Search Results for - Narrowed by: Computer security. - 2012 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026ps$003d300? 2024-05-29T17:06:39Z The tangled Web: a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:256341 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Zalewski, Michal.<br/>Format:&#160;Books<br/> Safeguarding Critical E-Documents : Implementing a Program for Securing Confidential Information Assets. ent://SD_ILS/0/SD_ILS:1236601 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Smallwood, Robert F.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=821999">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT Governance : An International Guide to Data Security and ISO27001/ISO27002. ent://SD_ILS/0/SD_ILS:1238164 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Calder, Alan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=838114">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands-On Ethical Hacking and Network Defense. ent://SD_ILS/0/SD_ILS:1305233 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Simpson, Michael T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136562">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber security standards, practices and industrial applications systems and methodologies ent://SD_ILS/0/SD_ILS:476348 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Zubairi, Junaid Ahmed, 1961-<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/</a><br/>Format:&#160;Electronic Resources<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:2126508 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826949">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with Citrix XenApp 6.5. ent://SD_ILS/0/SD_ILS:1247275 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Musumeci, Guillermo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=995550">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Forefront Identity Manager 2010 R2 Handbook. ent://SD_ILS/0/SD_ILS:1247816 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Nordstr&ouml;m, Kent.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1019543">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking Web Apps : Detecting and Preventing Web Application Security Problems. ent://SD_ILS/0/SD_ILS:1247665 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Shema, Mike.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Oracle 11g Anti-hacker's Cookbook. ent://SD_ILS/0/SD_ILS:1250862 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Neagu, Adrian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1057945">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft SQL Server 2012 Security Cookbook. ent://SD_ILS/0/SD_ILS:1248653 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Bruchez, Rudi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1036251">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing WebLogic Server 12c. ent://SD_ILS/0/SD_ILS:1252165 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Masini, Luca.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085228">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Nmap 6 : Network exploration and security auditing Cookbook. ent://SD_ILS/0/SD_ILS:1252167 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Pale, Paulino Calderon.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085230">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking For Dummies. ent://SD_ILS/0/SD_ILS:1252656 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Beaver, Kevin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 11th European Conference on Information warfare and security : ECIW 2012. ent://SD_ILS/0/SD_ILS:1270131 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Filiol, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1667290">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM i Security Administration and Compliance. ent://SD_ILS/0/SD_ILS:1242714 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Woodbury, Carol.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=906259">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Spring Security 3.1. ent://SD_ILS/0/SD_ILS:1252840 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Winch, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1108351">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical Malware Analysis : A Hands-On Guide to Dissecting Malicious Software. ent://SD_ILS/0/SD_ILS:1255586 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Sikorski, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137570">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Group Policy : Fundamentals, Security, and the Managed Desktop. ent://SD_ILS/0/SD_ILS:1252596 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Moskowitz, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1104500">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Embedded systems security practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:2205659 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Kleidermacher, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=886256">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL servers protecting your database from attackers ent://SD_ILS/0/SD_ILS:2205846 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=980013">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:2205552 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=829964">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:2205581 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=850700">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:2205692 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Mao, Wenji.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=892251">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SIS ent://SD_ILS/0/SD_ILS:2126495 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Macaulay, Tyson.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826923">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:2131736 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Mj&oslash;lsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1648315">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure and resilient software : requirements, test cases, and testing methods ent://SD_ILS/0/SD_ILS:2077514 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Merkow, Mark S., author.<br/><a href="https://www.taylorfrancis.com/books/9781439866221">Click here to view.</a><br/>Format:&#160;Books<br/> Hacking and securing iOS applications ent://SD_ILS/0/SD_ILS:2293464 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Zdziarski, Jonathan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781449325213/?ar">https://learning.oreilly.com/library/view/~/9781449325213/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781449325213/?ar">https://go.oreilly.com/library-access/library/view/-/9781449325213/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781449325213">https://learning.oreilly.com/library/view/~/9781449325213</a><br/>Format:&#160;Electronic Resources<br/> Analyzing computer security : a threat/vulnerability/countermeasure approach ent://SD_ILS/0/SD_ILS:2291806 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Pfleeger, Charles P., 1948-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar">https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132789493/?ar">https://learning.oreilly.com/library/view/~/9780132789493/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems digital forensics field guides ent://SD_ILS/0/SD_ILS:2205738 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=921016">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The tangled Web : a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:2293949 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Zalewski, Michal.<br/><a href="https://learning.oreilly.com/library/view/~/9781593273880">https://learning.oreilly.com/library/view/~/9781593273880</a> <a href="https://learning.oreilly.com/library/view/~/9781593273880/?ar">https://learning.oreilly.com/library/view/~/9781593273880/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar</a><br/>Format:&#160;Electronic Resources<br/> RC4 stream cipher and its variants ent://SD_ILS/0/SD_ILS:2293173 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Paul, Goutam.<br/><a href="https://learning.oreilly.com/library/view/~/9781439831373">https://learning.oreilly.com/library/view/~/9781439831373</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar">https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439831373/?ar">https://learning.oreilly.com/library/view/~/9781439831373/?ar</a><br/>Format:&#160;Electronic Resources<br/> Oracle 11g Anti-hacker's Cookbook. ent://SD_ILS/0/SD_ILS:2296554 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Neagu, Adrian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849685269/?ar">https://go.oreilly.com/library-access/library/view/-/9781849685269/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849685269/?ar">https://learning.oreilly.com/library/view/~/9781849685269/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849685269">https://learning.oreilly.com/library/view/~/9781849685269</a><br/>Format:&#160;Electronic Resources<br/> Clickjacking und UI-Redressing - Vom Klick-Betrug zum Datenklau : Ein Leitfaden f&uuml;r Sicherheitsexperten und Webentwickler. ent://SD_ILS/0/SD_ILS:2296555 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Niemietz, Marcus.<br/><a href="https://learning.oreilly.com/library/view/~/9781457171116/?ar">https://learning.oreilly.com/library/view/~/9781457171116/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457171116/?ar">https://go.oreilly.com/library-access/library/view/-/9781457171116/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2296528 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;McClure, Stuart.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar">https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071780285/?ar">https://learning.oreilly.com/library/view/~/9780071780285/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit ent://SD_ILS/0/SD_ILS:2295823 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy for Microsoft Office 2010 users. ent://SD_ILS/0/SD_ILS:2294210 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Tulloch, Mitch.<br/><a href="https://learning.oreilly.com/library/view/~/9780735668829">https://learning.oreilly.com/library/view/~/9780735668829</a> <a href="https://learning.oreilly.com/library/view/~/9780735668829/?ar">https://learning.oreilly.com/library/view/~/9780735668829/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar">https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:2294655 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Easttom, Chuck.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar">https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132828284/?ar">https://learning.oreilly.com/library/view/~/9780132828284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132828284">https://learning.oreilly.com/library/view/~/9780132828284</a><br/>Format:&#160;Electronic Resources<br/> Healthcare fraud : auditing and detection guide ent://SD_ILS/0/SD_ILS:2294132 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Busch, Rebecca S.<br/><a href="https://learning.oreilly.com/library/view/~/9781118240250/?ar">https://learning.oreilly.com/library/view/~/9781118240250/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118240250/?ar">https://go.oreilly.com/library-access/library/view/-/9781118240250/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118240250">https://learning.oreilly.com/library/view/~/9781118240250</a><br/>Format:&#160;Electronic Resources<br/> Computer-Forensik Hacks ent://SD_ILS/0/SD_ILS:2296229 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Kuhlee, Lorenz.<br/><a href="https://learning.oreilly.com/library/view/~/9783868997637">https://learning.oreilly.com/library/view/~/9783868997637</a> <a href="https://learning.oreilly.com/library/view/~/9783868997637/?ar">https://learning.oreilly.com/library/view/~/9783868997637/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783868997637/?ar">https://go.oreilly.com/library-access/library/view/-/9783868997637/?ar</a><br/>Format:&#160;Electronic Resources<br/> 125 sposob&oacute;w na bezpieczeństwo sieci ent://SD_ILS/0/SD_ILS:2299439 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176357/?ar">https://learning.oreilly.com/library/view/~/9781457176357/?ar</a><br/>Format:&#160;Electronic Resources<br/> The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) ent://SD_ILS/0/SD_ILS:2294170 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format:&#160;Electronic Resources<br/> Cloud computing : moving IT out of the office ent://SD_ILS/0/SD_ILS:2294026 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;BCS, The Chartered Institute for IT.<br/><a href="https://learning.oreilly.com/library/view/~/9781780171302">https://learning.oreilly.com/library/view/~/9781780171302</a> <a href="https://learning.oreilly.com/library/view/~/9781780171302/?ar">https://learning.oreilly.com/library/view/~/9781780171302/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780171302/?ar">https://go.oreilly.com/library-access/library/view/-/9781780171302/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical malware analysis : the hands-on guide to dissecting malicious software ent://SD_ILS/0/SD_ILS:2295152 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Sikorski, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593272906/?ar">https://learning.oreilly.com/library/view/~/9781593272906/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593272906">https://learning.oreilly.com/library/view/~/9781593272906</a><br/>Format:&#160;Electronic Resources<br/> Low tech hacking : street smarts for security professionals ent://SD_ILS/0/SD_ILS:2293229 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496650">https://learning.oreilly.com/library/view/~/9781597496650</a> <a href="https://learning.oreilly.com/library/view/~/9781597496650/?ar">https://learning.oreilly.com/library/view/~/9781597496650/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheit &amp; Datenschutz. ent://SD_ILS/0/SD_ILS:2295278 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Fr&ouml;schle, Hans-Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457170416/?ar">https://go.oreilly.com/library-access/library/view/-/9781457170416/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457170416/?ar">https://learning.oreilly.com/library/view/~/9781457170416/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning Whitehat hacking and penetration testing ent://SD_ILS/0/SD_ILS:2297866 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Messier, Ric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771370349/?ar">https://learning.oreilly.com/videos/~/9781771370349/?ar</a><br/>Format:&#160;Electronic Resources<br/> Embedded systems security : practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:2294927 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Kleidermacher, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780123868862">https://learning.oreilly.com/library/view/~/9780123868862</a> <a href="https://learning.oreilly.com/library/view/~/9780123868862/?ar">https://learning.oreilly.com/library/view/~/9780123868862/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780123868862/?ar">https://go.oreilly.com/library-access/library/view/-/9780123868862/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:2296936 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Mao, Wenji.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123972002/?ar">https://go.oreilly.com/library-access/library/view/-/9780123972002/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123972002/?ar">https://learning.oreilly.com/library/view/~/9780123972002/?ar</a><br/>Format:&#160;Electronic Resources<br/> Manually removing viruses and malware from Windows 7 ent://SD_ILS/0/SD_ILS:2296758 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Halsey, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar">https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781449338053/?ar">https://learning.oreilly.com/videos/~/9781449338053/?ar</a><br/>Format:&#160;Electronic Resources<br/> Endpoint security and compliance management design guide : using IBM Tivoli Endpoint Manager ent://SD_ILS/0/SD_ILS:2297512 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;B&uuml;cker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738436984">https://learning.oreilly.com/library/view/~/0738436984</a> <a href="https://learning.oreilly.com/library/view/~/0738436984/?ar">https://learning.oreilly.com/library/view/~/0738436984/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738436984/?ar">https://go.oreilly.com/library-access/library/view/-/0738436984/?ar</a><br/>Format:&#160;Electronic Resources<br/> Predicting malicious behavior : tools and techniques for ensuring global security ent://SD_ILS/0/SD_ILS:2295845 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Jackson, Gary M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118239568/?ar">https://go.oreilly.com/library-access/library/view/-/9781118239568/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118239568/?ar">https://learning.oreilly.com/library/view/~/9781118239568/?ar</a><br/>Format:&#160;Electronic Resources<br/> The computer incident response planning handbook : executable plans for protecting information at risk ent://SD_ILS/0/SD_ILS:2296325 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;McCarthy, N. K.<br/><a href="https://learning.oreilly.com/library/view/~/9780071790390/?ar">https://learning.oreilly.com/library/view/~/9780071790390/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071790390/?ar">https://go.oreilly.com/library-access/library/view/-/9780071790390/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071790390">https://learning.oreilly.com/library/view/~/9780071790390</a><br/>Format:&#160;Electronic Resources<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:2295369 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Clarke, Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499637/?ar">https://learning.oreilly.com/library/view/~/9781597499637/?ar</a><br/>Format:&#160;Electronic Resources<br/> Łamanie i zabezpieczanie aplikacji w systemie iOS ent://SD_ILS/0/SD_ILS:2297986 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Zdziarski, Jonathan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781457177057/?ar">https://learning.oreilly.com/library/view/~/9781457177057/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457177057/?ar">https://go.oreilly.com/library-access/library/view/-/9781457177057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457177057">https://learning.oreilly.com/library/view/~/9781457177057</a><br/>Format:&#160;Electronic Resources<br/> The CERT Oracle Secure Coding Standard for Java ent://SD_ILS/0/SD_ILS:2293394 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Long, Fred, 1947-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132882842/?ar">https://go.oreilly.com/library-access/library/view/-/9780132882842/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132882842/?ar">https://learning.oreilly.com/library/view/~/9780132882842/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132882842">https://learning.oreilly.com/library/view/~/9780132882842</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems : digital forensics field guides ent://SD_ILS/0/SD_ILS:2294682 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:2295951 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a> <a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking web apps : detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:2295912 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Shema, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499514/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499514/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499514/?ar">https://learning.oreilly.com/library/view/~/9781597499514/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499514">https://learning.oreilly.com/library/view/~/9781597499514</a><br/>Format:&#160;Electronic Resources<br/> Handbook on securing cyber-physical critical infrastructure : foundation and challenges ent://SD_ILS/0/SD_ILS:2295661 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Das, Sajal K.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124158153/?ar">https://go.oreilly.com/library-access/library/view/-/9780124158153/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124158153/?ar">https://learning.oreilly.com/library/view/~/9780124158153/?ar</a><br/>Format:&#160;Electronic Resources<br/> An introduction to hacking and crimeware : a pocket guide ent://SD_ILS/0/SD_ILS:2294606 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Loewengart, Victoria, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283304">https://learning.oreilly.com/library/view/~/9781849283304</a> <a href="https://learning.oreilly.com/library/view/~/9781849283304/?ar">https://learning.oreilly.com/library/view/~/9781849283304/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283304/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283304/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security risk assessment toolkit : practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:2298519 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Talabis, Mark Ryan M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497350/?ar">https://learning.oreilly.com/library/view/~/9781597497350/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597497350/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497350/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497350">https://learning.oreilly.com/library/view/~/9781597497350</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing mit Metasploit : Eine praktische Einf&uuml;hrung ent://SD_ILS/0/SD_ILS:2297913 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Neugebauer, Frank.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457174933/?ar">https://go.oreilly.com/library-access/library/view/-/9781457174933/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457174933/?ar">https://learning.oreilly.com/library/view/~/9781457174933/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Windows network forensics and investigation ent://SD_ILS/0/SD_ILS:2299176 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781118236086/?ar">https://learning.oreilly.com/library/view/~/9781118236086/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar">https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security for Wireless Sensor Networks using Identity-Based Cryptography ent://SD_ILS/0/SD_ILS:2327286 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Patil, Harsh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439869024">https://learning.oreilly.com/library/view/~/9781439869024</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar">https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439869024/?ar">https://learning.oreilly.com/library/view/~/9781439869024/?ar</a><br/>Format:&#160;Electronic Resources<br/> Podstawy ochrony komputer&oacute;w ent://SD_ILS/0/SD_ILS:2299546 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Lehtinen, Rick.<br/><a href="https://learning.oreilly.com/library/view/~/9781457172618">https://learning.oreilly.com/library/view/~/9781457172618</a> <a href="https://learning.oreilly.com/library/view/~/9781457172618/?ar">https://learning.oreilly.com/library/view/~/9781457172618/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457172618/?ar">https://go.oreilly.com/library-access/library/view/-/9781457172618/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM business process manager security : concepts and guidance ent://SD_ILS/0/SD_ILS:2307546 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Wood, J. Keith, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738437263/?ar">https://go.oreilly.com/library-access/library/view/-/0738437263/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738437263">https://learning.oreilly.com/library/view/~/0738437263</a> <a href="https://learning.oreilly.com/library/view/~/0738437263/?ar">https://learning.oreilly.com/library/view/~/0738437263/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cryptography with Open-Source Software. ent://SD_ILS/0/SD_ILS:2307016 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;McAndrew, Alasdair.<br/><a href="https://learning.oreilly.com/library/view/~/9781439825716">https://learning.oreilly.com/library/view/~/9781439825716</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar">https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439825716/?ar">https://learning.oreilly.com/library/view/~/9781439825716/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics explained ent://SD_ILS/0/SD_ILS:2318023 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Gogolin, Greg, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439874950/?ar">https://learning.oreilly.com/library/view/~/9781439874950/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439874950/?ar">https://go.oreilly.com/library-access/library/view/-/9781439874950/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439874950">https://learning.oreilly.com/library/view/~/9781439874950</a><br/>Format:&#160;Electronic Resources<br/> IOS an quan fang hu = Hacking and securing iOS applications ent://SD_ILS/0/SD_ILS:2331811 2024-05-29T17:06:39Z 2024-05-29T17:06:39Z by&#160;Zdziarski, Jonathan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789862766484">https://learning.oreilly.com/library/view/~/9789862766484</a> <a href="https://learning.oreilly.com/library/view/~/9789862766484/?ar">https://learning.oreilly.com/library/view/~/9789862766484/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9789862766484/?ar">https://go.oreilly.com/library-access/library/view/-/9789862766484/?ar</a><br/>Format:&#160;Electronic Resources<br/>