Search Results for - Narrowed by: Computer security. - 2008SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026ps$003d300?2024-06-18T16:10:16ZProfessional ASP.NET 3.5 security, membership, and role management with C♯ and VBent://SD_ILS/0/SD_ILS:22917422024-06-18T16:10:16Z2024-06-18T16:10:16Zby Haidar, Bilal.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470379301/?ar">https://go.oreilly.com/library-access/library/view/-/9780470379301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470379301/?ar">https://learning.oreilly.com/library/view/~/9780470379301/?ar</a><br/>Format: Electronic Resources<br/>Nmap network scanning : official Nmap project guide to network discovery and security scanningent://SD_ILS/0/SD_ILS:1291032024-06-18T16:10:16Z2024-06-18T16:10:16Zby Lyon, Gordon Fyodor.<br/>Format: Books<br/>Trust and Security in Collaborative Computing.ent://SD_ILS/0/SD_ILS:12706882024-06-18T16:10:16Z2024-06-18T16:10:16Zby Zou, Xukai.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679354">Click to View</a><br/>Format: Electronic Resources<br/>A Comparison between Smart Cards and Trusted Platform Modules in Business Scenarios.ent://SD_ILS/0/SD_ILS:12204852024-06-18T16:10:16Z2024-06-18T16:10:16Zby Murhammer, Martin W.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=616678">Click to View</a><br/>Format: Electronic Resources<br/>CompTIA Security+ 2008 In Depth.ent://SD_ILS/0/SD_ILS:13048582024-06-18T16:10:16Z2024-06-18T16:10:16Zby Ciampa, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136117">Click to View</a><br/>Format: Electronic Resources<br/>ASP.NET 3.5 Security, Membership, and Role Management with C# and VB.ent://SD_ILS/0/SD_ILS:13008272024-06-18T16:10:16Z2024-06-18T16:10:16Zby Haidar, Bilal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3057687">Click to View</a><br/>Format: Electronic Resources<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:20480172024-06-18T16:10:16Z2024-06-18T16:10:16Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=339307">Click to View</a><br/>Format: Electronic Resources<br/>Implementing Email and Security Tokens : Current Standards, Tools, and Practices.ent://SD_ILS/0/SD_ILS:11977622024-06-18T16:10:16Z2024-06-18T16:10:16Zby Turner, Sean.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=343700">Click to View</a><br/>Format: Electronic Resources<br/>Securing Information and Communications Systems : Principles, Technologies, and Applications.ent://SD_ILS/0/SD_ILS:12077132024-06-18T16:10:16Z2024-06-18T16:10:16Zby Lopez, Javier.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456881">Click to View</a><br/>Format: Electronic Resources<br/>Fuzzing for Software Security Testing and Quality Assurance.ent://SD_ILS/0/SD_ILS:12077162024-06-18T16:10:16Z2024-06-18T16:10:16Zby Takanen, Ari.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456884">Click to View</a><br/>Format: Electronic Resources<br/>Information Security : Policy, Processes, and Practices.ent://SD_ILS/0/SD_ILS:12053592024-06-18T16:10:16Z2024-06-18T16:10:16Zby Goodman, Seymour.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=435197">Click to View</a><br/>Format: Electronic Resources<br/>Secure Computer and Network Systems : Modeling, Analysis and Design.ent://SD_ILS/0/SD_ILS:11986442024-06-18T16:10:16Z2024-06-18T16:10:16Zby Ye, Nong.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=351427">Click to View</a><br/>Format: Electronic Resources<br/>Computer Forensics For Dummies.ent://SD_ILS/0/SD_ILS:11998622024-06-18T16:10:16Z2024-06-18T16:10:16Zby Volonino, Linda.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=380503">Click to View</a><br/>Format: Electronic Resources<br/>Computer security, privacy, and politics current issues, challenges, and solutionsent://SD_ILS/0/SD_ILS:22612352024-06-18T16:10:16Z2024-06-18T16:10:16Zby Subramanian, Ramesh.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-804-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-804-8</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:20522822024-06-18T16:10:16Z2024-06-18T16:10:16Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137538">Click to View</a><br/>Format: Electronic Resources<br/>Information security policy, processes, and practicesent://SD_ILS/0/SD_ILS:2930002024-06-18T16:10:16Z2024-06-18T16:10:16Zby Straub, Detmar W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513</a><br/>Format: Electronic Resources<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:3437392024-06-18T16:10:16Z2024-06-18T16:10:16Zby Clark, Champ, III.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542</a><br/>Format: Electronic Resources<br/>Privacy-preserving data mining : models and algorithmsent://SD_ILS/0/SD_ILS:813962024-06-18T16:10:16Z2024-06-18T16:10:16Zby Aggarwal, Charu C.<br/>Format: Books<br/>Panoptikon gözün iktidarı =b Panoptikon : vart gjennomsiktige samfunnent://SD_ILS/0/SD_ILS:857412024-06-18T16:10:16Z2024-06-18T16:10:16Zby Apenes, Georg.<br/>Format: Books<br/>Deployment guides series. IBM Tivoli Compliance Insight Managerent://SD_ILS/0/SD_ILS:22946672024-06-18T16:10:16Z2024-06-18T16:10:16Zby Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738485705/?ar">https://go.oreilly.com/library-access/library/view/-/0738485705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738485705/?ar">https://learning.oreilly.com/library/view/~/0738485705/?ar</a><br/>Format: Electronic Resources<br/>Securing Web services practical usage of standards and specificationsent://SD_ILS/0/SD_ILS:22618822024-06-18T16:10:16Z2024-06-18T16:10:16Zby Periorellis, Panos.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6</a><br/>Format: Electronic Resources<br/>Security and software for cybercafésent://SD_ILS/0/SD_ILS:22618832024-06-18T16:10:16Z2024-06-18T16:10:16Zby Adomi, Esharenana E.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8</a><br/>Format: Electronic Resources<br/>Understanding Windows CardSpace : an introduction to the concepts and challenges of digital identitiesent://SD_ILS/0/SD_ILS:22844022024-06-18T16:10:16Z2024-06-18T16:10:16Zby Bertocci, Vittorio.<br/><a href="https://learning.oreilly.com/library/view/~/9780321496843/?ar">https://learning.oreilly.com/library/view/~/9780321496843/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar">https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar</a><br/>Format: Electronic Resources<br/>Schneier on securityent://SD_ILS/0/SD_ILS:22865522024-06-18T16:10:16Z2024-06-18T16:10:16Zby Schneier, Bruce, 1963-<br/><a href="https://learning.oreilly.com/library/view/~/9780470395356/?ar">https://learning.oreilly.com/library/view/~/9780470395356/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470395356/?ar">https://go.oreilly.com/library-access/library/view/-/9780470395356/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470395356">https://learning.oreilly.com/library/view/~/9780470395356</a><br/>Format: Electronic Resources<br/>Netzwerkangriffe von innenent://SD_ILS/0/SD_ILS:22864742024-06-18T16:10:16Z2024-06-18T16:10:16Zby Ziegler, Paul Sebastian.<br/><a href="https://learning.oreilly.com/library/view/~/9783897217782">https://learning.oreilly.com/library/view/~/9783897217782</a>
<a href="https://learning.oreilly.com/library/view/~/9783897217782/?ar">https://learning.oreilly.com/library/view/~/9783897217782/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783897217782/?ar">https://go.oreilly.com/library-access/library/view/-/9783897217782/?ar</a><br/>Format: Electronic Resources<br/>Security engineering : a guide to building dependable distributed systemsent://SD_ILS/0/SD_ILS:22899902024-06-18T16:10:16Z2024-06-18T16:10:16Zby Anderson, Ross, 1956-<br/><a href="https://learning.oreilly.com/library/view/~/9780470068526">https://learning.oreilly.com/library/view/~/9780470068526</a>
<a href="https://learning.oreilly.com/library/view/~/9780470068526/?ar">https://learning.oreilly.com/library/view/~/9780470068526/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470068526/?ar">https://go.oreilly.com/library-access/library/view/-/9780470068526/?ar</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001 : a pocket guideent://SD_ILS/0/SD_ILS:22889322024-06-18T16:10:16Z2024-06-18T16:10:16Zby Watkins, Steve, 1970-<br/><a href="https://learning.oreilly.com/library/view/~/9781905356683">https://learning.oreilly.com/library/view/~/9781905356683</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356683/?ar">https://learning.oreilly.com/library/view/~/9781905356683/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356683/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356683/?ar</a><br/>Format: Electronic Resources<br/>The web application hacker's handbook : discovering and exploiting security flawsent://SD_ILS/0/SD_ILS:22885342024-06-18T16:10:16Z2024-06-18T16:10:16Zby Stuttard, Dafydd, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470170779/?ar">https://learning.oreilly.com/library/view/~/9780470170779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar">https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470170779">https://learning.oreilly.com/library/view/~/9780470170779</a><br/>Format: Electronic Resources<br/>Security and Usability : Designing Secure Systems that People Can Use.ent://SD_ILS/0/SD_ILS:22886102024-06-18T16:10:16Z2024-06-18T16:10:16Zby Cranor, Lorrie Faith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008279/?ar">https://go.oreilly.com/library-access/library/view/-/0596008279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008279/?ar">https://learning.oreilly.com/library/view/~/0596008279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008279">https://learning.oreilly.com/library/view/~/0596008279</a><br/>Format: Electronic Resources<br/>Hacking : the art of exploitationent://SD_ILS/0/SD_ILS:22879832024-06-18T16:10:16Z2024-06-18T16:10:16Zby Erickson, Jon, 1977-<br/><a href="https://learning.oreilly.com/library/view/~/9781593271442">https://learning.oreilly.com/library/view/~/9781593271442</a>
<a href="https://learning.oreilly.com/library/view/~/9781593271442/?ar">https://learning.oreilly.com/library/view/~/9781593271442/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar</a><br/>Format: Electronic Resources<br/>The craft of system securityent://SD_ILS/0/SD_ILS:22840582024-06-18T16:10:16Z2024-06-18T16:10:16Zby Smith, Sean W., 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780321434838">https://learning.oreilly.com/library/view/~/9780321434838</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321434838/?ar">https://go.oreilly.com/library-access/library/view/-/9780321434838/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321434838/?ar">https://learning.oreilly.com/library/view/~/9780321434838/?ar</a><br/>Format: Electronic Resources<br/>Creating the secure managed desktop : using group policy, SoftGrid, Microsoft deployment toolkit, and other management toolsent://SD_ILS/0/SD_ILS:22887562024-06-18T16:10:16Z2024-06-18T16:10:16Zby Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470277645/?ar">https://learning.oreilly.com/library/view/~/9780470277645/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470277645/?ar">https://go.oreilly.com/library-access/library/view/-/9780470277645/?ar</a><br/>Format: Electronic Resources<br/>SOA securityent://SD_ILS/0/SD_ILS:22849362024-06-18T16:10:16Z2024-06-18T16:10:16Zby Kanneganti, Ramarao.<br/><a href="https://learning.oreilly.com/library/view/~/9781932394689">https://learning.oreilly.com/library/view/~/9781932394689</a>
<a href="https://learning.oreilly.com/library/view/~/9781932394689/?ar">https://learning.oreilly.com/library/view/~/9781932394689/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar">https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar</a><br/>Format: Electronic Resources<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:22842222024-06-18T16:10:16Z2024-06-18T16:10:16Zby Harris, Shon.<br/><a href="https://learning.oreilly.com/library/view/~/9780071495684/?ar">https://learning.oreilly.com/library/view/~/9780071495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar">https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar</a><br/>Format: Electronic Resources<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:22845092024-06-18T16:10:16Z2024-06-18T16:10:16Zby Long, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491761/?ar">https://learning.oreilly.com/library/view/~/9781597491761/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar</a><br/>Format: Electronic Resources<br/>Is it safe? : protecting your computer, your business, and yourself onlineent://SD_ILS/0/SD_ILS:22855542024-06-18T16:10:16Z2024-06-18T16:10:16Zby Miller, Michael, 1958-<br/><a href="https://learning.oreilly.com/library/view/~/9780768683080/?ar">https://learning.oreilly.com/library/view/~/9780768683080/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar">https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768683080">https://learning.oreilly.com/library/view/~/9780768683080</a><br/>Format: Electronic Resources<br/>The new school of information securityent://SD_ILS/0/SD_ILS:22850322024-06-18T16:10:16Z2024-06-18T16:10:16Zby Shostack, Adam.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321562753/?ar">https://go.oreilly.com/library-access/library/view/-/9780321562753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321562753/?ar">https://learning.oreilly.com/library/view/~/9780321562753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321562753">https://learning.oreilly.com/library/view/~/9780321562753</a><br/>Format: Electronic Resources<br/>Crimeware : understanding new attacks and defensesent://SD_ILS/0/SD_ILS:22855872024-06-18T16:10:16Z2024-06-18T16:10:16Zby Jakobsson, Markus.<br/><a href="https://learning.oreilly.com/library/view/~/9780321553744/?ar">https://learning.oreilly.com/library/view/~/9780321553744/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar">https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar</a><br/>Format: Electronic Resources<br/>Computer forensics for dummiesent://SD_ILS/0/SD_ILS:22856722024-06-18T16:10:16Z2024-06-18T16:10:16Zby Volonino, Linda.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470371916/?ar">https://learning.oreilly.com/library/view/~/9780470371916/?ar</a><br/>Format: Electronic Resources<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:22852262024-06-18T16:10:16Z2024-06-18T16:10:16Zby Clark, Champ, III.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492249">https://learning.oreilly.com/library/view/~/9781597492249</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492249/?ar">https://learning.oreilly.com/library/view/~/9781597492249/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics : investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:22856932024-06-18T16:10:16Z2024-06-18T16:10:16Zby Aquilina, James M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492683/?ar">https://learning.oreilly.com/library/view/~/9781597492683/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492683">https://learning.oreilly.com/library/view/~/9781597492683</a><br/>Format: Electronic Resources<br/>Windows Vista security for dummiesent://SD_ILS/0/SD_ILS:22842182024-06-18T16:10:16Z2024-06-18T16:10:16Zby Koerner, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9780470118054">https://learning.oreilly.com/library/view/~/9780470118054</a>
<a href="https://learning.oreilly.com/library/view/~/9780470118054/?ar">https://learning.oreilly.com/library/view/~/9780470118054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar">https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar</a><br/>Format: Electronic Resources<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:22851402024-06-18T16:10:16Z2024-06-18T16:10:16Zby Hay, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492409">https://learning.oreilly.com/library/view/~/9781597492409</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492409/?ar">https://learning.oreilly.com/library/view/~/9781597492409/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar</a><br/>Format: Electronic Resources<br/>Securing Windows server 2008 : prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:22851412024-06-18T16:10:16Z2024-06-18T16:10:16Z<a href="https://learning.oreilly.com/library/view/~/9781597492805">https://learning.oreilly.com/library/view/~/9781597492805</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492805/?ar">https://learning.oreilly.com/library/view/~/9781597492805/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar</a><br/>Format: Electronic Resources<br/>No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfingent://SD_ILS/0/SD_ILS:22851432024-06-18T16:10:16Z2024-06-18T16:10:16Zby Long, Johnny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492157/?ar">https://learning.oreilly.com/library/view/~/9781597492157/?ar</a><br/>Format: Electronic Resources<br/>Securing Citrix XenApp Server in the enterpriseent://SD_ILS/0/SD_ILS:22851442024-06-18T16:10:16Z2024-06-18T16:10:16Zby Bin Azad, Tariq.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492812/?ar">https://learning.oreilly.com/library/view/~/9781597492812/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492812/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492812/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492812">https://learning.oreilly.com/library/view/~/9781597492812</a><br/>Format: Electronic Resources<br/>Microsoft Windows server 2008 security resource kitent://SD_ILS/0/SD_ILS:22848872024-06-18T16:10:16Z2024-06-18T16:10:16Zby Johansson, Jesper M.<br/><a href="https://learning.oreilly.com/library/view/~/9780735625044/?ar">https://learning.oreilly.com/library/view/~/9780735625044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735625044">https://learning.oreilly.com/library/view/~/9780735625044</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735625044/?ar">https://go.oreilly.com/library-access/library/view/-/9780735625044/?ar</a><br/>Format: Electronic Resources<br/>A practical guide to trusted computingent://SD_ILS/0/SD_ILS:22844602024-06-18T16:10:16Z2024-06-18T16:10:16Zby Challener, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780132398428">https://learning.oreilly.com/library/view/~/9780132398428</a>
<a href="https://learning.oreilly.com/library/view/~/9780132398428/?ar">https://learning.oreilly.com/library/view/~/9780132398428/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132398428/?ar">https://go.oreilly.com/library-access/library/view/-/9780132398428/?ar</a><br/>Format: Electronic Resources<br/>Software security engineering : a guide for project managersent://SD_ILS/0/SD_ILS:22844702024-06-18T16:10:16Z2024-06-18T16:10:16Zby Allen, Julia H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar">https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321559685/?ar">https://learning.oreilly.com/library/view/~/9780321559685/?ar</a><br/>Format: Electronic Resources<br/>Check Point NGX R65 security administrationent://SD_ILS/0/SD_ILS:22845192024-06-18T16:10:16Z2024-06-18T16:10:16Zby Bonnell, Ralph.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492454/?ar">https://learning.oreilly.com/library/view/~/9781597492454/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492454/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492454/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492454">https://learning.oreilly.com/library/view/~/9781597492454</a><br/>Format: Electronic Resources<br/>Practical embedded security : building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:22845232024-06-18T16:10:16Z2024-06-18T16:10:16Zby Stapko, Timothy John.<br/><a href="https://learning.oreilly.com/library/view/~/9780750682152/?ar">https://learning.oreilly.com/library/view/~/9780750682152/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750682152/?ar">https://go.oreilly.com/library-access/library/view/-/9780750682152/?ar</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and troubleshootingent://SD_ILS/0/SD_ILS:22887632024-06-18T16:10:16Z2024-06-18T16:10:16Zby Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470275894/?ar">https://learning.oreilly.com/library/view/~/9780470275894/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar">https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar</a><br/>Format: Electronic Resources<br/>Ten rules of information security for the smaller business : a plain English guideent://SD_ILS/0/SD_ILS:22896292024-06-18T16:10:16Z2024-06-18T16:10:16Zby Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781905356553/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356553/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356553/?ar">https://learning.oreilly.com/library/view/~/9781905356553/?ar</a><br/>Format: Electronic Resources<br/>Geekonomics : the real cost of insecure softwareent://SD_ILS/0/SD_ILS:22843502024-06-18T16:10:16Z2024-06-18T16:10:16Zby Rice, David, 1971-<br/><a href="https://learning.oreilly.com/library/view/~/9780321477897/?ar">https://learning.oreilly.com/library/view/~/9780321477897/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321477897/?ar">https://go.oreilly.com/library-access/library/view/-/9780321477897/?ar</a><br/>Format: Electronic Resources<br/>Mastering System Center Data Protection Manager 2007ent://SD_ILS/0/SD_ILS:22845422024-06-18T16:10:16Z2024-06-18T16:10:16Zby Ganger, Devin L.<br/><a href="https://learning.oreilly.com/library/view/~/9780470181522/?ar">https://learning.oreilly.com/library/view/~/9780470181522/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar">https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470181522">https://learning.oreilly.com/library/view/~/9780470181522</a><br/>Format: Electronic Resources<br/>Mainframe basics for security professionals : getting started with RACFent://SD_ILS/0/SD_ILS:22843272024-06-18T16:10:16Z2024-06-18T16:10:16Zby Pomerantz, Ori.<br/><a href="https://learning.oreilly.com/library/view/~/9780137137596/?ar">https://learning.oreilly.com/library/view/~/9780137137596/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137137596/?ar">https://go.oreilly.com/library-access/library/view/-/9780137137596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137137596">https://learning.oreilly.com/library/view/~/9780137137596</a><br/>Format: Electronic Resources<br/>Ajax securityent://SD_ILS/0/SD_ILS:22843352024-06-18T16:10:16Z2024-06-18T16:10:16Zby Hoffman, Billy, 1980-<br/><a href="https://learning.oreilly.com/library/view/~/9780321491930">https://learning.oreilly.com/library/view/~/9780321491930</a>
<a href="https://learning.oreilly.com/library/view/~/9780321491930/?ar">https://learning.oreilly.com/library/view/~/9780321491930/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321491930/?ar">https://go.oreilly.com/library-access/library/view/-/9780321491930/?ar</a><br/>Format: Electronic Resources<br/>Managing catastrophic loss of sensitive dataent://SD_ILS/0/SD_ILS:22846902024-06-18T16:10:16Z2024-06-18T16:10:16Zby Photopoulos, Constantine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492393/?ar">https://learning.oreilly.com/library/view/~/9781597492393/?ar</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime.ent://SD_ILS/0/SD_ILS:22851492024-06-18T16:10:16Z2024-06-18T16:10:16Zby Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492768">https://learning.oreilly.com/library/view/~/9781597492768</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492768/?ar">https://learning.oreilly.com/library/view/~/9781597492768/?ar</a><br/>Format: Electronic Resources<br/>OS X exploits and defenseent://SD_ILS/0/SD_ILS:22851572024-06-18T16:10:16Z2024-06-18T16:10:16Zby Baccas, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492546/?ar">https://learning.oreilly.com/library/view/~/9781597492546/?ar</a><br/>Format: Electronic Resources<br/>Modern cryptanalysis : techniques for advanced code breakingent://SD_ILS/0/SD_ILS:22846272024-06-18T16:10:16Z2024-06-18T16:10:16Zby Swenson, Christopher, 1983-<br/><a href="https://learning.oreilly.com/library/view/~/9780470135938">https://learning.oreilly.com/library/view/~/9780470135938</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar">https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470135938/?ar">https://learning.oreilly.com/library/view/~/9780470135938/?ar</a><br/>Format: Electronic Resources<br/>Foundations of Mac OS X Leopard securityent://SD_ILS/0/SD_ILS:22846282024-06-18T16:10:16Z2024-06-18T16:10:16Zby Edge, Charles S., Jr.<br/><a href="https://learning.oreilly.com/library/view/~/9781590599891/?ar">https://learning.oreilly.com/library/view/~/9781590599891/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar">https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781590599891">https://learning.oreilly.com/library/view/~/9781590599891</a><br/>Format: Electronic Resources<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:22845172024-06-18T16:10:16Z2024-06-18T16:10:16Zby Varsalone, Jesse.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492447">https://learning.oreilly.com/library/view/~/9781597492447</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492447/?ar">https://learning.oreilly.com/library/view/~/9781597492447/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar</a><br/>Format: Electronic Resources<br/>Deployment guide series. IBM Tivoli Identity Manager 5.0ent://SD_ILS/0/SD_ILS:22858442024-06-18T16:10:16Z2024-06-18T16:10:16Zby Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738432067/?ar">https://go.oreilly.com/library-access/library/view/-/0738432067/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738432067/?ar">https://learning.oreilly.com/library/view/~/0738432067/?ar</a><br/>Format: Electronic Resources<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:22862452024-06-18T16:10:16Z2024-06-18T16:10:16Zby Qian, Yi, 1962-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar">https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123735669/?ar">https://learning.oreilly.com/library/view/~/9780123735669/?ar</a><br/>Format: Electronic Resources<br/>