Search Results for - Narrowed by: Computer networks -- Security measures. - 2016SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092016$0025092016$0026ps$003d300?2024-05-31T01:14:41ZNetwork security with NetFlow and IPFIX : big data analytics for information securityent://SD_ILS/0/SD_ILS:23084012024-05-31T01:14:41Z2024-05-31T01:14:41Zby Santos, Omar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134033549/?ar">https://go.oreilly.com/library-access/library/view/-/9780134033549/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134033549/?ar">https://learning.oreilly.com/library/view/~/9780134033549/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134033549">https://learning.oreilly.com/library/view/~/9780134033549</a><br/>Format: Electronic Resources<br/>Foundations of modern networking : SDN, NFV, QoE, IoT, and Cloudent://SD_ILS/0/SD_ILS:23088002024-05-31T01:14:41Z2024-05-31T01:14:41Zby Stallings, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134175478/?ar">https://learning.oreilly.com/library/view/~/9780134175478/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar">https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practicesent://SD_ILS/0/SD_ILS:23111742024-05-31T01:14:41Z2024-05-31T01:14:41Zby Steadman, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785283925/?ar">https://learning.oreilly.com/library/view/~/9781785283925/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785283925">https://learning.oreilly.com/library/view/~/9781785283925</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785283925/?ar">https://go.oreilly.com/library-access/library/view/-/9781785283925/?ar</a><br/>Format: Electronic Resources<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:23093182024-05-31T01:14:41Z2024-05-31T01:14:41Zby Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar">https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119154686/?ar">https://learning.oreilly.com/library/view/~/9781119154686/?ar</a><br/>Format: Electronic Resources<br/>Thinking security : stopping next year's hackersent://SD_ILS/0/SD_ILS:23089322024-05-31T01:14:41Z2024-05-31T01:14:41Zby Bellovin, Steven M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar">https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134278223">https://learning.oreilly.com/library/view/~/9780134278223</a>
<a href="https://learning.oreilly.com/library/view/~/9780134278223/?ar">https://learning.oreilly.com/library/view/~/9780134278223/?ar</a><br/>Format: Electronic Resources<br/>Understanding the Cisco ASA firewall : learning to install, configure, and manage Cisco firewalls and advanced VPN solutionsent://SD_ILS/0/SD_ILS:23115432024-05-31T01:14:41Z2024-05-31T01:14:41Zby Larsson, Jimmy, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491969656/?ar">https://go.oreilly.com/library-access/library/view/-/9781491969656/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491969656/?ar">https://learning.oreilly.com/videos/~/9781491969656/?ar</a><br/>Format: Electronic Resources<br/>Securing Enterprise LANs using the Junos OS : defending and protecting Juniper based corporate networksent://SD_ILS/0/SD_ILS:23111072024-05-31T01:14:41Z2024-05-31T01:14:41Zby Brown, Martin, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491962503/?ar">https://learning.oreilly.com/videos/~/9781491962503/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491962503/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962503/?ar</a><br/>Format: Electronic Resources<br/>The O'Reilly Security Conference, New York, NY, 2016.ent://SD_ILS/0/SD_ILS:23118812024-05-31T01:14:41Z2024-05-31T01:14:41Zby Adkins, Heather, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491960035/?ar">https://go.oreilly.com/library-access/library/view/-/9781491960035/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491960035/?ar">https://learning.oreilly.com/videos/~/9781491960035/?ar</a><br/>Format: Electronic Resources<br/>Essential cybersecurity science : build, test, and evaluate secure systemsent://SD_ILS/0/SD_ILS:23091932024-05-31T01:14:41Z2024-05-31T01:14:41Zby Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format: Electronic Resources<br/>The current security threat landscape.ent://SD_ILS/0/SD_ILS:23093322024-05-31T01:14:41Z2024-05-31T01:14:41Zby Santos, Omar, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9780134466279/?ar">https://learning.oreilly.com/videos/~/9780134466279/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134466279/?ar">https://go.oreilly.com/library-access/library/view/-/9780134466279/?ar</a><br/>Format: Electronic Resources<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:23110502024-05-31T01:14:41Z2024-05-31T01:14:41Zby Chapman, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128036013">https://learning.oreilly.com/library/view/~/9780128036013</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128036013/?ar">https://go.oreilly.com/library-access/library/view/-/9780128036013/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128036013/?ar">https://learning.oreilly.com/library/view/~/9780128036013/?ar</a><br/>Format: Electronic Resources<br/>Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect itent://SD_ILS/0/SD_ILS:23115292024-05-31T01:14:41Z2024-05-31T01:14:41Zby Cardwell, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar">https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785883491/?ar">https://learning.oreilly.com/library/view/~/9781785883491/?ar</a><br/>Format: Electronic Resources<br/>O'Reilly Security Conference 2016, Amsterdam, Netherlands.ent://SD_ILS/0/SD_ILS:23120722024-05-31T01:14:41Z2024-05-31T01:14:41Zby O'Reilly Security Conference (2016 : Amsterdam, Netherlands)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491976128/?ar">https://go.oreilly.com/library-access/library/view/-/9781491976128/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491976128/?ar">https://learning.oreilly.com/videos/~/9781491976128/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing : a complete pentesting guide facilitating smooth backtracking for working hackers : a course in three modules.ent://SD_ILS/0/SD_ILS:23126192024-05-31T01:14:41Z2024-05-31T01:14:41Zby Velu, Vijay Kumar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287839/?ar">https://learning.oreilly.com/library/view/~/9781787287839/?ar</a><br/>Format: Electronic Resources<br/>Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniquesent://SD_ILS/0/SD_ILS:23102742024-05-31T01:14:41Z2024-05-31T01:14:41Zby Fadyushin, Vyacheslav, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785283154">https://learning.oreilly.com/library/view/~/9781785283154</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785283154/?ar">https://go.oreilly.com/library-access/library/view/-/9781785283154/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785283154/?ar">https://learning.oreilly.com/library/view/~/9781785283154/?ar</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:23100182024-05-31T01:14:41Z2024-05-31T01:14:41Zby Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar">https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128033357/?ar">https://learning.oreilly.com/library/view/~/9780128033357/?ar</a><br/>Format: Electronic Resources<br/>Are your bits flipped? : overcoming tech misconceptionsent://SD_ILS/0/SD_ILS:23105992024-05-31T01:14:41Z2024-05-31T01:14:41Zby Kissell, Joe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar">https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492017172/?ar">https://learning.oreilly.com/library/view/~/9781492017172/?ar</a><br/>Format: Electronic Resources<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:23109912024-05-31T01:14:41Z2024-05-31T01:14:41Zby Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format: Electronic Resources<br/>Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0ent://SD_ILS/0/SD_ILS:23113162024-05-31T01:14:41Z2024-05-31T01:14:41Zby Olups, Rihards, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782161288/?ar">https://learning.oreilly.com/library/view/~/9781782161288/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782161288/?ar">https://go.oreilly.com/library-access/library/view/-/9781782161288/?ar</a><br/>Format: Electronic Resources<br/>Identity and data security for web development : best practicesent://SD_ILS/0/SD_ILS:23108212024-05-31T01:14:41Z2024-05-31T01:14:41Zby LeBlanc, Jonathan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491937006">https://learning.oreilly.com/library/view/~/9781491937006</a>
<a href="https://learning.oreilly.com/library/view/~/9781491937006/?ar">https://learning.oreilly.com/library/view/~/9781491937006/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491937006/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937006/?ar</a><br/>Format: Electronic Resources<br/>Mastering identity and access management with Microsoft Azure : start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environmentsent://SD_ILS/0/SD_ILS:23117452024-05-31T01:14:41Z2024-05-31T01:14:41Zby Nickel, Jochen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889448/?ar">https://learning.oreilly.com/library/view/~/9781785889448/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889448">https://learning.oreilly.com/library/view/~/9781785889448</a><br/>Format: Electronic Resources<br/>Wireless communications security : solutions for the internet of thingsent://SD_ILS/0/SD_ILS:23116242024-05-31T01:14:41Z2024-05-31T01:14:41Zby Penttinen, Jyrki T. J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119084396/?ar">https://learning.oreilly.com/library/view/~/9781119084396/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar">https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar</a><br/>Format: Electronic Resources<br/>Mastering modern web penetration testing : master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!ent://SD_ILS/0/SD_ILS:23118962024-05-31T01:14:41Z2024-05-31T01:14:41Zby Prasad, Prakhar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar">https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785284588">https://learning.oreilly.com/library/view/~/9781785284588</a>
<a href="https://learning.oreilly.com/library/view/~/9781785284588/?ar">https://learning.oreilly.com/library/view/~/9781785284588/?ar</a><br/>Format: Electronic Resources<br/>The second economy : the race for trust, treasure and time in the cybersecurity warent://SD_ILS/0/SD_ILS:23125522024-05-31T01:14:41Z2024-05-31T01:14:41Zby Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format: Electronic Resources<br/>Information theft prevention : theory and practiceent://SD_ILS/0/SD_ILS:23155502024-05-31T01:14:41Z2024-05-31T01:14:41Zby Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format: Electronic Resources<br/>Understanding intrusion detection systems : detecting attackers and incidents inside your hosts and networksent://SD_ILS/0/SD_ILS:23111362024-05-31T01:14:41Z2024-05-31T01:14:41Zby Messier, Ric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491962701/?ar">https://learning.oreilly.com/videos/~/9781491962701/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491962701/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962701/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity lexiconent://SD_ILS/0/SD_ILS:23111372024-05-31T01:14:41Z2024-05-31T01:14:41Zby Ayala, Luis, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220689/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220689/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220689/?ar">https://learning.oreilly.com/library/view/~/9781484220689/?ar</a><br/>Format: Electronic Resources<br/>DevOpsSec : securing software through continuous deliveryent://SD_ILS/0/SD_ILS:23111962024-05-31T01:14:41Z2024-05-31T01:14:41Zby Bird, Jim, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491971413/?ar">https://go.oreilly.com/library-access/library/view/-/9781491971413/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491971413/?ar">https://learning.oreilly.com/library/view/~/9781491971413/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491971413">https://learning.oreilly.com/library/view/~/9781491971413</a><br/>Format: Electronic Resources<br/>Advanced penetration testing for highly-secured environments : employee the most advanced pentesting techniques and tools to build highly-secured systems and environmentsent://SD_ILS/0/SD_ILS:23102572024-05-31T01:14:41Z2024-05-31T01:14:41Zby Allen, Lee (Information security specialist), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784395810/?ar">https://learning.oreilly.com/library/view/~/9781784395810/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781784395810/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395810/?ar</a><br/>Format: Electronic Resources<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:23108042024-05-31T01:14:41Z2024-05-31T01:14:41Zby Fowler, Kevvie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034507/?ar">https://learning.oreilly.com/library/view/~/9780128034507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128034507">https://learning.oreilly.com/library/view/~/9780128034507</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128034507/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034507/?ar</a><br/>Format: Electronic Resources<br/>Practical Windows forensics : leverage the power of digital forensics for Windows systemsent://SD_ILS/0/SD_ILS:23110212024-05-31T01:14:41Z2024-05-31T01:14:41Zby Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format: Electronic Resources<br/>Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsent://SD_ILS/0/SD_ILS:23110222024-05-31T01:14:41Z2024-05-31T01:14:41Zby Rehim, Rejah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar">https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785280696/?ar">https://learning.oreilly.com/library/view/~/9781785280696/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785280696">https://learning.oreilly.com/library/view/~/9781785280696</a><br/>Format: Electronic Resources<br/>Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldent://SD_ILS/0/SD_ILS:23110272024-05-31T01:14:41Z2024-05-31T01:14:41Zby Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785889639">https://learning.oreilly.com/library/view/~/9781785889639</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889639/?ar">https://learning.oreilly.com/library/view/~/9781785889639/?ar</a><br/>Format: Electronic Resources<br/>A study of black hole attack solutions : on AODV routing protocol in MANETent://SD_ILS/0/SD_ILS:23090382024-05-31T01:14:41Z2024-05-31T01:14:41Zby Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linuxent://SD_ILS/0/SD_ILS:23100362024-05-31T01:14:41Z2024-05-31T01:14:41Zby Sak, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785285561">https://learning.oreilly.com/library/view/~/9781785285561</a>
<a href="https://learning.oreilly.com/library/view/~/9781785285561/?ar">https://learning.oreilly.com/library/view/~/9781785285561/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar">https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar</a><br/>Format: Electronic Resources<br/>Secure your Node.js web application : keep attackers out and users happyent://SD_ILS/0/SD_ILS:23099492024-05-31T01:14:41Z2024-05-31T01:14:41Zby Düüna, Karl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar">https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680501780/?ar">https://learning.oreilly.com/library/view/~/9781680501780/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680501780">https://learning.oreilly.com/library/view/~/9781680501780</a><br/>Format: Electronic Resources<br/>Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacksent://SD_ILS/0/SD_ILS:23101212024-05-31T01:14:41Z2024-05-31T01:14:41Zby Datt, Samir, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar">https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905/?ar">https://learning.oreilly.com/library/view/~/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905">https://learning.oreilly.com/library/view/~/9781782174905</a><br/>Format: Electronic Resources<br/>Implementing DirectAccess with Windows Server 2016ent://SD_ILS/0/SD_ILS:23117672024-05-31T01:14:41Z2024-05-31T01:14:41Zby Hicks, Richard M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484220597/?ar">https://learning.oreilly.com/library/view/~/9781484220597/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484220597/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220597/?ar</a><br/>Format: Electronic Resources<br/>Python : penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modulesent://SD_ILS/0/SD_ILS:23118492024-05-31T01:14:41Z2024-05-31T01:14:41Zby Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787128187">https://learning.oreilly.com/library/view/~/9781787128187</a>
<a href="https://learning.oreilly.com/library/view/~/9781787128187/?ar">https://learning.oreilly.com/library/view/~/9781787128187/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar">https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar</a><br/>Format: Electronic Resources<br/>Advances in Network Managementent://SD_ILS/0/SD_ILS:23136392024-05-31T01:14:41Z2024-05-31T01:14:41Zby Ding, Jianguo, author<br/><a href="https://learning.oreilly.com/library/view/~/9781420064551">https://learning.oreilly.com/library/view/~/9781420064551</a>
<a href="https://learning.oreilly.com/library/view/~/9781420064551/?ar">https://learning.oreilly.com/library/view/~/9781420064551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420064551/?ar">https://go.oreilly.com/library-access/library/view/-/9781420064551/?ar</a><br/>Format: Electronic Resources<br/>Malware diffusion models for modern complex networks : theory and applicationsent://SD_ILS/0/SD_ILS:23138692024-05-31T01:14:41Z2024-05-31T01:14:41Zby Karyotis, Vasileios, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027165/?ar">https://learning.oreilly.com/library/view/~/9780128027165/?ar</a><br/>Format: Electronic Resources<br/>Cracking security misconceptions : untangling common myths about modern information securityent://SD_ILS/0/SD_ILS:23167042024-05-31T01:14:41Z2024-05-31T01:14:41Zby Peterson, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042747">https://learning.oreilly.com/library/view/~/9781492042747</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042747/?ar">https://learning.oreilly.com/library/view/~/9781492042747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar</a><br/>Format: Electronic Resources<br/>Google hacking for penetration testersent://SD_ILS/0/SD_ILS:23092932024-05-31T01:14:41Z2024-05-31T01:14:41Zby Long, Johnny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029824/?ar">https://learning.oreilly.com/library/view/~/9780128029824/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:23092962024-05-31T01:14:41Z2024-05-31T01:14:41Zby Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format: Electronic Resources<br/>People-centric security : transforming your enterprise security cultureent://SD_ILS/0/SD_ILS:23095172024-05-31T01:14:41Z2024-05-31T01:14:41Zby Hayden, Lance, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071846790/?ar">https://learning.oreilly.com/library/view/~/9780071846790/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar">https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar</a><br/>Format: Electronic Resources<br/>Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deploymentsent://SD_ILS/0/SD_ILS:23092162024-05-31T01:14:41Z2024-05-31T01:14:41Zby Richter, Andy, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045046/?ar">https://learning.oreilly.com/library/view/~/9780128045046/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128045046/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045046/?ar</a><br/>Format: Electronic Resources<br/>The Complete Guide to Cybersecurity Risks and Controlsent://SD_ILS/0/SD_ILS:23245242024-05-31T01:14:41Z2024-05-31T01:14:41Zby Kohnke, Anne, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar">https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579/?ar">https://learning.oreilly.com/library/view/~/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579">https://learning.oreilly.com/library/view/~/9781498740579</a><br/>Format: Electronic Resources<br/>Bezpieczenstwo tozsamosci i danych w projektach Webent://SD_ILS/0/SD_ILS:23245052024-05-31T01:14:41Z2024-05-31T01:14:41Zby LeBlanc, Jonathan.<br/><a href="https://learning.oreilly.com/library/view/~/9788375412093/?ar">https://learning.oreilly.com/library/view/~/9788375412093/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788375412093/?ar">https://go.oreilly.com/library-access/library/view/-/9788375412093/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788375412093">https://learning.oreilly.com/library/view/~/9788375412093</a><br/>Format: Electronic Resources<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:23134842024-05-31T01:14:41Z2024-05-31T01:14:41Zby Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format: Electronic Resources<br/>z/OS PKI Services : quick set-up for multiple CAsent://SD_ILS/0/SD_ILS:23124322024-05-31T01:14:41Z2024-05-31T01:14:41Zby Winnard, Keith, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738443054/?ar">https://learning.oreilly.com/library/view/~/0738443054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738443054/?ar">https://go.oreilly.com/library-access/library/view/-/0738443054/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738443054">https://learning.oreilly.com/library/view/~/0738443054</a><br/>Format: Electronic Resources<br/>Security in an IPv6 Environmentent://SD_ILS/0/SD_ILS:23236512024-05-31T01:14:41Z2024-05-31T01:14:41Zby Minoli, Daniel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420092301/?ar">https://learning.oreilly.com/library/view/~/9781420092301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420092301">https://learning.oreilly.com/library/view/~/9781420092301</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420092301/?ar">https://go.oreilly.com/library-access/library/view/-/9781420092301/?ar</a><br/>Format: Electronic Resources<br/>Security and privacy in the digital era. Volume 1ent://SD_ILS/0/SD_ILS:20609152024-05-31T01:14:41Z2024-05-31T01:14:41Zby Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4648717">Click to View</a><br/>Format: Electronic Resources<br/>Foundations of modern networking : sdn, nfv, qoe, iot, and cloudent://SD_ILS/0/SD_ILS:13427302024-05-31T01:14:41Z2024-05-31T01:14:41Zby Stallings, William, author.<br/>Format: Books<br/>Security in fixed and wireless networksent://SD_ILS/0/SD_ILS:22799302024-05-31T01:14:41Z2024-05-31T01:14:41Zby Schafer, Gunter, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=7104366">Click to View</a><br/>Format: Electronic Resources<br/>Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect itent://SD_ILS/0/SD_ILS:22656012024-05-31T01:14:41Z2024-05-31T01:14:41Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4662307">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity and human rights in the age of cyberveillanceent://SD_ILS/0/SD_ILS:22641052024-05-31T01:14:41Z2024-05-31T01:14:41Zby Kulesza, Joanna, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4098051">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linuxent://SD_ILS/0/SD_ILS:22716212024-05-31T01:14:41Z2024-05-31T01:14:41Zby Sak, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4520799">Click to View</a><br/>Format: Electronic Resources<br/>Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0ent://SD_ILS/0/SD_ILS:22717582024-05-31T01:14:41Z2024-05-31T01:14:41Zby Olups, Rihards, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4643698">Click to View</a><br/>Format: Electronic Resources<br/>Practical Windows forensics : leverage the power of digital forensics for Windows systemsent://SD_ILS/0/SD_ILS:22717192024-05-31T01:14:41Z2024-05-31T01:14:41Zby Shaaban, Ayman, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594307">Click to View</a><br/>Format: Electronic Resources<br/>Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldent://SD_ILS/0/SD_ILS:22717202024-05-31T01:14:41Z2024-05-31T01:14:41Zby Russell, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594308">Click to View</a><br/>Format: Electronic Resources<br/>Perils of the web : cyber security and internet safetyent://SD_ILS/0/SD_ILS:22377742024-05-31T01:14:41Z2024-05-31T01:14:41Zby Hodalska, Magdalena, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6481756">Click to View</a><br/>Format: Electronic Resources<br/>Mastering identity and access management with Microsoft Azure : start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environmentsent://SD_ILS/0/SD_ILS:22355222024-05-31T01:14:41Z2024-05-31T01:14:41Zby Nickel, Jochen, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4709423">Click to View</a><br/>Format: Electronic Resources<br/>Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacksent://SD_ILS/0/SD_ILS:22353752024-05-31T01:14:41Z2024-05-31T01:14:41Zby Datt, Samir, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4520820">Click to View</a><br/>Format: Electronic Resources<br/>Essential skills for hackersent://SD_ILS/0/SD_ILS:20984242024-05-31T01:14:41Z2024-05-31T01:14:41Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189281">Click to View</a><br/>Format: Electronic Resources<br/>Advanced penetration testing for highly-secured environments.ent://SD_ILS/0/SD_ILS:21554832024-05-31T01:14:41Z2024-05-31T01:14:41Zby Allen, Lee, 1946- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4520648">Click to View</a><br/>Format: Electronic Resources<br/>Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasuresent://SD_ILS/0/SD_ILS:21110912024-05-31T01:14:41Z2024-05-31T01:14:41Zby Mazurczyk, Wojciech, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4405578">Click to View</a><br/>Format: Electronic Resources<br/>Malware diffusion models for modern complex networks : theory and applicationsent://SD_ILS/0/SD_ILS:22097582024-05-31T01:14:41Z2024-05-31T01:14:41Zby Karyotis, Vasileios, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4438752">Click to View</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the windows registryent://SD_ILS/0/SD_ILS:22097602024-05-31T01:14:41Z2024-05-31T01:14:41Zby Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4438754">Click to View</a><br/>Format: Electronic Resources<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:22089652024-05-31T01:14:41Z2024-05-31T01:14:41Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format: Electronic Resources<br/>SSL and TLS : theory and practiceent://SD_ILS/0/SD_ILS:22119622024-05-31T01:14:41Z2024-05-31T01:14:41Zby Oppliger, Rolf, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4821279">Click to View</a><br/>Format: Electronic Resources<br/>Building a corporate culture of security : strategies for strengthening organizational resiliencyent://SD_ILS/0/SD_ILS:22097382024-05-31T01:14:41Z2024-05-31T01:14:41Zby Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4425984">Click to View</a><br/>Format: Electronic Resources<br/>Hiding behind the keyboard : uncovering covert communication methods with forensic analysisent://SD_ILS/0/SD_ILS:22098132024-05-31T01:14:41Z2024-05-31T01:14:41Zby Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452264">Click to View</a><br/>Format: Electronic Resources<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:22098142024-05-31T01:14:41Z2024-05-31T01:14:41Zby Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452265">Click to View</a><br/>Format: Electronic Resources<br/>Cyber guerillaent://SD_ILS/0/SD_ILS:22102812024-05-31T01:14:41Z2024-05-31T01:14:41Zby Haaster, Jelle van, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4557157">Click to View</a><br/>Format: Electronic Resources<br/>Dns security : defending the domain name systement://SD_ILS/0/SD_ILS:22102632024-05-31T01:14:41Z2024-05-31T01:14:41Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556898">Click to View</a><br/>Format: Electronic Resources<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:22102642024-05-31T01:14:41Z2024-05-31T01:14:41Zby Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556899">Click to View</a><br/>Format: Electronic Resources<br/>Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsent://SD_ILS/0/SD_ILS:22768732024-05-31T01:14:41Z2024-05-31T01:14:41Zby Rehim, Rejah, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594304">Click to View</a><br/>Format: Electronic Resources<br/>SELinux System Administration : ward off traditional security permissions and effectively secure your Linuxs systems with SELinuxent://SD_ILS/0/SD_ILS:23124102024-05-31T01:14:41Z2024-05-31T01:14:41Zby Vermeulen, Sven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787126954/?ar">https://go.oreilly.com/library-access/library/view/-/9781787126954/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787126954">https://learning.oreilly.com/library/view/~/9781787126954</a>
<a href="https://learning.oreilly.com/library/view/~/9781787126954/?ar">https://learning.oreilly.com/library/view/~/9781787126954/?ar</a><br/>Format: Electronic Resources<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:23144162024-05-31T01:14:41Z2024-05-31T01:14:41Zby Bose, S., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789332579125/?ar">https://learning.oreilly.com/library/view/~/9789332579125/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar">https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9789332579125">https://learning.oreilly.com/library/view/~/9789332579125</a><br/>Format: Electronic Resources<br/>The platform transformation : how IoT will change IT, and whenent://SD_ILS/0/SD_ILS:23166612024-05-31T01:14:41Z2024-05-31T01:14:41Zby Perry, Matthew J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042792/?ar">https://learning.oreilly.com/library/view/~/9781492042792/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042792">https://learning.oreilly.com/library/view/~/9781492042792</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042792/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042792/?ar</a><br/>Format: Electronic Resources<br/>