Search Results for - Narrowed by: Computer security. - Ebrary CollectionSirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AONLINEEBR$002509Ebrary$002bCollection$0026ps$003d300?2024-06-18T20:53:19ZAdversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflictent://SD_ILS/0/SD_ILS:23537352024-06-18T20:53:19Z2024-06-18T20:53:19Zby Borges, Dan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6640534">Click to View</a><br/>Format: Electronic Resources<br/>Practical threat intelligence and data-driven threat huntingx : Practical threat intelligence and data-driven threat hunting : a hands-on guide to threat hunting with the ATT&CK framework and open source toolsent://SD_ILS/0/SD_ILS:23536262024-06-18T20:53:19Z2024-06-18T20:53:19Zby Palacin, Valentina, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6462896">Click to View</a><br/>Format: Electronic Resources<br/>Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environmentent://SD_ILS/0/SD_ILS:23567612024-06-18T20:53:19Z2024-06-18T20:53:19Zby Ackerman, Pascal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6730157">Click to View</a><br/>Format: Electronic Resources<br/>Artificial intelligence and data mining approaches in security frameworksent://SD_ILS/0/SD_ILS:23581812024-06-18T20:53:19Z2024-06-18T20:53:19Zby Bhargava, Neeraj, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6693036">Click to View</a><br/>Format: Electronic Resources<br/>Information security in education and practiceent://SD_ILS/0/SD_ILS:23513692024-06-18T20:53:19Z2024-06-18T20:53:19Zby Kaloyanova, Kalinka., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6424050">Click to View</a><br/>Format: Electronic Resources<br/>Data analytics : systems engineering - cybersecurity - project managementent://SD_ILS/0/SD_ILS:22750842024-06-18T20:53:19Z2024-06-18T20:53:19Zby Greco, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6457843">Click to View</a><br/>Format: Electronic Resources<br/>Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidentsent://SD_ILS/0/SD_ILS:23517642024-06-18T20:53:19Z2024-06-18T20:53:19Zby Singh, Glen D., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6824393">Click to View</a><br/>Format: Electronic Resources<br/>Lifecycle IoT Security for Engineers.ent://SD_ILS/0/SD_ILS:23372492024-06-18T20:53:19Z2024-06-18T20:53:19Zby Kaustubh, Dhondge.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6805253">Click to View</a><br/>Format: Electronic Resources<br/>The deviant security practices of cyber crimeent://SD_ILS/0/SD_ILS:23567332024-06-18T20:53:19Z2024-06-18T20:53:19Zby Van de Sandt, Erik H.A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6697091">Click to View</a><br/>Format: Electronic Resources<br/>Information Risk Management : A practitioner's guide.ent://SD_ILS/0/SD_ILS:23370732024-06-18T20:53:19Z2024-06-18T20:53:19Zby Sutton, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6733537">Click to View</a><br/>Format: Electronic Resources<br/>Security and privacy in the internet of things : challenges and solutionsent://SD_ILS/0/SD_ILS:22334122024-06-18T20:53:19Z2024-06-18T20:53:19Zby Hernández Ramos, José Luis, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6143723">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity and resilience in the arcticent://SD_ILS/0/SD_ILS:22423152024-06-18T20:53:19Z2024-06-18T20:53:19Zby Trump, Benjamin D., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6355988">Click to View</a><br/>Format: Electronic Resources<br/>Security operations in practiceent://SD_ILS/0/SD_ILS:22742232024-06-18T20:53:19Z2024-06-18T20:53:19Zby Sheward, Mike, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6123931">Click to View</a><br/>Format: Electronic Resources<br/>Security controls evaluation, testing, and assessment handbookent://SD_ILS/0/SD_ILS:22179062024-06-18T20:53:19Z2024-06-18T20:53:19Zby Johnson, Leighton, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986757">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity : a self-teaching introductionent://SD_ILS/0/SD_ILS:22213842024-06-18T20:53:19Z2024-06-18T20:53:19Zby Gupta, C. P., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6142332">Click to View</a><br/>Format: Electronic Resources<br/>Data privacy and GDPR handbookent://SD_ILS/0/SD_ILS:22739352024-06-18T20:53:19Z2024-06-18T20:53:19Zby Sharma, Sanjay, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986738">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security : essential principles to secure your organisationent://SD_ILS/0/SD_ILS:22214562024-06-18T20:53:19Z2024-06-18T20:53:19Zby Calder, Alan, 1957- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6176700">Click to View</a><br/>Format: Electronic Resources<br/>Ensuring network security through the use of the honeypot techniqueent://SD_ILS/0/SD_ILS:22331462024-06-18T20:53:19Z2024-06-18T20:53:19Zby Selvaraj, Rajalakshmi, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5994500">Click to View</a><br/>Format: Electronic Resources<br/>Medical device cybersecurity for engineers and manufacturersent://SD_ILS/0/SD_ILS:22423372024-06-18T20:53:19Z2024-06-18T20:53:19Zby Wirth, Axel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6371470">Click to View</a><br/>Format: Electronic Resources<br/>Computer security and encryption : an introductionent://SD_ILS/0/SD_ILS:22376602024-06-18T20:53:19Z2024-06-18T20:53:19Zby Chauhan, S. R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6404902">Click to View</a><br/>Format: Electronic Resources<br/>Developing a cybersecurity immune system for industry 4.0ent://SD_ILS/0/SD_ILS:22373492024-06-18T20:53:19Z2024-06-18T20:53:19Zby Petrenko, Sergei, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6241958">Click to View</a><br/>Format: Electronic Resources<br/>Successful cybersecurity professionals : how to change your behavior to protect your organizationent://SD_ILS/0/SD_ILS:22375912024-06-18T20:53:19Z2024-06-18T20:53:19Zby Brown, Steven, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6352009">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity for information professionals : concepts and applicationsent://SD_ILS/0/SD_ILS:23563482024-06-18T20:53:19Z2024-06-18T20:53:19Zby Chang, Xiaqing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6232193">Click to View</a><br/>Format: Electronic Resources<br/>Securing network infrastructure : discover practical network security with Nmap and Nessus 7ent://SD_ILS/0/SD_ILS:23533722024-06-18T20:53:19Z2024-06-18T20:53:19Zby Sairam, Jetty, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5742610">Click to View</a><br/>Format: Electronic Resources<br/>Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomaliesent://SD_ILS/0/SD_ILS:22682902024-06-18T20:53:19Z2024-06-18T20:53:19Zby Parisi, Alessandro, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5847212">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity : the beginner's guide : a comprehensive guide to getting started in cybersecurityent://SD_ILS/0/SD_ILS:22681972024-06-18T20:53:19Z2024-06-18T20:53:19Zby Ozkaya, Erdal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5781046">Click to View</a><br/>Format: Electronic Resources<br/>Digital asset valuation and cyber risk measurement : principles of cybernomicsent://SD_ILS/0/SD_ILS:22168082024-06-18T20:53:19Z2024-06-18T20:53:19Zby Ruan, Keyun, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5780982">Click to View</a><br/>Format: Electronic Resources<br/>Engineering secure and dependable software systemsent://SD_ILS/0/SD_ILS:22175252024-06-18T20:53:19Z2024-06-18T20:53:19Zby Pretschner, Alexander, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5899580">Click to View</a><br/>Format: Electronic Resources<br/>How cyber security can protect your business : a guide for all stakeholdersent://SD_ILS/0/SD_ILS:22178302024-06-18T20:53:19Z2024-06-18T20:53:19Zby Wright, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5979597">Click to View</a><br/>Format: Electronic Resources<br/>Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoTent://SD_ILS/0/SD_ILS:22734392024-06-18T20:53:19Z2024-06-18T20:53:19Zby Tounsi, Wiem, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5763061">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity law : protect yourself and your customersent://SD_ILS/0/SD_ILS:21567852024-06-18T20:53:19Z2024-06-18T20:53:19Zby Brathwaite, Shimon, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5719658">Click to View</a><br/>Format: Electronic Resources<br/>The business of cybersecurity : foundations and ideologiesent://SD_ILS/0/SD_ILS:21569012024-06-18T20:53:19Z2024-06-18T20:53:19Zby Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5770273">Click to View</a><br/>Format: Electronic Resources<br/>Understanding security issuesent://SD_ILS/0/SD_ILS:21445942024-06-18T20:53:19Z2024-06-18T20:53:19Zby Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157542">Click to View</a><br/>Format: Electronic Resources<br/>Cyber resilienceent://SD_ILS/0/SD_ILS:22329512024-06-18T20:53:19Z2024-06-18T20:53:19Zby Petrenko, Sergei, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5963879">Click to View</a><br/>Format: Electronic Resources<br/>Hardware security : a hands-on learning approachent://SD_ILS/0/SD_ILS:22165442024-06-18T20:53:19Z2024-06-18T20:53:19Zby Bhunia, Swarup, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5754491">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity and privacy in cyber physical systemsent://SD_ILS/0/SD_ILS:23471872024-06-18T20:53:19Z2024-06-18T20:53:19Zby Maleh, Yassine, 1987- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5764472">Click to View</a><br/>Format: Electronic Resources<br/>Insider threatsent://SD_ILS/0/SD_ILS:22726222024-06-18T20:53:19Z2024-06-18T20:53:19Zby Arduin, Pierre-Emmanuel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5323674">Click to View</a><br/>Format: Electronic Resources<br/>Rethinking cybersecurity : strategy, mass effect, and statesent://SD_ILS/0/SD_ILS:22671752024-06-18T20:53:19Z2024-06-18T20:53:19Zby Lewis, James Andrew, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5233949">Click to View</a><br/>Format: Electronic Resources<br/>99 privacy breaches to beware of : practical data protection tips from real-life experiencesent://SD_ILS/0/SD_ILS:22683062024-06-18T20:53:19Z2024-06-18T20:53:19Zby Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5879671">Click to View</a><br/>Format: Electronic Resources<br/>The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical securityent://SD_ILS/0/SD_ILS:22128452024-06-18T20:53:19Z2024-06-18T20:53:19Zby Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4981408">Click to View</a><br/>Format: Electronic Resources<br/>Empirical research for software security : foundations and experienceent://SD_ILS/0/SD_ILS:21086702024-06-18T20:53:19Z2024-06-18T20:53:19Zby ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5164090">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité et RGPD : protégez votre PME : guide pratique pour sécuriser votre système informatique et vous conformer au RGPDent://SD_ILS/0/SD_ILS:21565422024-06-18T20:53:19Z2024-06-18T20:53:19Zby Ejzyn, Alain, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5496488">Click to View</a><br/>Format: Electronic Resources<br/>Online danger : how to protect yourself and your loved ones from the evil side of the internetent://SD_ILS/0/SD_ILS:21461012024-06-18T20:53:19Z2024-06-18T20:53:19Zby Cole, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5893451">Click to View</a><br/>Format: Electronic Resources<br/>Selected readings in cybersecurityent://SD_ILS/0/SD_ILS:22314482024-06-18T20:53:19Z2024-06-18T20:53:19Zby Choi, Young B., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5613263">Click to View</a><br/>Format: Electronic Resources<br/>Computer security of instrumentation and control systems at nuclear facilities : technical guidance.ent://SD_ILS/0/SD_ILS:22307812024-06-18T20:53:19Z2024-06-18T20:53:19Z<a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5426853">Click to View</a><br/>Format: Electronic Resources<br/>Exploding data : reclaiming our cybersecurity in the digital ageent://SD_ILS/0/SD_ILS:22372322024-06-18T20:53:19Z2024-06-18T20:53:19Zby Chertoff, Michael, 1953- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6195359">Click to View</a><br/>Format: Electronic Resources<br/>Attribute-based access controlent://SD_ILS/0/SD_ILS:22407332024-06-18T20:53:19Z2024-06-18T20:53:19Zby Hu, Vincent C., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5430722">Click to View</a><br/>Format: Electronic Resources<br/>Security and resilience in intelligent data-centric systems and communication networksent://SD_ILS/0/SD_ILS:22131042024-06-18T20:53:19Z2024-06-18T20:53:19Zby Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5090270">Click to View</a><br/>Format: Electronic Resources<br/>Port cybersecurity : securing critical information infrastructures and supply chainsent://SD_ILS/0/SD_ILS:22132752024-06-18T20:53:19Z2024-06-18T20:53:19Zby Polemi, Nineta, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5118465">Click to View</a><br/>Format: Electronic Resources<br/>Spring security : secure your web applications, RESTful services, and microservice architecturesent://SD_ILS/0/SD_ILS:22301482024-06-18T20:53:19Z2024-06-18T20:53:19Zby Knutson, Mick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5165113">Click to View</a><br/>Format: Electronic Resources<br/>Preventing digital extortion : mitigate ransomware, DDoS, and other cyber-extortion attacksent://SD_ILS/0/SD_ILS:22293562024-06-18T20:53:19Z2024-06-18T20:53:19Zby Thakkar, Dhanya, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4867419">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:22107202024-06-18T20:53:19Z2024-06-18T20:53:19Zby Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4676113">Click to View</a><br/>Format: Electronic Resources<br/>Cybercrime and business : strategies for global corporate securityent://SD_ILS/0/SD_ILS:22123622024-06-18T20:53:19Z2024-06-18T20:53:19Zby Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4863624">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the hackerent://SD_ILS/0/SD_ILS:20627952024-06-18T20:53:19Z2024-06-18T20:53:19Zby Grimes, Roger A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4845208">Click to View</a><br/>Format: Electronic Resources<br/>IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodellent://SD_ILS/0/SD_ILS:21213252024-06-18T20:53:19Z2024-06-18T20:53:19Zby Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4830572">Click to View</a><br/>Format: Electronic Resources<br/>Wireshark for security professionals : using wireshark and the metasploit frameworkent://SD_ILS/0/SD_ILS:21440972024-06-18T20:53:19Z2024-06-18T20:53:19Zby Bullock, Jessey, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4816492">Click to View</a><br/>Format: Electronic Resources<br/>Securing the internet of thingsent://SD_ILS/0/SD_ILS:22116152024-06-18T20:53:19Z2024-06-18T20:53:19Zby Li, Shancang, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4786871">Click to View</a><br/>Format: Electronic Resources<br/>From corporate security to commercial force : a business leader's guide to security economicsent://SD_ILS/0/SD_ILS:22123862024-06-18T20:53:19Z2024-06-18T20:53:19Zby Cabric, Marko, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4865431">Click to View</a><br/>Format: Electronic Resources<br/>RIoT control : understanding and managing risks and the internet of thingsent://SD_ILS/0/SD_ILS:22107952024-06-18T20:53:19Z2024-06-18T20:53:19Zby Macaulay, Tyson, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4691335">Click to View</a><br/>Format: Electronic Resources<br/>Data breach aftermath and recovery for individuals and institutions : proceedings of a workshopent://SD_ILS/0/SD_ILS:22283312024-06-18T20:53:19Z2024-06-18T20:53:19Zby Johnson, Anne, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4690560">Click to View</a><br/>Format: Electronic Resources<br/>Facing cyber threats head on : protecting yourself and your businessent://SD_ILS/0/SD_ILS:22662742024-06-18T20:53:19Z2024-06-18T20:53:19Zby Minick, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4773207">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security awareness for CEOs and managementent://SD_ILS/0/SD_ILS:22093722024-06-18T20:53:19Z2024-06-18T20:53:19Zby Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189279">Click to View</a><br/>Format: Electronic Resources<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:22089652024-06-18T20:53:19Z2024-06-18T20:53:19Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:22094442024-06-18T20:53:19Z2024-06-18T20:53:19Zby Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4334673">Click to View</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the windows registryent://SD_ILS/0/SD_ILS:22097602024-06-18T20:53:19Z2024-06-18T20:53:19Zby Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4438754">Click to View</a><br/>Format: Electronic Resources<br/>OS X incident response : scripting and analysisent://SD_ILS/0/SD_ILS:22100352024-06-18T20:53:19Z2024-06-18T20:53:19Zby Bradley, Jaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4526010">Click to View</a><br/>Format: Electronic Resources<br/>Dns security : defending the domain name systement://SD_ILS/0/SD_ILS:22102632024-06-18T20:53:19Z2024-06-18T20:53:19Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556898">Click to View</a><br/>Format: Electronic Resources<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:22102642024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556899">Click to View</a><br/>Format: Electronic Resources<br/>Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipesent://SD_ILS/0/SD_ILS:22717742024-06-18T20:53:19Z2024-06-18T20:53:19Zby Kalsi, Tajinder, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4659132">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackersent://SD_ILS/0/SD_ILS:22717172024-06-18T20:53:19Z2024-06-18T20:53:19Zby Halton, Wolf, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594301">Click to View</a><br/>Format: Electronic Resources<br/>Practical Windows forensics : leverage the power of digital forensics for Windows systemsent://SD_ILS/0/SD_ILS:22717192024-06-18T20:53:19Z2024-06-18T20:53:19Zby Shaaban, Ayman, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594307">Click to View</a><br/>Format: Electronic Resources<br/>Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldent://SD_ILS/0/SD_ILS:22717202024-06-18T20:53:19Z2024-06-18T20:53:19Zby Russell, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594308">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : take your penetration testing an IT security skills to a whole new level with the secrets of Metasploitent://SD_ILS/0/SD_ILS:22718342024-06-18T20:53:19Z2024-06-18T20:53:19Zby Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4709428">Click to View</a><br/>Format: Electronic Resources<br/>Cyber insecurity : navigating the perils of the next information ageent://SD_ILS/0/SD_ILS:22660982024-06-18T20:53:19Z2024-06-18T20:53:19Zby Harrison, Richard M., 1981- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4742078">Click to View</a><br/>Format: Electronic Resources<br/>Breaking into information security : crafting a custom career path to get the job you really wantent://SD_ILS/0/SD_ILS:22093442024-06-18T20:53:19Z2024-06-18T20:53:19Zby More, Josh, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4187289">Click to View</a><br/>Format: Electronic Resources<br/>Building a corporate culture of security : strategies for strengthening organizational resiliencyent://SD_ILS/0/SD_ILS:22097382024-06-18T20:53:19Z2024-06-18T20:53:19Zby Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4425984">Click to View</a><br/>Format: Electronic Resources<br/>Meeting security challenges through data analytics and decision supportent://SD_ILS/0/SD_ILS:22197582024-06-18T20:53:19Z2024-06-18T20:53:19Zby Shahbazian, E. (Elisa), editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4753391">Click to View</a><br/>Format: Electronic Resources<br/>Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0ent://SD_ILS/0/SD_ILS:22717582024-06-18T20:53:19Z2024-06-18T20:53:19Zby Olups, Rihards, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4643698">Click to View</a><br/>Format: Electronic Resources<br/>Meeting people via WiFi and Bluetoothent://SD_ILS/0/SD_ILS:20984232024-06-18T20:53:19Z2024-06-18T20:53:19Zby Schroeder, Joshua, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189280">Click to View</a><br/>Format: Electronic Resources<br/>Essential skills for hackersent://SD_ILS/0/SD_ILS:20984242024-06-18T20:53:19Z2024-06-18T20:53:19Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189281">Click to View</a><br/>Format: Electronic Resources<br/>Chaotic secure communication : principles and technologiesent://SD_ILS/0/SD_ILS:20612852024-06-18T20:53:19Z2024-06-18T20:53:19Zby Sun, Kehui, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4707910">Click to View</a><br/>Format: Electronic Resources<br/>Security and privacy in the digital era. Volume 1ent://SD_ILS/0/SD_ILS:20609152024-06-18T20:53:19Z2024-06-18T20:53:19Zby Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4648717">Click to View</a><br/>Format: Electronic Resources<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:21109522024-06-18T20:53:19Z2024-06-18T20:53:19Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4009415">Click to View</a><br/>Format: Electronic Resources<br/>Selling information security to the board : a primerent://SD_ILS/0/SD_ILS:21325832024-06-18T20:53:19Z2024-06-18T20:53:19Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4519662">Click to View</a><br/>Format: Electronic Resources<br/>Linux server security : hack and defendent://SD_ILS/0/SD_ILS:20601022024-06-18T20:53:19Z2024-06-18T20:53:19Zby Binnie, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4519259">Click to View</a><br/>Format: Electronic Resources<br/>Hiding behind the keyboard : uncovering covert communication methods with forensic analysisent://SD_ILS/0/SD_ILS:22098132024-06-18T20:53:19Z2024-06-18T20:53:19Zby Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452264">Click to View</a><br/>Format: Electronic Resources<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:22098142024-06-18T20:53:19Z2024-06-18T20:53:19Zby Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452265">Click to View</a><br/>Format: Electronic Resources<br/>Information security science : measuring the vulnerability to data compromisesent://SD_ILS/0/SD_ILS:22103282024-06-18T20:53:19Z2024-06-18T20:53:19Zby Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4567434">Click to View</a><br/>Format: Electronic Resources<br/>Critical infrastructure protection against hybrid warfare security related challengesent://SD_ILS/0/SD_ILS:22113972024-06-18T20:53:19Z2024-06-18T20:53:19Zby Niglia, Alessandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4753392">Click to View</a><br/>Format: Electronic Resources<br/>88 privacy breaches to beware of : practical data protection tips from real-life experiencesent://SD_ILS/0/SD_ILS:22651852024-06-18T20:53:19Z2024-06-18T20:53:19Zby Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4558135">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity and human rights in the age of cyberveillanceent://SD_ILS/0/SD_ILS:22641052024-06-18T20:53:19Z2024-06-18T20:53:19Zby Kulesza, Joanna, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4098051">Click to View</a><br/>Format: Electronic Resources<br/>Security in fixed and wireless networksent://SD_ILS/0/SD_ILS:22799302024-06-18T20:53:19Z2024-06-18T20:53:19Zby Schafer, Gunter, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=7104366">Click to View</a><br/>Format: Electronic Resources<br/>From hacking to report writing : an introduction to security and penetration testingent://SD_ILS/0/SD_ILS:23460412024-06-18T20:53:19Z2024-06-18T20:53:19Zby Svensson, Robert, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4733249">Click to View</a><br/>Format: Electronic Resources<br/>Mastering XenApp : master the skills required to implement Citrix XenApp 7.6 to deploy a complete Citrix-hosted application from scratchent://SD_ILS/0/SD_ILS:23528662024-06-18T20:53:19Z2024-06-18T20:53:19Zby Jha, Sunny, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191098">Click to View</a><br/>Format: Electronic Resources<br/>The Mobile Application Hacker's Handbook.ent://SD_ILS/0/SD_ILS:12800572024-06-18T20:53:19Z2024-06-18T20:53:19Zby Chell, Dominic.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1895167">Click to View</a><br/>Format: Electronic Resources<br/>Security Intelligence : A Practitioner's Guide to Solving Enterprise Security Challenges.ent://SD_ILS/0/SD_ILS:12800512024-06-18T20:53:19Z2024-06-18T20:53:19Zby Li, Qing.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1895130">Click to View</a><br/>Format: Electronic Resources<br/>Online Safety.ent://SD_ILS/0/SD_ILS:12805012024-06-18T20:53:19Z2024-06-18T20:53:19Zby Healey, Justin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1899260">Click to View</a><br/>Format: Electronic Resources<br/>The Defender’s Dilemma : Charting a Course Toward Cybersecurity.ent://SD_ILS/0/SD_ILS:12855092024-06-18T20:53:19Z2024-06-18T20:53:19Zby Libicki, Martin C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2075897">Click to View</a><br/>Format: Electronic Resources<br/>Network Attacks and Exploitation : A Framework.ent://SD_ILS/0/SD_ILS:13381872024-06-18T20:53:19Z2024-06-18T20:53:19Zby Monte, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4040351">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linuxent://SD_ILS/0/SD_ILS:13868062024-06-18T20:53:19Z2024-06-18T20:53:19Zby Ramachandran, Vivek, author.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2005211">Click to View</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:21553202024-06-18T20:53:19Z2024-06-18T20:53:19Zby Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192125">Click to View</a><br/>Format: Electronic Resources<br/>Building Python real-time applications with Storm : learn to process massive real-time data streams using Storm and Python-- no Java requiredent://SD_ILS/0/SD_ILS:22276512024-06-18T20:53:19Z2024-06-18T20:53:19Zby Bhatnagar, Kartik, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191295">Click to View</a><br/>Format: Electronic Resources<br/>Python for secret agents. Volume II : gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agentsent://SD_ILS/0/SD_ILS:22276522024-06-18T20:53:19Z2024-06-18T20:53:19Zby Lott, Steven F., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191298">Click to View</a><br/>Format: Electronic Resources<br/>Web application security is a stack : how to CYA (Cover Your Apps) completelyent://SD_ILS/0/SD_ILS:22089712024-06-18T20:53:19Z2024-06-18T20:53:19Zby Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192126">Click to View</a><br/>Format: Electronic Resources<br/>Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:22083342024-06-18T20:53:19Z2024-06-18T20:53:19Zby Knapp, Eric D., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1887712">Click to View</a><br/>Format: Electronic Resources<br/>The science and technology of counterterrorism : measuring physical and electronic security riskent://SD_ILS/0/SD_ILS:22072342024-06-18T20:53:19Z2024-06-18T20:53:19Zby Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1641934">Click to View</a><br/>Format: Electronic Resources<br/>OpenCV with Python blueprints : design and develop advanced computer vision projects using OpenCV with Pythonent://SD_ILS/0/SD_ILS:22713582024-06-18T20:53:19Z2024-06-18T20:53:19Zby Beyeler, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191141">Click to View</a><br/>Format: Electronic Resources<br/>Implementing NetScaler VPX : implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platformsent://SD_ILS/0/SD_ILS:22713612024-06-18T20:53:19Z2024-06-18T20:53:19Zby Sandbu, Marius, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191154">Click to View</a><br/>Format: Electronic Resources<br/>Application security in the ISO 27001:2013 environmentent://SD_ILS/0/SD_ILS:22096112024-06-18T20:53:19Z2024-06-18T20:53:19Zby Vasudevan, Vinod, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4395800">Click to View</a><br/>Format: Electronic Resources<br/>OpenCV with Python by example : build real-world computer vision applications and develop cool demos using OpenCV for Pythonent://SD_ILS/0/SD_ILS:22713902024-06-18T20:53:19Z2024-06-18T20:53:19Zby Joshi, Prateek, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191268">Click to View</a><br/>Format: Electronic Resources<br/>Python GUI programming cookbook : over 80 object-oriented recipes to help you create mind-blowing GUIs in Pythonent://SD_ILS/0/SD_ILS:22713932024-06-18T20:53:19Z2024-06-18T20:53:19Zby Meier, Burkhard A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191299">Click to View</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:20981032024-06-18T20:53:19Z2024-06-18T20:53:19Zby Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2098440">Click to View</a><br/>Format: Electronic Resources<br/>Securing social media in the enterpriseent://SD_ILS/0/SD_ILS:20981312024-06-18T20:53:19Z2024-06-18T20:53:19Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2146009">Click to View</a><br/>Format: Electronic Resources<br/>Bent functions : results and applications to cryptographyent://SD_ILS/0/SD_ILS:20981522024-06-18T20:53:19Z2024-06-18T20:53:19Zby Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192079">Click to View</a><br/>Format: Electronic Resources<br/>Smart grid security : innovative solutions for a modernized grident://SD_ILS/0/SD_ILS:20981382024-06-18T20:53:19Z2024-06-18T20:53:19Zby Skopik, Florian, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2146995">Click to View</a><br/>Format: Electronic Resources<br/>Designing and building a security operations centerent://SD_ILS/0/SD_ILS:20976572024-06-18T20:53:19Z2024-06-18T20:53:19Zby Nathans, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1834659">Click to View</a><br/>Format: Electronic Resources<br/>Information security analytics : finding security insights, patterns and anomalies in big dataent://SD_ILS/0/SD_ILS:20976822024-06-18T20:53:19Z2024-06-18T20:53:19Zby Mark, Talabis, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1873129">Click to View</a><br/>Format: Electronic Resources<br/>Digital privacy in the marketplace : perspectives on the information exchangeent://SD_ILS/0/SD_ILS:20561852024-06-18T20:53:19Z2024-06-18T20:53:19Zby Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1920895">Click to View</a><br/>Format: Electronic Resources<br/>Black hat Python : Python programming for hackers and pentestersent://SD_ILS/0/SD_ILS:20562102024-06-18T20:53:19Z2024-06-18T20:53:19Zby Seitz, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1931622">Click to View</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:20590822024-06-18T20:53:19Z2024-06-18T20:53:19Zby Moskowitz, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4040685">Click to View</a><br/>Format: Electronic Resources<br/>Infosec management fundamentalsent://SD_ILS/0/SD_ILS:20981292024-06-18T20:53:19Z2024-06-18T20:53:19Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2146007">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre X, Sécurité des Réseaux Industriels étendus : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236792024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709824">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre XIV, Réglementation de la Cybersécurité et Régime Juridique des Systèmes Numériques Industriels : une étude des Dispositions Réglementaires en Cybersécurité en France et Aux États-Unis : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236802024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709825">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre II, Typologie des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236832024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709828">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre II, Typologie des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236842024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709829">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapter IV, Malveillance numérique sur les systèmes industriels : histoire de la menace, événements emblématiques, tendances et perspectives : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236852024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709831">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236682024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709810">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre XIII, État des Lieux des Référentiels en Sécurité des Systèmes Numériques Industriels : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236692024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709811">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236702024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709812">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des Installations Industrielles. Chapter V, Des bus de terrain a l'Industrial Ethernetent://SD_ILS/0/SD_ILS:21236772024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709821">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapter VI, Analyse des risques : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236882024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709834">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre I, Mythes et réalités de la cybersécurité des systèmes numériques industriels : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236892024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709836">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des Installations Industrielles : Chapitre XII Panorama de l'offre Technologique Pour la Cybersécurité Industrielleent://SD_ILS/0/SD_ILS:21236952024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709845">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des Installations Industriellesent://SD_ILS/0/SD_ILS:21237002024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709851">Click to View</a><br/>Format: Electronic Resources<br/>Using security patterns in web-applicationent://SD_ILS/0/SD_ILS:21448122024-06-18T20:53:19Z2024-06-18T20:53:19Zby Alam, Shahnawaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5291824">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Python forensics : master the art of digital forensics and analysis with Pythonent://SD_ILS/0/SD_ILS:22194612024-06-18T20:53:19Z2024-06-18T20:53:19Zby Spreitzenbarth, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191124">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Python data visualization : generate effective results in a variety of visually appealing charts using the plotting packages in Pythonent://SD_ILS/0/SD_ILS:22194622024-06-18T20:53:19Z2024-06-18T20:53:19Zby Raman, Kirthi, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191125">Click to View</a><br/>Format: Electronic Resources<br/>CSA guide to cloud computing : implementing cloud privacy and securityent://SD_ILS/0/SD_ILS:22081232024-06-18T20:53:19Z2024-06-18T20:53:19Zby Samani, Raj, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1793946">Click to View</a><br/>Format: Electronic Resources<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:22081452024-06-18T20:53:19Z2024-06-18T20:53:19Zby Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1798312">Click to View</a><br/>Format: Electronic Resources<br/>Windows malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setent://SD_ILS/0/SD_ILS:22386412024-06-18T20:53:19Z2024-06-18T20:53:19Zby Marak, Victor, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191257">Click to View</a><br/>Format: Electronic Resources<br/>Learning OpenCV 3 computer vision with Python : unleash the power of computer vision with Python using OpenCVent://SD_ILS/0/SD_ILS:22386432024-06-18T20:53:19Z2024-06-18T20:53:19Zby Minichino, Joe, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191267">Click to View</a><br/>Format: Electronic Resources<br/>Applications of secure multiparty computationent://SD_ILS/0/SD_ILS:22135412024-06-18T20:53:19Z2024-06-18T20:53:19Zby Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5161932">Click to View</a><br/>Format: Electronic Resources<br/>Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbixent://SD_ILS/0/SD_ILS:13867032024-06-18T20:53:19Z2024-06-18T20:53:19Zby Vacche, Andrea Dalle, author.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1973849">Click to View</a><br/>Format: Electronic Resources<br/>Web security : a whitehat perspectiveent://SD_ILS/0/SD_ILS:22703882024-06-18T20:53:19Z2024-06-18T20:53:19Zby Wu, Hanqing, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1566016">Click to View</a><br/>Format: Electronic Resources<br/>Implementing NetScaler VPX™.ent://SD_ILS/0/SD_ILS:12703992024-06-18T20:53:19Z2024-06-18T20:53:19Zby Sandbu, Marius.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1674868">Click to View</a><br/>Format: Electronic Resources<br/>Android Hacker's Handbook.ent://SD_ILS/0/SD_ILS:12698772024-06-18T20:53:19Z2024-06-18T20:53:19Zby Drake, Joshua J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1662701">Click to View</a><br/>Format: Electronic Resources<br/>Detection and Intelligent Systems for Homeland Security.ent://SD_ILS/0/SD_ILS:12665142024-06-18T20:53:19Z2024-06-18T20:53:19Zby Voeller, John G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1598817">Click to View</a><br/>Format: Electronic Resources<br/>Security Using Data Analysis, Visualization, and Dashboards : Analysis, Visualization and Dashboards.ent://SD_ILS/0/SD_ILS:12666662024-06-18T20:53:19Z2024-06-18T20:53:19Zby Jacobs, Jay.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1599321">Click to View</a><br/>Format: Electronic Resources<br/>Computer Forensics with FTK.ent://SD_ILS/0/SD_ILS:12695842024-06-18T20:53:19Z2024-06-18T20:53:19Zby Carbone, Fernando.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1657797">Click to View</a><br/>Format: Electronic Resources<br/>Hacking Point of Sale : Payment Application Secrets, Threats, and Solutions.ent://SD_ILS/0/SD_ILS:12679142024-06-18T20:53:19Z2024-06-18T20:53:19Zby Gomzin, Slava.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1629175">Click to View</a><br/>Format: Electronic Resources<br/>The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory.ent://SD_ILS/0/SD_ILS:12739522024-06-18T20:53:19Z2024-06-18T20:53:19Zby Hale Ligh, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1740753">Click to View</a><br/>Format: Electronic Resources<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013.ent://SD_ILS/0/SD_ILS:12745852024-06-18T20:53:19Z2024-06-18T20:53:19Zby Furnell, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1752831">Click to View</a><br/>Format: Electronic Resources<br/>Understanding Bitcoin : Cryptography, Engineering and Economics.ent://SD_ILS/0/SD_ILS:12777492024-06-18T20:53:19Z2024-06-18T20:53:19Zby Franco, Pedro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1823060">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Threat! : How to Manage the Growing Risk of Cyber Attacks.ent://SD_ILS/0/SD_ILS:12741262024-06-18T20:53:19Z2024-06-18T20:53:19Zby Ulsch, MacDonnell.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1742833">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux Network Scanning Cookbook.ent://SD_ILS/0/SD_ILS:12757822024-06-18T20:53:19Z2024-06-18T20:53:19Zby Hutchens, Justin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1771381">Click to View</a><br/>Format: Electronic Resources<br/>Iste : Chinese Cybersecurity and Cyberdefense.ent://SD_ILS/0/SD_ILS:12754012024-06-18T20:53:19Z2024-06-18T20:53:19Zby Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1765106">Click to View</a><br/>Format: Electronic Resources<br/>Security leader insights for information protection : lessons and strategies from leading security professionalsent://SD_ILS/0/SD_ILS:22074672024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699254">Click to View</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:22074682024-06-18T20:53:19Z2024-06-18T20:53:19Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699255">Click to View</a><br/>Format: Electronic Resources<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:22067902024-06-18T20:53:19Z2024-06-18T20:53:19Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1573362">Click to View</a><br/>Format: Electronic Resources<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:22067942024-06-18T20:53:19Z2024-06-18T20:53:19Zby Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1574451">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:22072932024-06-18T20:53:19Z2024-06-18T20:53:19Zby Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1659012">Click to View</a><br/>Format: Electronic Resources<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:22703482024-06-18T20:53:19Z2024-06-18T20:53:19Zby Stapleton, Jeffrey James, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1538312">Click to View</a><br/>Format: Electronic Resources<br/>Datennutzungs- und datenschutzverträge : muster, klauseln, erläuterungenent://SD_ILS/0/SD_ILS:21191022024-06-18T20:53:19Z2024-06-18T20:53:19Zby Moos, Flemming, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2129586">Click to View</a><br/>Format: Electronic Resources<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:21108552024-06-18T20:53:19Z2024-06-18T20:53:19Zby Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192124">Click to View</a><br/>Format: Electronic Resources<br/>Cyber essentials : a pocket guideent://SD_ILS/0/SD_ILS:21107262024-06-18T20:53:19Z2024-06-18T20:53:19Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1778769">Click to View</a><br/>Format: Electronic Resources<br/>Core software security : security at the sourceent://SD_ILS/0/SD_ILS:21316112024-06-18T20:53:19Z2024-06-18T20:53:19Zby Ransome, James.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1547083">Click to View</a><br/>Format: Electronic Resources<br/>Threat Modeling : Designing for Security.ent://SD_ILS/0/SD_ILS:12679162024-06-18T20:53:19Z2024-06-18T20:53:19Zby Shostack, Adam.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1629177">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux CTF Blueprints.ent://SD_ILS/0/SD_ILS:12720992024-06-18T20:53:19Z2024-06-18T20:53:19Zby Buchanan, Cameron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1688607">Click to View</a><br/>Format: Electronic Resources<br/>Cloud Management and Security.ent://SD_ILS/0/SD_ILS:12725982024-06-18T20:53:19Z2024-06-18T20:53:19Zby Abbadi, Imad M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1701403">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Blockades.ent://SD_ILS/0/SD_ILS:12769992024-06-18T20:53:19Z2024-06-18T20:53:19Zby Russell, Alison Lawlor.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1810129">Click to View</a><br/>Format: Electronic Resources<br/>Best Practices in Computer Network Defense : Incident Detection and Response.ent://SD_ILS/0/SD_ILS:12684532024-06-18T20:53:19Z2024-06-18T20:53:19Zby Hathaway, M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1637648">Click to View</a><br/>Format: Electronic Resources<br/>Burp suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the jobent://SD_ILS/0/SD_ILS:22243442024-06-18T20:53:19Z2024-06-18T20:53:19Zby Mahajan, Akash, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1879299">Click to View</a><br/>Format: Electronic Resources<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:22073392024-06-18T20:53:19Z2024-06-18T20:53:19Zby Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1675198">Click to View</a><br/>Format: Electronic Resources<br/>Security for service oriented architecturesent://SD_ILS/0/SD_ILS:22703852024-06-18T20:53:19Z2024-06-18T20:53:19Zby Williams, Walter (Telecommunications engineer), author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1564631">Click to View</a><br/>Format: Electronic Resources<br/>The Basics of IT Audit : Purposes, Processes, and Practical Information.ent://SD_ILS/0/SD_ILS:12642472024-06-18T20:53:19Z2024-06-18T20:53:19Zby Gantz, Stephen D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1550527">Click to View</a><br/>Format: Electronic Resources<br/>Data Visualization, Part 2 : New Directions for Evaluation, Number 140.ent://SD_ILS/0/SD_ILS:12654882024-06-18T20:53:19Z2024-06-18T20:53:19Zby Azzam, Tarek.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1579356">Click to View</a><br/>Format: Electronic Resources<br/>Getting Started with FortiGate.ent://SD_ILS/0/SD_ILS:12650072024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fabbri, Rosato.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572901">Click to View</a><br/>Format: Electronic Resources<br/>Instant Java Password and Authentication Security.ent://SD_ILS/0/SD_ILS:12650192024-06-18T20:53:19Z2024-06-18T20:53:19Zby Mayoral, Fernando.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572913">Click to View</a><br/>Format: Electronic Resources<br/>IBM Mainframe Security : Beyond the Basics—A Practical Guide from a z/OS and RACF Perspective.ent://SD_ILS/0/SD_ILS:12625912024-06-18T20:53:19Z2024-06-18T20:53:19Zby Dattani, Dinesh D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1411689">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Security and IT Infrastructure Protection.ent://SD_ILS/0/SD_ILS:12619622024-06-18T20:53:19Z2024-06-18T20:53:19Zby Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1377640">Click to View</a><br/>Format: Electronic Resources<br/>Security Patterns in Practice : Designing Secure Architectures Using Software Patterns.ent://SD_ILS/0/SD_ILS:12598172024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fernandez-Buglioni, Eduardo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1245159">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise Security : A Data-Centric Approach to Securing the Enterprise.ent://SD_ILS/0/SD_ILS:12525212024-06-18T20:53:19Z2024-06-18T20:53:19Zby Woody, Aaron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1103988">Click to View</a><br/>Format: Electronic Resources<br/>Social Media Security : Leveraging Social Networking While Mitigating Risk.ent://SD_ILS/0/SD_ILS:12534952024-06-18T20:53:19Z2024-06-18T20:53:19Zby Cross, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115173">Click to View</a><br/>Format: Electronic Resources<br/>Safety of Computer Architectures.ent://SD_ILS/0/SD_ILS:12539422024-06-18T20:53:19Z2024-06-18T20:53:19Zby Boulanger, Jean-Louis.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1120753">Click to View</a><br/>Format: Electronic Resources<br/>Using Social Media for Global Security.ent://SD_ILS/0/SD_ILS:12536702024-06-18T20:53:19Z2024-06-18T20:53:19Zby Gupta, Ravi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1118756">Click to View</a><br/>Format: Electronic Resources<br/>Investigative Computer Forensics : The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives.ent://SD_ILS/0/SD_ILS:12359582024-06-18T20:53:19Z2024-06-18T20:53:19Zby Laykin, Erik.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=817953">Click to View</a><br/>Format: Electronic Resources<br/>Biohackers : The Politics of Open Science.ent://SD_ILS/0/SD_ILS:13229962024-06-18T20:53:19Z2024-06-18T20:53:19Zby Delfanti, Alessandro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3386719">Click to View</a><br/>Format: Electronic Resources<br/>Convergence : Illicit Networks and National Security in the Age of Globalization.ent://SD_ILS/0/SD_ILS:13375722024-06-18T20:53:19Z2024-06-18T20:53:19Zby (U.S.), National Defense University.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3571653">Click to View</a><br/>Format: Electronic Resources<br/>Logging and log management the authoritative guide to understanding the concepts surrounding logging and log managementent://SD_ILS/0/SD_ILS:22060602024-06-18T20:53:19Z2024-06-18T20:53:19Zby Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1077419">Click to View</a><br/>Format: Electronic Resources<br/>Information protection playbookent://SD_ILS/0/SD_ILS:22065832024-06-18T20:53:19Z2024-06-18T20:53:19Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1418381">Click to View</a><br/>Format: Electronic Resources<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:20517122024-06-18T20:53:19Z2024-06-18T20:53:19Zby O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073021">Click to View</a><br/>Format: Electronic Resources<br/>Technocrime, policing and surveillanceent://SD_ILS/0/SD_ILS:21281282024-06-18T20:53:19Z2024-06-18T20:53:19Zby Leman-Langlois, Stéphane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1016143">Click to View</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:21549082024-06-18T20:53:19Z2024-06-18T20:53:19Zby Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463578">Click to View</a><br/>Format: Electronic Resources<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:21549092024-06-18T20:53:19Z2024-06-18T20:53:19Zby Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463579">Click to View</a><br/>Format: Electronic Resources<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:21293362024-06-18T20:53:19Z2024-06-18T20:53:19Zby Baker, Paul R., 1958-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1112600">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security for educational leaders a guide to understanding and implementing technology policiesent://SD_ILS/0/SD_ILS:21297052024-06-18T20:53:19Z2024-06-18T20:53:19Zby Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1143733">Click to View</a><br/>Format: Electronic Resources<br/>Sicherheit in kommunikationsnetzenent://SD_ILS/0/SD_ILS:21423122024-06-18T20:53:19Z2024-06-18T20:53:19Zby Sorge, Christoph.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1524463">Click to View</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:21298472024-06-18T20:53:19Z2024-06-18T20:53:19Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1153198">Click to View</a><br/>Format: Electronic Resources<br/>Safety Management of Software-based Equipment.ent://SD_ILS/0/SD_ILS:12579252024-06-18T20:53:19Z2024-06-18T20:53:19Zby Boulanger, Jean-Louis.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1187169">Click to View</a><br/>Format: Electronic Resources<br/>Web Application Defender's Cookbook : Battling Hackers and Protecting Users.ent://SD_ILS/0/SD_ILS:12528732024-06-18T20:53:19Z2024-06-18T20:53:19Zby Barnett, Ryan C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1108733">Click to View</a><br/>Format: Electronic Resources<br/>Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutionsent://SD_ILS/0/SD_ILS:22061642024-06-18T20:53:19Z2024-06-18T20:53:19Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115164">Click to View</a><br/>Format: Electronic Resources<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:22061652024-06-18T20:53:19Z2024-06-18T20:53:19Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115167">Click to View</a><br/>Format: Electronic Resources<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:22062162024-06-18T20:53:19Z2024-06-18T20:53:19Zby Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1133729">Click to View</a><br/>Format: Electronic Resources<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:22060252024-06-18T20:53:19Z2024-06-18T20:53:19Zby Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1058152">Click to View</a><br/>Format: Electronic Resources<br/>Linux malware incident response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:22061712024-06-18T20:53:19Z2024-06-18T20:53:19Zby Malin, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115185">Click to View</a><br/>Format: Electronic Resources<br/>Simple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:22061692024-06-18T20:53:19Z2024-06-18T20:53:19Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115182">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocolsent://SD_ILS/0/SD_ILS:22060432024-06-18T20:53:19Z2024-06-18T20:53:19Zby Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073014">Click to View</a><br/>Format: Electronic Resources<br/>The dark side of personalization online privacy concerns influence customer behaviorent://SD_ILS/0/SD_ILS:22379762024-06-18T20:53:19Z2024-06-18T20:53:19Zby Ziesak, Jörg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1324048">Click to View</a><br/>Format: Electronic Resources<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:22060052024-06-18T20:53:19Z2024-06-18T20:53:19Zby Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1047930">Click to View</a><br/>Format: Electronic Resources<br/>Proceedings of the 11th European Conference on Information warfare and security : ECIW 2012.ent://SD_ILS/0/SD_ILS:12701312024-06-18T20:53:19Z2024-06-18T20:53:19Zby Filiol, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1667290">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Forefront Identity Manager 2010 R2 Handbook.ent://SD_ILS/0/SD_ILS:12478162024-06-18T20:53:19Z2024-06-18T20:53:19Zby Nordström, Kent.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1019543">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft SQL Server 2012 Security Cookbook.ent://SD_ILS/0/SD_ILS:12486532024-06-18T20:53:19Z2024-06-18T20:53:19Zby Bruchez, Rudi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1036251">Click to View</a><br/>Format: Electronic Resources<br/>Spring Security 3.1.ent://SD_ILS/0/SD_ILS:12528402024-06-18T20:53:19Z2024-06-18T20:53:19Zby Winch, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1108351">Click to View</a><br/>Format: Electronic Resources<br/>Practical Malware Analysis : A Hands-On Guide to Dissecting Malicious Software.ent://SD_ILS/0/SD_ILS:12555862024-06-18T20:53:19Z2024-06-18T20:53:19Zby Sikorski, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137570">Click to View</a><br/>Format: Electronic Resources<br/>Hacking Web Apps : Detecting and Preventing Web Application Security Problems.ent://SD_ILS/0/SD_ILS:12476652024-06-18T20:53:19Z2024-06-18T20:53:19Zby Shema, Mike.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1012529">Click to View</a><br/>Format: Electronic Resources<br/>Getting Started with Citrix XenApp 6.5.ent://SD_ILS/0/SD_ILS:12472752024-06-18T20:53:19Z2024-06-18T20:53:19Zby Musumeci, Guillermo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=995550">Click to View</a><br/>Format: Electronic Resources<br/>IT Governance : An International Guide to Data Security and ISO27001/ISO27002.ent://SD_ILS/0/SD_ILS:12381642024-06-18T20:53:19Z2024-06-18T20:53:19Zby Calder, Alan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=838114">Click to View</a><br/>Format: Electronic Resources<br/>Safeguarding Critical E-Documents : Implementing a Program for Securing Confidential Information Assets.ent://SD_ILS/0/SD_ILS:12366012024-06-18T20:53:19Z2024-06-18T20:53:19Zby Smallwood, Robert F.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=821999">Click to View</a><br/>Format: Electronic Resources<br/>IBM i Security Administration and Compliance.ent://SD_ILS/0/SD_ILS:12427142024-06-18T20:53:19Z2024-06-18T20:53:19Zby Woodbury, Carol.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=906259">Click to View</a><br/>Format: Electronic Resources<br/>Oracle 11g Anti-hacker's Cookbook.ent://SD_ILS/0/SD_ILS:12508622024-06-18T20:53:19Z2024-06-18T20:53:19Zby Neagu, Adrian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1057945">Click to View</a><br/>Format: Electronic Resources<br/>Hands-On Ethical Hacking and Network Defense.ent://SD_ILS/0/SD_ILS:13052332024-06-18T20:53:19Z2024-06-18T20:53:19Zby Simpson, Michael T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136562">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:21264952024-06-18T20:53:19Z2024-06-18T20:53:19Zby Macaulay, Tyson.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826923">Click to View</a><br/>Format: Electronic Resources<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:21265082024-06-18T20:53:19Z2024-06-18T20:53:19Zby Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826949">Click to View</a><br/>Format: Electronic Resources<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:21317362024-06-18T20:53:19Z2024-06-18T20:53:19Zby Mjølsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1648315">Click to View</a><br/>Format: Electronic Resources<br/>Hacking For Dummies.ent://SD_ILS/0/SD_ILS:12526562024-06-18T20:53:19Z2024-06-18T20:53:19Zby Beaver, Kevin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106542">Click to View</a><br/>Format: Electronic Resources<br/>Securing WebLogic Server 12c.ent://SD_ILS/0/SD_ILS:12521652024-06-18T20:53:19Z2024-06-18T20:53:19Zby Masini, Luca.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085228">Click to View</a><br/>Format: Electronic Resources<br/>Nmap 6 : Network exploration and security auditing Cookbook.ent://SD_ILS/0/SD_ILS:12521672024-06-18T20:53:19Z2024-06-18T20:53:19Zby Pale, Paulino Calderon.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085230">Click to View</a><br/>Format: Electronic Resources<br/>Group Policy : Fundamentals, Security, and the Managed Desktop.ent://SD_ILS/0/SD_ILS:12525962024-06-18T20:53:19Z2024-06-18T20:53:19Zby Moskowitz, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1104500">Click to View</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems digital forensics field guidesent://SD_ILS/0/SD_ILS:22057382024-06-18T20:53:19Z2024-06-18T20:53:19Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=921016">Click to View</a><br/>Format: Electronic Resources<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:22056922024-06-18T20:53:19Z2024-06-18T20:53:19Zby Mao, Wenji.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=892251">Click to View</a><br/>Format: Electronic Resources<br/>Low tech hacking street smarts for security professionalsent://SD_ILS/0/SD_ILS:22055522024-06-18T20:53:19Z2024-06-18T20:53:19Zby Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=829964">Click to View</a><br/>Format: Electronic Resources<br/>Embedded systems security practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:22056592024-06-18T20:53:19Z2024-06-18T20:53:19Zby Kleidermacher, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=886256">Click to View</a><br/>Format: Electronic Resources<br/>Securing SQL servers protecting your database from attackersent://SD_ILS/0/SD_ILS:22058462024-06-18T20:53:19Z2024-06-18T20:53:19Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=980013">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:22055812024-06-18T20:53:19Z2024-06-18T20:53:19Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=850700">Click to View</a><br/>Format: Electronic Resources<br/>Formal Models and Techniques for Analyzing Security Protocols.ent://SD_ILS/0/SD_ILS:12336622024-06-18T20:53:19Z2024-06-18T20:53:19Zby Cortier, V.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=784604">Click to View</a><br/>Format: Electronic Resources<br/>Reversing : Secrets of Reverse Engineering.ent://SD_ILS/0/SD_ILS:11832802024-06-18T20:53:19Z2024-06-18T20:53:19Zby Eilam, Eldad.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227440">Click to View</a><br/>Format: Electronic Resources<br/>Developer's Guide to Web Application Security.ent://SD_ILS/0/SD_ILS:11910742024-06-18T20:53:19Z2024-06-18T20:53:19Zby Cross, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=289735">Click to View</a><br/>Format: Electronic Resources<br/>Tangled Web : A Guide to Securing Modern Web Applications.ent://SD_ILS/0/SD_ILS:12555872024-06-18T20:53:19Z2024-06-18T20:53:19Zby Zalewski, Michal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137574">Click to View</a><br/>Format: Electronic Resources<br/>Computer Forensics JumpStart.ent://SD_ILS/0/SD_ILS:12237352024-06-18T20:53:19Z2024-06-18T20:53:19Zby Solomon, Michael G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=661659">Click to View</a><br/>Format: Electronic Resources<br/>Web Commerce Security : Design and Development.ent://SD_ILS/0/SD_ILS:12288842024-06-18T20:53:19Z2024-06-18T20:53:19Zby Nahari, Hadi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706729">Click to View</a><br/>Format: Electronic Resources<br/>Identity Management : Concepts, Technologies, and Systems.ent://SD_ILS/0/SD_ILS:12226882024-06-18T20:53:19Z2024-06-18T20:53:19Zby Takahashi, Kenji.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=634511">Click to View</a><br/>Format: Electronic Resources<br/>The Essential Guide to Home Computer Security.ent://SD_ILS/0/SD_ILS:12356562024-06-18T20:53:19Z2024-06-18T20:53:19Zby R. Rowlingson, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=811317">Click to View</a><br/>Format: Electronic Resources<br/>Cloud : Understanding the Security, Privacy and Trust Challenges.ent://SD_ILS/0/SD_ILS:12368332024-06-18T20:53:19Z2024-06-18T20:53:19Zby Robinson, Neil.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=825129">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Forefront UAG 2010 Administrator's Handbook.ent://SD_ILS/0/SD_ILS:12457062024-06-18T20:53:19Z2024-06-18T20:53:19Zby Ben-Ari, Erez.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=948568">Click to View</a><br/>Format: Electronic Resources<br/>Securing the Cloud : Cloud Computer Security Techniques and Tactics.ent://SD_ILS/0/SD_ILS:12271702024-06-18T20:53:19Z2024-06-18T20:53:19Zby Winkler, Vic (J.R.).<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=686827">Click to View</a><br/>Format: Electronic Resources<br/>Security Risk Management : Building an Information Security Risk Management Program from the Ground Up.ent://SD_ILS/0/SD_ILS:12269432024-06-18T20:53:19Z2024-06-18T20:53:19Zby Wheeler, Evan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=685406">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Vista for IT Security Professionals.ent://SD_ILS/0/SD_ILS:11965172024-06-18T20:53:19Z2024-06-18T20:53:19Zby Piltzecker, Anthony.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328623">Click to View</a><br/>Format: Electronic Resources<br/>Zen and the Art of Information Security.ent://SD_ILS/0/SD_ILS:11967132024-06-18T20:53:19Z2024-06-18T20:53:19Zby Winkler, Ira.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=330200">Click to View</a><br/>Format: Electronic Resources<br/>Securing HP NonStop Servers in an Open Systems World : TCP/IP, OSS and SQL.ent://SD_ILS/0/SD_ILS:11917562024-06-18T20:53:19Z2024-06-18T20:53:19Zby Corp, XYPRO Technology.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=291716">Click to View</a><br/>Format: Electronic Resources<br/>TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook.ent://SD_ILS/0/SD_ILS:12001562024-06-18T20:53:19Z2024-06-18T20:53:19Zby Wiles, Jack.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=405426">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Windows Security Fundamentals : For Windows 2003 SP1 and R2.ent://SD_ILS/0/SD_ILS:11921752024-06-18T20:53:19Z2024-06-18T20:53:19Zby De Clercq, Jan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294637">Click to View</a><br/>Format: Electronic Resources<br/>Practical Embedded Security : Building Secure Resource-Constrained Systems.ent://SD_ILS/0/SD_ILS:11950042024-06-18T20:53:19Z2024-06-18T20:53:19Zby Stapko, Timothy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=312846">Click to View</a><br/>Format: Electronic Resources<br/>Security Convergence : Managing Enterprise Security Risk.ent://SD_ILS/0/SD_ILS:11929352024-06-18T20:53:19Z2024-06-18T20:53:19Zby Tyson, Dave.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=299507">Click to View</a><br/>Format: Electronic Resources<br/>A bug hunter's diary a guided tour through the wilds of software securityent://SD_ILS/0/SD_ILS:20522752024-06-18T20:53:19Z2024-06-18T20:53:19Zby Klein, Tobias.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137526">Click to View</a><br/>Format: Electronic Resources<br/>The web application hacker's handbook finding and exploiting security flawsent://SD_ILS/0/SD_ILS:21414902024-06-18T20:53:19Z2024-06-18T20:53:19Zby Stuttard, Dafydd.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=819008">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to cryptography with open-source softwareent://SD_ILS/0/SD_ILS:21317082024-06-18T20:53:19Z2024-06-18T20:53:19Zby McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1633743">Click to View</a><br/>Format: Electronic Resources<br/>Multimedia Security Technologies for Digital Rights Management.ent://SD_ILS/0/SD_ILS:11890772024-06-18T20:53:19Z2024-06-18T20:53:19Zby Zeng, Wenjun.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=274233">Click to View</a><br/>Format: Electronic Resources<br/>Relation Based Access Control.ent://SD_ILS/0/SD_ILS:12660402024-06-18T20:53:19Z2024-06-18T20:53:19Zby Zhang, R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1589007">Click to View</a><br/>Format: Electronic Resources<br/>Social Engineering : The Art of Human Hacking.ent://SD_ILS/0/SD_ILS:12288892024-06-18T20:53:19Z2024-06-18T20:53:19Zby Hadnagy, Christopher.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706746">Click to View</a><br/>Format: Electronic Resources<br/>Cloud Security : A Comprehensive Guide to Secure Cloud Computing.ent://SD_ILS/0/SD_ILS:12189872024-06-18T20:53:19Z2024-06-18T20:53:19Zby Krutz, Ronald L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=589027">Click to View</a><br/>Format: Electronic Resources<br/>Logics and Languages for Reliability and Security.ent://SD_ILS/0/SD_ILS:12173012024-06-18T20:53:19Z2024-06-18T20:53:19Zby Esparza, J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=557042">Click to View</a><br/>Format: Electronic Resources<br/>Hashing in Computer Science : Fifty Years of Slicing and Dicing.ent://SD_ILS/0/SD_ILS:12156732024-06-18T20:53:19Z2024-06-18T20:53:19Zby Konheim, Alan G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537352">Click to View</a><br/>Format: Electronic Resources<br/>Professional Cocoa Application Security.ent://SD_ILS/0/SD_ILS:12156742024-06-18T20:53:19Z2024-06-18T20:53:19Zby Lee, Graham J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537355">Click to View</a><br/>Format: Electronic Resources<br/>Assessing Information Security : Strategies, Tactics, Logic and Framework.ent://SD_ILS/0/SD_ILS:12133662024-06-18T20:53:19Z2024-06-18T20:53:19Zby Vladimirov, Andrew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=499606">Click to View</a><br/>Format: Electronic Resources<br/>IT Audit, Control, and Security.ent://SD_ILS/0/SD_ILS:12222742024-06-18T20:53:19Z2024-06-18T20:53:19Zby Moeller, Robert R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=624573">Click to View</a><br/>Format: Electronic Resources<br/>Least Privilege Security for Windows 7, Vista and XP : Implement Efficient System Security By Assigning Permissions Effectively.ent://SD_ILS/0/SD_ILS:12451842024-06-18T20:53:19Z2024-06-18T20:53:19Zby Smith, Russell.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944038">Click to View</a><br/>Format: Electronic Resources<br/>Group Policy : Fundamentals, Security, and the Managed Desktop.ent://SD_ILS/0/SD_ILS:12143372024-06-18T20:53:19Z2024-06-18T20:53:19Zby Moskowitz, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=530009">Click to View</a><br/>Format: Electronic Resources<br/>Dear Hacker : Letters to the Editor Of 2600.ent://SD_ILS/0/SD_ILS:12156712024-06-18T20:53:19Z2024-06-18T20:53:19Zby Goldstein, Emmanuel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537340">Click to View</a><br/>Format: Electronic Resources<br/>Spring Security 3.ent://SD_ILS/0/SD_ILS:12451972024-06-18T20:53:19Z2024-06-18T20:53:19Zby Mularien, Peter.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944051">Click to View</a><br/>Format: Electronic Resources<br/>Risk Factors in Computer-Crime Victimization.ent://SD_ILS/0/SD_ILS:12507572024-06-18T20:53:19Z2024-06-18T20:53:19Zby Choi, Kyung-Shick.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1057793">Click to View</a><br/>Format: Electronic Resources<br/>GlassFish Security.ent://SD_ILS/0/SD_ILS:12452432024-06-18T20:53:19Z2024-06-18T20:53:19Zby Kalali, Masoud.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944941">Click to View</a><br/>Format: Electronic Resources<br/>Security 2020 : Reduce Security Risks This Decade.ent://SD_ILS/0/SD_ILS:12283162024-06-18T20:53:19Z2024-06-18T20:53:19Zby Howard, Doug.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=694289">Click to View</a><br/>Format: Electronic Resources<br/>Information Assurance : Dependability and Security in Networked Systems.ent://SD_ILS/0/SD_ILS:11964582024-06-18T20:53:19Z2024-06-18T20:53:19Zby Qian, Yi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328312">Click to View</a><br/>Format: Electronic Resources<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:21254512024-06-18T20:53:19Z2024-06-18T20:53:19Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=625004">Click to View</a><br/>Format: Electronic Resources<br/>Secure and resilient software developmentent://SD_ILS/0/SD_ILS:21313812024-06-18T20:53:19Z2024-06-18T20:53:19Zby Merkow, Mark S., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1446770">Click to View</a><br/>Format: Electronic Resources<br/>Advances in Artificial Intelligence for Privacy Protection and Security.ent://SD_ILS/0/SD_ILS:12707052024-06-18T20:53:19Z2024-06-18T20:53:19Zby Solanas, Agusti.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679374">Click to View</a><br/>Format: Electronic Resources<br/>Definitive Guide to the C&A Transformation Process : The First Publication of a Comprehensive View of the C&A Transformation.ent://SD_ILS/0/SD_ILS:12161552024-06-18T20:53:19Z2024-06-18T20:53:19Zby Mehan, Julie.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=547041">Click to View</a><br/>Format: Electronic Resources<br/>SQL Injection Attacks and Defense.ent://SD_ILS/0/SD_ILS:12461182024-06-18T20:53:19Z2024-06-18T20:53:19Zby Clarke-Salt, Justin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=953188">Click to View</a><br/>Format: Electronic Resources<br/>Distributed Systems Security : Issues, Processes and Solutions.ent://SD_ILS/0/SD_ILS:12058042024-06-18T20:53:19Z2024-06-18T20:53:19Zby Belapurkar, Abhijit.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=437429">Click to View</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:20483782024-06-18T20:53:19Z2024-06-18T20:53:19Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=453166">Click to View</a><br/>Format: Electronic Resources<br/>Gray hat Python Python programming for hackers and reverse engineersent://SD_ILS/0/SD_ILS:20522802024-06-18T20:53:19Z2024-06-18T20:53:19Zby Seitz, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137535">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise Information Security and Privacy.ent://SD_ILS/0/SD_ILS:12077182024-06-18T20:53:19Z2024-06-18T20:53:19Zby Axelrod, C. Warren.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456886">Click to View</a><br/>Format: Electronic Resources<br/>Mac Security Bible.ent://SD_ILS/0/SD_ILS:12115662024-06-18T20:53:19Z2024-06-18T20:53:19Zby Kissell, Joe.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=477803">Click to View</a><br/>Format: Electronic Resources<br/>Trust and Security in Collaborative Computing.ent://SD_ILS/0/SD_ILS:12706882024-06-18T20:53:19Z2024-06-18T20:53:19Zby Zou, Xukai.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679354">Click to View</a><br/>Format: Electronic Resources<br/>A Comparison between Smart Cards and Trusted Platform Modules in Business Scenarios.ent://SD_ILS/0/SD_ILS:12204852024-06-18T20:53:19Z2024-06-18T20:53:19Zby Murhammer, Martin W.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=616678">Click to View</a><br/>Format: Electronic Resources<br/>CompTIA Security+ 2008 In Depth.ent://SD_ILS/0/SD_ILS:13048582024-06-18T20:53:19Z2024-06-18T20:53:19Zby Ciampa, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136117">Click to View</a><br/>Format: Electronic Resources<br/>ASP.NET 3.5 Security, Membership, and Role Management with C# and VB.ent://SD_ILS/0/SD_ILS:13008272024-06-18T20:53:19Z2024-06-18T20:53:19Zby Haidar, Bilal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3057687">Click to View</a><br/>Format: Electronic Resources<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:20480172024-06-18T20:53:19Z2024-06-18T20:53:19Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=339307">Click to View</a><br/>Format: Electronic Resources<br/>Implementing Email and Security Tokens : Current Standards, Tools, and Practices.ent://SD_ILS/0/SD_ILS:11977622024-06-18T20:53:19Z2024-06-18T20:53:19Zby Turner, Sean.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=343700">Click to View</a><br/>Format: Electronic Resources<br/>Securing Information and Communications Systems : Principles, Technologies, and Applications.ent://SD_ILS/0/SD_ILS:12077132024-06-18T20:53:19Z2024-06-18T20:53:19Zby Lopez, Javier.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456881">Click to View</a><br/>Format: Electronic Resources<br/>Fuzzing for Software Security Testing and Quality Assurance.ent://SD_ILS/0/SD_ILS:12077162024-06-18T20:53:19Z2024-06-18T20:53:19Zby Takanen, Ari.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456884">Click to View</a><br/>Format: Electronic Resources<br/>Information Security : Policy, Processes, and Practices.ent://SD_ILS/0/SD_ILS:12053592024-06-18T20:53:19Z2024-06-18T20:53:19Zby Goodman, Seymour.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=435197">Click to View</a><br/>Format: Electronic Resources<br/>Secure Computer and Network Systems : Modeling, Analysis and Design.ent://SD_ILS/0/SD_ILS:11986442024-06-18T20:53:19Z2024-06-18T20:53:19Zby Ye, Nong.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=351427">Click to View</a><br/>Format: Electronic Resources<br/>Computer Forensics For Dummies.ent://SD_ILS/0/SD_ILS:11998622024-06-18T20:53:19Z2024-06-18T20:53:19Zby Volonino, Linda.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=380503">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:20522822024-06-18T20:53:19Z2024-06-18T20:53:19Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137538">Click to View</a><br/>Format: Electronic Resources<br/>Toward a Safer and More Secure Cyberspace.ent://SD_ILS/0/SD_ILS:13201382024-06-18T20:53:19Z2024-06-18T20:53:19Zby Committee on Improving Cybersecurity Research in the United States, National Research Council.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3378311">Click to View</a><br/>Format: Electronic Resources<br/>Security Data Visualization : Graphical Techniques for Network Analysis.ent://SD_ILS/0/SD_ILS:12916132024-06-18T20:53:19Z2024-06-18T20:53:19Zby Conti, Greg.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3017625">Click to View</a><br/>Format: Electronic Resources<br/>Misuse of Information Systems : The Impact of Security Countermeasures.ent://SD_ILS/0/SD_ILS:12911772024-06-18T20:53:19Z2024-06-18T20:53:19Zby D'Arcy, John P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3016826">Click to View</a><br/>Format: Electronic Resources<br/>Windows Forensic Analysis DVD Toolkit.ent://SD_ILS/0/SD_ILS:11965182024-06-18T20:53:19Z2024-06-18T20:53:19Zby Carvey, Harlan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328624">Click to View</a><br/>Format: Electronic Resources<br/>Papers from the First European Workshop on Technological & Security Issues in Digital Rights Management (EuDiRights’06).ent://SD_ILS/0/SD_ILS:11917202024-06-18T20:53:19Z2024-06-18T20:53:19Zby Yague, Mariemma.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=291585">Click to View</a><br/>Format: Electronic Resources<br/>