Search Results for - Narrowed by: Computer security. - Ebrary Collection SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AONLINEEBR$002509Ebrary$002bCollection$0026ps$003d300? 2024-06-18T20:53:19Z Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict ent://SD_ILS/0/SD_ILS:2353735 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Borges, Dan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6640534">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical threat intelligence and data-driven threat huntingx : Practical threat intelligence and data-driven threat hunting : a hands-on guide to threat hunting with the ATT&amp;CK framework and open source tools ent://SD_ILS/0/SD_ILS:2353626 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Palacin, Valentina, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6462896">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environment ent://SD_ILS/0/SD_ILS:2356761 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Ackerman, Pascal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6730157">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:2358181 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Bhargava, Neeraj, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6693036">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security in education and practice ent://SD_ILS/0/SD_ILS:2351369 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Kaloyanova, Kalinka., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6424050">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data analytics : systems engineering - cybersecurity - project management ent://SD_ILS/0/SD_ILS:2275084 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Greco, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6457843">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents ent://SD_ILS/0/SD_ILS:2351764 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Singh, Glen D., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6824393">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Lifecycle IoT Security for Engineers. ent://SD_ILS/0/SD_ILS:2337249 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Kaustubh, Dhondge.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6805253">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The deviant security practices of cyber crime ent://SD_ILS/0/SD_ILS:2356733 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Van de Sandt, Erik H.A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6697091">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Risk Management : A practitioner's guide. ent://SD_ILS/0/SD_ILS:2337073 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Sutton, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6733537">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in the internet of things : challenges and solutions ent://SD_ILS/0/SD_ILS:2233412 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Hern&aacute;ndez Ramos, Jos&eacute; Luis, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6143723">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and resilience in the arctic ent://SD_ILS/0/SD_ILS:2242315 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Trump, Benjamin D., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6355988">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security operations in practice ent://SD_ILS/0/SD_ILS:2274223 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Sheward, Mike, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6123931">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security controls evaluation, testing, and assessment handbook ent://SD_ILS/0/SD_ILS:2217906 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Johnson, Leighton, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986757">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity : a self-teaching introduction ent://SD_ILS/0/SD_ILS:2221384 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Gupta, C. P., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6142332">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data privacy and GDPR handbook ent://SD_ILS/0/SD_ILS:2273935 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Sharma, Sanjay, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986738">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : essential principles to secure your organisation ent://SD_ILS/0/SD_ILS:2221456 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6176700">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Ensuring network security through the use of the honeypot technique ent://SD_ILS/0/SD_ILS:2233146 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Selvaraj, Rajalakshmi, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5994500">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Medical device cybersecurity for engineers and manufacturers ent://SD_ILS/0/SD_ILS:2242337 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Wirth, Axel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6371470">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer security and encryption : an introduction ent://SD_ILS/0/SD_ILS:2237660 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Chauhan, S. R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6404902">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Developing a cybersecurity immune system for industry 4.0 ent://SD_ILS/0/SD_ILS:2237349 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Petrenko, Sergei, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6241958">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Successful cybersecurity professionals : how to change your behavior to protect your organization ent://SD_ILS/0/SD_ILS:2237591 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Brown, Steven, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6352009">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for information professionals : concepts and applications ent://SD_ILS/0/SD_ILS:2356348 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Chang, Xiaqing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6232193">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing network infrastructure : discover practical network security with Nmap and Nessus 7 ent://SD_ILS/0/SD_ILS:2353372 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Sairam, Jetty, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5742610">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies ent://SD_ILS/0/SD_ILS:2268290 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Parisi, Alessandro, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5847212">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity : the beginner's guide : a comprehensive guide to getting started in cybersecurity ent://SD_ILS/0/SD_ILS:2268197 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Ozkaya, Erdal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5781046">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital asset valuation and cyber risk measurement : principles of cybernomics ent://SD_ILS/0/SD_ILS:2216808 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Ruan, Keyun, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5780982">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Engineering secure and dependable software systems ent://SD_ILS/0/SD_ILS:2217525 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Pretschner, Alexander, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5899580">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How cyber security can protect your business : a guide for all stakeholders ent://SD_ILS/0/SD_ILS:2217830 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Wright, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5979597">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT ent://SD_ILS/0/SD_ILS:2273439 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Tounsi, Wiem, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5763061">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity law : protect yourself and your customers ent://SD_ILS/0/SD_ILS:2156785 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Brathwaite, Shimon, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5719658">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The business of cybersecurity : foundations and ideologies ent://SD_ILS/0/SD_ILS:2156901 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5770273">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Understanding security issues ent://SD_ILS/0/SD_ILS:2144594 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157542">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber resilience ent://SD_ILS/0/SD_ILS:2232951 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Petrenko, Sergei, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5963879">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hardware security : a hands-on learning approach ent://SD_ILS/0/SD_ILS:2216544 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Bhunia, Swarup, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5754491">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and privacy in cyber physical systems ent://SD_ILS/0/SD_ILS:2347187 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Maleh, Yassine, 1987- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5764472">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Insider threats ent://SD_ILS/0/SD_ILS:2272622 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Arduin, Pierre-Emmanuel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5323674">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Rethinking cybersecurity : strategy, mass effect, and states ent://SD_ILS/0/SD_ILS:2267175 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Lewis, James Andrew, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5233949">Click to View</a><br/>Format:&#160;Electronic Resources<br/> 99 privacy breaches to beware of : practical data protection tips from real-life experiences ent://SD_ILS/0/SD_ILS:2268306 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5879671">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical security ent://SD_ILS/0/SD_ILS:2212845 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4981408">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Empirical research for software security : foundations and experience ent://SD_ILS/0/SD_ILS:2108670 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5164090">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; et RGPD : prot&eacute;gez votre PME : guide pratique pour s&eacute;curiser votre syst&egrave;me informatique et vous conformer au RGPD ent://SD_ILS/0/SD_ILS:2156542 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Ejzyn, Alain, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5496488">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Online danger : how to protect yourself and your loved ones from the evil side of the internet ent://SD_ILS/0/SD_ILS:2146101 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Cole, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5893451">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Selected readings in cybersecurity ent://SD_ILS/0/SD_ILS:2231448 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Choi, Young B., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5613263">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer security of instrumentation and control systems at nuclear facilities : technical guidance. ent://SD_ILS/0/SD_ILS:2230781 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z <a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5426853">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Exploding data : reclaiming our cybersecurity in the digital age ent://SD_ILS/0/SD_ILS:2237232 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Chertoff, Michael, 1953- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6195359">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Attribute-based access control ent://SD_ILS/0/SD_ILS:2240733 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Hu, Vincent C., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5430722">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and resilience in intelligent data-centric systems and communication networks ent://SD_ILS/0/SD_ILS:2213104 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5090270">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Port cybersecurity : securing critical information infrastructures and supply chains ent://SD_ILS/0/SD_ILS:2213275 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Polemi, Nineta, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5118465">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Spring security : secure your web applications, RESTful services, and microservice architectures ent://SD_ILS/0/SD_ILS:2230148 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Knutson, Mick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5165113">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Preventing digital extortion : mitigate ransomware, DDoS, and other cyber-extortion attacks ent://SD_ILS/0/SD_ILS:2229356 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Thakkar, Dhanya, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4867419">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data hiding techniques in Windows OS : a practical approach to investigation and defense ent://SD_ILS/0/SD_ILS:2210720 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4676113">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime and business : strategies for global corporate security ent://SD_ILS/0/SD_ILS:2212362 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4863624">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the hacker ent://SD_ILS/0/SD_ILS:2062795 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Grimes, Roger A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4845208">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodell ent://SD_ILS/0/SD_ILS:2121325 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4830572">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Wireshark for security professionals : using wireshark and the metasploit framework ent://SD_ILS/0/SD_ILS:2144097 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Bullock, Jessey, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4816492">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:2211615 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Li, Shancang, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4786871">Click to View</a><br/>Format:&#160;Electronic Resources<br/> From corporate security to commercial force : a business leader's guide to security economics ent://SD_ILS/0/SD_ILS:2212386 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Cabric, Marko, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4865431">Click to View</a><br/>Format:&#160;Electronic Resources<br/> RIoT control : understanding and managing risks and the internet of things ent://SD_ILS/0/SD_ILS:2210795 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Macaulay, Tyson, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4691335">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data breach aftermath and recovery for individuals and institutions : proceedings of a workshop ent://SD_ILS/0/SD_ILS:2228331 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Johnson, Anne, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4690560">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Facing cyber threats head on : protecting yourself and your business ent://SD_ILS/0/SD_ILS:2266274 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Minick, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4773207">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber security awareness for CEOs and management ent://SD_ILS/0/SD_ILS:2209372 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189279">Click to View</a><br/>Format:&#160;Electronic Resources<br/> You : for sale protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:2208965 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:2209444 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4334673">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the windows registry ent://SD_ILS/0/SD_ILS:2209760 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4438754">Click to View</a><br/>Format:&#160;Electronic Resources<br/> OS X incident response : scripting and analysis ent://SD_ILS/0/SD_ILS:2210035 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Bradley, Jaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4526010">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dns security : defending the domain name system ent://SD_ILS/0/SD_ILS:2210263 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556898">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:2210264 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556899">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes ent://SD_ILS/0/SD_ILS:2271774 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Kalsi, Tajinder, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4659132">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackers ent://SD_ILS/0/SD_ILS:2271717 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Halton, Wolf, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594301">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical Windows forensics : leverage the power of digital forensics for Windows systems ent://SD_ILS/0/SD_ILS:2271719 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Shaaban, Ayman, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594307">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world ent://SD_ILS/0/SD_ILS:2271720 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Russell, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594308">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering Metasploit : take your penetration testing an IT security skills to a whole new level with the secrets of Metasploit ent://SD_ILS/0/SD_ILS:2271834 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4709428">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber insecurity : navigating the perils of the next information age ent://SD_ILS/0/SD_ILS:2266098 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Harrison, Richard M., 1981- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4742078">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Breaking into information security : crafting a custom career path to get the job you really want ent://SD_ILS/0/SD_ILS:2209344 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;More, Josh, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4187289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building a corporate culture of security : strategies for strengthening organizational resiliency ent://SD_ILS/0/SD_ILS:2209738 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4425984">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Meeting security challenges through data analytics and decision support ent://SD_ILS/0/SD_ILS:2219758 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Shahbazian, E. (Elisa), editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4753391">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0 ent://SD_ILS/0/SD_ILS:2271758 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Olups, Rihards, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4643698">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Meeting people via WiFi and Bluetooth ent://SD_ILS/0/SD_ILS:2098423 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Schroeder, Joshua, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189280">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Essential skills for hackers ent://SD_ILS/0/SD_ILS:2098424 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189281">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Chaotic secure communication : principles and technologies ent://SD_ILS/0/SD_ILS:2061285 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Sun, Kehui, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4707910">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in the digital era. Volume 1 ent://SD_ILS/0/SD_ILS:2060915 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4648717">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information technology security fundamentals ent://SD_ILS/0/SD_ILS:2110952 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4009415">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Selling information security to the board : a primer ent://SD_ILS/0/SD_ILS:2132583 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4519662">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Linux server security : hack and defend ent://SD_ILS/0/SD_ILS:2060102 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Binnie, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4519259">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:2209813 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452264">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:2209814 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452265">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security science : measuring the vulnerability to data compromises ent://SD_ILS/0/SD_ILS:2210328 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4567434">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Critical infrastructure protection against hybrid warfare security related challenges ent://SD_ILS/0/SD_ILS:2211397 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Niglia, Alessandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4753392">Click to View</a><br/>Format:&#160;Electronic Resources<br/> 88 privacy breaches to beware of : practical data protection tips from real-life experiences ent://SD_ILS/0/SD_ILS:2265185 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4558135">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and human rights in the age of cyberveillance ent://SD_ILS/0/SD_ILS:2264105 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Kulesza, Joanna, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4098051">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security in fixed and wireless networks ent://SD_ILS/0/SD_ILS:2279930 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Schafer, Gunter, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=7104366">Click to View</a><br/>Format:&#160;Electronic Resources<br/> From hacking to report writing : an introduction to security and penetration testing ent://SD_ILS/0/SD_ILS:2346041 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Svensson, Robert, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4733249">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering XenApp : master the skills required to implement Citrix XenApp 7.6 to deploy a complete Citrix-hosted application from scratch ent://SD_ILS/0/SD_ILS:2352866 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Jha, Sunny, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191098">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Mobile Application Hacker's Handbook. ent://SD_ILS/0/SD_ILS:1280057 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Chell, Dominic.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1895167">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Intelligence : A Practitioner's Guide to Solving Enterprise Security Challenges. ent://SD_ILS/0/SD_ILS:1280051 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Li, Qing.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1895130">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Online Safety. ent://SD_ILS/0/SD_ILS:1280501 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Healey, Justin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1899260">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Defender&rsquo;s Dilemma : Charting a Course Toward Cybersecurity. ent://SD_ILS/0/SD_ILS:1285509 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Libicki, Martin C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2075897">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network Attacks and Exploitation : A Framework. ent://SD_ILS/0/SD_ILS:1338187 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Monte, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4040351">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux ent://SD_ILS/0/SD_ILS:1386806 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Ramachandran, Vivek, author.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2005211">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data protection and the cloud : are the risks too great? ent://SD_ILS/0/SD_ILS:2155320 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192125">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building Python real-time applications with Storm : learn to process massive real-time data streams using Storm and Python-- no Java required ent://SD_ILS/0/SD_ILS:2227651 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Bhatnagar, Kartik, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191295">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Python for secret agents. Volume II : gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents ent://SD_ILS/0/SD_ILS:2227652 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Lott, Steven F., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191298">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web application security is a stack : how to CYA (Cover Your Apps) completely ent://SD_ILS/0/SD_ILS:2208971 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192126">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:2208334 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Knapp, Eric D., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1887712">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The science and technology of counterterrorism : measuring physical and electronic security risk ent://SD_ILS/0/SD_ILS:2207234 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1641934">Click to View</a><br/>Format:&#160;Electronic Resources<br/> OpenCV with Python blueprints : design and develop advanced computer vision projects using OpenCV with Python ent://SD_ILS/0/SD_ILS:2271358 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Beyeler, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191141">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing NetScaler VPX : implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms ent://SD_ILS/0/SD_ILS:2271361 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Sandbu, Marius, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191154">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Application security in the ISO 27001:2013 environment ent://SD_ILS/0/SD_ILS:2209611 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Vasudevan, Vinod, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4395800">Click to View</a><br/>Format:&#160;Electronic Resources<br/> OpenCV with Python by example : build real-world computer vision applications and develop cool demos using OpenCV for Python ent://SD_ILS/0/SD_ILS:2271390 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Joshi, Prateek, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191268">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Python GUI programming cookbook : over 80 object-oriented recipes to help you create mind-blowing GUIs in Python ent://SD_ILS/0/SD_ILS:2271393 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Meier, Burkhard A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191299">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the V3rb0ten network ent://SD_ILS/0/SD_ILS:2098103 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2098440">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing social media in the enterprise ent://SD_ILS/0/SD_ILS:2098131 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2146009">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Bent functions : results and applications to cryptography ent://SD_ILS/0/SD_ILS:2098152 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192079">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Smart grid security : innovative solutions for a modernized grid ent://SD_ILS/0/SD_ILS:2098138 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Skopik, Florian, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2146995">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Designing and building a security operations center ent://SD_ILS/0/SD_ILS:2097657 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Nathans, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1834659">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security analytics : finding security insights, patterns and anomalies in big data ent://SD_ILS/0/SD_ILS:2097682 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Mark, Talabis, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1873129">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital privacy in the marketplace : perspectives on the information exchange ent://SD_ILS/0/SD_ILS:2056185 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1920895">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Black hat Python : Python programming for hackers and pentesters ent://SD_ILS/0/SD_ILS:2056210 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Seitz, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1931622">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:2059082 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Moskowitz, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4040685">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Infosec management fundamentals ent://SD_ILS/0/SD_ILS:2098129 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2146007">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre X, S&eacute;curit&eacute; des R&eacute;seaux Industriels &eacute;tendus : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123679 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709824">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre XIV, R&eacute;glementation de la Cybers&eacute;curit&eacute; et R&eacute;gime Juridique des Syst&egrave;mes Num&eacute;riques Industriels : une &eacute;tude des Dispositions R&eacute;glementaires en Cybers&eacute;curit&eacute; en France et Aux &Eacute;tats-Unis : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123680 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709825">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre II, Typologie des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123683 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709828">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre II, Typologie des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123684 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709829">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapter IV, Malveillance num&eacute;rique sur les syst&egrave;mes industriels : histoire de la menace, &eacute;v&eacute;nements embl&eacute;matiques, tendances et perspectives : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123685 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709831">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123668 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709810">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre XIII, &Eacute;tat des Lieux des R&eacute;f&eacute;rentiels en S&eacute;curit&eacute; des Syst&egrave;mes Num&eacute;riques Industriels : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123669 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709811">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123670 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709812">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des Installations Industrielles. Chapter V, Des bus de terrain a l'Industrial Ethernet ent://SD_ILS/0/SD_ILS:2123677 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709821">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapter VI, Analyse des risques : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123688 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709834">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre I, Mythes et r&eacute;alit&eacute;s de la cybers&eacute;curit&eacute; des syst&egrave;mes num&eacute;riques industriels : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123689 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709836">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des Installations Industrielles : Chapitre XII Panorama de l'offre Technologique Pour la Cybers&eacute;curit&eacute; Industrielle ent://SD_ILS/0/SD_ILS:2123695 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709845">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des Installations Industrielles ent://SD_ILS/0/SD_ILS:2123700 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709851">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Using security patterns in web-application ent://SD_ILS/0/SD_ILS:2144812 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Alam, Shahnawaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5291824">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering Python forensics : master the art of digital forensics and analysis with Python ent://SD_ILS/0/SD_ILS:2219461 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Spreitzenbarth, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191124">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering Python data visualization : generate effective results in a variety of visually appealing charts using the plotting packages in Python ent://SD_ILS/0/SD_ILS:2219462 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Raman, Kirthi, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191125">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CSA guide to cloud computing : implementing cloud privacy and security ent://SD_ILS/0/SD_ILS:2208123 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Samani, Raj, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1793946">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:2208145 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1798312">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set ent://SD_ILS/0/SD_ILS:2238641 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Marak, Victor, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191257">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Learning OpenCV 3 computer vision with Python : unleash the power of computer vision with Python using OpenCV ent://SD_ILS/0/SD_ILS:2238643 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Minichino, Joe, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191267">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Applications of secure multiparty computation ent://SD_ILS/0/SD_ILS:2213541 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5161932">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbix ent://SD_ILS/0/SD_ILS:1386703 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Vacche, Andrea Dalle, author.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1973849">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web security : a whitehat perspective ent://SD_ILS/0/SD_ILS:2270388 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Wu, Hanqing, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1566016">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing NetScaler VPX&trade;. ent://SD_ILS/0/SD_ILS:1270399 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Sandbu, Marius.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1674868">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Android Hacker's Handbook. ent://SD_ILS/0/SD_ILS:1269877 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Drake, Joshua J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1662701">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Detection and Intelligent Systems for Homeland Security. ent://SD_ILS/0/SD_ILS:1266514 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Voeller, John G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1598817">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Using Data Analysis, Visualization, and Dashboards : Analysis, Visualization and Dashboards. ent://SD_ILS/0/SD_ILS:1266666 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Jacobs, Jay.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1599321">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer Forensics with FTK. ent://SD_ILS/0/SD_ILS:1269584 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Carbone, Fernando.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1657797">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking Point of Sale : Payment Application Secrets, Threats, and Solutions. ent://SD_ILS/0/SD_ILS:1267914 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Gomzin, Slava.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1629175">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory. ent://SD_ILS/0/SD_ILS:1273952 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Hale Ligh, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1740753">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013. ent://SD_ILS/0/SD_ILS:1274585 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Furnell, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1752831">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Understanding Bitcoin : Cryptography, Engineering and Economics. ent://SD_ILS/0/SD_ILS:1277749 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Franco, Pedro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1823060">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber Threat! : How to Manage the Growing Risk of Cyber Attacks. ent://SD_ILS/0/SD_ILS:1274126 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Ulsch, MacDonnell.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1742833">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux Network Scanning Cookbook. ent://SD_ILS/0/SD_ILS:1275782 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Hutchens, Justin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1771381">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Iste : Chinese Cybersecurity and Cyberdefense. ent://SD_ILS/0/SD_ILS:1275401 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1765106">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security leader insights for information protection : lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:2207467 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699254">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:2207468 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699255">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:2206790 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1573362">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:2206794 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1574451">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:2207293 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1659012">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:2270348 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Stapleton, Jeffrey James, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1538312">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Datennutzungs- und datenschutzvertr&auml;ge : muster, klauseln, erl&auml;uterungen ent://SD_ILS/0/SD_ILS:2119102 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Moos, Flemming, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2129586">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:2110855 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192124">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber essentials : a pocket guide ent://SD_ILS/0/SD_ILS:2110726 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1778769">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Core software security : security at the source ent://SD_ILS/0/SD_ILS:2131611 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Ransome, James.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1547083">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Threat Modeling : Designing for Security. ent://SD_ILS/0/SD_ILS:1267916 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Shostack, Adam.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1629177">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux CTF Blueprints. ent://SD_ILS/0/SD_ILS:1272099 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Buchanan, Cameron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1688607">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cloud Management and Security. ent://SD_ILS/0/SD_ILS:1272598 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Abbadi, Imad M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1701403">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber Blockades. ent://SD_ILS/0/SD_ILS:1276999 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Russell, Alison Lawlor.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1810129">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Best Practices in Computer Network Defense : Incident Detection and Response. ent://SD_ILS/0/SD_ILS:1268453 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Hathaway, M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1637648">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Burp suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the job ent://SD_ILS/0/SD_ILS:2224344 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Mahajan, Akash, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1879299">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:2207339 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1675198">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security for service oriented architectures ent://SD_ILS/0/SD_ILS:2270385 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Williams, Walter (Telecommunications engineer), author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1564631">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Basics of IT Audit : Purposes, Processes, and Practical Information. ent://SD_ILS/0/SD_ILS:1264247 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Gantz, Stephen D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1550527">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data Visualization, Part 2 : New Directions for Evaluation, Number 140. ent://SD_ILS/0/SD_ILS:1265488 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Azzam, Tarek.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1579356">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with FortiGate. ent://SD_ILS/0/SD_ILS:1265007 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fabbri, Rosato.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572901">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Instant Java Password and Authentication Security. ent://SD_ILS/0/SD_ILS:1265019 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Mayoral, Fernando.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572913">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM Mainframe Security : Beyond the Basics—A Practical Guide from a z/OS and RACF Perspective. ent://SD_ILS/0/SD_ILS:1262591 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Dattani, Dinesh D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1411689">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and IT Infrastructure Protection. ent://SD_ILS/0/SD_ILS:1261962 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1377640">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Patterns in Practice : Designing Secure Architectures Using Software Patterns. ent://SD_ILS/0/SD_ILS:1259817 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fernandez-Buglioni, Eduardo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1245159">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Security : A Data-Centric Approach to Securing the Enterprise. ent://SD_ILS/0/SD_ILS:1252521 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Woody, Aaron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1103988">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Social Media Security : Leveraging Social Networking While Mitigating Risk. ent://SD_ILS/0/SD_ILS:1253495 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Cross, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115173">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Safety of Computer Architectures. ent://SD_ILS/0/SD_ILS:1253942 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Boulanger, Jean-Louis.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1120753">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Using Social Media for Global Security. ent://SD_ILS/0/SD_ILS:1253670 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Gupta, Ravi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1118756">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Investigative Computer Forensics : The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives. ent://SD_ILS/0/SD_ILS:1235958 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Laykin, Erik.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=817953">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Biohackers : The Politics of Open Science. ent://SD_ILS/0/SD_ILS:1322996 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Delfanti, Alessandro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3386719">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Convergence : Illicit Networks and National Security in the Age of Globalization. ent://SD_ILS/0/SD_ILS:1337572 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;(U.S.), National Defense University.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3571653">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Logging and log management the authoritative guide to understanding the concepts surrounding logging and log management ent://SD_ILS/0/SD_ILS:2206060 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1077419">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:2206583 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418381">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:2051712 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073021">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Technocrime, policing and surveillance ent://SD_ILS/0/SD_ILS:2128128 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Leman-Langlois, St&eacute;phane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1016143">Click to View</a><br/>Format:&#160;Electronic Resources<br/> An introduction to information security and ISO27001:2013 : a pocket guide ent://SD_ILS/0/SD_ILS:2154908 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463578">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 / ISO27002 : a pocket guide ent://SD_ILS/0/SD_ILS:2154909 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463579">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:2129336 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Baker, Paul R., 1958-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1112600">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber security for educational leaders a guide to understanding and implementing technology policies ent://SD_ILS/0/SD_ILS:2129705 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1143733">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Sicherheit in kommunikationsnetzen ent://SD_ILS/0/SD_ILS:2142312 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Sorge, Christoph.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1524463">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Pragmatic security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:2129847 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1153198">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Safety Management of Software-based Equipment. ent://SD_ILS/0/SD_ILS:1257925 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Boulanger, Jean-Louis.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1187169">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web Application Defender's Cookbook : Battling Hackers and Protecting Users. ent://SD_ILS/0/SD_ILS:1252873 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Barnett, Ryan C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions ent://SD_ILS/0/SD_ILS:2206164 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115164">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:2206165 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:2206216 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1133729">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:2206025 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1058152">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Linux malware incident response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware forensics field guide for Linux systems ent://SD_ILS/0/SD_ILS:2206171 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Malin, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115185">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Simple steps to data encryption a practical guide to secure computing ent://SD_ILS/0/SD_ILS:2206169 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115182">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols ent://SD_ILS/0/SD_ILS:2206043 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073014">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The dark side of personalization online privacy concerns influence customer behavior ent://SD_ILS/0/SD_ILS:2237976 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Ziesak, J&ouml;rg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1324048">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:2206005 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1047930">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 11th European Conference on Information warfare and security : ECIW 2012. ent://SD_ILS/0/SD_ILS:1270131 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Filiol, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1667290">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Forefront Identity Manager 2010 R2 Handbook. ent://SD_ILS/0/SD_ILS:1247816 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Nordstr&ouml;m, Kent.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1019543">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft SQL Server 2012 Security Cookbook. ent://SD_ILS/0/SD_ILS:1248653 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Bruchez, Rudi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1036251">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Spring Security 3.1. ent://SD_ILS/0/SD_ILS:1252840 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Winch, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1108351">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical Malware Analysis : A Hands-On Guide to Dissecting Malicious Software. ent://SD_ILS/0/SD_ILS:1255586 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Sikorski, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137570">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking Web Apps : Detecting and Preventing Web Application Security Problems. ent://SD_ILS/0/SD_ILS:1247665 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Shema, Mike.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with Citrix XenApp 6.5. ent://SD_ILS/0/SD_ILS:1247275 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Musumeci, Guillermo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=995550">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT Governance : An International Guide to Data Security and ISO27001/ISO27002. ent://SD_ILS/0/SD_ILS:1238164 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Calder, Alan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=838114">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Safeguarding Critical E-Documents : Implementing a Program for Securing Confidential Information Assets. ent://SD_ILS/0/SD_ILS:1236601 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Smallwood, Robert F.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=821999">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM i Security Administration and Compliance. ent://SD_ILS/0/SD_ILS:1242714 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Woodbury, Carol.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=906259">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Oracle 11g Anti-hacker's Cookbook. ent://SD_ILS/0/SD_ILS:1250862 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Neagu, Adrian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1057945">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands-On Ethical Hacking and Network Defense. ent://SD_ILS/0/SD_ILS:1305233 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Simpson, Michael T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136562">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SIS ent://SD_ILS/0/SD_ILS:2126495 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Macaulay, Tyson.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826923">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:2126508 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826949">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:2131736 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Mj&oslash;lsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1648315">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking For Dummies. ent://SD_ILS/0/SD_ILS:1252656 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Beaver, Kevin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing WebLogic Server 12c. ent://SD_ILS/0/SD_ILS:1252165 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Masini, Luca.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085228">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Nmap 6 : Network exploration and security auditing Cookbook. ent://SD_ILS/0/SD_ILS:1252167 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Pale, Paulino Calderon.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085230">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Group Policy : Fundamentals, Security, and the Managed Desktop. ent://SD_ILS/0/SD_ILS:1252596 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Moskowitz, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1104500">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems digital forensics field guides ent://SD_ILS/0/SD_ILS:2205738 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=921016">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:2205692 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Mao, Wenji.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=892251">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:2205552 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=829964">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Embedded systems security practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:2205659 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Kleidermacher, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=886256">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL servers protecting your database from attackers ent://SD_ILS/0/SD_ILS:2205846 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=980013">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:2205581 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=850700">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Formal Models and Techniques for Analyzing Security Protocols. ent://SD_ILS/0/SD_ILS:1233662 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Cortier, V.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=784604">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Reversing : Secrets of Reverse Engineering. ent://SD_ILS/0/SD_ILS:1183280 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Eilam, Eldad.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227440">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Developer's Guide to Web Application Security. ent://SD_ILS/0/SD_ILS:1191074 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Cross, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=289735">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Tangled Web : A Guide to Securing Modern Web Applications. ent://SD_ILS/0/SD_ILS:1255587 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Zalewski, Michal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137574">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer Forensics JumpStart. ent://SD_ILS/0/SD_ILS:1223735 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Solomon, Michael G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=661659">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web Commerce Security : Design and Development. ent://SD_ILS/0/SD_ILS:1228884 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Nahari, Hadi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706729">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Identity Management : Concepts, Technologies, and Systems. ent://SD_ILS/0/SD_ILS:1222688 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Takahashi, Kenji.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=634511">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Essential Guide to Home Computer Security. ent://SD_ILS/0/SD_ILS:1235656 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;R. Rowlingson, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=811317">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cloud : Understanding the Security, Privacy and Trust Challenges. ent://SD_ILS/0/SD_ILS:1236833 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Robinson, Neil.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=825129">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Forefront UAG 2010 Administrator's Handbook. ent://SD_ILS/0/SD_ILS:1245706 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Ben-Ari, Erez.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=948568">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing the Cloud : Cloud Computer Security Techniques and Tactics. ent://SD_ILS/0/SD_ILS:1227170 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Winkler, Vic (J.R.).<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=686827">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Risk Management : Building an Information Security Risk Management Program from the Ground Up. ent://SD_ILS/0/SD_ILS:1226943 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Wheeler, Evan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=685406">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Vista for IT Security Professionals. ent://SD_ILS/0/SD_ILS:1196517 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Piltzecker, Anthony.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328623">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Zen and the Art of Information Security. ent://SD_ILS/0/SD_ILS:1196713 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Winkler, Ira.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=330200">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing HP NonStop Servers in an Open Systems World : TCP/IP, OSS and SQL. ent://SD_ILS/0/SD_ILS:1191756 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Corp, XYPRO Technology.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=291716">Click to View</a><br/>Format:&#160;Electronic Resources<br/> TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook. ent://SD_ILS/0/SD_ILS:1200156 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Wiles, Jack.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=405426">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Windows Security Fundamentals : For Windows 2003 SP1 and R2. ent://SD_ILS/0/SD_ILS:1192175 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;De Clercq, Jan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294637">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical Embedded Security : Building Secure Resource-Constrained Systems. ent://SD_ILS/0/SD_ILS:1195004 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Stapko, Timothy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=312846">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Convergence : Managing Enterprise Security Risk. ent://SD_ILS/0/SD_ILS:1192935 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Tyson, Dave.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=299507">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A bug hunter's diary a guided tour through the wilds of software security ent://SD_ILS/0/SD_ILS:2052275 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Klein, Tobias.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137526">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The web application hacker's handbook finding and exploiting security flaws ent://SD_ILS/0/SD_ILS:2141490 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Stuttard, Dafydd.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=819008">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Introduction to cryptography with open-source software ent://SD_ILS/0/SD_ILS:2131708 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1633743">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Security Technologies for Digital Rights Management. ent://SD_ILS/0/SD_ILS:1189077 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Zeng, Wenjun.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=274233">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Relation Based Access Control. ent://SD_ILS/0/SD_ILS:1266040 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Zhang, R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1589007">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Social Engineering : The Art of Human Hacking. ent://SD_ILS/0/SD_ILS:1228889 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Hadnagy, Christopher.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706746">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cloud Security : A Comprehensive Guide to Secure Cloud Computing. ent://SD_ILS/0/SD_ILS:1218987 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Krutz, Ronald L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=589027">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Logics and Languages for Reliability and Security. ent://SD_ILS/0/SD_ILS:1217301 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Esparza, J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=557042">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hashing in Computer Science : Fifty Years of Slicing and Dicing. ent://SD_ILS/0/SD_ILS:1215673 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Konheim, Alan G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537352">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Professional Cocoa Application Security. ent://SD_ILS/0/SD_ILS:1215674 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Lee, Graham J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537355">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Assessing Information Security : Strategies, Tactics, Logic and Framework. ent://SD_ILS/0/SD_ILS:1213366 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Vladimirov, Andrew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=499606">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT Audit, Control, and Security. ent://SD_ILS/0/SD_ILS:1222274 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Moeller, Robert R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=624573">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Least Privilege Security for Windows 7, Vista and XP : Implement Efficient System Security By Assigning Permissions Effectively. ent://SD_ILS/0/SD_ILS:1245184 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Smith, Russell.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944038">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Group Policy : Fundamentals, Security, and the Managed Desktop. ent://SD_ILS/0/SD_ILS:1214337 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Moskowitz, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=530009">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dear Hacker : Letters to the Editor Of 2600. ent://SD_ILS/0/SD_ILS:1215671 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Goldstein, Emmanuel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537340">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Spring Security 3. ent://SD_ILS/0/SD_ILS:1245197 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Mularien, Peter.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944051">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Risk Factors in Computer-Crime Victimization. ent://SD_ILS/0/SD_ILS:1250757 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Choi, Kyung-Shick.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1057793">Click to View</a><br/>Format:&#160;Electronic Resources<br/> GlassFish Security. ent://SD_ILS/0/SD_ILS:1245243 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Kalali, Masoud.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944941">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security 2020 : Reduce Security Risks This Decade. ent://SD_ILS/0/SD_ILS:1228316 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Howard, Doug.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=694289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Assurance : Dependability and Security in Networked Systems. ent://SD_ILS/0/SD_ILS:1196458 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Qian, Yi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328312">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:2125451 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=625004">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:2131381 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Merkow, Mark S., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1446770">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in Artificial Intelligence for Privacy Protection and Security. ent://SD_ILS/0/SD_ILS:1270705 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Solanas, Agusti.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679374">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Definitive Guide to the C&amp;A Transformation Process : The First Publication of a Comprehensive View of the C&amp;A Transformation. ent://SD_ILS/0/SD_ILS:1216155 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Mehan, Julie.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=547041">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SQL Injection Attacks and Defense. ent://SD_ILS/0/SD_ILS:1246118 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Clarke-Salt, Justin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=953188">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Distributed Systems Security : Issues, Processes and Solutions. ent://SD_ILS/0/SD_ILS:1205804 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Belapurkar, Abhijit.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=437429">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2048378 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=453166">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Gray hat Python Python programming for hackers and reverse engineers ent://SD_ILS/0/SD_ILS:2052280 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Seitz, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137535">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Information Security and Privacy. ent://SD_ILS/0/SD_ILS:1207718 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Axelrod, C. Warren.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456886">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mac Security Bible. ent://SD_ILS/0/SD_ILS:1211566 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Kissell, Joe.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=477803">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Trust and Security in Collaborative Computing. ent://SD_ILS/0/SD_ILS:1270688 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Zou, Xukai.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679354">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A Comparison between Smart Cards and Trusted Platform Modules in Business Scenarios. ent://SD_ILS/0/SD_ILS:1220485 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Murhammer, Martin W.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=616678">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Security+ 2008 In Depth. ent://SD_ILS/0/SD_ILS:1304858 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Ciampa, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136117">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ASP.NET 3.5 Security, Membership, and Role Management with C# and VB. ent://SD_ILS/0/SD_ILS:1300827 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Haidar, Bilal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3057687">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:2048017 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing Email and Security Tokens : Current Standards, Tools, and Practices. ent://SD_ILS/0/SD_ILS:1197762 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Turner, Sean.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=343700">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing Information and Communications Systems : Principles, Technologies, and Applications. ent://SD_ILS/0/SD_ILS:1207713 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Lopez, Javier.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Fuzzing for Software Security Testing and Quality Assurance. ent://SD_ILS/0/SD_ILS:1207716 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Takanen, Ari.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Security : Policy, Processes, and Practices. ent://SD_ILS/0/SD_ILS:1205359 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Goodman, Seymour.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=435197">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure Computer and Network Systems : Modeling, Analysis and Design. ent://SD_ILS/0/SD_ILS:1198644 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Ye, Nong.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=351427">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer Forensics For Dummies. ent://SD_ILS/0/SD_ILS:1199862 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Volonino, Linda.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=380503">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:2052282 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Toward a Safer and More Secure Cyberspace. ent://SD_ILS/0/SD_ILS:1320138 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Committee on Improving Cybersecurity Research in the United States, National Research Council.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3378311">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Data Visualization : Graphical Techniques for Network Analysis. ent://SD_ILS/0/SD_ILS:1291613 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Conti, Greg.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3017625">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Misuse of Information Systems : The Impact of Security Countermeasures. ent://SD_ILS/0/SD_ILS:1291177 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;D'Arcy, John P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3016826">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows Forensic Analysis DVD Toolkit. ent://SD_ILS/0/SD_ILS:1196518 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Carvey, Harlan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328624">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Papers from the First European Workshop on Technological &amp; Security Issues in Digital Rights Management (EuDiRights&rsquo;06). ent://SD_ILS/0/SD_ILS:1191720 2024-06-18T20:53:19Z 2024-06-18T20:53:19Z by&#160;Yague, Mariemma.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=291585">Click to View</a><br/>Format:&#160;Electronic Resources<br/>