Search Results for - Narrowed by: Computer networks -- Security measures. - Computer crimes -- Investigation.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes$002b--$002bInvestigation.$002509Computer$002bcrimes$002b--$002bInvestigation.$0026ps$003d300?2024-06-03T18:43:45ZDigital forensics and incident response : incident response tools and techniques for effective cyber threat responseent://SD_ILS/0/SD_ILS:23353612024-06-03T18:43:45Z2024-06-03T18:43:45Zby Johansen, Gerard, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803238678/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238678/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238678/?ar">https://learning.oreilly.com/library/view/~/9781803238678/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238678">https://learning.oreilly.com/library/view/~/9781803238678</a><br/>Format: Electronic Resources<br/>Incident response primer : how to keep from getting pwned too hardent://SD_ILS/0/SD_ILS:23233162024-06-03T18:43:45Z2024-06-03T18:43:45Zby Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format: Electronic Resources<br/>Learning Python for forensics : leverage the power of Python in forensic investigationsent://SD_ILS/0/SD_ILS:23191162024-06-03T18:43:45Z2024-06-03T18:43:45Zby Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format: Electronic Resources<br/>Hands-on network forensics : investigate network attacks and find evidence using common network forensic toolsent://SD_ILS/0/SD_ILS:23198362024-06-03T18:43:45Z2024-06-03T18:43:45Zby Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789344523/?ar">https://learning.oreilly.com/library/view/~/9781789344523/?ar</a><br/>Format: Electronic Resources<br/>Fraud detection without feature engineeringent://SD_ILS/0/SD_ILS:23224342024-06-03T18:43:45Z2024-06-03T18:43:45Zby Vagata, Pamela, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540/?ar">https://learning.oreilly.com/videos/~/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540">https://learning.oreilly.com/videos/~/0636920339540</a><br/>Format: Electronic Resources<br/>Practical cyber forensics : an incident-based approach to forensic investigationsent://SD_ILS/0/SD_ILS:23215212024-06-03T18:43:45Z2024-06-03T18:43:45Zby Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics and cyber crime with Kali Linux fundamentalsent://SD_ILS/0/SD_ILS:23140432024-06-03T18:43:45Z2024-06-03T18:43:45Zby Muniz, Joseph, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar">https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134693644/?ar">https://learning.oreilly.com/videos/~/9780134693644/?ar</a><br/>Format: Electronic Resources<br/>Hands-on incident response and digital forensicsent://SD_ILS/0/SD_ILS:23171142024-06-03T18:43:45Z2024-06-03T18:43:45Zby Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780174204/?ar">https://learning.oreilly.com/library/view/~/9781780174204/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780174204">https://learning.oreilly.com/library/view/~/9781780174204</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780174204/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174204/?ar</a><br/>Format: Electronic Resources<br/>Threat intelligence in practice : a practical guide to threat intelligence from successful organizationsent://SD_ILS/0/SD_ILS:23184352024-06-03T18:43:45Z2024-06-03T18:43:45Zby Liska, Allan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar">https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492049302/?ar">https://learning.oreilly.com/library/view/~/9781492049302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492049302">https://learning.oreilly.com/library/view/~/9781492049302</a><br/>Format: Electronic Resources<br/>Hands-on incident response and digital forensicsent://SD_ILS/0/SD_ILS:22678472024-06-03T18:43:45Z2024-06-03T18:43:45Zby Sheward, Mike, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5614288">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensics cookbook : 61 recipes to help you analyze Windows systemsent://SD_ILS/0/SD_ILS:23139902024-06-03T18:43:45Z2024-06-03T18:43:45Zby Sulkin, Oleg, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495/?ar">https://learning.oreilly.com/library/view/~/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495">https://learning.oreilly.com/library/view/~/9781784390495</a><br/>Format: Electronic Resources<br/>Digital forensics and incident response : an intelligent way to respond to attacksent://SD_ILS/0/SD_ILS:23139152024-06-03T18:43:45Z2024-06-03T18:43:45Zby Johansen, Gerard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787288683">https://learning.oreilly.com/library/view/~/9781787288683</a>
<a href="https://learning.oreilly.com/library/view/~/9781787288683/?ar">https://learning.oreilly.com/library/view/~/9781787288683/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787288683/?ar">https://go.oreilly.com/library-access/library/view/-/9781787288683/?ar</a><br/>Format: Electronic Resources<br/>Forensic analysis of computer memory.ent://SD_ILS/0/SD_ILS:23347972024-06-03T18:43:45Z2024-06-03T18:43:45Zby Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029144">https://learning.oreilly.com/videos/~/9781492029144</a>
<a href="https://learning.oreilly.com/videos/~/9781492029144/?ar">https://learning.oreilly.com/videos/~/9781492029144/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar</a><br/>Format: Video recording<br/>Capture and analysis of network-based evidence.ent://SD_ILS/0/SD_ILS:23347672024-06-03T18:43:45Z2024-06-03T18:43:45Zby Messier, Ric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492029182">https://learning.oreilly.com/videos/~/9781492029182</a>
<a href="https://learning.oreilly.com/videos/~/9781492029182/?ar">https://learning.oreilly.com/videos/~/9781492029182/?ar</a><br/>Format: Video recording<br/>Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux toolsent://SD_ILS/0/SD_ILS:23153862024-06-03T18:43:45Z2024-06-03T18:43:45Zby Parasram, Shiva V. N., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625005">https://learning.oreilly.com/library/view/~/9781788625005</a>
<a href="https://learning.oreilly.com/library/view/~/9781788625005/?ar">https://learning.oreilly.com/library/view/~/9781788625005/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788625005/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625005/?ar</a><br/>Format: Electronic Resources<br/>Post-incident reviews : learning from failure for improved incident responseent://SD_ILS/0/SD_ILS:23184992024-06-03T18:43:45Z2024-06-03T18:43:45Zby Hand, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar">https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491986998">https://learning.oreilly.com/library/view/~/9781491986998</a>
<a href="https://learning.oreilly.com/library/view/~/9781491986998/?ar">https://learning.oreilly.com/library/view/~/9781491986998/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics and incident response : an intelligent way to respond to attacksent://SD_ILS/0/SD_ILS:22722552024-06-03T18:43:45Z2024-06-03T18:43:45Zby Johansen, Gerard, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4925642">Click to View</a><br/>Format: Electronic Resources<br/>Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacksent://SD_ILS/0/SD_ILS:23101212024-06-03T18:43:45Z2024-06-03T18:43:45Zby Datt, Samir, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar">https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905/?ar">https://learning.oreilly.com/library/view/~/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905">https://learning.oreilly.com/library/view/~/9781782174905</a><br/>Format: Electronic Resources<br/>Practical Windows forensics : leverage the power of digital forensics for Windows systemsent://SD_ILS/0/SD_ILS:23110212024-06-03T18:43:45Z2024-06-03T18:43:45Zby Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format: Electronic Resources<br/>Practical Windows forensics : leverage the power of digital forensics for Windows systemsent://SD_ILS/0/SD_ILS:22717192024-06-03T18:43:45Z2024-06-03T18:43:45Zby Shaaban, Ayman, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594307">Click to View</a><br/>Format: Electronic Resources<br/>Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacksent://SD_ILS/0/SD_ILS:22353752024-06-03T18:43:45Z2024-06-03T18:43:45Zby Datt, Samir, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4520820">Click to View</a><br/>Format: Electronic Resources<br/>A practical guide to computer forensics investigationsent://SD_ILS/0/SD_ILS:23056322024-06-03T18:43:45Z2024-06-03T18:43:45Zby Hayes, Darren R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780132756174/?ar">https://learning.oreilly.com/library/view/~/9780132756174/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar">https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:20981032024-06-03T18:43:45Z2024-06-03T18:43:45Zby Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2098440">Click to View</a><br/>Format: Electronic Resources<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:23014742024-06-03T18:43:45Z2024-06-03T18:43:45Zby DeFranco, Joanna F.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564527/?ar">https://learning.oreilly.com/library/view/~/9781466564527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564527">https://learning.oreilly.com/library/view/~/9781466564527</a><br/>Format: Electronic Resources<br/>Learning computer forensicsent://SD_ILS/0/SD_ILS:22985542024-06-03T18:43:45Z2024-06-03T18:43:45Zby Messier, Ric.<br/><a href="https://learning.oreilly.com/videos/~/9781771370615/?ar">https://learning.oreilly.com/videos/~/9781771370615/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar</a><br/>Format: Electronic Resources<br/>Network intrusion analysis : methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:22963922024-06-03T18:43:45Z2024-06-03T18:43:45Zby Fichera, Joe, 1966-<br/><a href="https://learning.oreilly.com/library/view/~/9781597499620">https://learning.oreilly.com/library/view/~/9781597499620</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499620/?ar">https://learning.oreilly.com/library/view/~/9781597499620/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar</a><br/>Format: Electronic Resources<br/>Mastering Windows Network Forensics and Investigation.ent://SD_ILS/0/SD_ILS:12360222024-06-03T18:43:45Z2024-06-03T18:43:45Zby Anson, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=818114">Click to View</a><br/>Format: Electronic Resources<br/>Computer forensics jumpstartent://SD_ILS/0/SD_ILS:22914362024-06-03T18:43:45Z2024-06-03T18:43:45Zby Solomon, Michael (Michael G.), 1963-<br/><a href="https://learning.oreilly.com/library/view/~/9781118067659/?ar">https://learning.oreilly.com/library/view/~/9781118067659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118067659/?ar">https://go.oreilly.com/library-access/library/view/-/9781118067659/?ar</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the f0rb1dd3n networkent://SD_ILS/0/SD_ILS:22907002024-06-03T18:43:45Z2024-06-03T18:43:45Zby Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format: Electronic Resources<br/>Computer forensics : a pocket guideent://SD_ILS/0/SD_ILS:22896162024-06-03T18:43:45Z2024-06-03T18:43:45Zby Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and dataent://SD_ILS/0/SD_ILS:22891492024-06-03T18:43:45Z2024-06-03T18:43:45Zby Lillard, Terrence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387/?ar">https://learning.oreilly.com/library/view/~/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387">https://learning.oreilly.com/library/view/~/9781597495387</a><br/>Format: Electronic Resources<br/>Cisco router and switch forensics : investigating and analyzing malicious network activityent://SD_ILS/0/SD_ILS:22871802024-06-03T18:43:45Z2024-06-03T18:43:45Zby Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494182">https://learning.oreilly.com/library/view/~/9781597494182</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494182/?ar">https://learning.oreilly.com/library/view/~/9781597494182/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime.ent://SD_ILS/0/SD_ILS:22851492024-06-03T18:43:45Z2024-06-03T18:43:45Zby Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492768">https://learning.oreilly.com/library/view/~/9781597492768</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492768/?ar">https://learning.oreilly.com/library/view/~/9781597492768/?ar</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:3432012024-06-03T18:43:45Z2024-06-03T18:43:45Zby Wiles, Jack.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:22845142024-06-03T18:43:45Z2024-06-03T18:43:45Zby Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492232">https://learning.oreilly.com/library/view/~/9781597492232</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492232/?ar">https://learning.oreilly.com/library/view/~/9781597492232/?ar</a><br/>Format: Electronic Resources<br/>Computer Forensics JumpStart.ent://SD_ILS/0/SD_ILS:11871092024-06-03T18:43:45Z2024-06-03T18:43:45Zby Solomon, Micah.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267268">Click to View</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime computer forensics handbookent://SD_ILS/0/SD_ILS:658712024-06-03T18:43:45Z2024-06-03T18:43:45Zby Shinder, Debra Littlejohn.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime : computer forensics handbookent://SD_ILS/0/SD_ILS:22807562024-06-03T18:43:45Z2024-06-03T18:43:45Zby Shinder, Debra Littlejohn, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836654">https://learning.oreilly.com/library/view/~/9781931836654</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836654/?ar">https://learning.oreilly.com/library/view/~/9781931836654/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781931836654">https://www.sciencedirect.com/science/book/9781931836654</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836654/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836654/?ar</a><br/>Format: Electronic Resources<br/>