Search Results for - Narrowed by: Computer networks -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue? 2024-05-25T05:33:45Z Exam MS-100 Microsoft 365 identity and services. ent://SD_ILS/0/SD_ILS:2335515 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Costello, Dan, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137648689/?ar">https://learning.oreilly.com/videos/~/9780137648689/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137648689">https://learning.oreilly.com/videos/~/9780137648689</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137648689/?ar">https://go.oreilly.com/library-access/library/view/-/9780137648689/?ar</a><br/>Format:&#160;Video recording<br/> Learning digital identity : design, deploy, and manage identity architectures ent://SD_ILS/0/SD_ILS:2334739 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Windley, Phillip J., 1958- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098117689/?ar">https://learning.oreilly.com/library/view/~/9781098117689/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098117689">https://learning.oreilly.com/library/view/~/9781098117689</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar">https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar</a><br/>Format:&#160;Electronic Resources<br/> Winning the national security AI competition : a practical guide for government and industry leaders ent://SD_ILS/0/SD_ILS:2335230 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Whitlock, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484288146">https://learning.oreilly.com/library/view/~/9781484288146</a> <a href="https://learning.oreilly.com/library/view/~/9781484288146/?ar">https://learning.oreilly.com/library/view/~/9781484288146/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484288146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484288146/?ar</a><br/>Format:&#160;Electronic Resources<br/> Wireshark for network forensics : an essential guide for IT and cloud professionals ent://SD_ILS/0/SD_ILS:2335445 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Nainar, Nagendra Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484290019/?ar">https://learning.oreilly.com/library/view/~/9781484290019/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484290019/?ar">https://go.oreilly.com/library-access/library/view/-/9781484290019/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484290019">https://learning.oreilly.com/library/view/~/9781484290019</a><br/>Format:&#160;Electronic Resources<br/> The security culture playbook : an executive guide to reducing risk and developing your human defense layer ent://SD_ILS/0/SD_ILS:2332410 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119875239/?ar">https://learning.oreilly.com/library/view/~/9781119875239/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119875239">https://learning.oreilly.com/library/view/~/9781119875239</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar">https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking ent://SD_ILS/0/SD_ILS:2332886 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Beaver, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119872191">https://learning.oreilly.com/library/view/~/9781119872191</a> <a href="https://learning.oreilly.com/library/view/~/9781119872191/?ar">https://learning.oreilly.com/library/view/~/9781119872191/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar">https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar</a><br/>Format:&#160;Electronic Resources<br/> Making sense of cybersecurity ent://SD_ILS/0/SD_ILS:2335000 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Kranz, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617298004/?ar">https://learning.oreilly.com/library/view/~/9781617298004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617298004">https://learning.oreilly.com/library/view/~/9781617298004</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar">https://go.oreilly.com/library-access/library/view/-/9781617298004/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Network security fundamentals ent://SD_ILS/0/SD_ILS:2333384 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Weadock, Glenn E., presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920671206">https://learning.oreilly.com/videos/~/0636920671206</a> <a href="https://learning.oreilly.com/videos/~/0636920671206/?ar">https://learning.oreilly.com/videos/~/0636920671206/?ar</a><br/>Format:&#160;Video recording<br/> Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy ent://SD_ILS/0/SD_ILS:2333950 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Shingornikar, Shashank, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460710/?ar">https://learning.oreilly.com/library/view/~/9780738460710/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460710">https://learning.oreilly.com/library/view/~/9780738460710</a><br/>Format:&#160;Electronic Resources<br/> Offensive hacking unfolded. Become a pro Pentester. ent://SD_ILS/0/SD_ILS:2334688 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Yadav, Avinash, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar">https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781804615294/?ar">https://learning.oreilly.com/videos/~/9781804615294/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781804615294">https://learning.oreilly.com/videos/~/9781804615294</a><br/>Format:&#160;Video recording<br/> Cyber warfare : truth, tactics, and strategies : strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare ent://SD_ILS/0/SD_ILS:2334694 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Cunningham, Chase, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801076876">https://learning.oreilly.com/library/view/~/9781801076876</a> <a href="https://learning.oreilly.com/library/view/~/9781801076876/?ar">https://learning.oreilly.com/library/view/~/9781801076876/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801076876/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076876/?ar</a><br/>Format:&#160;Sound recording<br/> Digital forensics and incident response : incident response tools and techniques for effective cyber threat response ent://SD_ILS/0/SD_ILS:2335361 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Johansen, Gerard, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803238678/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238678/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803238678/?ar">https://learning.oreilly.com/library/view/~/9781803238678/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803238678">https://learning.oreilly.com/library/view/~/9781803238678</a><br/>Format:&#160;Electronic Resources<br/> Secure web application development : a hands-on guide with Python and Django ent://SD_ILS/0/SD_ILS:2334906 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Baker, Matthew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484285961">https://learning.oreilly.com/library/view/~/9781484285961</a> <a href="https://learning.oreilly.com/library/view/~/9781484285961/?ar">https://learning.oreilly.com/library/view/~/9781484285961/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484285961/?ar">https://go.oreilly.com/library-access/library/view/-/9781484285961/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web hacker's toolbox : tools used by successful hackers. ent://SD_ILS/0/SD_ILS:2335459 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Czagan, Dawid, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837632831/?ar">https://learning.oreilly.com/videos/~/9781837632831/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837632831">https://learning.oreilly.com/videos/~/9781837632831</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar</a><br/>Format:&#160;Video recording<br/> Practical cyber hacking skills for beginners. ent://SD_ILS/0/SD_ILS:2335514 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar">https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837636181">https://learning.oreilly.com/videos/~/9781837636181</a> <a href="https://learning.oreilly.com/videos/~/9781837636181/?ar">https://learning.oreilly.com/videos/~/9781837636181/?ar</a><br/>Format:&#160;Video recording<br/> Cyber security : the complete guide to cyber threats and protection ent://SD_ILS/0/SD_ILS:2356999 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sutton, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=7146447">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000 ent://SD_ILS/0/SD_ILS:2332067 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;International Business Machines Corporation, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460406/?ar">https://learning.oreilly.com/library/view/~/9780738460406/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460406">https://learning.oreilly.com/library/view/~/9780738460406</a><br/>Format:&#160;Electronic Resources<br/> Shifting left for application security : bridging the divide between DevOps and security with the right security tools ent://SD_ILS/0/SD_ILS:2332575 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a> <a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security for dummies ent://SD_ILS/0/SD_ILS:2332497 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a> <a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kerberos : Single Sign-on in gemischten Linux/Windows-Umgebungen. ent://SD_ILS/0/SD_ILS:2332670 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Pr&ouml;hl, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9781098141059/?ar">https://learning.oreilly.com/library/view/~/9781098141059/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098141059/?ar">https://go.oreilly.com/library-access/library/view/-/9781098141059/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098141059">https://learning.oreilly.com/library/view/~/9781098141059</a><br/>Format:&#160;Electronic Resources<br/> Network security : private communications in a public world ent://SD_ILS/0/SD_ILS:2334128 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Kaufman, Charlie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780136643531">https://learning.oreilly.com/library/view/~/9780136643531</a> <a href="https://learning.oreilly.com/library/view/~/9780136643531/?ar">https://learning.oreilly.com/library/view/~/9780136643531/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780136643531/?ar">https://go.oreilly.com/library-access/library/view/-/9780136643531/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network protocols for security professionals : probe and identify network-based vulnerabilities and safeguard against network protocol breaches ent://SD_ILS/0/SD_ILS:2334886 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Orzach, Yoram.<br/><a href="https://learning.oreilly.com/library/view/~/9781789953480">https://learning.oreilly.com/library/view/~/9781789953480</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789953480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789953480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789953480/?ar">https://learning.oreilly.com/library/view/~/9781789953480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to social engineering ent://SD_ILS/0/SD_ILS:2333857 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Assemble You, publisher.<br/><a href="https://go.oreilly.com/library-access/library/view/-/125051AYPOD/?ar">https://go.oreilly.com/library-access/library/view/-/125051AYPOD/?ar</a> <a href="https://learning.oreilly.com/library/view/~/125051AYPOD">https://learning.oreilly.com/library/view/~/125051AYPOD</a> <a href="https://learning.oreilly.com/library/view/~/125051AYPOD/?ar">https://learning.oreilly.com/library/view/~/125051AYPOD/?ar</a><br/>Format:&#160;Sound recording<br/> Threat modeling with Owasp Threat Dragon &amp; risk rating a vulnerability. ent://SD_ILS/0/SD_ILS:2332599 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Fisher, Derek, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202248/?ar">https://learning.oreilly.com/videos/~/10000MNHV202248/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202248">https://learning.oreilly.com/videos/~/10000MNHV202248</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar</a><br/>Format:&#160;Video recording<br/> Finding your cyber security path. ent://SD_ILS/0/SD_ILS:2332701 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Miller, Alyssa, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202258">https://learning.oreilly.com/videos/~/10000MNHV202258</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202258/?ar">https://learning.oreilly.com/videos/~/10000MNHV202258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar</a><br/>Format:&#160;Video recording<br/> Defensive cybersecurity fundamentals ent://SD_ILS/0/SD_ILS:2333379 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Berlin, Amanda, author.<br/><a href="https://learning.oreilly.com/videos/~/0636920670896/?ar">https://learning.oreilly.com/videos/~/0636920670896/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920670896/?ar">https://go.oreilly.com/library-access/library/view/-/0636920670896/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920670896">https://learning.oreilly.com/videos/~/0636920670896</a><br/>Format:&#160;Video recording<br/> Single sign-on and passwordless authentication : an overview. ent://SD_ILS/0/SD_ILS:2333558 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Ovcharov, Andrey, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202294">https://learning.oreilly.com/videos/~/10000MNHV202294</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202294/?ar">https://learning.oreilly.com/videos/~/10000MNHV202294/?ar</a><br/>Format:&#160;Video recording<br/> Cyber resiliency with IBM QRadar and IBM Spectrum Virtualize for Public Cloud on Azure with IBM Copy Services Manager for Safeguarded Copy ent://SD_ILS/0/SD_ILS:2333811 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;International Business Machines Corporation, issuing body.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460628">https://learning.oreilly.com/library/view/~/9780738460628</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460628/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460628/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460628/?ar">https://learning.oreilly.com/library/view/~/9780738460628/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to hack like a legend : breaking windows ent://SD_ILS/0/SD_ILS:2334190 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098141431/?ar">https://learning.oreilly.com/library/view/~/9781098141431/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar">https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098141431">https://learning.oreilly.com/library/view/~/9781098141431</a><br/>Format:&#160;Electronic Resources<br/> Web hacking expert : full-stack exploitation mastery. ent://SD_ILS/0/SD_ILS:2335278 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Czagan, Dawid, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837639717">https://learning.oreilly.com/videos/~/9781837639717</a> <a href="https://learning.oreilly.com/videos/~/9781837639717/?ar">https://learning.oreilly.com/videos/~/9781837639717/?ar</a><br/>Format:&#160;Video recording<br/> Hacking : der umfassende Praxis-Guide : inkl. Pr&uuml;fungsvorbereitung zum CEHv11 ent://SD_ILS/0/SD_ILS:2331683 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Amberg, Eric, author<br/><a href="https://learning.oreilly.com/library/view/~/9783747504840">https://learning.oreilly.com/library/view/~/9783747504840</a> <a href="https://learning.oreilly.com/library/view/~/9783747504840/?ar">https://learning.oreilly.com/library/view/~/9783747504840/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar">https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar</a><br/>Format:&#160;Electronic Resources<br/> Understand, manage, and measure cyber risk : practical solutions for creating a sustainable cyber program ent://SD_ILS/0/SD_ILS:2331428 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Leirvik, Ryan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484278215/?ar">https://go.oreilly.com/library-access/library/view/-/9781484278215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484278215/?ar">https://learning.oreilly.com/library/view/~/9781484278215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484278215">https://learning.oreilly.com/library/view/~/9781484278215</a><br/>Format:&#160;Electronic Resources<br/> SC-300 : Microsoft Identity and Access Administrator. ent://SD_ILS/0/SD_ILS:2331717 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Nednur, Anand Rao, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803238043/?ar">https://learning.oreilly.com/videos/~/9781803238043/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803238043">https://learning.oreilly.com/videos/~/9781803238043</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803238043/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238043/?ar</a><br/>Format:&#160;Video recording<br/> Mastering Kali Linux for advanced penetration testing : apply a proactive approach to secure your cyber infrastructure and enchance your pentesting skills ent://SD_ILS/0/SD_ILS:2332062 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801819770">https://learning.oreilly.com/library/view/~/9781801819770</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801819770/?ar">https://go.oreilly.com/library-access/library/view/-/9781801819770/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801819770/?ar">https://learning.oreilly.com/library/view/~/9781801819770/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity pevention and detection (Video collection). ent://SD_ILS/0/SD_ILS:2332252 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137929351">https://learning.oreilly.com/videos/~/9780137929351</a> <a href="https://learning.oreilly.com/videos/~/9780137929351/?ar">https://learning.oreilly.com/videos/~/9780137929351/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137929351/?ar">https://go.oreilly.com/library-access/library/view/-/9780137929351/?ar</a><br/>Format:&#160;Video recording<br/> Hands-on threat modeling ent://SD_ILS/0/SD_ILS:2333383 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Deleersnyder, Sebastien, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671268">https://learning.oreilly.com/videos/~/0636920671268</a> <a href="https://learning.oreilly.com/videos/~/0636920671268/?ar">https://learning.oreilly.com/videos/~/0636920671268/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar</a><br/>Format:&#160;Video recording<br/> Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud ent://SD_ILS/0/SD_ILS:2333792 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Berkouwer, Sander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar">https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803242507/?ar">https://learning.oreilly.com/library/view/~/9781803242507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803242507">https://learning.oreilly.com/library/view/~/9781803242507</a><br/>Format:&#160;Electronic Resources<br/> Mastering Palo Alto networks : build, configure and deploy network solutions for your infrastructure using features of PAN-OS ent://SD_ILS/0/SD_ILS:2333518 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Piens, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803241418/?ar">https://go.oreilly.com/library-access/library/view/-/9781803241418/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803241418/?ar">https://learning.oreilly.com/library/view/~/9781803241418/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803241418">https://learning.oreilly.com/library/view/~/9781803241418</a><br/>Format:&#160;Electronic Resources<br/> Diving into secure access service Edge : a technical leadership guide to achieving success with sase at market speed ent://SD_ILS/0/SD_ILS:2335081 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Ginn, Jeremiah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803242170/?ar">https://go.oreilly.com/library-access/library/view/-/9781803242170/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803242170">https://learning.oreilly.com/library/view/~/9781803242170</a> <a href="https://learning.oreilly.com/library/view/~/9781803242170/?ar">https://learning.oreilly.com/library/view/~/9781803242170/?ar</a><br/>Format:&#160;Electronic Resources<br/> Identity and access management fundamentals. ent://SD_ILS/0/SD_ILS:2335277 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Kohli, Harpreet, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671145/?ar">https://learning.oreilly.com/videos/~/0636920671145/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920671145">https://learning.oreilly.com/videos/~/0636920671145</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar</a><br/>Format:&#160;Video recording<br/> Apache essentials : install, configure, maintain ent://SD_ILS/0/SD_ILS:2334281 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Harkness, Darren James, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484283240/?ar">https://go.oreilly.com/library-access/library/view/-/9781484283240/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484283240/?ar">https://learning.oreilly.com/library/view/~/9781484283240/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484283240">https://learning.oreilly.com/library/view/~/9781484283240</a><br/>Format:&#160;Electronic Resources<br/> The security culture playbook : an executive guide to reducing risk and developing your human defense layer ent://SD_ILS/0/SD_ILS:2334218 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Carpenter, Perry, author, narrator.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar">https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781663720177">https://learning.oreilly.com/library/view/~/9781663720177</a> <a href="https://learning.oreilly.com/library/view/~/9781663720177/?ar">https://learning.oreilly.com/library/view/~/9781663720177/?ar</a><br/>Format:&#160;Sound recording<br/> Getting started with IBM Hyper Protect Data Controller ent://SD_ILS/0/SD_ILS:2331451 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format:&#160;Electronic Resources<br/> Python for cybersecurity : using Python for cyber offense and defense ent://SD_ILS/0/SD_ILS:2331574 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Poston, Howard E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar">https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119850649/?ar">https://learning.oreilly.com/library/view/~/9781119850649/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119850649">https://learning.oreilly.com/library/view/~/9781119850649</a><br/>Format:&#160;Electronic Resources<br/> Transitioning to quantum-safe cryptography on IBM Z ent://SD_ILS/0/SD_ILS:2333933 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460680">https://learning.oreilly.com/library/view/~/9780738460680</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460680/?ar">https://learning.oreilly.com/library/view/~/9780738460680/?ar</a><br/>Format:&#160;Electronic Resources<br/> Breached! : why data security law fails and how to improve it ent://SD_ILS/0/SD_ILS:2332956 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Solove, Daniel J., 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781705056271/?ar">https://go.oreilly.com/library-access/library/view/-/9781705056271/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781705056271/?ar">https://learning.oreilly.com/library/view/~/9781705056271/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781705056271">https://learning.oreilly.com/library/view/~/9781705056271</a><br/>Format:&#160;Sound recording<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:2333211 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Moyo, Siegfried, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119863113">https://learning.oreilly.com/library/view/~/9781119863113</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar">https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119863113/?ar">https://learning.oreilly.com/library/view/~/9781119863113/?ar</a><br/>Format:&#160;Electronic Resources<br/> The complete cybersecurity bootcamp ent://SD_ILS/0/SD_ILS:2333407 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137949397">https://learning.oreilly.com/videos/~/9780137949397</a> <a href="https://learning.oreilly.com/videos/~/9780137949397/?ar">https://learning.oreilly.com/videos/~/9780137949397/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar">https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar</a><br/>Format:&#160;Video recording<br/> Mastering Azure security : keeping your Microsoft Azure workloads safe ent://SD_ILS/0/SD_ILS:2332927 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Toroman, Mustafa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803238555">https://learning.oreilly.com/library/view/~/9781803238555</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803238555/?ar">https://learning.oreilly.com/library/view/~/9781803238555/?ar</a><br/>Format:&#160;Electronic Resources<br/> CIBERSEGURIDAD PARA DIRECTIVOS riesgos, control y eficiencia de las tecnolog&iacute;as de la informacion ent://SD_ILS/0/SD_ILS:2333767 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;DEUTSCH, VICTOR EDUARDO.<br/><a href="https://learning.oreilly.com/library/view/~/9788411312585">https://learning.oreilly.com/library/view/~/9788411312585</a> <a href="https://go.oreilly.com/library-access/library/view/-/9788411312585/?ar">https://go.oreilly.com/library-access/library/view/-/9788411312585/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9788411312585/?ar">https://learning.oreilly.com/library/view/~/9788411312585/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn Wireshark : a definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark ent://SD_ILS/0/SD_ILS:2334004 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Bock, Lisa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803231679/?ar">https://learning.oreilly.com/library/view/~/9781803231679/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803231679/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231679/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803231679">https://learning.oreilly.com/library/view/~/9781803231679</a><br/>Format:&#160;Electronic Resources<br/> Navigating the cybersecurity career path ent://SD_ILS/0/SD_ILS:2330836 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Patton, Helen E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119833420">https://learning.oreilly.com/library/view/~/9781119833420</a> <a href="https://learning.oreilly.com/library/view/~/9781119833420/?ar">https://learning.oreilly.com/library/view/~/9781119833420/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar">https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security handbook ent://SD_ILS/0/SD_ILS:2330245 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Jhanjhi, Noor Zaman, 1972- editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000540567">https://learning.oreilly.com/library/view/~/9781000540567</a> <a href="https://learning.oreilly.com/library/view/~/9781000540567/?ar">https://learning.oreilly.com/library/view/~/9781000540567/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781000540567/?ar">https://go.oreilly.com/library-access/library/view/-/9781000540567/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadar ent://SD_ILS/0/SD_ILS:2332057 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;IBM Storage Team, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460260/?ar">https://learning.oreilly.com/library/view/~/9780738460260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460260">https://learning.oreilly.com/library/view/~/9780738460260</a><br/>Format:&#160;Electronic Resources<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:2332538 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Pramanik, Sabyasachi, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119812494">https://learning.oreilly.com/library/view/~/9781119812494</a> <a href="https://learning.oreilly.com/library/view/~/9781119812494/?ar">https://learning.oreilly.com/library/view/~/9781119812494/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar">https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security for dummies ent://SD_ILS/0/SD_ILS:2332936 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Coombs, Ted, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar">https://go.oreilly.com/library-access/library/view/-/9798765008096/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9798765008096/?ar">https://learning.oreilly.com/library/view/~/9798765008096/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9798765008096">https://learning.oreilly.com/library/view/~/9798765008096</a><br/>Format:&#160;Sound recording<br/> Cybersecurity For Dummies ent://SD_ILS/0/SD_ILS:2332872 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119867180">https://learning.oreilly.com/library/view/~/9781119867180</a> <a href="https://learning.oreilly.com/library/view/~/9781119867180/?ar">https://learning.oreilly.com/library/view/~/9781119867180/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar">https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar</a><br/>Format:&#160;Electronic Resources<br/> OPNsense Beginner to Professional : Protect Networks and Build Next-Generation Firewalls Easily with OPNsense ent://SD_ILS/0/SD_ILS:2333204 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Camargo, Julio Cesar Bueno de.<br/><a href="https://learning.oreilly.com/library/view/~/9781801816878/?ar">https://learning.oreilly.com/library/view/~/9781801816878/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801816878">https://learning.oreilly.com/library/view/~/9781801816878</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801816878/?ar">https://go.oreilly.com/library-access/library/view/-/9781801816878/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide ent://SD_ILS/0/SD_ILS:2330975 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar">https://go.oreilly.com/library-access/library/view/-/9780136634829/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780136634829/?ar">https://learning.oreilly.com/library/view/~/9780136634829/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780136634829">https://learning.oreilly.com/library/view/~/9780136634829</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling a practical guide for developing teams ent://SD_ILS/0/SD_ILS:2331156 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Tarandach, Izar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056546/?ar">https://learning.oreilly.com/library/view/~/9781492056546/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492056546">https://learning.oreilly.com/library/view/~/9781492056546</a><br/>Format:&#160;Electronic Resources<br/> 8 steps to better security : a simple cyber resilience guide for business ent://SD_ILS/0/SD_ILS:2330835 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Crawley, Kim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119811237/?ar">https://learning.oreilly.com/library/view/~/9781119811237/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119811237">https://learning.oreilly.com/library/view/~/9781119811237</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar">https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics for pentesters : hands-on learning. ent://SD_ILS/0/SD_ILS:2331969 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Krahenbill, Cliff, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803231969">https://learning.oreilly.com/videos/~/9781803231969</a> <a href="https://learning.oreilly.com/videos/~/9781803231969/?ar">https://learning.oreilly.com/videos/~/9781803231969/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar</a><br/>Format:&#160;Video recording<br/> Penetration Testing Azure for Ethical Hackers ent://SD_ILS/0/SD_ILS:2331077 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Okeyode, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212932/?ar">https://learning.oreilly.com/library/view/~/9781839212932/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839212932">https://learning.oreilly.com/library/view/~/9781839212932</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Active Directory - Third Edition ent://SD_ILS/0/SD_ILS:2331105 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format:&#160;Electronic Resources<br/> Certified ethical hacker v11 ent://SD_ILS/0/SD_ILS:2333423 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Bushmiller, Dean, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780996619158/?ar">https://learning.oreilly.com/videos/~/9780996619158/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780996619158">https://learning.oreilly.com/videos/~/9780996619158</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780996619158/?ar">https://go.oreilly.com/library-access/library/view/-/9780996619158/?ar</a><br/>Format:&#160;Video recording<br/> Aan quan fang yu ru men shou ce = Defensive security handbook ent://SD_ILS/0/SD_ILS:2333648 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Brotherston, Lee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9787115577955/?ar">https://learning.oreilly.com/library/view/~/9787115577955/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9787115577955/?ar">https://go.oreilly.com/library-access/library/view/-/9787115577955/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9787115577955">https://learning.oreilly.com/library/view/~/9787115577955</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of Information Security and Assurance ent://SD_ILS/0/SD_ILS:2341722 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Clarke, Nathan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6870870">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How cybersecurity really works : a hands-on guide for total beginners ent://SD_ILS/0/SD_ILS:2328036 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Grubb, Sam (Cyber security consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098128999/?ar">https://learning.oreilly.com/library/view/~/9781098128999/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098128999">https://learning.oreilly.com/library/view/~/9781098128999</a><br/>Format:&#160;Electronic Resources<br/> Pentesting Industrial Control Systems : an Ethical Hacker's Guide to Analyzing, Compromising, Mitigating, and Securing Industrial Processes. ent://SD_ILS/0/SD_ILS:2330864 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Smith, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800202382/?ar">https://learning.oreilly.com/library/view/~/9781800202382/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800202382">https://learning.oreilly.com/library/view/~/9781800202382</a><br/>Format:&#160;Electronic Resources<br/> Secure operations and protections ent://SD_ILS/0/SD_ILS:2332092 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format:&#160;Video recording<br/> Google xi tong jia gou jie mi : gou jian an quan ke kao de xi tong = Building secure and reliable systems ent://SD_ILS/0/SD_ILS:2332928 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Adkins, Heather, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar">https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9787115569257/?ar">https://learning.oreilly.com/library/view/~/9787115569257/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9787115569257">https://learning.oreilly.com/library/view/~/9787115569257</a><br/>Format:&#160;Electronic Resources<br/> Comptia security+ certification practice exams, (Exam SY0-601). ent://SD_ILS/0/SD_ILS:2327137 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Lachance, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781260467987/?ar">https://learning.oreilly.com/library/view/~/9781260467987/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar">https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781260467987">https://learning.oreilly.com/library/view/~/9781260467987</a><br/>Format:&#160;Electronic Resources<br/> Zero Trust security : an enterprise guide ent://SD_ILS/0/SD_ILS:2328396 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Garbis, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484267028">https://learning.oreilly.com/library/view/~/9781484267028</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484267028/?ar">https://go.oreilly.com/library-access/library/view/-/9781484267028/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484267028/?ar">https://learning.oreilly.com/library/view/~/9781484267028/?ar</a><br/>Format:&#160;Electronic Resources<br/> Multi-site network and security services with NSX-T : implement network security, stateful services, and operations ent://SD_ILS/0/SD_ILS:2328881 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Hoogendoorn, Iwan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484270837/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270837/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484270837/?ar">https://learning.oreilly.com/library/view/~/9781484270837/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484270837">https://learning.oreilly.com/library/view/~/9781484270837</a><br/>Format:&#160;Electronic Resources<br/> Cyberjutsu : cybersecurity for the modern ninja ent://SD_ILS/0/SD_ILS:2326541 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a> <a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to hack like a ghost ent://SD_ILS/0/SD_ILS:2326507 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a> <a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format:&#160;Electronic Resources<br/> Artificial Intelligence, Cybersecurity and Cyber Defence ent://SD_ILS/0/SD_ILS:2328358 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a> <a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format:&#160;Electronic Resources<br/> Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade antivirus software ent://SD_ILS/0/SD_ILS:2329434 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Yehoshua, Nir, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801079747/?ar">https://learning.oreilly.com/library/view/~/9781801079747/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar">https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801079747">https://learning.oreilly.com/library/view/~/9781801079747</a><br/>Format:&#160;Electronic Resources<br/> CEH v11 certified ethical hacker study guide ent://SD_ILS/0/SD_ILS:2329776 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119800286/?ar">https://learning.oreilly.com/library/view/~/9781119800286/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar">https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119800286">https://learning.oreilly.com/library/view/~/9781119800286</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for dummies ent://SD_ILS/0/SD_ILS:2322839 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119560326/?ar">https://learning.oreilly.com/library/view/~/9781119560326/?ar</a><br/>Format:&#160;Electronic Resources<br/> AWS SECURITY COOKBOOK;PRACTICAL SOLUTIONS FOR MANAGING SECURITY POLICIES, MONITORING, AUDITING, AND COMPLIANCE WITH AWS ent://SD_ILS/0/SD_ILS:2323340 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;HEARTIN KANIKATHOTTU.<br/><a href="https://learning.oreilly.com/library/view/~/9781838826253">https://learning.oreilly.com/library/view/~/9781838826253</a> <a href="https://learning.oreilly.com/library/view/~/9781838826253/?ar">https://learning.oreilly.com/library/view/~/9781838826253/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar">https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web security for developers ent://SD_ILS/0/SD_ILS:2324422 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;McDonald, Malcolm (Computer programmer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098122683/?ar">https://learning.oreilly.com/library/view/~/9781098122683/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098122683">https://learning.oreilly.com/library/view/~/9781098122683</a><br/>Format:&#160;Electronic Resources<br/> Incident response primer : how to keep from getting pwned too hard ent://SD_ILS/0/SD_ILS:2323316 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format:&#160;Electronic Resources<br/> IBM DS8000 Encryption for data at rest, Transparent Cloud Tiering, and Endpoint Security (DS8000 Release 9.0) ent://SD_ILS/0/SD_ILS:2323373 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Dufrasne, Bertrand, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738458427/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458427/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458427/?ar">https://learning.oreilly.com/library/view/~/9780738458427/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458427">https://learning.oreilly.com/library/view/~/9780738458427</a><br/>Format:&#160;Electronic Resources<br/> Web application security : exploitation and countermeasures for modern web applications ent://SD_ILS/0/SD_ILS:2323527 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Hoffman, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492053101/?ar">https://learning.oreilly.com/library/view/~/9781492053101/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492053101/?ar">https://go.oreilly.com/library-access/library/view/-/9781492053101/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492053101">https://learning.oreilly.com/library/view/~/9781492053101</a><br/>Format:&#160;Electronic Resources<br/> Container security : fundamental technology concepts that protect containerized applications ent://SD_ILS/0/SD_ILS:2323879 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Rice, Liz, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056690/?ar">https://learning.oreilly.com/library/view/~/9781492056690/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492056690/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056690/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492056690">https://learning.oreilly.com/library/view/~/9781492056690</a><br/>Format:&#160;Electronic Resources<br/> Designing a HIPAA-compliant security operations center : a guide to detecting and responding to healthcare breaches and events ent://SD_ILS/0/SD_ILS:2323333 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Thompson, Eric C.<br/><a href="https://learning.oreilly.com/library/view/~/9781484256084">https://learning.oreilly.com/library/view/~/9781484256084</a> <a href="https://learning.oreilly.com/library/view/~/9781484256084/?ar">https://learning.oreilly.com/library/view/~/9781484256084/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Complete 2020 Ethereum and Solidity Developer Bootcamp ent://SD_ILS/0/SD_ILS:2323478 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Wiesner, Thomas, author.<br/><a href="https://learning.oreilly.com/videos/~/9781800201019/?ar">https://learning.oreilly.com/videos/~/9781800201019/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar">https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781800201019">https://learning.oreilly.com/videos/~/9781800201019</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:2323589 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:2323627 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sadiqui, Ali, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar">https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786305275">https://learning.oreilly.com/library/view/~/9781786305275</a> <a href="https://learning.oreilly.com/library/view/~/9781786305275/?ar">https://learning.oreilly.com/library/view/~/9781786305275/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber Warfare - Truth, Tactics, and Strategies ent://SD_ILS/0/SD_ILS:2323667 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a> <a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity fundamentals : a real-world perspective ent://SD_ILS/0/SD_ILS:2356265 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Thakur, Kutub, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6186711">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intelligent network management and control : intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio ent://SD_ILS/0/SD_ILS:2358096 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Benmammar, Badr, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6522998">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer security and encryption : an introduction ent://SD_ILS/0/SD_ILS:2237660 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Chauhan, S. R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6404902">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Design and analysis of security protocol for communication ent://SD_ILS/0/SD_ILS:2274166 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Goyal, Dinesh, 1976- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6040173">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe ent://SD_ILS/0/SD_ILS:2268639 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Rubinoff, Shira, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6020320">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Artificial intelligence, cybersecurity and cyber defense ent://SD_ILS/0/SD_ILS:2274878 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Ventre, Daniel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6384365">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:2274699 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Hickey, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6301556">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer network security ent://SD_ILS/0/SD_ILS:2274211 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sadiqui, Ali, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6123268">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security operations in practice ent://SD_ILS/0/SD_ILS:2333929 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175089/?ar">https://learning.oreilly.com/library/view/~/9781780175089/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780175089">https://learning.oreilly.com/library/view/~/9781780175089</a><br/>Format:&#160;Electronic Resources<br/> Secrets management with Terraform ent://SD_ILS/0/SD_ILS:2331925 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Winkler, Scott, author, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202178">https://learning.oreilly.com/videos/~/10000MNLV202178</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202178/?ar">https://learning.oreilly.com/videos/~/10000MNLV202178/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202178/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202178/?ar</a><br/>Format:&#160;Video recording<br/> Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu ent://SD_ILS/0/SD_ILS:2332657 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format:&#160;Electronic Resources<br/> Hacking : der umfassende Praxis-Guide: inkl. Pr&uuml;fungsvorbereitung zum CEHv10 ent://SD_ILS/0/SD_ILS:2325946 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Amberg, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958452206/?ar">https://learning.oreilly.com/library/view/~/9783958452206/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958452206">https://learning.oreilly.com/library/view/~/9783958452206</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2322053 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:2322126 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Kegerreis, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260453232/?ar">https://learning.oreilly.com/library/view/~/9781260453232/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar">https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data breaches : crisis and opportunity ent://SD_ILS/0/SD_ILS:2322222 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format:&#160;Electronic Resources<br/> Applied incident response ent://SD_ILS/0/SD_ILS:2322826 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781119560265">https://learning.oreilly.com/library/view/~/9781119560265</a> <a href="https://learning.oreilly.com/library/view/~/9781119560265/?ar">https://learning.oreilly.com/library/view/~/9781119560265/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning node embeddings in transaction networks ent://SD_ILS/0/SD_ILS:2326362 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Barbour, Jesse, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/00000HQHJ2T3KE2A/?ar">https://go.oreilly.com/library-access/library/view/-/00000HQHJ2T3KE2A/?ar</a> <a href="https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A/?ar">https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A/?ar</a> <a href="https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A">https://learning.oreilly.com/videos/~/00000HQHJ2T3KE2A</a><br/>Format:&#160;Electronic Resources<br/> Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud ent://SD_ILS/0/SD_ILS:2326395 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Calles, Miguel A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484261002/?ar">https://learning.oreilly.com/library/view/~/9781484261002/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484261002">https://learning.oreilly.com/library/view/~/9781484261002</a><br/>Format:&#160;Electronic Resources<br/> Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats. ent://SD_ILS/0/SD_ILS:2326028 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Mukherjee, Aditya.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789806298/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806298/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789806298/?ar">https://learning.oreilly.com/library/view/~/9781789806298/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789806298">https://learning.oreilly.com/library/view/~/9781789806298</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Security, 2nd Edition ent://SD_ILS/0/SD_ILS:2331101 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a> <a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing microservices with Istio Service Mesh ent://SD_ILS/0/SD_ILS:2331950 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Siriwardena, Prabath, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202172">https://learning.oreilly.com/videos/~/10000MNLV202172</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202172/?ar">https://learning.oreilly.com/videos/~/10000MNLV202172/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar</a><br/>Format:&#160;Video recording<br/> Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe ent://SD_ILS/0/SD_ILS:2324802 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format:&#160;Electronic Resources<br/> Rational cybersecurity for business : the security leaders' guide to business alignment ent://SD_ILS/0/SD_ILS:2325488 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Blum, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781484259528">https://learning.oreilly.com/library/view/~/9781484259528</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484259528/?ar">https://learning.oreilly.com/library/view/~/9781484259528/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privileged attack vectors : building effective cyber-defense strategies to protect organizations ent://SD_ILS/0/SD_ILS:2324664 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484259146/?ar">https://learning.oreilly.com/library/view/~/9781484259146/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484259146">https://learning.oreilly.com/library/view/~/9781484259146</a><br/>Format:&#160;Electronic Resources<br/> Practical vulnerability management : a strategic approach to managing cyber risk ent://SD_ILS/0/SD_ILS:2325867 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Magnusson, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098125707/?ar">https://learning.oreilly.com/library/view/~/9781098125707/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098125707">https://learning.oreilly.com/library/view/~/9781098125707</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity attacks - red team strategies : a practical guide to building a penetration testing program having homefield advantage ent://SD_ILS/0/SD_ILS:2351005 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Rehberger, Johann, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6155204">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical cyber forensics : an incident-based approach to forensic investigations ent://SD_ILS/0/SD_ILS:2321521 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for dummies ent://SD_ILS/0/SD_ILS:2322747 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781494542450">https://learning.oreilly.com/library/view/~/9781494542450</a> <a href="https://learning.oreilly.com/library/view/~/9781494542450/?ar">https://learning.oreilly.com/library/view/~/9781494542450/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar">https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security principles for the working architect ent://SD_ILS/0/SD_ILS:2322691 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Woods, Eoin, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338215/?ar">https://learning.oreilly.com/videos/~/0636920338215/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920338215">https://learning.oreilly.com/videos/~/0636920338215</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar</a><br/>Format:&#160;Electronic Resources<br/> O'Reilly Velocity Conference 2019, San Jose, California. ent://SD_ILS/0/SD_ILS:2322886 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;O'Reilly Velocity Conference (2019 : San Jose, Calif.) issuing body.<br/><a href="https://learning.oreilly.com/videos/~/9781492050582/?ar">https://learning.oreilly.com/videos/~/9781492050582/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492050582/?ar">https://go.oreilly.com/library-access/library/view/-/9781492050582/?ar</a><br/>Format:&#160;Electronic Resources<br/> Pro Spring security : securing Spring Framework 5 and Boot 2-based Java applications ent://SD_ILS/0/SD_ILS:2323072 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Scarioni, Carlo, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484250525/?ar">https://learning.oreilly.com/library/view/~/9781484250525/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Active Directory - Second Edition ent://SD_ILS/0/SD_ILS:2323979 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789800203/?ar">https://learning.oreilly.com/library/view/~/9781789800203/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar">https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789800203">https://learning.oreilly.com/library/view/~/9781789800203</a><br/>Format:&#160;Electronic Resources<br/> Hands-on AWS penetration testing with Kali Linux : set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation ent://SD_ILS/0/SD_ILS:2321409 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Gilbert, Karl, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789136722">https://learning.oreilly.com/library/view/~/9781789136722</a> <a href="https://learning.oreilly.com/library/view/~/9781789136722/?ar">https://learning.oreilly.com/library/view/~/9781789136722/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar">https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux troubleshooting course with real life examples ent://SD_ILS/0/SD_ILS:2323238 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format:&#160;Electronic Resources<br/> How Lyft migrated to a service mesh with Envoy ent://SD_ILS/0/SD_ILS:2323296 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Hochman, Daniel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338390/?ar">https://learning.oreilly.com/videos/~/0636920338390/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920338390">https://learning.oreilly.com/videos/~/0636920338390</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn Kali Linux 2019 : perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark ent://SD_ILS/0/SD_ILS:2323768 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789611809/?ar">https://learning.oreilly.com/library/view/~/9781789611809/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789611809">https://learning.oreilly.com/library/view/~/9781789611809</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar">https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar</a><br/>Format:&#160;Electronic Resources<br/> Zabbix 4 network monitoring : monitor the performance of your network devices and applications using the all-new Zabbix 4.0 ent://SD_ILS/0/SD_ILS:2319010 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Uytterhoeven, Patrik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340266/?ar">https://learning.oreilly.com/library/view/~/9781789340266/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical security : simple practices for defending your systems ent://SD_ILS/0/SD_ILS:2319402 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Zabicki, Roman, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar">https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781680506679">https://learning.oreilly.com/library/view/~/9781680506679</a> <a href="https://learning.oreilly.com/library/view/~/9781680506679/?ar">https://learning.oreilly.com/library/view/~/9781680506679/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity of industrial systems ent://SD_ILS/0/SD_ILS:2321293 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Flaus, Jean-Marie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786304216/?ar">https://learning.oreilly.com/library/view/~/9781786304216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786304216">https://learning.oreilly.com/library/view/~/9781786304216</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781786304216/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304216/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessons ent://SD_ILS/0/SD_ILS:2321550 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format:&#160;Electronic Resources<br/> The cybersecurity playbook : how every leader and employee can contribute to a culture of security ent://SD_ILS/0/SD_ILS:2321568 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Cerra, Allison, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar">https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119442196/?ar">https://learning.oreilly.com/library/view/~/9781119442196/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119442196">https://learning.oreilly.com/library/view/~/9781119442196</a><br/>Format:&#160;Electronic Resources<br/> Learn Wireshark : Confidently Navigate the Wireshark Interface and Solve Real-World Networking Problems. ent://SD_ILS/0/SD_ILS:2321701 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Bock, Lisa.<br/><a href="https://learning.oreilly.com/library/view/~/9781789134506">https://learning.oreilly.com/library/view/~/9781789134506</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789134506/?ar">https://go.oreilly.com/library-access/library/view/-/9781789134506/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789134506/?ar">https://learning.oreilly.com/library/view/~/9781789134506/?ar</a><br/>Format:&#160;Electronic Resources<br/> Bug bounty hunting for web security : find and exploit vulnerabilities in web sites and applications ent://SD_ILS/0/SD_ILS:2323037 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sinha, Sanjib, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484253915/?ar">https://learning.oreilly.com/library/view/~/9781484253915/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484253915/?ar">https://go.oreilly.com/library-access/library/view/-/9781484253915/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM Spectrum Protect Plus : practical guidance for deployment, configuration, and usage ent://SD_ILS/0/SD_ILS:2323017 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Gaschler, Andre, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738458045/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458045/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458045/?ar">https://learning.oreilly.com/library/view/~/9780738458045/?ar</a><br/>Format:&#160;Electronic Resources<br/> Foundations of information security : a straightforward introduction ent://SD_ILS/0/SD_ILS:2322313 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098122546/?ar">https://learning.oreilly.com/library/view/~/9781098122546/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098122546">https://learning.oreilly.com/library/view/~/9781098122546</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar</a><br/>Format:&#160;Electronic Resources<br/> Implementing Cisco network security, Part 2. ent://SD_ILS/0/SD_ILS:2334801 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Pickard, John, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar">https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920303213">https://learning.oreilly.com/videos/~/0636920303213</a> <a href="https://learning.oreilly.com/videos/~/0636920303213/?ar">https://learning.oreilly.com/videos/~/0636920303213/?ar</a><br/>Format:&#160;Video recording<br/> Microsoft Enterprise Mobility and Security training ent://SD_ILS/0/SD_ILS:2319556 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on network forensics : investigate network attacks and find evidence using common network forensic tools ent://SD_ILS/0/SD_ILS:2319836 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789344523/?ar">https://learning.oreilly.com/library/view/~/9781789344523/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing ent://SD_ILS/0/SD_ILS:2319847 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on pfSense 2.x for firewalls and routers ent://SD_ILS/0/SD_ILS:2319334 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;White, Jason, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789805017/?ar">https://go.oreilly.com/library-access/library/view/-/9781789805017/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789805017/?ar">https://learning.oreilly.com/videos/~/9781789805017/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber operations : building, defending, and attacking modern computer networks ent://SD_ILS/0/SD_ILS:2318914 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;O'Leary, Mike, 1968- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242940">https://learning.oreilly.com/library/view/~/9781484242940</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484242940/?ar">https://learning.oreilly.com/library/view/~/9781484242940/?ar</a><br/>Format:&#160;Electronic Resources<br/> Protecting your web applications : solutions and strategies to combat cybersecurity threats ent://SD_ILS/0/SD_ILS:2321166 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sloper, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492052791">https://learning.oreilly.com/library/view/~/9781492052791</a> <a href="https://learning.oreilly.com/library/view/~/9781492052791/?ar">https://learning.oreilly.com/library/view/~/9781492052791/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft AZ-301 certification : Azure architect design ent://SD_ILS/0/SD_ILS:2320826 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Colyer, Nick, speaker.<br/><a href="https://learning.oreilly.com/videos/~/1018947653/?ar">https://learning.oreilly.com/videos/~/1018947653/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1018947653/?ar">https://go.oreilly.com/library-access/library/view/-/1018947653/?ar</a> <a href="https://learning.oreilly.com/videos/~/1018947653">https://learning.oreilly.com/videos/~/1018947653</a><br/>Format:&#160;Electronic Resources<br/> Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risks ent://SD_ILS/0/SD_ILS:2321954 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Born, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789807608/?ar">https://learning.oreilly.com/library/view/~/9781789807608/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807608">https://learning.oreilly.com/library/view/~/9781789807608</a><br/>Format:&#160;Electronic Resources<br/> Security within Conasense Paragon ent://SD_ILS/0/SD_ILS:2232483 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Prasad, Ramjee, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5829254">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The complete Metasploit guide : explore effective penetration testing techniques with Metasploit ent://SD_ILS/0/SD_ILS:2268236 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5802136">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Extended topology analysis of a detection mechanism implementation against Botnet Based DDoS flooding attack in SDN ent://SD_ILS/0/SD_ILS:2133891 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Karakış, Emre, author.<br/><a href="https://hdl.handle.net/11147/7430">Access to Electronic Versiyon.</a><br/>Format:&#160;Manuscript<br/> Understanding security issues ent://SD_ILS/0/SD_ILS:2144594 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157542">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity of industrial systems ent://SD_ILS/0/SD_ILS:2273571 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Flaus, Jean-Marie, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5813671">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Rewired cybersecurity governance ent://SD_ILS/0/SD_ILS:2273424 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Ellis, Ryan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5761058">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Smart cities cybersecurity and privacy ent://SD_ILS/0/SD_ILS:2215883 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Kayhan Zrar Ghafoor, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5609779">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber and you : the impact of technology on our lives ent://SD_ILS/0/SD_ILS:2217081 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Kendal, Maureen, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5811334">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The business of cybersecurity : foundations and ideologies ent://SD_ILS/0/SD_ILS:2156901 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5770273">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web hacking : become a professional web pentester ent://SD_ILS/0/SD_ILS:2319831 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization ent://SD_ILS/0/SD_ILS:2318938 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134807614/?ar">https://learning.oreilly.com/library/view/~/9780134807614/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134807614">https://learning.oreilly.com/library/view/~/9780134807614</a><br/>Format:&#160;Electronic Resources<br/> Becoming the hacker : the playbook for getting inside the mind of an attacker ent://SD_ILS/0/SD_ILS:2319129 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format:&#160;Electronic Resources<br/> My online privacy for seniors ent://SD_ILS/0/SD_ILS:2319412 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Rich, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135381281/?ar">https://learning.oreilly.com/library/view/~/9780135381281/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar">https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security : art and science ent://SD_ILS/0/SD_ILS:2318452 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format:&#160;Electronic Resources<br/> Spring security : LiveLessons ent://SD_ILS/0/SD_ILS:2318493 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Long, Josh, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar">https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780135415054/?ar">https://learning.oreilly.com/videos/~/9780135415054/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security with AI and machine learning : using advanced tools to improve application security at the edge ent://SD_ILS/0/SD_ILS:2319058 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Ops with bash : attack, defend, and analyze from the command line ent://SD_ILS/0/SD_ILS:2319252 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a> <a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on application penetration testing with Burp Suite : use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications ent://SD_ILS/0/SD_ILS:2319360 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Lozano, Carlos A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788994064/?ar">https://learning.oreilly.com/library/view/~/9781788994064/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar">https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788994064">https://learning.oreilly.com/library/view/~/9781788994064</a><br/>Format:&#160;Electronic Resources<br/> Hands-on penetration testing with Kali NetHunter : spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go ent://SD_ILS/0/SD_ILS:2319361 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Singh, Glen D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995177/?ar">https://learning.oreilly.com/library/view/~/9781788995177/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995177">https://learning.oreilly.com/library/view/~/9781788995177</a><br/>Format:&#160;Electronic Resources<br/> Threat and vulnerability assessment for enterprises ent://SD_ILS/0/SD_ILS:2319277 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781838559205/?ar">https://learning.oreilly.com/videos/~/9781838559205/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar">https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux 2019.1, the ultimate white hat hackers' toolkit ent://SD_ILS/0/SD_ILS:2319114 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340563/?ar">https://learning.oreilly.com/library/view/~/9781789340563/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning Python for forensics : leverage the power of Python in forensic investigations ent://SD_ILS/0/SD_ILS:2319116 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber smart : five habits to protect your family, money, and identity from cyber criminals ent://SD_ILS/0/SD_ILS:2318868 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;McDonough, Bart R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469071503/?ar">https://learning.oreilly.com/library/view/~/9781469071503/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar">https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781469071503">https://learning.oreilly.com/library/view/~/9781469071503</a><br/>Format:&#160;Sound recording<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:2319534 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a> <a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux essentials for cybersecurity lab manual ent://SD_ILS/0/SD_ILS:2317558 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data analytics for IT networks : developing innovative use cases ent://SD_ILS/0/SD_ILS:2317559 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data ent://SD_ILS/0/SD_ILS:2319238 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Nickel, Jochen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789132304/?ar">https://learning.oreilly.com/library/view/~/9781789132304/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar">https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical security automation and testing : tools and techniques for automated security scanning and testing in DevSecOps ent://SD_ILS/0/SD_ILS:2319096 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Hsu, Tony Hsiang-Chih, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789802023/?ar">https://learning.oreilly.com/library/view/~/9781789802023/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789802023/?ar">https://go.oreilly.com/library-access/library/view/-/9781789802023/?ar</a><br/>Format:&#160;Electronic Resources<br/> Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud ent://SD_ILS/0/SD_ILS:2321488 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Berkouwer, Sander, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806984">https://learning.oreilly.com/library/view/~/9781789806984</a> <a href="https://learning.oreilly.com/library/view/~/9781789806984/?ar">https://learning.oreilly.com/library/view/~/9781789806984/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber resiliency solution for IBM Spectrum Scale ent://SD_ILS/0/SD_ILS:2322145 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;IBM Storage Team, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457963/?ar">https://learning.oreilly.com/library/view/~/9780738457963/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar</a><br/>Format:&#160;Electronic Resources<br/> Zero trust networks with VMware NSX : build highly secure network architectures for your data centers ent://SD_ILS/0/SD_ILS:2322659 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Keeriyattil, Sreejith, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484254318">https://learning.oreilly.com/library/view/~/9781484254318</a> <a href="https://learning.oreilly.com/library/view/~/9781484254318/?ar">https://learning.oreilly.com/library/view/~/9781484254318/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484254318/?ar">https://go.oreilly.com/library-access/library/view/-/9781484254318/?ar</a><br/>Format:&#160;Electronic Resources<br/> Qi ye shen tou ce shi he chi xu jian kong. ent://SD_ILS/0/SD_ILS:2332289 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a> <a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a> <a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format:&#160;Video recording<br/> Practical cloud security. ent://SD_ILS/0/SD_ILS:2334616 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Dotson, Chris, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar">https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492060727">https://learning.oreilly.com/videos/~/9781492060727</a> <a href="https://learning.oreilly.com/videos/~/9781492060727/?ar">https://learning.oreilly.com/videos/~/9781492060727/?ar</a><br/>Format:&#160;Video recording<br/> Practical cloud security : a guide for secure design and deployment ent://SD_ILS/0/SD_ILS:2319005 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Dotson, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492037507">https://learning.oreilly.com/library/view/~/9781492037507</a> <a href="https://learning.oreilly.com/library/view/~/9781492037507/?ar">https://learning.oreilly.com/library/view/~/9781492037507/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:2321452 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format:&#160;Electronic Resources<br/> Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments ent://SD_ILS/0/SD_ILS:2322055 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS : a pocket guide ent://SD_ILS/0/SD_ILS:2322160 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781641/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781641/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787781641/?ar">https://learning.oreilly.com/library/view/~/9781787781641/?ar</a><br/>Format:&#160;Electronic Resources<br/> Waging cyber war : technical challenges and operational constraints ent://SD_ILS/0/SD_ILS:2321908 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Oakley, Jacob G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249505/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249505/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484249505/?ar">https://learning.oreilly.com/library/view/~/9781484249505/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Complete Ethical Hacking Course ent://SD_ILS/0/SD_ILS:2323185 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Fraud detection without feature engineering ent://SD_ILS/0/SD_ILS:2322434 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Vagata, Pamela, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339540/?ar">https://learning.oreilly.com/videos/~/0636920339540/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339540">https://learning.oreilly.com/videos/~/0636920339540</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheit : Eine Einf&uuml;hrung ent://SD_ILS/0/SD_ILS:2122520 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Hellmann, Roland, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157634">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands-on red team tactics : a practical guide to mastering red team operations ent://SD_ILS/0/SD_ILS:2317792 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sharma, Himanshu, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995238">https://learning.oreilly.com/library/view/~/9781788995238</a> <a href="https://learning.oreilly.com/library/view/~/9781788995238/?ar">https://learning.oreilly.com/library/view/~/9781788995238/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ansible quick start guide : Control and monitor infrastructures of any size, physical or virtual ent://SD_ILS/0/SD_ILS:2317798 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Alibi, Mohamed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789532937">https://learning.oreilly.com/library/view/~/9781789532937</a> <a href="https://learning.oreilly.com/library/view/~/9781789532937/?ar">https://learning.oreilly.com/library/view/~/9781789532937/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789532937/?ar">https://go.oreilly.com/library-access/library/view/-/9781789532937/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on bug hunting for penetration testers : a practical guide to help ethical hackers discover web application security flaws ent://SD_ILS/0/SD_ILS:2317823 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Marshall, Joseph, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789344202">https://learning.oreilly.com/library/view/~/9781789344202</a> <a href="https://learning.oreilly.com/library/view/~/9781789344202/?ar">https://learning.oreilly.com/library/view/~/9781789344202/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar</a><br/>Format:&#160;Electronic Resources<br/> Velocity Conference - London, UK 2018 ent://SD_ILS/0/SD_ILS:2321191 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;O'Reilly (Firm), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492025931/?ar">https://go.oreilly.com/library-access/library/view/-/9781492025931/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492025931">https://learning.oreilly.com/videos/~/9781492025931</a> <a href="https://learning.oreilly.com/videos/~/9781492025931/?ar">https://learning.oreilly.com/videos/~/9781492025931/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity essentials ent://SD_ILS/0/SD_ILS:2322482 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Brooks, Charles J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119362395/?ar">https://learning.oreilly.com/library/view/~/9781119362395/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar">https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar</a><br/>Format:&#160;Electronic Resources<br/> Unsupervised machine learning in security applications. ent://SD_ILS/0/SD_ILS:2334784 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032373">https://learning.oreilly.com/videos/~/9781492032373</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492032373/?ar">https://learning.oreilly.com/videos/~/9781492032373/?ar</a><br/>Format:&#160;Video recording<br/> Learning Kali Linux : security testing, penetration testing, and ethical hacking ent://SD_ILS/0/SD_ILS:2316978 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492028680/?ar">https://learning.oreilly.com/library/view/~/9781492028680/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492028680">https://learning.oreilly.com/library/view/~/9781492028680</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux tutorial for beginners ent://SD_ILS/0/SD_ILS:2317579 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Naja, Tarek, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar">https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789615173/?ar">https://learning.oreilly.com/videos/~/9781789615173/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network scanning cookbook : practical network security using Nmap and Nessus 7 ent://SD_ILS/0/SD_ILS:2317776 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mobilita, sicurezza e nuove frontiere tecnologiche ent://SD_ILS/0/SD_ILS:2241188 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Militello, Vincenzo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5662503">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Internet of things security : fundamentals, techniques and applications ent://SD_ILS/0/SD_ILS:2231065 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Shandilya, Shishir K., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5493971">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical security ent://SD_ILS/0/SD_ILS:2212845 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4981408">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace and cybersecurity ent://SD_ILS/0/SD_ILS:2260769 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Kostopoulos, George K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5110029">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:2156465 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Takanen, Ari, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5430720">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands-on incident response and digital forensics ent://SD_ILS/0/SD_ILS:2267847 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sheward, Mike, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5614288">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Insider threats ent://SD_ILS/0/SD_ILS:2272622 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Arduin, Pierre-Emmanuel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5323674">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and resilience in intelligent data-centric systems and communication networks ent://SD_ILS/0/SD_ILS:2213104 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5090270">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network vulnerability assessment : identify security loopholes in your network's infrastructure ent://SD_ILS/0/SD_ILS:2215106 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5507753">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security and cryptography : a self-teaching introduction ent://SD_ILS/0/SD_ILS:2214460 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Musa, Sarhan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5389089">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Empirical research for software security : foundations and experience ent://SD_ILS/0/SD_ILS:2108670 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5164090">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:2132928 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4987646">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communications 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085504 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Chowdhury, Kaushik Roy. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02931-9">https://doi.org/10.1007/978-3-030-02931-9</a><br/>Format:&#160;Electronic Resources<br/> Smart Computing and Communication Third International Conference, SmartCom 2018, Tokyo, Japan, December 10&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085394 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Qiu, Meikang. editor. (orcid)0000-0002-1004-0140<br/><a href="https://doi.org/10.1007/978-3-030-05755-8">https://doi.org/10.1007/978-3-030-05755-8</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085551 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Budaghyan, Lilya. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:2112473 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Moschovitis, Christos J. P., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5342325">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Monitoring anti-patterns ent://SD_ILS/0/SD_ILS:2315680 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Julian, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492036791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492036791/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492036791/?ar">https://learning.oreilly.com/library/view/~/9781492036791/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492036791">https://learning.oreilly.com/library/view/~/9781492036791</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics ent://SD_ILS/0/SD_ILS:2315706 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:2316152 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linux ent://SD_ILS/0/SD_ILS:2315998 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Najera-Gutierrez, Gilberto, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar">https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788623377/?ar">https://learning.oreilly.com/library/view/~/9781788623377/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:2316100 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Moschovitis, Christos J. P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119429517/?ar">https://go.oreilly.com/library-access/library/view/-/9781119429517/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119429517/?ar">https://learning.oreilly.com/library/view/~/9781119429517/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119429517">https://learning.oreilly.com/library/view/~/9781119429517</a><br/>Format:&#160;Electronic Resources<br/> Practical cyber intelligence : how action-based intelligence can be an effective response to incidents ent://SD_ILS/0/SD_ILS:2316348 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Bautista, Wilson, Jr., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788625562">https://learning.oreilly.com/library/view/~/9781788625562</a> <a href="https://learning.oreilly.com/library/view/~/9781788625562/?ar">https://learning.oreilly.com/library/view/~/9781788625562/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web application firewalls : securing modern web applications ent://SD_ILS/0/SD_ILS:2318497 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Russell, Chad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492032311">https://learning.oreilly.com/library/view/~/9781492032311</a> <a href="https://learning.oreilly.com/library/view/~/9781492032311/?ar">https://learning.oreilly.com/library/view/~/9781492032311/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar</a><br/>Format:&#160;Electronic Resources<br/> Risk management for cybersecurity and IT managers ent://SD_ILS/0/SD_ILS:2316845 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789531992/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531992/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789531992/?ar">https://learning.oreilly.com/videos/~/9781789531992/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kubernetes security : operating Kubernetes clusters and applications safely ent://SD_ILS/0/SD_ILS:2318519 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Rice, Liz, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492039075">https://learning.oreilly.com/library/view/~/9781492039075</a> <a href="https://learning.oreilly.com/library/view/~/9781492039075/?ar">https://learning.oreilly.com/library/view/~/9781492039075/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2316778 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format:&#160;Electronic Resources<br/> EVPN in the data center ent://SD_ILS/0/SD_ILS:2317148 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Dutt, Dinesh G., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492029045">https://learning.oreilly.com/library/view/~/9781492029045</a> <a href="https://learning.oreilly.com/library/view/~/9781492029045/?ar">https://learning.oreilly.com/library/view/~/9781492029045/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492029045/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029045/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking for Dummies. ent://SD_ILS/0/SD_ILS:2316883 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119485476/?ar">https://go.oreilly.com/library-access/library/view/-/9781119485476/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119485476/?ar">https://learning.oreilly.com/library/view/~/9781119485476/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn website hacking : penetration testing from scratch ent://SD_ILS/0/SD_ILS:2316434 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789346145/?ar">https://learning.oreilly.com/videos/~/9781789346145/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning Python web penetration testing : automate web penetration testing activities using Python ent://SD_ILS/0/SD_ILS:2317026 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Martorella, Christian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789533972/?ar">https://learning.oreilly.com/library/view/~/9781789533972/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789533972/?ar">https://go.oreilly.com/library-access/library/view/-/9781789533972/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Industrial Internet of Things security : a practitioner's guide to securing connected industries ent://SD_ILS/0/SD_ILS:2317285 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Bhattacharjee, Sravani, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788832687/?ar">https://learning.oreilly.com/library/view/~/9781788832687/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788832687">https://learning.oreilly.com/library/view/~/9781788832687</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar">https://go.oreilly.com/library-access/library/view/-/9781788832687/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOps ent://SD_ILS/0/SD_ILS:2317298 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Hsu, Tony, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788995504/?ar">https://learning.oreilly.com/library/view/~/9781788995504/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995504">https://learning.oreilly.com/library/view/~/9781788995504</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux&reg; hardening in hostile networks : server security from TLS to TOR ent://SD_ILS/0/SD_ILS:2314177 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco Firepower Threat Defense (FTD) : configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP) ent://SD_ILS/0/SD_ILS:2314393 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Rajib, Nazmul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134679471">https://learning.oreilly.com/library/view/~/9780134679471</a> <a href="https://learning.oreilly.com/library/view/~/9780134679471/?ar">https://learning.oreilly.com/library/view/~/9780134679471/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar">https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital resilience : is your company ready for the next cyber threat? ent://SD_ILS/0/SD_ILS:2314734 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Rothrock, Ray A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814439258">https://learning.oreilly.com/library/view/~/9780814439258</a> <a href="https://learning.oreilly.com/library/view/~/9780814439258/?ar">https://learning.oreilly.com/library/view/~/9780814439258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar">https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus ent://SD_ILS/0/SD_ILS:2316700 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format:&#160;Electronic Resources<br/> Threat hunting : a guide to proactive network defense ent://SD_ILS/0/SD_ILS:2318444 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Collins, Michael (Michael Patrick), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028260/?ar">https://learning.oreilly.com/library/view/~/9781492028260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492028260">https://learning.oreilly.com/library/view/~/9781492028260</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar</a><br/>Format:&#160;Electronic Resources<br/> Modernizing cybersecurity operations with machine intelligence : advanced threat detection, hunting, and analysis ent://SD_ILS/0/SD_ILS:2318456 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Guerra, Peter, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar">https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492035992/?ar">https://learning.oreilly.com/library/view/~/9781492035992/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492035992">https://learning.oreilly.com/library/view/~/9781492035992</a><br/>Format:&#160;Electronic Resources<br/> Engineering trustworthy systems : get cybersecurity design right the first time ent://SD_ILS/0/SD_ILS:2316316 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Saydjari, O. Sami, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260118186/?ar">https://go.oreilly.com/library-access/library/view/-/9781260118186/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781260118186/?ar">https://learning.oreilly.com/library/view/~/9781260118186/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781260118186">https://learning.oreilly.com/library/view/~/9781260118186</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : orchestrating attacks ent://SD_ILS/0/SD_ILS:2318510 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781484243404/?ar">https://learning.oreilly.com/videos/~/9781484243404/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : networks and websites ent://SD_ILS/0/SD_ILS:2318511 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243411/?ar">https://learning.oreilly.com/videos/~/9781484243411/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar</a><br/>Format:&#160;Electronic Resources<br/> Orchestrating and automating security for the Internet of Things : delivering advanced security capabilities from Edge to Cloud for IoT ent://SD_ILS/0/SD_ILS:2316233 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sabella, Anthony, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134756936/?ar">https://go.oreilly.com/library-access/library/view/-/9780134756936/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134756936/?ar">https://learning.oreilly.com/library/view/~/9780134756936/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134756936">https://learning.oreilly.com/library/view/~/9780134756936</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : learning the basics ent://SD_ILS/0/SD_ILS:2318527 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243480/?ar">https://learning.oreilly.com/videos/~/9781484243480/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain ent://SD_ILS/0/SD_ILS:2317092 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Gupta, Rajneesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990189">https://learning.oreilly.com/library/view/~/9781788990189</a> <a href="https://learning.oreilly.com/library/view/~/9781788990189/?ar">https://learning.oreilly.com/library/view/~/9781788990189/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn social engineering from scratch ent://SD_ILS/0/SD_ILS:2316600 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sabih, Zaid, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789341584/?ar">https://learning.oreilly.com/videos/~/9781789341584/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789341584/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341584/?ar</a><br/>Format:&#160;Electronic Resources<br/> Investigating the Cyber Breach : the digital forensics guide for the network engineer ent://SD_ILS/0/SD_ILS:2315345 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar">https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134755885/?ar">https://learning.oreilly.com/library/view/~/9780134755885/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM QRadar Version 7.3 : planning and installation guide ent://SD_ILS/0/SD_ILS:2315474 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Carabaguiaz, Elias, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442877/?ar">https://learning.oreilly.com/library/view/~/9780738442877/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity attacks (Red Team activity) ent://SD_ILS/0/SD_ILS:2315986 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Nesterenko, Sergii, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781788478878/?ar">https://learning.oreilly.com/videos/~/9781788478878/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security automation : get to grips with automating your cloud security on AWS and OpenStack ent://SD_ILS/0/SD_ILS:2316344 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Priyam, Prashant, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627863/?ar">https://learning.oreilly.com/library/view/~/9781788627863/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn social engineering : learn the art of human hacking with an internationally renowned expert ent://SD_ILS/0/SD_ILS:2316546 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar">https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788837927/?ar">https://learning.oreilly.com/library/view/~/9781788837927/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering machine learning for penetration testing : develop an extensive skill set to break self-learning systems using Python ent://SD_ILS/0/SD_ILS:2317035 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788997409/?ar">https://go.oreilly.com/library-access/library/view/-/9781788997409/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788997409/?ar">https://learning.oreilly.com/library/view/~/9781788997409/?ar</a><br/>Format:&#160;Electronic Resources<br/> Fixing an insecure software life cycle : practical techniques for building security into existing software development programs ent://SD_ILS/0/SD_ILS:2316498 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Wright, April C., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028222">https://learning.oreilly.com/library/view/~/9781492028222</a> <a href="https://learning.oreilly.com/library/view/~/9781492028222/?ar">https://learning.oreilly.com/library/view/~/9781492028222/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492028222/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028222/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering reverse engineering : re-engineer your ethical hacking skills ent://SD_ILS/0/SD_ILS:2319089 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Wong, Reginald, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788838849/?ar">https://learning.oreilly.com/library/view/~/9781788838849/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar">https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Board's Role in Managing Cybersecurity Risks ent://SD_ILS/0/SD_ILS:2320749 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Rothrock, Ray, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT59221/?ar">https://learning.oreilly.com/library/view/~/53863MIT59221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT59221">https://learning.oreilly.com/library/view/~/53863MIT59221</a><br/>Format:&#160;Electronic Resources<br/> Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers ent://SD_ILS/0/SD_ILS:2316089 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCSP Certified Cloud Security Professional practice exams ent://SD_ILS/0/SD_ILS:2316001 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Carter, Daniel, CISSP, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260031362">https://learning.oreilly.com/library/view/~/9781260031362</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260031362/?ar">https://go.oreilly.com/library-access/library/view/-/9781260031362/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781260031362/?ar">https://learning.oreilly.com/library/view/~/9781260031362/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated security technologies and solutions. Volume I, Cisco Security Solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content security ent://SD_ILS/0/SD_ILS:2316388 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Woland, Aaron T., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134807577/?ar">https://learning.oreilly.com/library/view/~/9780134807577/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics and cyber crime with Kali Linux fundamentals ent://SD_ILS/0/SD_ILS:2314043 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Muniz, Joseph, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar">https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780134693644/?ar">https://learning.oreilly.com/videos/~/9780134693644/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical monitoring : effective strategies for the real world ent://SD_ILS/0/SD_ILS:2314748 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Julian, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491957349/?ar">https://go.oreilly.com/library-access/library/view/-/9781491957349/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491957349/?ar">https://learning.oreilly.com/library/view/~/9781491957349/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privileged attack vectors : building effective cyber-defense strategies to protect organizations ent://SD_ILS/0/SD_ILS:2314870 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format:&#160;Electronic Resources<br/> The art of hacking : self paced traning kit for cyber security professionals ent://SD_ILS/0/SD_ILS:2315658 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854632/?ar">https://learning.oreilly.com/videos/~/9780134854632/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134854632/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854632/?ar</a><br/>Format:&#160;Electronic Resources<br/> WiFi hacking : wireless penetration testing for beginners ent://SD_ILS/0/SD_ILS:2316772 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530193/?ar">https://learning.oreilly.com/videos/~/9781789530193/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building a modern security program : adapting security for DevOps and cloud ent://SD_ILS/0/SD_ILS:2317166 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Lackey, Zane, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492044680/?ar">https://learning.oreilly.com/library/view/~/9781492044680/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492044680">https://learning.oreilly.com/library/view/~/9781492044680</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492044680/?ar">https://go.oreilly.com/library-access/library/view/-/9781492044680/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing microservice APIs : sustainable and scalable access control ent://SD_ILS/0/SD_ILS:2318425 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;McLarty, Matt, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492027140">https://learning.oreilly.com/library/view/~/9781492027140</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492027140/?ar">https://go.oreilly.com/library-access/library/view/-/9781492027140/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492027140/?ar">https://learning.oreilly.com/library/view/~/9781492027140/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : design a security framework for an Internet connected ecosystem ent://SD_ILS/0/SD_ILS:2318628 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625821/?ar">https://learning.oreilly.com/library/view/~/9781788625821/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar</a><br/>Format:&#160;Electronic Resources<br/> Take Control of 1Password, 4th Edition ent://SD_ILS/0/SD_ILS:2319474 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:2316874 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Moschovitis, Christos J. P.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781469098753/?ar">https://go.oreilly.com/library-access/library/view/-/9781469098753/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781469098753/?ar">https://learning.oreilly.com/library/view/~/9781469098753/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781469098753">https://learning.oreilly.com/library/view/~/9781469098753</a><br/>Format:&#160;Sound recording<br/> Practical web penetration testing : secure web applications using Burp Suite, Nmap, Metasploit, and more ent://SD_ILS/0/SD_ILS:2317003 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Khawaja, Gus, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624039/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624039/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788624039/?ar">https://learning.oreilly.com/library/view/~/9781788624039/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn ethical hacking from scratch : your stepping stone to penetration testing ent://SD_ILS/0/SD_ILS:2317259 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sabih, Zaid, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar">https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788622059">https://learning.oreilly.com/library/view/~/9781788622059</a> <a href="https://learning.oreilly.com/library/view/~/9781788622059/?ar">https://learning.oreilly.com/library/view/~/9781788622059/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking web performance : moving beyond the basics of web performance optimization ent://SD_ILS/0/SD_ILS:2316902 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Firtman, Maximiliano R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492039426/?ar">https://learning.oreilly.com/library/view/~/9781492039426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492039426">https://learning.oreilly.com/library/view/~/9781492039426</a><br/>Format:&#160;Electronic Resources<br/> Open source intelligence methods and tools : a practical guide to online intelligence ent://SD_ILS/0/SD_ILS:2316916 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232132">https://learning.oreilly.com/library/view/~/9781484232132</a> <a href="https://learning.oreilly.com/library/view/~/9781484232132/?ar">https://learning.oreilly.com/library/view/~/9781484232132/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn ethical hacking from scratch ent://SD_ILS/0/SD_ILS:2316923 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789340297/?ar">https://learning.oreilly.com/videos/~/9781789340297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on incident response and digital forensics ent://SD_ILS/0/SD_ILS:2317114 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780174204/?ar">https://learning.oreilly.com/library/view/~/9781780174204/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780174204">https://learning.oreilly.com/library/view/~/9781780174204</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780174204/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174204/?ar</a><br/>Format:&#160;Electronic Resources<br/> Netzwerkprotokolle hacken : Sicherheisl&uuml;cken verstehen, analysieren und sch&uuml;tzen ent://SD_ILS/0/SD_ILS:2317121 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Forshaw, James, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492068631/?ar">https://learning.oreilly.com/library/view/~/9781492068631/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492068631/?ar">https://go.oreilly.com/library-access/library/view/-/9781492068631/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux security and hardening : the practical security guide ent://SD_ILS/0/SD_ILS:2317860 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Cannon, Jason, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789612820/?ar">https://learning.oreilly.com/videos/~/9781789612820/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789612820/?ar">https://go.oreilly.com/library-access/library/view/-/9781789612820/?ar</a><br/>Format:&#160;Electronic Resources<br/> Burp Suite cookbook : practical recipes to help you master web penetration testing with Burp Suite ent://SD_ILS/0/SD_ILS:2317723 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Wear, Sunny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789531732">https://learning.oreilly.com/library/view/~/9781789531732</a> <a href="https://learning.oreilly.com/library/view/~/9781789531732/?ar">https://learning.oreilly.com/library/view/~/9781789531732/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : endpoint defense ent://SD_ILS/0/SD_ILS:2316613 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Dewey, Gary, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788990981/?ar">https://learning.oreilly.com/videos/~/9781788990981/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security with pfSense : architect, deploy, and operate enterprise-grade firewalls ent://SD_ILS/0/SD_ILS:2317295 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Aggarwal, Manuj, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789532975">https://learning.oreilly.com/library/view/~/9781789532975</a> <a href="https://learning.oreilly.com/library/view/~/9781789532975/?ar">https://learning.oreilly.com/library/view/~/9781789532975/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789532975/?ar">https://go.oreilly.com/library-access/library/view/-/9781789532975/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threats ent://SD_ILS/0/SD_ILS:2316833 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Crouthamel, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788626521/?ar">https://learning.oreilly.com/library/view/~/9781788626521/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar">https://go.oreilly.com/library-access/library/view/-/9781788626521/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity incident response : how to contain, eradicate, and recover from incidents ent://SD_ILS/0/SD_ILS:2317670 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Thompson, Eric C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484238707/?ar">https://learning.oreilly.com/library/view/~/9781484238707/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking masterclass ent://SD_ILS/0/SD_ILS:2317748 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789530018/?ar">https://learning.oreilly.com/videos/~/9781789530018/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat intelligence in practice : a practical guide to threat intelligence from successful organizations ent://SD_ILS/0/SD_ILS:2318435 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Liska, Allan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar">https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492049302/?ar">https://learning.oreilly.com/library/view/~/9781492049302/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492049302">https://learning.oreilly.com/library/view/~/9781492049302</a><br/>Format:&#160;Electronic Resources<br/> Hei ke wang luo ying yong : wang luo qin ru ying yong. ent://SD_ILS/0/SD_ILS:2332288 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a> <a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format:&#160;Video recording<br/> Preparing and exploring security data for machine learning. ent://SD_ILS/0/SD_ILS:2334770 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032335">https://learning.oreilly.com/videos/~/9781492032335</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492032335/?ar">https://learning.oreilly.com/videos/~/9781492032335/?ar</a><br/>Format:&#160;Video recording<br/> Supervised machine learning in security applications. ent://SD_ILS/0/SD_ILS:2334773 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032410">https://learning.oreilly.com/videos/~/9781492032410</a> <a href="https://learning.oreilly.com/videos/~/9781492032410/?ar">https://learning.oreilly.com/videos/~/9781492032410/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar</a><br/>Format:&#160;Video recording<br/> Securing microservices : protect sensitive data in transit and at rest. ent://SD_ILS/0/SD_ILS:2334787 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Newman, Sam, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar">https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492038986/?ar">https://learning.oreilly.com/videos/~/9781492038986/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492038986">https://learning.oreilly.com/videos/~/9781492038986</a><br/>Format:&#160;Video recording<br/> Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics ent://SD_ILS/0/SD_ILS:2340159 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Diogenes, Yuri, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5259454">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheitsmanagement - Praxiswissen f&uuml;r IT Security Manager, 2. Auflage ent://SD_ILS/0/SD_ILS:2320105 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Harich, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9783958452756/?ar">https://learning.oreilly.com/library/view/~/9783958452756/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958452756">https://learning.oreilly.com/library/view/~/9783958452756</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar</a><br/>Format:&#160;Electronic Resources<br/> IoT security issues ent://SD_ILS/0/SD_ILS:2062195 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Gilchrist, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4810138">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced penetration testing : hacking the world's most secure networks ent://SD_ILS/0/SD_ILS:2099471 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Allsopp, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4813145">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodell ent://SD_ILS/0/SD_ILS:2121325 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4830572">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Wireless communications security : solutions for the internet of things ent://SD_ILS/0/SD_ILS:2061083 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Penttinen, Jyrki T. J., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4690021">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Distributed Networks ent://SD_ILS/0/SD_ILS:2319907 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format:&#160;Electronic Resources<br/> An analysis of information spreading and privacy issues on social networks ent://SD_ILS/0/SD_ILS:2023878 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Sayin, Burcu, author.<br/><a href="http://hdl.handle.net/11147/6886">Access to Electronic Versiyon.</a><br/>Format:&#160;Manuscript<br/> Software update as a mechanism for resilience and security : proceedings of a Workshop. ent://SD_ILS/0/SD_ILS:2013724 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Johnson, Anne Frances, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Software-Update-as-a-Mechanism-for-Resilience-and-Security.pdf">An electronic book accessible through the World Wide Web; click for information.</a> <a href="http://doi.org/10.17226/24833">http://doi.org/10.17226/24833</a><br/>Format:&#160;Electronic Resources<br/> Spring security : secure your web applications, RESTful services, and microservice architectures ent://SD_ILS/0/SD_ILS:2230148 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Knutson, Mick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5165113">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Industrial cybersecurity : efficiently secure critical infrastructure systems ent://SD_ILS/0/SD_ILS:2230028 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Ackerman, Pascal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5110693">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Safety of web applications : risks, encryption and handling vulnerabilities with PHP ent://SD_ILS/0/SD_ILS:2212109 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Quinton, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4840953">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Metasploit bootcamp : a fast-paced guide to enhance your pentesting skills. ent://SD_ILS/0/SD_ILS:2235740 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4866345">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics and incident response : an intelligent way to respond to attacks ent://SD_ILS/0/SD_ILS:2272255 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Johansen, Gerard, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4925642">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security automation with ansible 2 : leverage ansible 2 to automate complex security tasks like application security, network security, and malware analysis ent://SD_ILS/0/SD_ILS:2272457 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Akula, Madhu, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5188229">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:2311609 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Griffor, Edward R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128038383/?ar">https://learning.oreilly.com/library/view/~/9780128038383/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar">https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128038383">https://learning.oreilly.com/library/view/~/9780128038383</a><br/>Format:&#160;Electronic Resources<br/> Cyber security on Azure : an IT professionals guide to Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2313788 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484227404/?ar">https://learning.oreilly.com/library/view/~/9781484227404/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484227404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484227404/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484227404">https://learning.oreilly.com/library/view/~/9781484227404</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux, the ultimate hackers' arsenal ent://SD_ILS/0/SD_ILS:2313803 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787120235/?ar">https://learning.oreilly.com/library/view/~/9781787120235/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar">https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network functions virtualization (NFV) with a touch of SDN ent://SD_ILS/0/SD_ILS:2311983 2024-05-25T05:33:45Z 2024-05-25T05:33:45Z by&#160;Chayapathi, Rajendra, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134464312">https://learning.oreilly.com/library/view/~/9780134464312</a> <a href="https://learning.oreilly.com/library/view/~/9780134464312/?ar">https://learning.oreilly.com/library/view/~/9780134464312/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134464312/?ar">https://go.oreilly.com/library-access/library/view/-/9780134464312/?ar</a><br/>Format:&#160;Electronic Resources<br/>