561</a> <a href="https://learning.oreilly.com/library/view/~/9781785285561/?ar">https://learning.oreilly.com/library/view/~/9781785285561/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar">https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure your Node.js web application : keep attackers out and users happy ent://SD_ILS/0/SD_ILS:2309949 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;D&uuml;&uuml;na, Karl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar">https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781680501780/?ar">https://learning.oreilly.com/library/view/~/9781680501780/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781680501780">https://learning.oreilly.com/library/view/~/9781680501780</a><br/>Format:&#160;Electronic Resources<br/> Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks ent://SD_ILS/0/SD_ILS:2310121 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Datt, Samir, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar">https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782174905/?ar">https://learning.oreilly.com/library/view/~/9781782174905/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782174905">https://learning.oreilly.com/library/view/~/9781782174905</a><br/>Format:&#160;Electronic Resources<br/> Implementing DirectAccess with Windows Server 2016 ent://SD_ILS/0/SD_ILS:2311767 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Hicks, Richard M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484220597/?ar">https://learning.oreilly.com/library/view/~/9781484220597/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484220597/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220597/?ar</a><br/>Format:&#160;Electronic Resources<br/> Python : penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modules ent://SD_ILS/0/SD_ILS:2311849 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787128187">https://learning.oreilly.com/library/view/~/9781787128187</a> <a href="https://learning.oreilly.com/library/view/~/9781787128187/?ar">https://learning.oreilly.com/library/view/~/9781787128187/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar">https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advances in Network Management ent://SD_ILS/0/SD_ILS:2313639 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Ding, Jianguo, author<br/><a href="https://learning.oreilly.com/library/view/~/9781420064551">https://learning.oreilly.com/library/view/~/9781420064551</a> <a href="https://learning.oreilly.com/library/view/~/9781420064551/?ar">https://learning.oreilly.com/library/view/~/9781420064551/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420064551/?ar">https://go.oreilly.com/library-access/library/view/-/9781420064551/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware diffusion models for modern complex networks : theory and applications ent://SD_ILS/0/SD_ILS:2313869 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Karyotis, Vasileios, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128027165/?ar">https://learning.oreilly.com/library/view/~/9780128027165/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cracking security misconceptions : untangling common myths about modern information security ent://SD_ILS/0/SD_ILS:2316704 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Peterson, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042747">https://learning.oreilly.com/library/view/~/9781492042747</a> <a href="https://learning.oreilly.com/library/view/~/9781492042747/?ar">https://learning.oreilly.com/library/view/~/9781492042747/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar</a><br/>Format:&#160;Electronic Resources<br/> Google hacking for penetration testers ent://SD_ILS/0/SD_ILS:2309293 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Long, Johnny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029824/?ar">https://learning.oreilly.com/library/view/~/9780128029824/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the V3rb0ten network ent://SD_ILS/0/SD_ILS:2309296 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format:&#160;Electronic Resources<br/> People-centric security : transforming your enterprise security culture ent://SD_ILS/0/SD_ILS:2309517 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Hayden, Lance, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071846790/?ar">https://learning.oreilly.com/library/view/~/9780071846790/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar">https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments ent://SD_ILS/0/SD_ILS:2309216 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Richter, Andy, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045046/?ar">https://learning.oreilly.com/library/view/~/9780128045046/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128045046/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045046/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Complete Guide to Cybersecurity Risks and Controls ent://SD_ILS/0/SD_ILS:2324524 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Kohnke, Anne, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar">https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781498740579/?ar">https://learning.oreilly.com/library/view/~/9781498740579/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781498740579">https://learning.oreilly.com/library/view/~/9781498740579</a><br/>Format:&#160;Electronic Resources<br/> Bezpieczenstwo tozsamosci i danych w projektach Web ent://SD_ILS/0/SD_ILS:2324505 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;LeBlanc, Jonathan.<br/><a href="https://learning.oreilly.com/library/view/~/9788375412093/?ar">https://learning.oreilly.com/library/view/~/9788375412093/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9788375412093/?ar">https://go.oreilly.com/library-access/library/view/-/9788375412093/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9788375412093">https://learning.oreilly.com/library/view/~/9788375412093</a><br/>Format:&#160;Electronic Resources<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:2313484 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format:&#160;Electronic Resources<br/> z/OS PKI Services : quick set-up for multiple CAs ent://SD_ILS/0/SD_ILS:2312432 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Winnard, Keith, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738443054/?ar">https://learning.oreilly.com/library/view/~/0738443054/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738443054/?ar">https://go.oreilly.com/library-access/library/view/-/0738443054/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738443054">https://learning.oreilly.com/library/view/~/0738443054</a><br/>Format:&#160;Electronic Resources<br/> Security in an IPv6 Environment ent://SD_ILS/0/SD_ILS:2323651 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Minoli, Daniel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420092301/?ar">https://learning.oreilly.com/library/view/~/9781420092301/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420092301">https://learning.oreilly.com/library/view/~/9781420092301</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420092301/?ar">https://go.oreilly.com/library-access/library/view/-/9781420092301/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in the digital era. Volume 1 ent://SD_ILS/0/SD_ILS:2060915 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4648717">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Foundations of modern networking : sdn, nfv, qoe, iot, and cloud ent://SD_ILS/0/SD_ILS:1342730 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Stallings, William, author.<br/>Format:&#160;Books<br/> Security in fixed and wireless networks ent://SD_ILS/0/SD_ILS:2279930 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Schafer, Gunter, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=7104366">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it ent://SD_ILS/0/SD_ILS:2265601 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4662307">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and human rights in the age of cyberveillance ent://SD_ILS/0/SD_ILS:2264105 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Kulesza, Joanna, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4098051">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux ent://SD_ILS/0/SD_ILS:2271621 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Sak, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4520799">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0 ent://SD_ILS/0/SD_ILS:2271758 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Olups, Rihards, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4643698">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical Windows forensics : leverage the power of digital forensics for Windows systems ent://SD_ILS/0/SD_ILS:2271719 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Shaaban, Ayman, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594307">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world ent://SD_ILS/0/SD_ILS:2271720 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Russell, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594308">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Perils of the web : cyber security and internet safety ent://SD_ILS/0/SD_ILS:2237774 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Hodalska, Magdalena, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6481756">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering identity and access management with Microsoft Azure : start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments ent://SD_ILS/0/SD_ILS:2235522 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Nickel, Jochen, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4709423">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks ent://SD_ILS/0/SD_ILS:2235375 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Datt, Samir, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4520820">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Essential skills for hackers ent://SD_ILS/0/SD_ILS:2098424 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189281">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced penetration testing for highly-secured environments. ent://SD_ILS/0/SD_ILS:2155483 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Allen, Lee, 1946- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4520648">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures ent://SD_ILS/0/SD_ILS:2111091 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Mazurczyk, Wojciech, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4405578">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malware diffusion models for modern complex networks : theory and applications ent://SD_ILS/0/SD_ILS:2209758 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Karyotis, Vasileios, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4438752">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the windows registry ent://SD_ILS/0/SD_ILS:2209760 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4438754">Click to View</a><br/>Format:&#160;Electronic Resources<br/> You : for sale protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:2208965 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SSL and TLS : theory and practice ent://SD_ILS/0/SD_ILS:2211962 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Oppliger, Rolf, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4821279">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building a corporate culture of security : strategies for strengthening organizational resiliency ent://SD_ILS/0/SD_ILS:2209738 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4425984">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:2209813 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452264">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:2209814 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452265">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber guerilla ent://SD_ILS/0/SD_ILS:2210281 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Haaster, Jelle van, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4557157">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dns security : defending the domain name system ent://SD_ILS/0/SD_ILS:2210263 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556898">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:2210264 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556899">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools ent://SD_ILS/0/SD_ILS:2276873 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Rehim, Rejah, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594304">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SELinux System Administration : ward off traditional security permissions and effectively secure your Linuxs systems with SELinux ent://SD_ILS/0/SD_ILS:2312410 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Vermeulen, Sven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787126954/?ar">https://go.oreilly.com/library-access/library/view/-/9781787126954/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787126954">https://learning.oreilly.com/library/view/~/9781787126954</a> <a href="https://learning.oreilly.com/library/view/~/9781787126954/?ar">https://learning.oreilly.com/library/view/~/9781787126954/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:2314416 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Bose, S., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789332579125/?ar">https://learning.oreilly.com/library/view/~/9789332579125/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar">https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9789332579125">https://learning.oreilly.com/library/view/~/9789332579125</a><br/>Format:&#160;Electronic Resources<br/> The platform transformation : how IoT will change IT, and when ent://SD_ILS/0/SD_ILS:2316661 2024-05-31T01:14:41Z 2024-05-31T01:14:41Z by&#160;Perry, Matthew J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042792/?ar">https://learning.oreilly.com/library/view/~/9781492042792/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492042792">https://learning.oreilly.com/library/view/~/9781492042792</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042792/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042792/?ar</a><br/>Format:&#160;Electronic Resources<br/>