Search Results for - Narrowed by: Computer security. - 2012SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026ps$003d300?2024-05-29T17:06:39ZThe tangled Web: a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:2563412024-05-29T17:06:39Z2024-05-29T17:06:39Zby Zalewski, Michal.<br/>Format: Books<br/>Safeguarding Critical E-Documents : Implementing a Program for Securing Confidential Information Assets.ent://SD_ILS/0/SD_ILS:12366012024-05-29T17:06:39Z2024-05-29T17:06:39Zby Smallwood, Robert F.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=821999">Click to View</a><br/>Format: Electronic Resources<br/>IT Governance : An International Guide to Data Security and ISO27001/ISO27002.ent://SD_ILS/0/SD_ILS:12381642024-05-29T17:06:39Z2024-05-29T17:06:39Zby Calder, Alan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=838114">Click to View</a><br/>Format: Electronic Resources<br/>Hands-On Ethical Hacking and Network Defense.ent://SD_ILS/0/SD_ILS:13052332024-05-29T17:06:39Z2024-05-29T17:06:39Zby Simpson, Michael T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136562">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security standards, practices and industrial applications systems and methodologiesent://SD_ILS/0/SD_ILS:4763482024-05-29T17:06:39Z2024-05-29T17:06:39Zby Zubairi, Junaid Ahmed, 1961-<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpCSSPIAS1/viewerType:toc/</a><br/>Format: Electronic Resources<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:21265082024-05-29T17:06:39Z2024-05-29T17:06:39Zby Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826949">Click to View</a><br/>Format: Electronic Resources<br/>Getting Started with Citrix XenApp 6.5.ent://SD_ILS/0/SD_ILS:12472752024-05-29T17:06:39Z2024-05-29T17:06:39Zby Musumeci, Guillermo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=995550">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Forefront Identity Manager 2010 R2 Handbook.ent://SD_ILS/0/SD_ILS:12478162024-05-29T17:06:39Z2024-05-29T17:06:39Zby Nordström, Kent.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1019543">Click to View</a><br/>Format: Electronic Resources<br/>Hacking Web Apps : Detecting and Preventing Web Application Security Problems.ent://SD_ILS/0/SD_ILS:12476652024-05-29T17:06:39Z2024-05-29T17:06:39Zby Shema, Mike.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1012529">Click to View</a><br/>Format: Electronic Resources<br/>Oracle 11g Anti-hacker's Cookbook.ent://SD_ILS/0/SD_ILS:12508622024-05-29T17:06:39Z2024-05-29T17:06:39Zby Neagu, Adrian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1057945">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft SQL Server 2012 Security Cookbook.ent://SD_ILS/0/SD_ILS:12486532024-05-29T17:06:39Z2024-05-29T17:06:39Zby Bruchez, Rudi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1036251">Click to View</a><br/>Format: Electronic Resources<br/>Securing WebLogic Server 12c.ent://SD_ILS/0/SD_ILS:12521652024-05-29T17:06:39Z2024-05-29T17:06:39Zby Masini, Luca.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085228">Click to View</a><br/>Format: Electronic Resources<br/>Nmap 6 : Network exploration and security auditing Cookbook.ent://SD_ILS/0/SD_ILS:12521672024-05-29T17:06:39Z2024-05-29T17:06:39Zby Pale, Paulino Calderon.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085230">Click to View</a><br/>Format: Electronic Resources<br/>Hacking For Dummies.ent://SD_ILS/0/SD_ILS:12526562024-05-29T17:06:39Z2024-05-29T17:06:39Zby Beaver, Kevin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106542">Click to View</a><br/>Format: Electronic Resources<br/>Proceedings of the 11th European Conference on Information warfare and security : ECIW 2012.ent://SD_ILS/0/SD_ILS:12701312024-05-29T17:06:39Z2024-05-29T17:06:39Zby Filiol, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1667290">Click to View</a><br/>Format: Electronic Resources<br/>IBM i Security Administration and Compliance.ent://SD_ILS/0/SD_ILS:12427142024-05-29T17:06:39Z2024-05-29T17:06:39Zby Woodbury, Carol.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=906259">Click to View</a><br/>Format: Electronic Resources<br/>Spring Security 3.1.ent://SD_ILS/0/SD_ILS:12528402024-05-29T17:06:39Z2024-05-29T17:06:39Zby Winch, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1108351">Click to View</a><br/>Format: Electronic Resources<br/>Practical Malware Analysis : A Hands-On Guide to Dissecting Malicious Software.ent://SD_ILS/0/SD_ILS:12555862024-05-29T17:06:39Z2024-05-29T17:06:39Zby Sikorski, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137570">Click to View</a><br/>Format: Electronic Resources<br/>Group Policy : Fundamentals, Security, and the Managed Desktop.ent://SD_ILS/0/SD_ILS:12525962024-05-29T17:06:39Z2024-05-29T17:06:39Zby Moskowitz, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1104500">Click to View</a><br/>Format: Electronic Resources<br/>Embedded systems security practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:22056592024-05-29T17:06:39Z2024-05-29T17:06:39Zby Kleidermacher, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=886256">Click to View</a><br/>Format: Electronic Resources<br/>Securing SQL servers protecting your database from attackersent://SD_ILS/0/SD_ILS:22058462024-05-29T17:06:39Z2024-05-29T17:06:39Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=980013">Click to View</a><br/>Format: Electronic Resources<br/>Low tech hacking street smarts for security professionalsent://SD_ILS/0/SD_ILS:22055522024-05-29T17:06:39Z2024-05-29T17:06:39Zby Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=829964">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:22055812024-05-29T17:06:39Z2024-05-29T17:06:39Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=850700">Click to View</a><br/>Format: Electronic Resources<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:22056922024-05-29T17:06:39Z2024-05-29T17:06:39Zby Mao, Wenji.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=892251">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:21264952024-05-29T17:06:39Z2024-05-29T17:06:39Zby Macaulay, Tyson.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826923">Click to View</a><br/>Format: Electronic Resources<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:21317362024-05-29T17:06:39Z2024-05-29T17:06:39Zby Mjølsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1648315">Click to View</a><br/>Format: Electronic Resources<br/>Secure and resilient software : requirements, test cases, and testing methodsent://SD_ILS/0/SD_ILS:20775142024-05-29T17:06:39Z2024-05-29T17:06:39Zby Merkow, Mark S., author.<br/><a href="https://www.taylorfrancis.com/books/9781439866221">Click here to view.</a><br/>Format: Books<br/>Hacking and securing iOS applicationsent://SD_ILS/0/SD_ILS:22934642024-05-29T17:06:39Z2024-05-29T17:06:39Zby Zdziarski, Jonathan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781449325213/?ar">https://learning.oreilly.com/library/view/~/9781449325213/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781449325213/?ar">https://go.oreilly.com/library-access/library/view/-/9781449325213/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449325213">https://learning.oreilly.com/library/view/~/9781449325213</a><br/>Format: Electronic Resources<br/>Analyzing computer security : a threat/vulnerability/countermeasure approachent://SD_ILS/0/SD_ILS:22918062024-05-29T17:06:39Z2024-05-29T17:06:39Zby Pfleeger, Charles P., 1948-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar">https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132789493/?ar">https://learning.oreilly.com/library/view/~/9780132789493/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems digital forensics field guidesent://SD_ILS/0/SD_ILS:22057382024-05-29T17:06:39Z2024-05-29T17:06:39Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=921016">Click to View</a><br/>Format: Electronic Resources<br/>The tangled Web : a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:22939492024-05-29T17:06:39Z2024-05-29T17:06:39Zby Zalewski, Michal.<br/><a href="https://learning.oreilly.com/library/view/~/9781593273880">https://learning.oreilly.com/library/view/~/9781593273880</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273880/?ar">https://learning.oreilly.com/library/view/~/9781593273880/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar</a><br/>Format: Electronic Resources<br/>RC4 stream cipher and its variantsent://SD_ILS/0/SD_ILS:22931732024-05-29T17:06:39Z2024-05-29T17:06:39Zby Paul, Goutam.<br/><a href="https://learning.oreilly.com/library/view/~/9781439831373">https://learning.oreilly.com/library/view/~/9781439831373</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar">https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439831373/?ar">https://learning.oreilly.com/library/view/~/9781439831373/?ar</a><br/>Format: Electronic Resources<br/>Oracle 11g Anti-hacker's Cookbook.ent://SD_ILS/0/SD_ILS:22965542024-05-29T17:06:39Z2024-05-29T17:06:39Zby Neagu, Adrian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849685269/?ar">https://go.oreilly.com/library-access/library/view/-/9781849685269/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849685269/?ar">https://learning.oreilly.com/library/view/~/9781849685269/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849685269">https://learning.oreilly.com/library/view/~/9781849685269</a><br/>Format: Electronic Resources<br/>Clickjacking und UI-Redressing - Vom Klick-Betrug zum Datenklau : Ein Leitfaden für Sicherheitsexperten und Webentwickler.ent://SD_ILS/0/SD_ILS:22965552024-05-29T17:06:39Z2024-05-29T17:06:39Zby Niemietz, Marcus.<br/><a href="https://learning.oreilly.com/library/view/~/9781457171116/?ar">https://learning.oreilly.com/library/view/~/9781457171116/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457171116/?ar">https://go.oreilly.com/library-access/library/view/-/9781457171116/?ar</a><br/>Format: Electronic Resources<br/>Hacking exposed 7 : network security secrets & solutionsent://SD_ILS/0/SD_ILS:22965282024-05-29T17:06:39Z2024-05-29T17:06:39Zby McClure, Stuart.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar">https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071780285/?ar">https://learning.oreilly.com/library/view/~/9780071780285/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkitent://SD_ILS/0/SD_ILS:22958232024-05-29T17:06:39Z2024-05-29T17:06:39Zby Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format: Electronic Resources<br/>Security and privacy for Microsoft Office 2010 users.ent://SD_ILS/0/SD_ILS:22942102024-05-29T17:06:39Z2024-05-29T17:06:39Zby Tulloch, Mitch.<br/><a href="https://learning.oreilly.com/library/view/~/9780735668829">https://learning.oreilly.com/library/view/~/9780735668829</a>
<a href="https://learning.oreilly.com/library/view/~/9780735668829/?ar">https://learning.oreilly.com/library/view/~/9780735668829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar">https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar</a><br/>Format: Electronic Resources<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:22946552024-05-29T17:06:39Z2024-05-29T17:06:39Zby Easttom, Chuck.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar">https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132828284/?ar">https://learning.oreilly.com/library/view/~/9780132828284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132828284">https://learning.oreilly.com/library/view/~/9780132828284</a><br/>Format: Electronic Resources<br/>Healthcare fraud : auditing and detection guideent://SD_ILS/0/SD_ILS:22941322024-05-29T17:06:39Z2024-05-29T17:06:39Zby Busch, Rebecca S.<br/><a href="https://learning.oreilly.com/library/view/~/9781118240250/?ar">https://learning.oreilly.com/library/view/~/9781118240250/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118240250/?ar">https://go.oreilly.com/library-access/library/view/-/9781118240250/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118240250">https://learning.oreilly.com/library/view/~/9781118240250</a><br/>Format: Electronic Resources<br/>Computer-Forensik Hacksent://SD_ILS/0/SD_ILS:22962292024-05-29T17:06:39Z2024-05-29T17:06:39Zby Kuhlee, Lorenz.<br/><a href="https://learning.oreilly.com/library/view/~/9783868997637">https://learning.oreilly.com/library/view/~/9783868997637</a>
<a href="https://learning.oreilly.com/library/view/~/9783868997637/?ar">https://learning.oreilly.com/library/view/~/9783868997637/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783868997637/?ar">https://go.oreilly.com/library-access/library/view/-/9783868997637/?ar</a><br/>Format: Electronic Resources<br/>125 sposobów na bezpieczeństwo siecient://SD_ILS/0/SD_ILS:22994392024-05-29T17:06:39Z2024-05-29T17:06:39Zby Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176357/?ar">https://learning.oreilly.com/library/view/~/9781457176357/?ar</a><br/>Format: Electronic Resources<br/>The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)ent://SD_ILS/0/SD_ILS:22941702024-05-29T17:06:39Z2024-05-29T17:06:39Zby Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format: Electronic Resources<br/>Cloud computing : moving IT out of the officeent://SD_ILS/0/SD_ILS:22940262024-05-29T17:06:39Z2024-05-29T17:06:39Zby BCS, The Chartered Institute for IT.<br/><a href="https://learning.oreilly.com/library/view/~/9781780171302">https://learning.oreilly.com/library/view/~/9781780171302</a>
<a href="https://learning.oreilly.com/library/view/~/9781780171302/?ar">https://learning.oreilly.com/library/view/~/9781780171302/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780171302/?ar">https://go.oreilly.com/library-access/library/view/-/9781780171302/?ar</a><br/>Format: Electronic Resources<br/>Practical malware analysis : the hands-on guide to dissecting malicious softwareent://SD_ILS/0/SD_ILS:22951522024-05-29T17:06:39Z2024-05-29T17:06:39Zby Sikorski, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272906/?ar">https://learning.oreilly.com/library/view/~/9781593272906/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272906">https://learning.oreilly.com/library/view/~/9781593272906</a><br/>Format: Electronic Resources<br/>Low tech hacking : street smarts for security professionalsent://SD_ILS/0/SD_ILS:22932292024-05-29T17:06:39Z2024-05-29T17:06:39Zby Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496650">https://learning.oreilly.com/library/view/~/9781597496650</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496650/?ar">https://learning.oreilly.com/library/view/~/9781597496650/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar</a><br/>Format: Electronic Resources<br/>IT-Sicherheit & Datenschutz.ent://SD_ILS/0/SD_ILS:22952782024-05-29T17:06:39Z2024-05-29T17:06:39Zby Fröschle, Hans-Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457170416/?ar">https://go.oreilly.com/library-access/library/view/-/9781457170416/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457170416/?ar">https://learning.oreilly.com/library/view/~/9781457170416/?ar</a><br/>Format: Electronic Resources<br/>Learning Whitehat hacking and penetration testingent://SD_ILS/0/SD_ILS:22978662024-05-29T17:06:39Z2024-05-29T17:06:39Zby Messier, Ric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771370349/?ar">https://learning.oreilly.com/videos/~/9781771370349/?ar</a><br/>Format: Electronic Resources<br/>Embedded systems security : practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:22949272024-05-29T17:06:39Z2024-05-29T17:06:39Zby Kleidermacher, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780123868862">https://learning.oreilly.com/library/view/~/9780123868862</a>
<a href="https://learning.oreilly.com/library/view/~/9780123868862/?ar">https://learning.oreilly.com/library/view/~/9780123868862/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780123868862/?ar">https://go.oreilly.com/library-access/library/view/-/9780123868862/?ar</a><br/>Format: Electronic Resources<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:22969362024-05-29T17:06:39Z2024-05-29T17:06:39Zby Mao, Wenji.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123972002/?ar">https://go.oreilly.com/library-access/library/view/-/9780123972002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123972002/?ar">https://learning.oreilly.com/library/view/~/9780123972002/?ar</a><br/>Format: Electronic Resources<br/>Manually removing viruses and malware from Windows 7ent://SD_ILS/0/SD_ILS:22967582024-05-29T17:06:39Z2024-05-29T17:06:39Zby Halsey, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar">https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781449338053/?ar">https://learning.oreilly.com/videos/~/9781449338053/?ar</a><br/>Format: Electronic Resources<br/>Endpoint security and compliance management design guide : using IBM Tivoli Endpoint Managerent://SD_ILS/0/SD_ILS:22975122024-05-29T17:06:39Z2024-05-29T17:06:39Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738436984">https://learning.oreilly.com/library/view/~/0738436984</a>
<a href="https://learning.oreilly.com/library/view/~/0738436984/?ar">https://learning.oreilly.com/library/view/~/0738436984/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738436984/?ar">https://go.oreilly.com/library-access/library/view/-/0738436984/?ar</a><br/>Format: Electronic Resources<br/>Predicting malicious behavior : tools and techniques for ensuring global securityent://SD_ILS/0/SD_ILS:22958452024-05-29T17:06:39Z2024-05-29T17:06:39Zby Jackson, Gary M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118239568/?ar">https://go.oreilly.com/library-access/library/view/-/9781118239568/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118239568/?ar">https://learning.oreilly.com/library/view/~/9781118239568/?ar</a><br/>Format: Electronic Resources<br/>The computer incident response planning handbook : executable plans for protecting information at riskent://SD_ILS/0/SD_ILS:22963252024-05-29T17:06:39Z2024-05-29T17:06:39Zby McCarthy, N. K.<br/><a href="https://learning.oreilly.com/library/view/~/9780071790390/?ar">https://learning.oreilly.com/library/view/~/9780071790390/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071790390/?ar">https://go.oreilly.com/library-access/library/view/-/9780071790390/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071790390">https://learning.oreilly.com/library/view/~/9780071790390</a><br/>Format: Electronic Resources<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:22953692024-05-29T17:06:39Z2024-05-29T17:06:39Zby Clarke, Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499637/?ar">https://learning.oreilly.com/library/view/~/9781597499637/?ar</a><br/>Format: Electronic Resources<br/>Łamanie i zabezpieczanie aplikacji w systemie iOSent://SD_ILS/0/SD_ILS:22979862024-05-29T17:06:39Z2024-05-29T17:06:39Zby Zdziarski, Jonathan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781457177057/?ar">https://learning.oreilly.com/library/view/~/9781457177057/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457177057/?ar">https://go.oreilly.com/library-access/library/view/-/9781457177057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457177057">https://learning.oreilly.com/library/view/~/9781457177057</a><br/>Format: Electronic Resources<br/>The CERT Oracle Secure Coding Standard for Javaent://SD_ILS/0/SD_ILS:22933942024-05-29T17:06:39Z2024-05-29T17:06:39Zby Long, Fred, 1947-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132882842/?ar">https://go.oreilly.com/library-access/library/view/-/9780132882842/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132882842/?ar">https://learning.oreilly.com/library/view/~/9780132882842/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132882842">https://learning.oreilly.com/library/view/~/9780132882842</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems : digital forensics field guidesent://SD_ILS/0/SD_ILS:22946822024-05-29T17:06:39Z2024-05-29T17:06:39Zby Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format: Electronic Resources<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:22959512024-05-29T17:06:39Z2024-05-29T17:06:39Zby ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format: Electronic Resources<br/>Hacking web apps : detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:22959122024-05-29T17:06:39Z2024-05-29T17:06:39Zby Shema, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499514/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499514/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499514/?ar">https://learning.oreilly.com/library/view/~/9781597499514/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499514">https://learning.oreilly.com/library/view/~/9781597499514</a><br/>Format: Electronic Resources<br/>Handbook on securing cyber-physical critical infrastructure : foundation and challengesent://SD_ILS/0/SD_ILS:22956612024-05-29T17:06:39Z2024-05-29T17:06:39Zby Das, Sajal K.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124158153/?ar">https://go.oreilly.com/library-access/library/view/-/9780124158153/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124158153/?ar">https://learning.oreilly.com/library/view/~/9780124158153/?ar</a><br/>Format: Electronic Resources<br/>An introduction to hacking and crimeware : a pocket guideent://SD_ILS/0/SD_ILS:22946062024-05-29T17:06:39Z2024-05-29T17:06:39Zby Loewengart, Victoria, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283304">https://learning.oreilly.com/library/view/~/9781849283304</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283304/?ar">https://learning.oreilly.com/library/view/~/9781849283304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283304/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283304/?ar</a><br/>Format: Electronic Resources<br/>Information security risk assessment toolkit : practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:22985192024-05-29T17:06:39Z2024-05-29T17:06:39Zby Talabis, Mark Ryan M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497350/?ar">https://learning.oreilly.com/library/view/~/9781597497350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597497350/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497350/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497350">https://learning.oreilly.com/library/view/~/9781597497350</a><br/>Format: Electronic Resources<br/>Penetration testing mit Metasploit : Eine praktische Einführungent://SD_ILS/0/SD_ILS:22979132024-05-29T17:06:39Z2024-05-29T17:06:39Zby Neugebauer, Frank.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457174933/?ar">https://go.oreilly.com/library-access/library/view/-/9781457174933/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457174933/?ar">https://learning.oreilly.com/library/view/~/9781457174933/?ar</a><br/>Format: Electronic Resources<br/>Mastering Windows network forensics and investigationent://SD_ILS/0/SD_ILS:22991762024-05-29T17:06:39Z2024-05-29T17:06:39Zby Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781118236086/?ar">https://learning.oreilly.com/library/view/~/9781118236086/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar">https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar</a><br/>Format: Electronic Resources<br/>Security for Wireless Sensor Networks using Identity-Based Cryptographyent://SD_ILS/0/SD_ILS:23272862024-05-29T17:06:39Z2024-05-29T17:06:39Zby Patil, Harsh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439869024">https://learning.oreilly.com/library/view/~/9781439869024</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar">https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439869024/?ar">https://learning.oreilly.com/library/view/~/9781439869024/?ar</a><br/>Format: Electronic Resources<br/>Podstawy ochrony komputerówent://SD_ILS/0/SD_ILS:22995462024-05-29T17:06:39Z2024-05-29T17:06:39Zby Lehtinen, Rick.<br/><a href="https://learning.oreilly.com/library/view/~/9781457172618">https://learning.oreilly.com/library/view/~/9781457172618</a>
<a href="https://learning.oreilly.com/library/view/~/9781457172618/?ar">https://learning.oreilly.com/library/view/~/9781457172618/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457172618/?ar">https://go.oreilly.com/library-access/library/view/-/9781457172618/?ar</a><br/>Format: Electronic Resources<br/>IBM business process manager security : concepts and guidanceent://SD_ILS/0/SD_ILS:23075462024-05-29T17:06:39Z2024-05-29T17:06:39Zby Wood, J. Keith, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738437263/?ar">https://go.oreilly.com/library-access/library/view/-/0738437263/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738437263">https://learning.oreilly.com/library/view/~/0738437263</a>
<a href="https://learning.oreilly.com/library/view/~/0738437263/?ar">https://learning.oreilly.com/library/view/~/0738437263/?ar</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography with Open-Source Software.ent://SD_ILS/0/SD_ILS:23070162024-05-29T17:06:39Z2024-05-29T17:06:39Zby McAndrew, Alasdair.<br/><a href="https://learning.oreilly.com/library/view/~/9781439825716">https://learning.oreilly.com/library/view/~/9781439825716</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar">https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439825716/?ar">https://learning.oreilly.com/library/view/~/9781439825716/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics explainedent://SD_ILS/0/SD_ILS:23180232024-05-29T17:06:39Z2024-05-29T17:06:39Zby Gogolin, Greg, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439874950/?ar">https://learning.oreilly.com/library/view/~/9781439874950/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439874950/?ar">https://go.oreilly.com/library-access/library/view/-/9781439874950/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439874950">https://learning.oreilly.com/library/view/~/9781439874950</a><br/>Format: Electronic Resources<br/>IOS an quan fang hu = Hacking and securing iOS applicationsent://SD_ILS/0/SD_ILS:23318112024-05-29T17:06:39Z2024-05-29T17:06:39Zby Zdziarski, Jonathan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789862766484">https://learning.oreilly.com/library/view/~/9789862766484</a>
<a href="https://learning.oreilly.com/library/view/~/9789862766484/?ar">https://learning.oreilly.com/library/view/~/9789862766484/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9789862766484/?ar">https://go.oreilly.com/library-access/library/view/-/9789862766484/?ar</a><br/>Format: Electronic Resources<br/>