Search Results for - Narrowed by: Computer security. - 2015 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092015$0025092015$0026ps$003d300? 2024-05-25T12:26:58Z Essential cybersecurity science : build, test, and evaluate secure systems ent://SD_ILS/0/SD_ILS:2309193 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format:&#160;Electronic Resources<br/> Designing and building a security operations center ent://SD_ILS/0/SD_ILS:2097657 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Nathans, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1834659">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity dilemmas : technology, policy, and incentives : summary of discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forum ent://SD_ILS/0/SD_ILS:2027622 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;National Academy of Sciences (U.S.)<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Cybersecurity-Dilemmas.pdf">An electronic book accessible through the World Wide Web; click for information</a> <a href="http://www.nap.edu/catalog.php?record_id=21833">http://www.nap.edu/catalog.php?record_id=21833</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux ent://SD_ILS/0/SD_ILS:1386806 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Ramachandran, Vivek, author.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2005211">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:2059082 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Moskowitz, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4040685">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital privacy in the marketplace : perspectives on the information exchange ent://SD_ILS/0/SD_ILS:2056185 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1920895">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network Attacks and Exploitation : A Framework. ent://SD_ILS/0/SD_ILS:1338187 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Monte, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4040351">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Defender&rsquo;s Dilemma : Charting a Course Toward Cybersecurity. ent://SD_ILS/0/SD_ILS:1285509 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Libicki, Martin C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2075897">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Mobile Application Hacker's Handbook. ent://SD_ILS/0/SD_ILS:1280057 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Chell, Dominic.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1895167">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Applications of secure multiparty computation ent://SD_ILS/0/SD_ILS:2213541 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5161932">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:2208334 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Knapp, Eric D., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1887712">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Application security in the ISO 27001:2013 environment ent://SD_ILS/0/SD_ILS:2209611 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Vasudevan, Vinod, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4395800">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre I, Mythes et r&eacute;alit&eacute;s de la cybers&eacute;curit&eacute; des syst&egrave;mes num&eacute;riques industriels : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123689 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709836">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des Installations Industrielles : Chapitre XII Panorama de l'offre Technologique Pour la Cybers&eacute;curit&eacute; Industrielle ent://SD_ILS/0/SD_ILS:2123695 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709845">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des Installations Industrielles. Chapter V, Des bus de terrain a l'Industrial Ethernet ent://SD_ILS/0/SD_ILS:2123677 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709821">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Learning OpenCV 3 computer vision with Python : unleash the power of computer vision with Python using OpenCV ent://SD_ILS/0/SD_ILS:2238643 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Minichino, Joe, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191267">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set ent://SD_ILS/0/SD_ILS:2238641 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Marak, Victor, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191257">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building Python real-time applications with Storm : learn to process massive real-time data streams using Storm and Python-- no Java required ent://SD_ILS/0/SD_ILS:2227651 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Bhatnagar, Kartik, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191295">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Python for secret agents. Volume II : gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents ent://SD_ILS/0/SD_ILS:2227652 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Lott, Steven F., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191298">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web security : a whitehat perspective ent://SD_ILS/0/SD_ILS:2270388 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Wu, Hanqing, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1566016">Click to View</a><br/>Format:&#160;Electronic Resources<br/> OpenCV with Python blueprints : design and develop advanced computer vision projects using OpenCV with Python ent://SD_ILS/0/SD_ILS:2271358 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Beyeler, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191141">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing NetScaler VPX : implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms ent://SD_ILS/0/SD_ILS:2271361 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Sandbu, Marius, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191154">Click to View</a><br/>Format:&#160;Electronic Resources<br/> OpenCV with Python by example : build real-world computer vision applications and develop cool demos using OpenCV for Python ent://SD_ILS/0/SD_ILS:2271390 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Joshi, Prateek, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191268">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Python GUI programming cookbook : over 80 object-oriented recipes to help you create mind-blowing GUIs in Python ent://SD_ILS/0/SD_ILS:2271393 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Meier, Burkhard A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191299">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering Python forensics : master the art of digital forensics and analysis with Python ent://SD_ILS/0/SD_ILS:2219461 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Spreitzenbarth, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191124">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering Python data visualization : generate effective results in a variety of visually appealing charts using the plotting packages in Python ent://SD_ILS/0/SD_ILS:2219462 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Raman, Kirthi, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191125">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbix ent://SD_ILS/0/SD_ILS:1386703 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Vacche, Andrea Dalle, author.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1973849">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The science and technology of counterterrorism : measuring physical and electronic security risk ent://SD_ILS/0/SD_ILS:2207234 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1641934">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CSA guide to cloud computing : implementing cloud privacy and security ent://SD_ILS/0/SD_ILS:2208123 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Samani, Raj, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1793946">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:2208145 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1798312">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web application security is a stack : how to CYA (Cover Your Apps) completely ent://SD_ILS/0/SD_ILS:2208971 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192126">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Smart grid security : innovative solutions for a modernized grid ent://SD_ILS/0/SD_ILS:2098138 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Skopik, Florian, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2146995">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Using security patterns in web-application ent://SD_ILS/0/SD_ILS:2144812 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Alam, Shahnawaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5291824">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre II, Typologie des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123683 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709828">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des Installations Industrielles ent://SD_ILS/0/SD_ILS:2123700 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709851">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing social media in the enterprise ent://SD_ILS/0/SD_ILS:2098131 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2146009">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Infosec management fundamentals ent://SD_ILS/0/SD_ILS:2098129 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2146007">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Bent functions : results and applications to cryptography ent://SD_ILS/0/SD_ILS:2098152 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192079">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security analytics : finding security insights, patterns and anomalies in big data ent://SD_ILS/0/SD_ILS:2097682 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Mark, Talabis, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1873129">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the V3rb0ten network ent://SD_ILS/0/SD_ILS:2098103 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2098440">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapter VI, Analyse des risques : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123688 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709834">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Black hat Python : Python programming for hackers and pentesters ent://SD_ILS/0/SD_ILS:2056210 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Seitz, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1931622">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre X, S&eacute;curit&eacute; des R&eacute;seaux Industriels &eacute;tendus : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123679 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709824">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre XIV, R&eacute;glementation de la Cybers&eacute;curit&eacute; et R&eacute;gime Juridique des Syst&egrave;mes Num&eacute;riques Industriels : une &eacute;tude des Dispositions R&eacute;glementaires en Cybers&eacute;curit&eacute; en France et Aux &Eacute;tats-Unis : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123680 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709825">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre II, Typologie des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123684 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709829">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapter IV, Malveillance num&eacute;rique sur les syst&egrave;mes industriels : histoire de la menace, &eacute;v&eacute;nements embl&eacute;matiques, tendances et perspectives : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123685 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709831">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123668 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709810">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre XIII, &Eacute;tat des Lieux des R&eacute;f&eacute;rentiels en S&eacute;curit&eacute; des Syst&egrave;mes Num&eacute;riques Industriels : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123669 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709811">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123670 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709812">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Online Safety. ent://SD_ILS/0/SD_ILS:1280501 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Healey, Justin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1899260">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Intelligence : A Practitioner's Guide to Solving Enterprise Security Challenges. ent://SD_ILS/0/SD_ILS:1280051 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Li, Qing.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1895130">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data protection and the cloud : are the risks too great? ent://SD_ILS/0/SD_ILS:2155320 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192125">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Measuring and managing information risk : a FAIR approach ent://SD_ILS/0/SD_ILS:2304245 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Freund, Jack, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar">https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124202313/?ar">https://learning.oreilly.com/library/view/~/9780124202313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124202313">https://learning.oreilly.com/library/view/~/9780124202313</a><br/>Format:&#160;Electronic Resources<br/> Microsoft security fundamentals LiveLessons ent://SD_ILS/0/SD_ILS:2305725 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Lieberman, Ed, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780133949445/?ar">https://learning.oreilly.com/videos/~/9780133949445/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar">https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent threat hacking : the art and science of hacking any organization ent://SD_ILS/0/SD_ILS:2306515 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Wrightson, Tyler, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071828369">https://learning.oreilly.com/library/view/~/9780071828369</a> <a href="https://learning.oreilly.com/library/view/~/9780071828369/?ar">https://learning.oreilly.com/library/view/~/9780071828369/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071828369/?ar">https://go.oreilly.com/library-access/library/view/-/9780071828369/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise software security : a confluence of disciplines ent://SD_ILS/0/SD_ILS:2305297 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Van Wyk, Kenneth R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780321604378/?ar">https://learning.oreilly.com/library/view/~/9780321604378/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321604378">https://learning.oreilly.com/library/view/~/9780321604378</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar">https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar</a><br/>Format:&#160;Electronic Resources<br/> Bulletproof Android : practical advice for building secure apps ent://SD_ILS/0/SD_ILS:2305298 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Nolan, Godfrey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780133995121/?ar">https://learning.oreilly.com/library/view/~/9780133995121/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133995121">https://learning.oreilly.com/library/view/~/9780133995121</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133995121/?ar">https://go.oreilly.com/library-access/library/view/-/9780133995121/?ar</a><br/>Format:&#160;Electronic Resources<br/> Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:2305941 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Knapp, Eric D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124201149/?ar">https://learning.oreilly.com/library/view/~/9780124201149/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124201149/?ar">https://go.oreilly.com/library-access/library/view/-/9780124201149/?ar</a><br/>Format:&#160;Electronic Resources<br/> A practical guide to computer forensics investigations ent://SD_ILS/0/SD_ILS:2305632 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Hayes, Darren R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780132756174/?ar">https://learning.oreilly.com/library/view/~/9780132756174/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar">https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to attack and defend your website ent://SD_ILS/0/SD_ILS:2305934 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128027325/?ar">https://learning.oreilly.com/library/view/~/9780128027325/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128027325">https://learning.oreilly.com/library/view/~/9780128027325</a><br/>Format:&#160;Electronic Resources<br/> Web application security is a stack : how to CYA (cover your apps) completely ent://SD_ILS/0/SD_ILS:2308845 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;MacVittie, Lori A., 1969- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287050/?ar">https://learning.oreilly.com/library/view/~/9781849287050/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar</a><br/>Format:&#160;Electronic Resources<br/> Once more unto the breach : managing information security in an uncertain world ent://SD_ILS/0/SD_ILS:2308846 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Simmons, Andrea C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849287098/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287098/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849287098/?ar">https://learning.oreilly.com/library/view/~/9781849287098/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data protection and the cloud : are the risks too great? ent://SD_ILS/0/SD_ILS:2308847 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Ticher, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287135/?ar">https://learning.oreilly.com/library/view/~/9781849287135/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security : a practical guide : bridging the gap between IT and management ent://SD_ILS/0/SD_ILS:2308852 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Mooney, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849287418/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287418/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849287418/?ar">https://learning.oreilly.com/library/view/~/9781849287418/?ar</a><br/>Format:&#160;Electronic Resources<br/> Reduce risk and improve security on IBM mainframes. Volume 2, Mainframe communication and networking security ent://SD_ILS/0/SD_ILS:2308622 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;B&uuml;cker, Axel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738440941/?ar">https://learning.oreilly.com/library/view/~/9780738440941/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738440941/?ar">https://go.oreilly.com/library-access/library/view/-/9780738440941/?ar</a><br/>Format:&#160;Electronic Resources<br/> The security consultant's handbook ent://SD_ILS/0/SD_ILS:2309072 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Bingley, Richard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287500">https://learning.oreilly.com/library/view/~/9781849287500</a> <a href="https://learning.oreilly.com/library/view/~/9781849287500/?ar">https://learning.oreilly.com/library/view/~/9781849287500/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar</a><br/>Format:&#160;Electronic Resources<br/> Application security in the ISO 27001:2013 environment ent://SD_ILS/0/SD_ILS:2309073 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Vasudevan, Vinod, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287692/?ar">https://learning.oreilly.com/library/view/~/9781849287692/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar</a><br/>Format:&#160;Electronic Resources<br/> The future of cyber security and security innovation. ent://SD_ILS/0/SD_ILS:2308889 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Suits and spooks conference (2015 : New York, N.Y.)<br/><a href="https://learning.oreilly.com/videos/~/9781491937198/?ar">https://learning.oreilly.com/videos/~/9781491937198/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Java web applications with Spring Security : from JDBC and LDAP authentication to UI and method level security ent://SD_ILS/0/SD_ILS:2309363 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Bowersox, Kevin, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781771375306/?ar">https://learning.oreilly.com/videos/~/9781771375306/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781771375306/?ar">https://go.oreilly.com/library-access/library/view/-/9781771375306/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to build an anomaly detection engine with Spark, Akka and Cassandra ent://SD_ILS/0/SD_ILS:2310372 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Busa, Natalino, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491955253/?ar">https://go.oreilly.com/library-access/library/view/-/9781491955253/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491955253/?ar">https://learning.oreilly.com/videos/~/9781491955253/?ar</a><br/>Format:&#160;Electronic Resources<br/> Healthcare information security and privacy ent://SD_ILS/0/SD_ILS:2306509 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Murphy, Sean P. (Sean Patrick), 1968- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071831796/?ar">https://go.oreilly.com/library-access/library/view/-/9780071831796/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071831796">https://learning.oreilly.com/library/view/~/9780071831796</a> <a href="https://learning.oreilly.com/library/view/~/9780071831796/?ar">https://learning.oreilly.com/library/view/~/9780071831796/?ar</a><br/>Format:&#160;Electronic Resources<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:2306510 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Regalado, Daniel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071832380/?ar">https://learning.oreilly.com/library/view/~/9780071832380/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar">https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar</a><br/>Format:&#160;Electronic Resources<br/> The antivirus hacker's handbook ent://SD_ILS/0/SD_ILS:2308160 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Koret, Joxean, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119028758/?ar">https://learning.oreilly.com/library/view/~/9781119028758/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119028758/?ar">https://go.oreilly.com/library-access/library/view/-/9781119028758/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set ent://SD_ILS/0/SD_ILS:2308438 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Marak, Victor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785281518">https://learning.oreilly.com/library/view/~/9781785281518</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar">https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785281518/?ar">https://learning.oreilly.com/library/view/~/9781785281518/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise cybersecurity : how to build a successful cyberdefense program against advanced threats ent://SD_ILS/0/SD_ILS:2307313 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Donaldson, Scott E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430260837/?ar">https://go.oreilly.com/library-access/library/view/-/9781430260837/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430260837/?ar">https://learning.oreilly.com/library/view/~/9781430260837/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430260837">https://learning.oreilly.com/library/view/~/9781430260837</a><br/>Format:&#160;Electronic Resources<br/> Reduce risk and improve security on IBM mainframes. Volume 3, Mainframe subsystem and application security ent://SD_ILS/0/SD_ILS:2308971 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;B&uuml;cker, Axel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738441023/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441023/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738441023/?ar">https://learning.oreilly.com/library/view/~/9780738441023/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information assurance handbook : effective computer security and risk management strategies ent://SD_ILS/0/SD_ILS:2304875 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Schou, Corey.<br/><a href="https://learning.oreilly.com/library/view/~/9780071821650">https://learning.oreilly.com/library/view/~/9780071821650</a> <a href="https://learning.oreilly.com/library/view/~/9780071821650/?ar">https://learning.oreilly.com/library/view/~/9780071821650/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar">https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar</a><br/>Format:&#160;Electronic Resources<br/> Designing and building a security operations center ent://SD_ILS/0/SD_ILS:2305305 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Nathans, David, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008997/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008997/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128008997/?ar">https://learning.oreilly.com/library/view/~/9780128008997/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128008997">https://learning.oreilly.com/library/view/~/9780128008997</a><br/>Format:&#160;Electronic Resources<br/> Introduction to information security : LiveLessons (Sneak Peek Video Training) ent://SD_ILS/0/SD_ILS:2306346 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Aurnou, Scott, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar">https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780134135823/?ar">https://learning.oreilly.com/videos/~/9780134135823/?ar</a><br/>Format:&#160;Electronic Resources<br/> Fluent conference 2015 : complete video compilation ent://SD_ILS/0/SD_ILS:2307530 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Fluent. San Francisco, April 20-25<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491927786/?ar">https://go.oreilly.com/library-access/library/view/-/9781491927786/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491927786/?ar">https://learning.oreilly.com/videos/~/9781491927786/?ar</a><br/>Format:&#160;Electronic Resources<br/> A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of security ent://SD_ILS/0/SD_ILS:2306964 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Arthur, Will, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265849/?ar">https://learning.oreilly.com/library/view/~/9781430265849/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering the Nmap scripting engine : master the Nmap scripting engine and the art of developing NSE scripts ent://SD_ILS/0/SD_ILS:2306630 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Pale, Paulino Calderon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782168317/?ar">https://learning.oreilly.com/library/view/~/9781782168317/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782168317/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168317/?ar</a><br/>Format:&#160;Electronic Resources<br/> Crafting the InfoSec playbook ent://SD_ILS/0/SD_ILS:2307392 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Bollinger, Jeff, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar">https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491913598">https://learning.oreilly.com/library/view/~/9781491913598</a> <a href="https://learning.oreilly.com/library/view/~/9781491913598/?ar">https://learning.oreilly.com/library/view/~/9781491913598/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Windows networks : from system security basics to monitoring and auditing ent://SD_ILS/0/SD_ILS:2308561 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Long, Mark, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar">https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771374903/?ar">https://learning.oreilly.com/videos/~/9781771374903/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network attacks and exploitation : a framework ent://SD_ILS/0/SD_ILS:2307717 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Monte, Matthew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118987124">https://learning.oreilly.com/library/view/~/9781118987124</a> <a href="https://learning.oreilly.com/library/view/~/9781118987124/?ar">https://learning.oreilly.com/library/view/~/9781118987124/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118987124/?ar">https://go.oreilly.com/library-access/library/view/-/9781118987124/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced malware analysis ent://SD_ILS/0/SD_ILS:2308865 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Elisan, Christopher C., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071819756">https://learning.oreilly.com/library/view/~/9780071819756</a> <a href="https://learning.oreilly.com/library/view/~/9780071819756/?ar">https://learning.oreilly.com/library/view/~/9780071819756/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar">https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mehr Hacking mit Python : eigene Tools entwickeln f&uuml;r Hacker and Pentester ent://SD_ILS/0/SD_ILS:2308777 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Seitz, Justin, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457196140">https://learning.oreilly.com/library/view/~/9781457196140</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457196140/?ar">https://go.oreilly.com/library-access/library/view/-/9781457196140/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457196140/?ar">https://learning.oreilly.com/library/view/~/9781457196140/?ar</a><br/>Format:&#160;Electronic Resources<br/> Risk centric threat modeling : process for attack simulation and threat analysis ent://SD_ILS/0/SD_ILS:2308792 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Uceda V&eacute;lez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web security : a whitehat perspective ent://SD_ILS/0/SD_ILS:2306712 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Wu, Hanqing, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592612/?ar">https://learning.oreilly.com/library/view/~/9781466592612/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466592612/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592612/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secrets and lies : digital security in a networked world ent://SD_ILS/0/SD_ILS:2308753 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119092438">https://learning.oreilly.com/library/view/~/9781119092438</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar">https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119092438/?ar">https://learning.oreilly.com/library/view/~/9781119092438/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security for web developers : using JavaScript, HTML, and CSS ent://SD_ILS/0/SD_ILS:2309022 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Mueller, John, 1958- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491928684/?ar">https://go.oreilly.com/library-access/library/view/-/9781491928684/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491928684/?ar">https://learning.oreilly.com/library/view/~/9781491928684/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491928684">https://learning.oreilly.com/library/view/~/9781491928684</a><br/>Format:&#160;Electronic Resources<br/> Control engineering and information systems : proceedings of the 2014 International Conference on Control Engineering and Information System (ICCEIS2014), Yueyang, Hunan, China, 20-22 June 2014 ent://SD_ILS/0/SD_ILS:2305607 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;International Conference on Control Engineering and Information Systems (2014 : Yueyang, Hunan Sheng, China), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781138026858/?ar">https://learning.oreilly.com/library/view/~/9781138026858/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781138026858">https://learning.oreilly.com/library/view/~/9781138026858</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781138026858/?ar">https://go.oreilly.com/library-access/library/view/-/9781138026858/?ar</a><br/>Format:&#160;Electronic Resources<br/> Infosec management fundamentals ent://SD_ILS/0/SD_ILS:2308039 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar">https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128041871/?ar">https://learning.oreilly.com/library/view/~/9780128041871/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128041871">https://learning.oreilly.com/library/view/~/9780128041871</a><br/>Format:&#160;Electronic Resources<br/> Securing social media in the enterprise ent://SD_ILS/0/SD_ILS:2308041 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Dalziel, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128041963">https://learning.oreilly.com/library/view/~/9780128041963</a> <a href="https://learning.oreilly.com/library/view/~/9780128041963/?ar">https://learning.oreilly.com/library/view/~/9780128041963/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128041963/?ar">https://go.oreilly.com/library-access/library/view/-/9780128041963/?ar</a><br/>Format:&#160;Electronic Resources<br/> Smart grid security : innovative solutions for a modernized grid ent://SD_ILS/0/SD_ILS:2308049 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Skopik, Florian, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023549">https://learning.oreilly.com/library/view/~/9780128023549</a> <a href="https://learning.oreilly.com/library/view/~/9780128023549/?ar">https://learning.oreilly.com/library/view/~/9780128023549/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128023549/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023549/?ar</a><br/>Format:&#160;Electronic Resources<br/> Abusing the Internet of things : blackouts, freakouts, and stakeouts ent://SD_ILS/0/SD_ILS:2308052 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Dhanjani, Nitesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491902899">https://learning.oreilly.com/library/view/~/9781491902899</a> <a href="https://learning.oreilly.com/library/view/~/9781491902899/?ar">https://learning.oreilly.com/library/view/~/9781491902899/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491902899/?ar">https://go.oreilly.com/library-access/library/view/-/9781491902899/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with cybersecurity science ent://SD_ILS/0/SD_ILS:2308150 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Dykstra, Josiah, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491936528/?ar">https://go.oreilly.com/library-access/library/view/-/9781491936528/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491936528/?ar">https://learning.oreilly.com/videos/~/9781491936528/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Architecture of Privacy : On Engineering Technologies that Can Deliver Trustworthy Safeguards ent://SD_ILS/0/SD_ILS:2308207 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Bowman, Courtney, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491904503/?ar">https://learning.oreilly.com/library/view/~/9781491904503/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491904503/?ar">https://go.oreilly.com/library-access/library/view/-/9781491904503/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491904503">https://learning.oreilly.com/library/view/~/9781491904503</a><br/>Format:&#160;Electronic Resources<br/> CSA guide to cloud computing : implementing cloud privacy and security ent://SD_ILS/0/SD_ILS:2304776 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Samani, Raj, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar">https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124201255/?ar">https://learning.oreilly.com/library/view/~/9780124201255/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124201255">https://learning.oreilly.com/library/view/~/9780124201255</a><br/>Format:&#160;Electronic Resources<br/> Information security analytics : finding security insights, patterns, and anomalies in big data ent://SD_ILS/0/SD_ILS:2305164 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Talabis, Mark Ryan M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128002070/?ar">https://go.oreilly.com/library-access/library/view/-/9780128002070/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128002070/?ar">https://learning.oreilly.com/library/view/~/9780128002070/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security in computing ent://SD_ILS/0/SD_ILS:2305897 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Pfleeger, Charles P., 1948- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134085074/?ar">https://learning.oreilly.com/library/view/~/9780134085074/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar">https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning Puppet Security : secure your IT environments with the powerful secuity tools of Puppet ent://SD_ILS/0/SD_ILS:2306948 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Slagle, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784397753/?ar">https://go.oreilly.com/library-access/library/view/-/9781784397753/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784397753">https://learning.oreilly.com/library/view/~/9781784397753</a> <a href="https://learning.oreilly.com/library/view/~/9781784397753/?ar">https://learning.oreilly.com/library/view/~/9781784397753/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with Windows Server Security : develop and implement a secure Microsoft infrastructure platform using native and built-in tools ent://SD_ILS/0/SD_ILS:2306681 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Sivarajan, Santhosh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784398729/?ar">https://learning.oreilly.com/library/view/~/9781784398729/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781784398729/?ar">https://go.oreilly.com/library-access/library/view/-/9781784398729/?ar</a><br/>Format:&#160;Electronic Resources<br/> Beyond cybersecurity : protecting your digital business ent://SD_ILS/0/SD_ILS:2306934 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Kaplan, James M., 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119026846">https://learning.oreilly.com/library/view/~/9781119026846</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar">https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119026846/?ar">https://learning.oreilly.com/library/view/~/9781119026846/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security : overview and best practices ent://SD_ILS/0/SD_ILS:2315521 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Bond, James (Cloud chief technologist)<br/><a href="https://learning.oreilly.com/library/view/~/9781492033790">https://learning.oreilly.com/library/view/~/9781492033790</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492033790/?ar">https://go.oreilly.com/library-access/library/view/-/9781492033790/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492033790/?ar">https://learning.oreilly.com/library/view/~/9781492033790/?ar</a><br/>Format:&#160;Electronic Resources<br/> Agile security : an introduction for developers ent://SD_ILS/0/SD_ILS:2316380 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Brunton-Spall, Michael, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492037699/?ar">https://learning.oreilly.com/videos/~/9781492037699/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492037699/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037699/?ar</a><br/>Format:&#160;Electronic Resources<br/> Anomaly detection for monitoring : a statistical approach to time series anomaly detection ent://SD_ILS/0/SD_ILS:2316907 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Jinka, Preetam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492042341">https://learning.oreilly.com/library/view/~/9781492042341</a> <a href="https://learning.oreilly.com/library/view/~/9781492042341/?ar">https://learning.oreilly.com/library/view/~/9781492042341/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:2304682 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Hexmoor, Henry, 1960- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128008911/?ar">https://learning.oreilly.com/library/view/~/9780128008911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128008911">https://learning.oreilly.com/library/view/~/9780128008911</a><br/>Format:&#160;Electronic Resources<br/> ASP.NET web API security essentials : take the security of your ASP.NET web API to the next level using some of the most amazing security techniques around ent://SD_ILS/0/SD_ILS:2309298 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Gunasundaram, Rajesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785882210/?ar">https://learning.oreilly.com/library/view/~/9781785882210/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785882210">https://learning.oreilly.com/library/view/~/9781785882210</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785882210/?ar">https://go.oreilly.com/library-access/library/view/-/9781785882210/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building Python Real-Time Applications with Storm. ent://SD_ILS/0/SD_ILS:2309194 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Kartik Bhatnagar; Barry Hart.<br/><a href="https://learning.oreilly.com/library/view/~/9781784392857/?ar">https://learning.oreilly.com/library/view/~/9781784392857/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781784392857/?ar">https://go.oreilly.com/library-access/library/view/-/9781784392857/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784392857">https://learning.oreilly.com/library/view/~/9781784392857</a><br/>Format:&#160;Electronic Resources<br/> RESILIA&quot;!Pocketbook : Cyber Resilience Best Practice. ent://SD_ILS/0/SD_ILS:2309576 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;AXELOS, AXELOS.<br/><a href="https://learning.oreilly.com/library/view/~/9780113314751">https://learning.oreilly.com/library/view/~/9780113314751</a> <a href="https://learning.oreilly.com/library/view/~/9780113314751/?ar">https://learning.oreilly.com/library/view/~/9780113314751/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780113314751/?ar">https://go.oreilly.com/library-access/library/view/-/9780113314751/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Python forensics : master the art of digital forensics and analysis with Python ent://SD_ILS/0/SD_ILS:2309227 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Spreitzenbarth, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783988044/?ar">https://learning.oreilly.com/library/view/~/9781783988044/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar">https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783988044">https://learning.oreilly.com/library/view/~/9781783988044</a><br/>Format:&#160;Electronic Resources<br/> Implementing NetScaler VPX : implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms ent://SD_ILS/0/SD_ILS:2309832 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Sandbu, Marius, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785288982">https://learning.oreilly.com/library/view/~/9781785288982</a> <a href="https://learning.oreilly.com/library/view/~/9781785288982/?ar">https://learning.oreilly.com/library/view/~/9781785288982/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785288982/?ar">https://go.oreilly.com/library-access/library/view/-/9781785288982/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber operations : building, defending, and attacking modern computer networks ent://SD_ILS/0/SD_ILS:2308678 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;O'Leary, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484204573">https://learning.oreilly.com/library/view/~/9781484204573</a> <a href="https://learning.oreilly.com/library/view/~/9781484204573/?ar">https://learning.oreilly.com/library/view/~/9781484204573/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar">https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar</a><br/>Format:&#160;Electronic Resources<br/> The security data lake : leveraging big data technologies to build a common data repository for security ent://SD_ILS/0/SD_ILS:2318350 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Marty, Raffael, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491927748/?ar">https://learning.oreilly.com/library/view/~/9781491927748/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar">https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar</a><br/>Format:&#160;Electronic Resources<br/> Opportunities and challenges in the IoT : a conversation with Tim O'Reilly and Cory Doctorow ent://SD_ILS/0/SD_ILS:2318384 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;O'Reilly, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492048220/?ar">https://learning.oreilly.com/library/view/~/9781492048220/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492048220">https://learning.oreilly.com/library/view/~/9781492048220</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar">https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering XenApp : master the skills required to implement Citrix XenApp 7.6 to deploy a complete Citrix-hosted application from scratch ent://SD_ILS/0/SD_ILS:2352866 2024-05-25T12:26:58Z 2024-05-25T12:26:58Z by&#160;Jha, Sunny, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191098">Click to View</a><br/>Format:&#160;Electronic Resources<br/>