Search Results for - Narrowed by: Computer security. - 2008 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026ps$003d300? 2024-06-18T16:10:16Z Professional ASP.NET 3.5 security, membership, and role management with C♯ and VB ent://SD_ILS/0/SD_ILS:2291742 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Haidar, Bilal.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470379301/?ar">https://go.oreilly.com/library-access/library/view/-/9780470379301/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470379301/?ar">https://learning.oreilly.com/library/view/~/9780470379301/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nmap network scanning : official Nmap project guide to network discovery and security scanning ent://SD_ILS/0/SD_ILS:129103 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Lyon, Gordon Fyodor.<br/>Format:&#160;Books<br/> Trust and Security in Collaborative Computing. ent://SD_ILS/0/SD_ILS:1270688 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Zou, Xukai.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679354">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A Comparison between Smart Cards and Trusted Platform Modules in Business Scenarios. ent://SD_ILS/0/SD_ILS:1220485 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Murhammer, Martin W.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=616678">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Security+ 2008 In Depth. ent://SD_ILS/0/SD_ILS:1304858 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Ciampa, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136117">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ASP.NET 3.5 Security, Membership, and Role Management with C# and VB. ent://SD_ILS/0/SD_ILS:1300827 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Haidar, Bilal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3057687">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:2048017 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing Email and Security Tokens : Current Standards, Tools, and Practices. ent://SD_ILS/0/SD_ILS:1197762 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Turner, Sean.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=343700">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing Information and Communications Systems : Principles, Technologies, and Applications. ent://SD_ILS/0/SD_ILS:1207713 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Lopez, Javier.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Fuzzing for Software Security Testing and Quality Assurance. ent://SD_ILS/0/SD_ILS:1207716 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Takanen, Ari.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Security : Policy, Processes, and Practices. ent://SD_ILS/0/SD_ILS:1205359 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Goodman, Seymour.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=435197">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure Computer and Network Systems : Modeling, Analysis and Design. ent://SD_ILS/0/SD_ILS:1198644 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Ye, Nong.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=351427">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer Forensics For Dummies. ent://SD_ILS/0/SD_ILS:1199862 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Volonino, Linda.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=380503">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer security, privacy, and politics current issues, challenges, and solutions ent://SD_ILS/0/SD_ILS:2261235 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Subramanian, Ramesh.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-804-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-804-8</a><br/>Format:&#160;Electronic Resources<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:2052282 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security policy, processes, and practices ent://SD_ILS/0/SD_ILS:293000 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Straub, Detmar W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513</a><br/>Format:&#160;Electronic Resources<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:343739 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Clark, Champ, III.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542</a><br/>Format:&#160;Electronic Resources<br/> Privacy-preserving data mining : models and algorithms ent://SD_ILS/0/SD_ILS:81396 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Aggarwal, Charu C.<br/>Format:&#160;Books<br/> Panoptikon g&ouml;z&uuml;n iktidarı =b Panoptikon : vart gjennomsiktige samfunn ent://SD_ILS/0/SD_ILS:85741 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Apenes, Georg.<br/>Format:&#160;Books<br/> Deployment guides series. IBM Tivoli Compliance Insight Manager ent://SD_ILS/0/SD_ILS:2294667 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;B&uuml;cker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738485705/?ar">https://go.oreilly.com/library-access/library/view/-/0738485705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738485705/?ar">https://learning.oreilly.com/library/view/~/0738485705/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Web services practical usage of standards and specifications ent://SD_ILS/0/SD_ILS:2261882 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Periorellis, Panos.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6</a><br/>Format:&#160;Electronic Resources<br/> Security and software for cybercaf&eacute;s ent://SD_ILS/0/SD_ILS:2261883 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Adomi, Esharenana E.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8</a><br/>Format:&#160;Electronic Resources<br/> Understanding Windows CardSpace : an introduction to the concepts and challenges of digital identities ent://SD_ILS/0/SD_ILS:2284402 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Bertocci, Vittorio.<br/><a href="https://learning.oreilly.com/library/view/~/9780321496843/?ar">https://learning.oreilly.com/library/view/~/9780321496843/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar">https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar</a><br/>Format:&#160;Electronic Resources<br/> Schneier on security ent://SD_ILS/0/SD_ILS:2286552 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Schneier, Bruce, 1963-<br/><a href="https://learning.oreilly.com/library/view/~/9780470395356/?ar">https://learning.oreilly.com/library/view/~/9780470395356/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470395356/?ar">https://go.oreilly.com/library-access/library/view/-/9780470395356/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470395356">https://learning.oreilly.com/library/view/~/9780470395356</a><br/>Format:&#160;Electronic Resources<br/> Netzwerkangriffe von innen ent://SD_ILS/0/SD_ILS:2286474 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Ziegler, Paul Sebastian.<br/><a href="https://learning.oreilly.com/library/view/~/9783897217782">https://learning.oreilly.com/library/view/~/9783897217782</a> <a href="https://learning.oreilly.com/library/view/~/9783897217782/?ar">https://learning.oreilly.com/library/view/~/9783897217782/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783897217782/?ar">https://go.oreilly.com/library-access/library/view/-/9783897217782/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security engineering : a guide to building dependable distributed systems ent://SD_ILS/0/SD_ILS:2289990 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Anderson, Ross, 1956-<br/><a href="https://learning.oreilly.com/library/view/~/9780470068526">https://learning.oreilly.com/library/view/~/9780470068526</a> <a href="https://learning.oreilly.com/library/view/~/9780470068526/?ar">https://learning.oreilly.com/library/view/~/9780470068526/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470068526/?ar">https://go.oreilly.com/library-access/library/view/-/9780470068526/?ar</a><br/>Format:&#160;Electronic Resources<br/> An introduction to information security and ISO27001 : a pocket guide ent://SD_ILS/0/SD_ILS:2288932 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Watkins, Steve, 1970-<br/><a href="https://learning.oreilly.com/library/view/~/9781905356683">https://learning.oreilly.com/library/view/~/9781905356683</a> <a href="https://learning.oreilly.com/library/view/~/9781905356683/?ar">https://learning.oreilly.com/library/view/~/9781905356683/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781905356683/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356683/?ar</a><br/>Format:&#160;Electronic Resources<br/> The web application hacker's handbook : discovering and exploiting security flaws ent://SD_ILS/0/SD_ILS:2288534 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Stuttard, Dafydd, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470170779/?ar">https://learning.oreilly.com/library/view/~/9780470170779/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar">https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470170779">https://learning.oreilly.com/library/view/~/9780470170779</a><br/>Format:&#160;Electronic Resources<br/> Security and Usability : Designing Secure Systems that People Can Use. ent://SD_ILS/0/SD_ILS:2288610 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Cranor, Lorrie Faith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008279/?ar">https://go.oreilly.com/library-access/library/view/-/0596008279/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008279/?ar">https://learning.oreilly.com/library/view/~/0596008279/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008279">https://learning.oreilly.com/library/view/~/0596008279</a><br/>Format:&#160;Electronic Resources<br/> Hacking : the art of exploitation ent://SD_ILS/0/SD_ILS:2287983 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Erickson, Jon, 1977-<br/><a href="https://learning.oreilly.com/library/view/~/9781593271442">https://learning.oreilly.com/library/view/~/9781593271442</a> <a href="https://learning.oreilly.com/library/view/~/9781593271442/?ar">https://learning.oreilly.com/library/view/~/9781593271442/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar</a><br/>Format:&#160;Electronic Resources<br/> The craft of system security ent://SD_ILS/0/SD_ILS:2284058 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Smith, Sean W., 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780321434838">https://learning.oreilly.com/library/view/~/9780321434838</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321434838/?ar">https://go.oreilly.com/library-access/library/view/-/9780321434838/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321434838/?ar">https://learning.oreilly.com/library/view/~/9780321434838/?ar</a><br/>Format:&#160;Electronic Resources<br/> Creating the secure managed desktop : using group policy, SoftGrid, Microsoft deployment toolkit, and other management tools ent://SD_ILS/0/SD_ILS:2288756 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470277645/?ar">https://learning.oreilly.com/library/view/~/9780470277645/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470277645/?ar">https://go.oreilly.com/library-access/library/view/-/9780470277645/?ar</a><br/>Format:&#160;Electronic Resources<br/> SOA security ent://SD_ILS/0/SD_ILS:2284936 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Kanneganti, Ramarao.<br/><a href="https://learning.oreilly.com/library/view/~/9781932394689">https://learning.oreilly.com/library/view/~/9781932394689</a> <a href="https://learning.oreilly.com/library/view/~/9781932394689/?ar">https://learning.oreilly.com/library/view/~/9781932394689/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar">https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar</a><br/>Format:&#160;Electronic Resources<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:2284222 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Harris, Shon.<br/><a href="https://learning.oreilly.com/library/view/~/9780071495684/?ar">https://learning.oreilly.com/library/view/~/9780071495684/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar">https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar</a><br/>Format:&#160;Electronic Resources<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:2284509 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Long, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491761/?ar">https://learning.oreilly.com/library/view/~/9781597491761/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar</a><br/>Format:&#160;Electronic Resources<br/> Is it safe? : protecting your computer, your business, and yourself online ent://SD_ILS/0/SD_ILS:2285554 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Miller, Michael, 1958-<br/><a href="https://learning.oreilly.com/library/view/~/9780768683080/?ar">https://learning.oreilly.com/library/view/~/9780768683080/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar">https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768683080">https://learning.oreilly.com/library/view/~/9780768683080</a><br/>Format:&#160;Electronic Resources<br/> The new school of information security ent://SD_ILS/0/SD_ILS:2285032 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Shostack, Adam.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321562753/?ar">https://go.oreilly.com/library-access/library/view/-/9780321562753/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321562753/?ar">https://learning.oreilly.com/library/view/~/9780321562753/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321562753">https://learning.oreilly.com/library/view/~/9780321562753</a><br/>Format:&#160;Electronic Resources<br/> Crimeware : understanding new attacks and defenses ent://SD_ILS/0/SD_ILS:2285587 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Jakobsson, Markus.<br/><a href="https://learning.oreilly.com/library/view/~/9780321553744/?ar">https://learning.oreilly.com/library/view/~/9780321553744/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar">https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics for dummies ent://SD_ILS/0/SD_ILS:2285672 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Volonino, Linda.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470371916/?ar">https://learning.oreilly.com/library/view/~/9780470371916/?ar</a><br/>Format:&#160;Electronic Resources<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:2285226 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Clark, Champ, III.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492249">https://learning.oreilly.com/library/view/~/9781597492249</a> <a href="https://learning.oreilly.com/library/view/~/9781597492249/?ar">https://learning.oreilly.com/library/view/~/9781597492249/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics : investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:2285693 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Aquilina, James M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492683/?ar">https://learning.oreilly.com/library/view/~/9781597492683/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492683">https://learning.oreilly.com/library/view/~/9781597492683</a><br/>Format:&#160;Electronic Resources<br/> Windows Vista security for dummies ent://SD_ILS/0/SD_ILS:2284218 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Koerner, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9780470118054">https://learning.oreilly.com/library/view/~/9780470118054</a> <a href="https://learning.oreilly.com/library/view/~/9780470118054/?ar">https://learning.oreilly.com/library/view/~/9780470118054/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar">https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar</a><br/>Format:&#160;Electronic Resources<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:2285140 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Hay, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492409">https://learning.oreilly.com/library/view/~/9781597492409</a> <a href="https://learning.oreilly.com/library/view/~/9781597492409/?ar">https://learning.oreilly.com/library/view/~/9781597492409/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Windows server 2008 : prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:2285141 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z <a href="https://learning.oreilly.com/library/view/~/9781597492805">https://learning.oreilly.com/library/view/~/9781597492805</a> <a href="https://learning.oreilly.com/library/view/~/9781597492805/?ar">https://learning.oreilly.com/library/view/~/9781597492805/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar</a><br/>Format:&#160;Electronic Resources<br/> No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing ent://SD_ILS/0/SD_ILS:2285143 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Long, Johnny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492157/?ar">https://learning.oreilly.com/library/view/~/9781597492157/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Citrix XenApp Server in the enterprise ent://SD_ILS/0/SD_ILS:2285144 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Bin Azad, Tariq.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492812/?ar">https://learning.oreilly.com/library/view/~/9781597492812/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492812/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492812/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492812">https://learning.oreilly.com/library/view/~/9781597492812</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Windows server 2008 security resource kit ent://SD_ILS/0/SD_ILS:2284887 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Johansson, Jesper M.<br/><a href="https://learning.oreilly.com/library/view/~/9780735625044/?ar">https://learning.oreilly.com/library/view/~/9780735625044/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735625044">https://learning.oreilly.com/library/view/~/9780735625044</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735625044/?ar">https://go.oreilly.com/library-access/library/view/-/9780735625044/?ar</a><br/>Format:&#160;Electronic Resources<br/> A practical guide to trusted computing ent://SD_ILS/0/SD_ILS:2284460 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Challener, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780132398428">https://learning.oreilly.com/library/view/~/9780132398428</a> <a href="https://learning.oreilly.com/library/view/~/9780132398428/?ar">https://learning.oreilly.com/library/view/~/9780132398428/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780132398428/?ar">https://go.oreilly.com/library-access/library/view/-/9780132398428/?ar</a><br/>Format:&#160;Electronic Resources<br/> Software security engineering : a guide for project managers ent://SD_ILS/0/SD_ILS:2284470 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Allen, Julia H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar">https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321559685/?ar">https://learning.oreilly.com/library/view/~/9780321559685/?ar</a><br/>Format:&#160;Electronic Resources<br/> Check Point NGX R65 security administration ent://SD_ILS/0/SD_ILS:2284519 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Bonnell, Ralph.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492454/?ar">https://learning.oreilly.com/library/view/~/9781597492454/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492454/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492454/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492454">https://learning.oreilly.com/library/view/~/9781597492454</a><br/>Format:&#160;Electronic Resources<br/> Practical embedded security : building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:2284523 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Stapko, Timothy John.<br/><a href="https://learning.oreilly.com/library/view/~/9780750682152/?ar">https://learning.oreilly.com/library/view/~/9780750682152/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780750682152/?ar">https://go.oreilly.com/library-access/library/view/-/9780750682152/?ar</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and troubleshooting ent://SD_ILS/0/SD_ILS:2288763 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470275894/?ar">https://learning.oreilly.com/library/view/~/9780470275894/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar">https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ten rules of information security for the smaller business : a plain English guide ent://SD_ILS/0/SD_ILS:2289629 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781905356553/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356553/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781905356553/?ar">https://learning.oreilly.com/library/view/~/9781905356553/?ar</a><br/>Format:&#160;Electronic Resources<br/> Geekonomics : the real cost of insecure software ent://SD_ILS/0/SD_ILS:2284350 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Rice, David, 1971-<br/><a href="https://learning.oreilly.com/library/view/~/9780321477897/?ar">https://learning.oreilly.com/library/view/~/9780321477897/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321477897/?ar">https://go.oreilly.com/library-access/library/view/-/9780321477897/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering System Center Data Protection Manager 2007 ent://SD_ILS/0/SD_ILS:2284542 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Ganger, Devin L.<br/><a href="https://learning.oreilly.com/library/view/~/9780470181522/?ar">https://learning.oreilly.com/library/view/~/9780470181522/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar">https://go.oreilly.com/library-access/library/view/-/9780470181522/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470181522">https://learning.oreilly.com/library/view/~/9780470181522</a><br/>Format:&#160;Electronic Resources<br/> Mainframe basics for security professionals : getting started with RACF ent://SD_ILS/0/SD_ILS:2284327 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Pomerantz, Ori.<br/><a href="https://learning.oreilly.com/library/view/~/9780137137596/?ar">https://learning.oreilly.com/library/view/~/9780137137596/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137137596/?ar">https://go.oreilly.com/library-access/library/view/-/9780137137596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780137137596">https://learning.oreilly.com/library/view/~/9780137137596</a><br/>Format:&#160;Electronic Resources<br/> Ajax security ent://SD_ILS/0/SD_ILS:2284335 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Hoffman, Billy, 1980-<br/><a href="https://learning.oreilly.com/library/view/~/9780321491930">https://learning.oreilly.com/library/view/~/9780321491930</a> <a href="https://learning.oreilly.com/library/view/~/9780321491930/?ar">https://learning.oreilly.com/library/view/~/9780321491930/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321491930/?ar">https://go.oreilly.com/library-access/library/view/-/9780321491930/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing catastrophic loss of sensitive data ent://SD_ILS/0/SD_ILS:2284690 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Photopoulos, Constantine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492393/?ar">https://learning.oreilly.com/library/view/~/9781597492393/?ar</a><br/>Format:&#160;Electronic Resources<br/> Scene of the cybercrime. ent://SD_ILS/0/SD_ILS:2285149 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492768">https://learning.oreilly.com/library/view/~/9781597492768</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492768/?ar">https://learning.oreilly.com/library/view/~/9781597492768/?ar</a><br/>Format:&#160;Electronic Resources<br/> OS X exploits and defense ent://SD_ILS/0/SD_ILS:2285157 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Baccas, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492546/?ar">https://learning.oreilly.com/library/view/~/9781597492546/?ar</a><br/>Format:&#160;Electronic Resources<br/> Modern cryptanalysis : techniques for advanced code breaking ent://SD_ILS/0/SD_ILS:2284627 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Swenson, Christopher, 1983-<br/><a href="https://learning.oreilly.com/library/view/~/9780470135938">https://learning.oreilly.com/library/view/~/9780470135938</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar">https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470135938/?ar">https://learning.oreilly.com/library/view/~/9780470135938/?ar</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Mac OS X Leopard security ent://SD_ILS/0/SD_ILS:2284628 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Edge, Charles S., Jr.<br/><a href="https://learning.oreilly.com/library/view/~/9781590599891/?ar">https://learning.oreilly.com/library/view/~/9781590599891/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar">https://go.oreilly.com/library-access/library/view/-/9781590599891/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781590599891">https://learning.oreilly.com/library/view/~/9781590599891</a><br/>Format:&#160;Electronic Resources<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:2284517 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Varsalone, Jesse.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492447">https://learning.oreilly.com/library/view/~/9781597492447</a> <a href="https://learning.oreilly.com/library/view/~/9781597492447/?ar">https://learning.oreilly.com/library/view/~/9781597492447/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deployment guide series. IBM Tivoli Identity Manager 5.0 ent://SD_ILS/0/SD_ILS:2285844 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;B&uuml;cker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738432067/?ar">https://go.oreilly.com/library-access/library/view/-/0738432067/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738432067/?ar">https://learning.oreilly.com/library/view/~/0738432067/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:2286245 2024-06-18T16:10:16Z 2024-06-18T16:10:16Z by&#160;Qian, Yi, 1962-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar">https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123735669/?ar">https://learning.oreilly.com/library/view/~/9780123735669/?ar</a><br/>Format:&#160;Electronic Resources<br/>