Search Results for - Narrowed by: Computer security. - 2015SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092015$0025092015$0026ps$003d300?2024-05-25T12:26:58ZEssential cybersecurity science : build, test, and evaluate secure systemsent://SD_ILS/0/SD_ILS:23091932024-05-25T12:26:58Z2024-05-25T12:26:58Zby Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format: Electronic Resources<br/>Designing and building a security operations centerent://SD_ILS/0/SD_ILS:20976572024-05-25T12:26:58Z2024-05-25T12:26:58Zby Nathans, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1834659">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity dilemmas : technology, policy, and incentives : summary of discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forument://SD_ILS/0/SD_ILS:20276222024-05-25T12:26:58Z2024-05-25T12:26:58Zby National Academy of Sciences (U.S.)<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Cybersecurity-Dilemmas.pdf">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://www.nap.edu/catalog.php?record_id=21833">http://www.nap.edu/catalog.php?record_id=21833</a><br/>Format: Electronic Resources<br/>Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linuxent://SD_ILS/0/SD_ILS:13868062024-05-25T12:26:58Z2024-05-25T12:26:58Zby Ramachandran, Vivek, author.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2005211">Click to View</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:20590822024-05-25T12:26:58Z2024-05-25T12:26:58Zby Moskowitz, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4040685">Click to View</a><br/>Format: Electronic Resources<br/>Digital privacy in the marketplace : perspectives on the information exchangeent://SD_ILS/0/SD_ILS:20561852024-05-25T12:26:58Z2024-05-25T12:26:58Zby Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1920895">Click to View</a><br/>Format: Electronic Resources<br/>Network Attacks and Exploitation : A Framework.ent://SD_ILS/0/SD_ILS:13381872024-05-25T12:26:58Z2024-05-25T12:26:58Zby Monte, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4040351">Click to View</a><br/>Format: Electronic Resources<br/>The Defender’s Dilemma : Charting a Course Toward Cybersecurity.ent://SD_ILS/0/SD_ILS:12855092024-05-25T12:26:58Z2024-05-25T12:26:58Zby Libicki, Martin C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2075897">Click to View</a><br/>Format: Electronic Resources<br/>The Mobile Application Hacker's Handbook.ent://SD_ILS/0/SD_ILS:12800572024-05-25T12:26:58Z2024-05-25T12:26:58Zby Chell, Dominic.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1895167">Click to View</a><br/>Format: Electronic Resources<br/>Applications of secure multiparty computationent://SD_ILS/0/SD_ILS:22135412024-05-25T12:26:58Z2024-05-25T12:26:58Zby Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5161932">Click to View</a><br/>Format: Electronic Resources<br/>Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:22083342024-05-25T12:26:58Z2024-05-25T12:26:58Zby Knapp, Eric D., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1887712">Click to View</a><br/>Format: Electronic Resources<br/>Application security in the ISO 27001:2013 environmentent://SD_ILS/0/SD_ILS:22096112024-05-25T12:26:58Z2024-05-25T12:26:58Zby Vasudevan, Vinod, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4395800">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre I, Mythes et réalités de la cybersécurité des systèmes numériques industriels : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236892024-05-25T12:26:58Z2024-05-25T12:26:58Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709836">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des Installations Industrielles : Chapitre XII Panorama de l'offre Technologique Pour la Cybersécurité Industrielleent://SD_ILS/0/SD_ILS:21236952024-05-25T12:26:58Z2024-05-25T12:26:58Zby Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709845">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des Installations Industrielles. Chapter V, Des bus de terrain a l'Industrial Ethernetent://SD_ILS/0/SD_ILS:21236772024-05-25T12:26:58Z2024-05-25T12:26:58Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709821">Click to View</a><br/>Format: Electronic Resources<br/>Learning OpenCV 3 computer vision with Python : unleash the power of computer vision with Python using OpenCVent://SD_ILS/0/SD_ILS:22386432024-05-25T12:26:58Z2024-05-25T12:26:58Zby Minichino, Joe, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191267">Click to View</a><br/>Format: Electronic Resources<br/>Windows malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setent://SD_ILS/0/SD_ILS:22386412024-05-25T12:26:58Z2024-05-25T12:26:58Zby Marak, Victor, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191257">Click to View</a><br/>Format: Electronic Resources<br/>Building Python real-time applications with Storm : learn to process massive real-time data streams using Storm and Python-- no Java requiredent://SD_ILS/0/SD_ILS:22276512024-05-25T12:26:58Z2024-05-25T12:26:58Zby Bhatnagar, Kartik, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191295">Click to View</a><br/>Format: Electronic Resources<br/>Python for secret agents. Volume II : gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agentsent://SD_ILS/0/SD_ILS:22276522024-05-25T12:26:58Z2024-05-25T12:26:58Zby Lott, Steven F., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191298">Click to View</a><br/>Format: Electronic Resources<br/>Web security : a whitehat perspectiveent://SD_ILS/0/SD_ILS:22703882024-05-25T12:26:58Z2024-05-25T12:26:58Zby Wu, Hanqing, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1566016">Click to View</a><br/>Format: Electronic Resources<br/>OpenCV with Python blueprints : design and develop advanced computer vision projects using OpenCV with Pythonent://SD_ILS/0/SD_ILS:22713582024-05-25T12:26:58Z2024-05-25T12:26:58Zby Beyeler, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191141">Click to View</a><br/>Format: Electronic Resources<br/>Implementing NetScaler VPX : implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platformsent://SD_ILS/0/SD_ILS:22713612024-05-25T12:26:58Z2024-05-25T12:26:58Zby Sandbu, Marius, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191154">Click to View</a><br/>Format: Electronic Resources<br/>OpenCV with Python by example : build real-world computer vision applications and develop cool demos using OpenCV for Pythonent://SD_ILS/0/SD_ILS:22713902024-05-25T12:26:58Z2024-05-25T12:26:58Zby Joshi, Prateek, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191268">Click to View</a><br/>Format: Electronic Resources<br/>Python GUI programming cookbook : over 80 object-oriented recipes to help you create mind-blowing GUIs in Pythonent://SD_ILS/0/SD_ILS:22713932024-05-25T12:26:58Z2024-05-25T12:26:58Zby Meier, Burkhard A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191299">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Python forensics : master the art of digital forensics and analysis with Pythonent://SD_ILS/0/SD_ILS:22194612024-05-25T12:26:58Z2024-05-25T12:26:58Zby Spreitzenbarth, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191124">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Python data visualization : generate effective results in a variety of visually appealing charts using the plotting packages in Pythonent://SD_ILS/0/SD_ILS:22194622024-05-25T12:26:58Z2024-05-25T12:26:58Zby Raman, Kirthi, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191125">Click to View</a><br/>Format: Electronic Resources<br/>Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbixent://SD_ILS/0/SD_ILS:13867032024-05-25T12:26:58Z2024-05-25T12:26:58Zby Vacche, Andrea Dalle, author.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1973849">Click to View</a><br/>Format: Electronic Resources<br/>The science and technology of counterterrorism : measuring physical and electronic security riskent://SD_ILS/0/SD_ILS:22072342024-05-25T12:26:58Z2024-05-25T12:26:58Zby Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1641934">Click to View</a><br/>Format: Electronic Resources<br/>CSA guide to cloud computing : implementing cloud privacy and securityent://SD_ILS/0/SD_ILS:22081232024-05-25T12:26:58Z2024-05-25T12:26:58Zby Samani, Raj, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1793946">Click to View</a><br/>Format: Electronic Resources<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:22081452024-05-25T12:26:58Z2024-05-25T12:26:58Zby Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1798312">Click to View</a><br/>Format: Electronic Resources<br/>Web application security is a stack : how to CYA (Cover Your Apps) completelyent://SD_ILS/0/SD_ILS:22089712024-05-25T12:26:58Z2024-05-25T12:26:58Zby Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192126">Click to View</a><br/>Format: Electronic Resources<br/>Smart grid security : innovative solutions for a modernized grident://SD_ILS/0/SD_ILS:20981382024-05-25T12:26:58Z2024-05-25T12:26:58Zby Skopik, Florian, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2146995">Click to View</a><br/>Format: Electronic Resources<br/>Using security patterns in web-applicationent://SD_ILS/0/SD_ILS:21448122024-05-25T12:26:58Z2024-05-25T12:26:58Zby Alam, Shahnawaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5291824">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre II, Typologie des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236832024-05-25T12:26:58Z2024-05-25T12:26:58Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709828">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des Installations Industriellesent://SD_ILS/0/SD_ILS:21237002024-05-25T12:26:58Z2024-05-25T12:26:58Zby Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709851">Click to View</a><br/>Format: Electronic Resources<br/>Securing social media in the enterpriseent://SD_ILS/0/SD_ILS:20981312024-05-25T12:26:58Z2024-05-25T12:26:58Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2146009">Click to View</a><br/>Format: Electronic Resources<br/>Infosec management fundamentalsent://SD_ILS/0/SD_ILS:20981292024-05-25T12:26:58Z2024-05-25T12:26:58Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2146007">Click to View</a><br/>Format: Electronic Resources<br/>Bent functions : results and applications to cryptographyent://SD_ILS/0/SD_ILS:20981522024-05-25T12:26:58Z2024-05-25T12:26:58Zby Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192079">Click to View</a><br/>Format: Electronic Resources<br/>Information security analytics : finding security insights, patterns and anomalies in big dataent://SD_ILS/0/SD_ILS:20976822024-05-25T12:26:58Z2024-05-25T12:26:58Zby Mark, Talabis, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1873129">Click to View</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:20981032024-05-25T12:26:58Z2024-05-25T12:26:58Zby Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2098440">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapter VI, Analyse des risques : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236882024-05-25T12:26:58Z2024-05-25T12:26:58Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709834">Click to View</a><br/>Format: Electronic Resources<br/>Black hat Python : Python programming for hackers and pentestersent://SD_ILS/0/SD_ILS:20562102024-05-25T12:26:58Z2024-05-25T12:26:58Zby Seitz, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1931622">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre X, Sécurité des Réseaux Industriels étendus : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236792024-05-25T12:26:58Z2024-05-25T12:26:58Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709824">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre XIV, Réglementation de la Cybersécurité et Régime Juridique des Systèmes Numériques Industriels : une étude des Dispositions Réglementaires en Cybersécurité en France et Aux États-Unis : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236802024-05-25T12:26:58Z2024-05-25T12:26:58Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709825">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre II, Typologie des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236842024-05-25T12:26:58Z2024-05-25T12:26:58Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709829">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapter IV, Malveillance numérique sur les systèmes industriels : histoire de la menace, événements emblématiques, tendances et perspectives : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236852024-05-25T12:26:58Z2024-05-25T12:26:58Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709831">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236682024-05-25T12:26:58Z2024-05-25T12:26:58Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709810">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre XIII, État des Lieux des Référentiels en Sécurité des Systèmes Numériques Industriels : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236692024-05-25T12:26:58Z2024-05-25T12:26:58Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709811">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:21236702024-05-25T12:26:58Z2024-05-25T12:26:58Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709812">Click to View</a><br/>Format: Electronic Resources<br/>Online Safety.ent://SD_ILS/0/SD_ILS:12805012024-05-25T12:26:58Z2024-05-25T12:26:58Zby Healey, Justin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1899260">Click to View</a><br/>Format: Electronic Resources<br/>Security Intelligence : A Practitioner's Guide to Solving Enterprise Security Challenges.ent://SD_ILS/0/SD_ILS:12800512024-05-25T12:26:58Z2024-05-25T12:26:58Zby Li, Qing.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1895130">Click to View</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:21553202024-05-25T12:26:58Z2024-05-25T12:26:58Zby Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192125">Click to View</a><br/>Format: Electronic Resources<br/>Measuring and managing information risk : a FAIR approachent://SD_ILS/0/SD_ILS:23042452024-05-25T12:26:58Z2024-05-25T12:26:58Zby Freund, Jack, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar">https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124202313/?ar">https://learning.oreilly.com/library/view/~/9780124202313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124202313">https://learning.oreilly.com/library/view/~/9780124202313</a><br/>Format: Electronic Resources<br/>Microsoft security fundamentals LiveLessonsent://SD_ILS/0/SD_ILS:23057252024-05-25T12:26:58Z2024-05-25T12:26:58Zby Lieberman, Ed, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780133949445/?ar">https://learning.oreilly.com/videos/~/9780133949445/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar">https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar</a><br/>Format: Electronic Resources<br/>Advanced persistent threat hacking : the art and science of hacking any organizationent://SD_ILS/0/SD_ILS:23065152024-05-25T12:26:58Z2024-05-25T12:26:58Zby Wrightson, Tyler, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071828369">https://learning.oreilly.com/library/view/~/9780071828369</a>
<a href="https://learning.oreilly.com/library/view/~/9780071828369/?ar">https://learning.oreilly.com/library/view/~/9780071828369/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071828369/?ar">https://go.oreilly.com/library-access/library/view/-/9780071828369/?ar</a><br/>Format: Electronic Resources<br/>Enterprise software security : a confluence of disciplinesent://SD_ILS/0/SD_ILS:23052972024-05-25T12:26:58Z2024-05-25T12:26:58Zby Van Wyk, Kenneth R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780321604378/?ar">https://learning.oreilly.com/library/view/~/9780321604378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321604378">https://learning.oreilly.com/library/view/~/9780321604378</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar">https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar</a><br/>Format: Electronic Resources<br/>Bulletproof Android : practical advice for building secure appsent://SD_ILS/0/SD_ILS:23052982024-05-25T12:26:58Z2024-05-25T12:26:58Zby Nolan, Godfrey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780133995121/?ar">https://learning.oreilly.com/library/view/~/9780133995121/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133995121">https://learning.oreilly.com/library/view/~/9780133995121</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133995121/?ar">https://go.oreilly.com/library-access/library/view/-/9780133995121/?ar</a><br/>Format: Electronic Resources<br/>Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:23059412024-05-25T12:26:58Z2024-05-25T12:26:58Zby Knapp, Eric D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124201149/?ar">https://learning.oreilly.com/library/view/~/9780124201149/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124201149/?ar">https://go.oreilly.com/library-access/library/view/-/9780124201149/?ar</a><br/>Format: Electronic Resources<br/>A practical guide to computer forensics investigationsent://SD_ILS/0/SD_ILS:23056322024-05-25T12:26:58Z2024-05-25T12:26:58Zby Hayes, Darren R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780132756174/?ar">https://learning.oreilly.com/library/view/~/9780132756174/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar">https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar</a><br/>Format: Electronic Resources<br/>How to attack and defend your websiteent://SD_ILS/0/SD_ILS:23059342024-05-25T12:26:58Z2024-05-25T12:26:58Zby Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027325/?ar">https://learning.oreilly.com/library/view/~/9780128027325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027325">https://learning.oreilly.com/library/view/~/9780128027325</a><br/>Format: Electronic Resources<br/>Web application security is a stack : how to CYA (cover your apps) completelyent://SD_ILS/0/SD_ILS:23088452024-05-25T12:26:58Z2024-05-25T12:26:58Zby MacVittie, Lori A., 1969- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287050/?ar">https://learning.oreilly.com/library/view/~/9781849287050/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar</a><br/>Format: Electronic Resources<br/>Once more unto the breach : managing information security in an uncertain worldent://SD_ILS/0/SD_ILS:23088462024-05-25T12:26:58Z2024-05-25T12:26:58Zby Simmons, Andrea C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849287098/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287098/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849287098/?ar">https://learning.oreilly.com/library/view/~/9781849287098/?ar</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:23088472024-05-25T12:26:58Z2024-05-25T12:26:58Zby Ticher, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287135/?ar">https://learning.oreilly.com/library/view/~/9781849287135/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar</a><br/>Format: Electronic Resources<br/>Information security : a practical guide : bridging the gap between IT and managementent://SD_ILS/0/SD_ILS:23088522024-05-25T12:26:58Z2024-05-25T12:26:58Zby Mooney, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849287418/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287418/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849287418/?ar">https://learning.oreilly.com/library/view/~/9781849287418/?ar</a><br/>Format: Electronic Resources<br/>Reduce risk and improve security on IBM mainframes. Volume 2, Mainframe communication and networking securityent://SD_ILS/0/SD_ILS:23086222024-05-25T12:26:58Z2024-05-25T12:26:58Zby Bücker, Axel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738440941/?ar">https://learning.oreilly.com/library/view/~/9780738440941/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738440941/?ar">https://go.oreilly.com/library-access/library/view/-/9780738440941/?ar</a><br/>Format: Electronic Resources<br/>The security consultant's handbookent://SD_ILS/0/SD_ILS:23090722024-05-25T12:26:58Z2024-05-25T12:26:58Zby Bingley, Richard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287500">https://learning.oreilly.com/library/view/~/9781849287500</a>
<a href="https://learning.oreilly.com/library/view/~/9781849287500/?ar">https://learning.oreilly.com/library/view/~/9781849287500/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar</a><br/>Format: Electronic Resources<br/>Application security in the ISO 27001:2013 environmentent://SD_ILS/0/SD_ILS:23090732024-05-25T12:26:58Z2024-05-25T12:26:58Zby Vasudevan, Vinod, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287692/?ar">https://learning.oreilly.com/library/view/~/9781849287692/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar</a><br/>Format: Electronic Resources<br/>The future of cyber security and security innovation.ent://SD_ILS/0/SD_ILS:23088892024-05-25T12:26:58Z2024-05-25T12:26:58Zby Suits and spooks conference (2015 : New York, N.Y.)<br/><a href="https://learning.oreilly.com/videos/~/9781491937198/?ar">https://learning.oreilly.com/videos/~/9781491937198/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar</a><br/>Format: Electronic Resources<br/>Securing Java web applications with Spring Security : from JDBC and LDAP authentication to UI and method level securityent://SD_ILS/0/SD_ILS:23093632024-05-25T12:26:58Z2024-05-25T12:26:58Zby Bowersox, Kevin, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781771375306/?ar">https://learning.oreilly.com/videos/~/9781771375306/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771375306/?ar">https://go.oreilly.com/library-access/library/view/-/9781771375306/?ar</a><br/>Format: Electronic Resources<br/>How to build an anomaly detection engine with Spark, Akka and Cassandraent://SD_ILS/0/SD_ILS:23103722024-05-25T12:26:58Z2024-05-25T12:26:58Zby Busa, Natalino, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491955253/?ar">https://go.oreilly.com/library-access/library/view/-/9781491955253/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491955253/?ar">https://learning.oreilly.com/videos/~/9781491955253/?ar</a><br/>Format: Electronic Resources<br/>Healthcare information security and privacyent://SD_ILS/0/SD_ILS:23065092024-05-25T12:26:58Z2024-05-25T12:26:58Zby Murphy, Sean P. (Sean Patrick), 1968- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071831796/?ar">https://go.oreilly.com/library-access/library/view/-/9780071831796/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071831796">https://learning.oreilly.com/library/view/~/9780071831796</a>
<a href="https://learning.oreilly.com/library/view/~/9780071831796/?ar">https://learning.oreilly.com/library/view/~/9780071831796/?ar</a><br/>Format: Electronic Resources<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:23065102024-05-25T12:26:58Z2024-05-25T12:26:58Zby Regalado, Daniel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071832380/?ar">https://learning.oreilly.com/library/view/~/9780071832380/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar">https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar</a><br/>Format: Electronic Resources<br/>The antivirus hacker's handbookent://SD_ILS/0/SD_ILS:23081602024-05-25T12:26:58Z2024-05-25T12:26:58Zby Koret, Joxean, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119028758/?ar">https://learning.oreilly.com/library/view/~/9781119028758/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119028758/?ar">https://go.oreilly.com/library-access/library/view/-/9781119028758/?ar</a><br/>Format: Electronic Resources<br/>Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setent://SD_ILS/0/SD_ILS:23084382024-05-25T12:26:58Z2024-05-25T12:26:58Zby Marak, Victor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785281518">https://learning.oreilly.com/library/view/~/9781785281518</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar">https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785281518/?ar">https://learning.oreilly.com/library/view/~/9781785281518/?ar</a><br/>Format: Electronic Resources<br/>Enterprise cybersecurity : how to build a successful cyberdefense program against advanced threatsent://SD_ILS/0/SD_ILS:23073132024-05-25T12:26:58Z2024-05-25T12:26:58Zby Donaldson, Scott E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430260837/?ar">https://go.oreilly.com/library-access/library/view/-/9781430260837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430260837/?ar">https://learning.oreilly.com/library/view/~/9781430260837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430260837">https://learning.oreilly.com/library/view/~/9781430260837</a><br/>Format: Electronic Resources<br/>Reduce risk and improve security on IBM mainframes. Volume 3, Mainframe subsystem and application securityent://SD_ILS/0/SD_ILS:23089712024-05-25T12:26:58Z2024-05-25T12:26:58Zby Bücker, Axel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738441023/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441023/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738441023/?ar">https://learning.oreilly.com/library/view/~/9780738441023/?ar</a><br/>Format: Electronic Resources<br/>Information assurance handbook : effective computer security and risk management strategiesent://SD_ILS/0/SD_ILS:23048752024-05-25T12:26:58Z2024-05-25T12:26:58Zby Schou, Corey.<br/><a href="https://learning.oreilly.com/library/view/~/9780071821650">https://learning.oreilly.com/library/view/~/9780071821650</a>
<a href="https://learning.oreilly.com/library/view/~/9780071821650/?ar">https://learning.oreilly.com/library/view/~/9780071821650/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar">https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar</a><br/>Format: Electronic Resources<br/>Designing and building a security operations centerent://SD_ILS/0/SD_ILS:23053052024-05-25T12:26:58Z2024-05-25T12:26:58Zby Nathans, David, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008997/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008997/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008997/?ar">https://learning.oreilly.com/library/view/~/9780128008997/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008997">https://learning.oreilly.com/library/view/~/9780128008997</a><br/>Format: Electronic Resources<br/>Introduction to information security : LiveLessons (Sneak Peek Video Training)ent://SD_ILS/0/SD_ILS:23063462024-05-25T12:26:58Z2024-05-25T12:26:58Zby Aurnou, Scott, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar">https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134135823/?ar">https://learning.oreilly.com/videos/~/9780134135823/?ar</a><br/>Format: Electronic Resources<br/>Fluent conference 2015 : complete video compilationent://SD_ILS/0/SD_ILS:23075302024-05-25T12:26:58Z2024-05-25T12:26:58Zby Fluent. San Francisco, April 20-25<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491927786/?ar">https://go.oreilly.com/library-access/library/view/-/9781491927786/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491927786/?ar">https://learning.oreilly.com/videos/~/9781491927786/?ar</a><br/>Format: Electronic Resources<br/>A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of securityent://SD_ILS/0/SD_ILS:23069642024-05-25T12:26:58Z2024-05-25T12:26:58Zby Arthur, Will, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265849/?ar">https://learning.oreilly.com/library/view/~/9781430265849/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar</a><br/>Format: Electronic Resources<br/>Mastering the Nmap scripting engine : master the Nmap scripting engine and the art of developing NSE scriptsent://SD_ILS/0/SD_ILS:23066302024-05-25T12:26:58Z2024-05-25T12:26:58Zby Pale, Paulino Calderon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782168317/?ar">https://learning.oreilly.com/library/view/~/9781782168317/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782168317/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168317/?ar</a><br/>Format: Electronic Resources<br/>Crafting the InfoSec playbookent://SD_ILS/0/SD_ILS:23073922024-05-25T12:26:58Z2024-05-25T12:26:58Zby Bollinger, Jeff, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar">https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491913598">https://learning.oreilly.com/library/view/~/9781491913598</a>
<a href="https://learning.oreilly.com/library/view/~/9781491913598/?ar">https://learning.oreilly.com/library/view/~/9781491913598/?ar</a><br/>Format: Electronic Resources<br/>Securing Windows networks : from system security basics to monitoring and auditingent://SD_ILS/0/SD_ILS:23085612024-05-25T12:26:58Z2024-05-25T12:26:58Zby Long, Mark, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar">https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771374903/?ar">https://learning.oreilly.com/videos/~/9781771374903/?ar</a><br/>Format: Electronic Resources<br/>Network attacks and exploitation : a frameworkent://SD_ILS/0/SD_ILS:23077172024-05-25T12:26:58Z2024-05-25T12:26:58Zby Monte, Matthew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118987124">https://learning.oreilly.com/library/view/~/9781118987124</a>
<a href="https://learning.oreilly.com/library/view/~/9781118987124/?ar">https://learning.oreilly.com/library/view/~/9781118987124/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118987124/?ar">https://go.oreilly.com/library-access/library/view/-/9781118987124/?ar</a><br/>Format: Electronic Resources<br/>Advanced malware analysisent://SD_ILS/0/SD_ILS:23088652024-05-25T12:26:58Z2024-05-25T12:26:58Zby Elisan, Christopher C., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071819756">https://learning.oreilly.com/library/view/~/9780071819756</a>
<a href="https://learning.oreilly.com/library/view/~/9780071819756/?ar">https://learning.oreilly.com/library/view/~/9780071819756/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar">https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar</a><br/>Format: Electronic Resources<br/>Mehr Hacking mit Python : eigene Tools entwickeln für Hacker and Pentesterent://SD_ILS/0/SD_ILS:23087772024-05-25T12:26:58Z2024-05-25T12:26:58Zby Seitz, Justin, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457196140">https://learning.oreilly.com/library/view/~/9781457196140</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457196140/?ar">https://go.oreilly.com/library-access/library/view/-/9781457196140/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457196140/?ar">https://learning.oreilly.com/library/view/~/9781457196140/?ar</a><br/>Format: Electronic Resources<br/>Risk centric threat modeling : process for attack simulation and threat analysisent://SD_ILS/0/SD_ILS:23087922024-05-25T12:26:58Z2024-05-25T12:26:58Zby Uceda Vélez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format: Electronic Resources<br/>Web security : a whitehat perspectiveent://SD_ILS/0/SD_ILS:23067122024-05-25T12:26:58Z2024-05-25T12:26:58Zby Wu, Hanqing, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592612/?ar">https://learning.oreilly.com/library/view/~/9781466592612/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466592612/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592612/?ar</a><br/>Format: Electronic Resources<br/>Secrets and lies : digital security in a networked worldent://SD_ILS/0/SD_ILS:23087532024-05-25T12:26:58Z2024-05-25T12:26:58Zby Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119092438">https://learning.oreilly.com/library/view/~/9781119092438</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar">https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119092438/?ar">https://learning.oreilly.com/library/view/~/9781119092438/?ar</a><br/>Format: Electronic Resources<br/>Security for web developers : using JavaScript, HTML, and CSSent://SD_ILS/0/SD_ILS:23090222024-05-25T12:26:58Z2024-05-25T12:26:58Zby Mueller, John, 1958- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491928684/?ar">https://go.oreilly.com/library-access/library/view/-/9781491928684/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491928684/?ar">https://learning.oreilly.com/library/view/~/9781491928684/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491928684">https://learning.oreilly.com/library/view/~/9781491928684</a><br/>Format: Electronic Resources<br/>Control engineering and information systems : proceedings of the 2014 International Conference on Control Engineering and Information System (ICCEIS2014), Yueyang, Hunan, China, 20-22 June 2014ent://SD_ILS/0/SD_ILS:23056072024-05-25T12:26:58Z2024-05-25T12:26:58Zby International Conference on Control Engineering and Information Systems (2014 : Yueyang, Hunan Sheng, China), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781138026858/?ar">https://learning.oreilly.com/library/view/~/9781138026858/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781138026858">https://learning.oreilly.com/library/view/~/9781138026858</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781138026858/?ar">https://go.oreilly.com/library-access/library/view/-/9781138026858/?ar</a><br/>Format: Electronic Resources<br/>Infosec management fundamentalsent://SD_ILS/0/SD_ILS:23080392024-05-25T12:26:58Z2024-05-25T12:26:58Zby Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar">https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128041871/?ar">https://learning.oreilly.com/library/view/~/9780128041871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128041871">https://learning.oreilly.com/library/view/~/9780128041871</a><br/>Format: Electronic Resources<br/>Securing social media in the enterpriseent://SD_ILS/0/SD_ILS:23080412024-05-25T12:26:58Z2024-05-25T12:26:58Zby Dalziel, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128041963">https://learning.oreilly.com/library/view/~/9780128041963</a>
<a href="https://learning.oreilly.com/library/view/~/9780128041963/?ar">https://learning.oreilly.com/library/view/~/9780128041963/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128041963/?ar">https://go.oreilly.com/library-access/library/view/-/9780128041963/?ar</a><br/>Format: Electronic Resources<br/>Smart grid security : innovative solutions for a modernized grident://SD_ILS/0/SD_ILS:23080492024-05-25T12:26:58Z2024-05-25T12:26:58Zby Skopik, Florian, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023549">https://learning.oreilly.com/library/view/~/9780128023549</a>
<a href="https://learning.oreilly.com/library/view/~/9780128023549/?ar">https://learning.oreilly.com/library/view/~/9780128023549/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128023549/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023549/?ar</a><br/>Format: Electronic Resources<br/>Abusing the Internet of things : blackouts, freakouts, and stakeoutsent://SD_ILS/0/SD_ILS:23080522024-05-25T12:26:58Z2024-05-25T12:26:58Zby Dhanjani, Nitesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491902899">https://learning.oreilly.com/library/view/~/9781491902899</a>
<a href="https://learning.oreilly.com/library/view/~/9781491902899/?ar">https://learning.oreilly.com/library/view/~/9781491902899/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491902899/?ar">https://go.oreilly.com/library-access/library/view/-/9781491902899/?ar</a><br/>Format: Electronic Resources<br/>Getting started with cybersecurity scienceent://SD_ILS/0/SD_ILS:23081502024-05-25T12:26:58Z2024-05-25T12:26:58Zby Dykstra, Josiah, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491936528/?ar">https://go.oreilly.com/library-access/library/view/-/9781491936528/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491936528/?ar">https://learning.oreilly.com/videos/~/9781491936528/?ar</a><br/>Format: Electronic Resources<br/>The Architecture of Privacy : On Engineering Technologies that Can Deliver Trustworthy Safeguardsent://SD_ILS/0/SD_ILS:23082072024-05-25T12:26:58Z2024-05-25T12:26:58Zby Bowman, Courtney, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491904503/?ar">https://learning.oreilly.com/library/view/~/9781491904503/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491904503/?ar">https://go.oreilly.com/library-access/library/view/-/9781491904503/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491904503">https://learning.oreilly.com/library/view/~/9781491904503</a><br/>Format: Electronic Resources<br/>CSA guide to cloud computing : implementing cloud privacy and securityent://SD_ILS/0/SD_ILS:23047762024-05-25T12:26:58Z2024-05-25T12:26:58Zby Samani, Raj, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar">https://go.oreilly.com/library-access/library/view/-/9780124201255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124201255/?ar">https://learning.oreilly.com/library/view/~/9780124201255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124201255">https://learning.oreilly.com/library/view/~/9780124201255</a><br/>Format: Electronic Resources<br/>Information security analytics : finding security insights, patterns, and anomalies in big dataent://SD_ILS/0/SD_ILS:23051642024-05-25T12:26:58Z2024-05-25T12:26:58Zby Talabis, Mark Ryan M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128002070/?ar">https://go.oreilly.com/library-access/library/view/-/9780128002070/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128002070/?ar">https://learning.oreilly.com/library/view/~/9780128002070/?ar</a><br/>Format: Electronic Resources<br/>Security in computingent://SD_ILS/0/SD_ILS:23058972024-05-25T12:26:58Z2024-05-25T12:26:58Zby Pfleeger, Charles P., 1948- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134085074/?ar">https://learning.oreilly.com/library/view/~/9780134085074/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar">https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar</a><br/>Format: Electronic Resources<br/>Learning Puppet Security : secure your IT environments with the powerful secuity tools of Puppetent://SD_ILS/0/SD_ILS:23069482024-05-25T12:26:58Z2024-05-25T12:26:58Zby Slagle, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784397753/?ar">https://go.oreilly.com/library-access/library/view/-/9781784397753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784397753">https://learning.oreilly.com/library/view/~/9781784397753</a>
<a href="https://learning.oreilly.com/library/view/~/9781784397753/?ar">https://learning.oreilly.com/library/view/~/9781784397753/?ar</a><br/>Format: Electronic Resources<br/>Getting started with Windows Server Security : develop and implement a secure Microsoft infrastructure platform using native and built-in toolsent://SD_ILS/0/SD_ILS:23066812024-05-25T12:26:58Z2024-05-25T12:26:58Zby Sivarajan, Santhosh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784398729/?ar">https://learning.oreilly.com/library/view/~/9781784398729/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781784398729/?ar">https://go.oreilly.com/library-access/library/view/-/9781784398729/?ar</a><br/>Format: Electronic Resources<br/>Beyond cybersecurity : protecting your digital businessent://SD_ILS/0/SD_ILS:23069342024-05-25T12:26:58Z2024-05-25T12:26:58Zby Kaplan, James M., 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119026846">https://learning.oreilly.com/library/view/~/9781119026846</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar">https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119026846/?ar">https://learning.oreilly.com/library/view/~/9781119026846/?ar</a><br/>Format: Electronic Resources<br/>Cloud security : overview and best practicesent://SD_ILS/0/SD_ILS:23155212024-05-25T12:26:58Z2024-05-25T12:26:58Zby Bond, James (Cloud chief technologist)<br/><a href="https://learning.oreilly.com/library/view/~/9781492033790">https://learning.oreilly.com/library/view/~/9781492033790</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492033790/?ar">https://go.oreilly.com/library-access/library/view/-/9781492033790/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492033790/?ar">https://learning.oreilly.com/library/view/~/9781492033790/?ar</a><br/>Format: Electronic Resources<br/>Agile security : an introduction for developersent://SD_ILS/0/SD_ILS:23163802024-05-25T12:26:58Z2024-05-25T12:26:58Zby Brunton-Spall, Michael, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492037699/?ar">https://learning.oreilly.com/videos/~/9781492037699/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492037699/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037699/?ar</a><br/>Format: Electronic Resources<br/>Anomaly detection for monitoring : a statistical approach to time series anomaly detectionent://SD_ILS/0/SD_ILS:23169072024-05-25T12:26:58Z2024-05-25T12:26:58Zby Jinka, Preetam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042341">https://learning.oreilly.com/library/view/~/9781492042341</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042341/?ar">https://learning.oreilly.com/library/view/~/9781492042341/?ar</a><br/>Format: Electronic Resources<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:23046822024-05-25T12:26:58Z2024-05-25T12:26:58Zby Hexmoor, Henry, 1960- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008911/?ar">https://learning.oreilly.com/library/view/~/9780128008911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008911">https://learning.oreilly.com/library/view/~/9780128008911</a><br/>Format: Electronic Resources<br/>ASP.NET web API security essentials : take the security of your ASP.NET web API to the next level using some of the most amazing security techniques aroundent://SD_ILS/0/SD_ILS:23092982024-05-25T12:26:58Z2024-05-25T12:26:58Zby Gunasundaram, Rajesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785882210/?ar">https://learning.oreilly.com/library/view/~/9781785882210/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785882210">https://learning.oreilly.com/library/view/~/9781785882210</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785882210/?ar">https://go.oreilly.com/library-access/library/view/-/9781785882210/?ar</a><br/>Format: Electronic Resources<br/>Building Python Real-Time Applications with Storm.ent://SD_ILS/0/SD_ILS:23091942024-05-25T12:26:58Z2024-05-25T12:26:58Zby Kartik Bhatnagar; Barry Hart.<br/><a href="https://learning.oreilly.com/library/view/~/9781784392857/?ar">https://learning.oreilly.com/library/view/~/9781784392857/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781784392857/?ar">https://go.oreilly.com/library-access/library/view/-/9781784392857/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784392857">https://learning.oreilly.com/library/view/~/9781784392857</a><br/>Format: Electronic Resources<br/>RESILIA"!Pocketbook : Cyber Resilience Best Practice.ent://SD_ILS/0/SD_ILS:23095762024-05-25T12:26:58Z2024-05-25T12:26:58Zby AXELOS, AXELOS.<br/><a href="https://learning.oreilly.com/library/view/~/9780113314751">https://learning.oreilly.com/library/view/~/9780113314751</a>
<a href="https://learning.oreilly.com/library/view/~/9780113314751/?ar">https://learning.oreilly.com/library/view/~/9780113314751/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780113314751/?ar">https://go.oreilly.com/library-access/library/view/-/9780113314751/?ar</a><br/>Format: Electronic Resources<br/>Mastering Python forensics : master the art of digital forensics and analysis with Pythonent://SD_ILS/0/SD_ILS:23092272024-05-25T12:26:58Z2024-05-25T12:26:58Zby Spreitzenbarth, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783988044/?ar">https://learning.oreilly.com/library/view/~/9781783988044/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar">https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783988044">https://learning.oreilly.com/library/view/~/9781783988044</a><br/>Format: Electronic Resources<br/>Implementing NetScaler VPX : implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platformsent://SD_ILS/0/SD_ILS:23098322024-05-25T12:26:58Z2024-05-25T12:26:58Zby Sandbu, Marius, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785288982">https://learning.oreilly.com/library/view/~/9781785288982</a>
<a href="https://learning.oreilly.com/library/view/~/9781785288982/?ar">https://learning.oreilly.com/library/view/~/9781785288982/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785288982/?ar">https://go.oreilly.com/library-access/library/view/-/9781785288982/?ar</a><br/>Format: Electronic Resources<br/>Cyber operations : building, defending, and attacking modern computer networksent://SD_ILS/0/SD_ILS:23086782024-05-25T12:26:58Z2024-05-25T12:26:58Zby O'Leary, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484204573">https://learning.oreilly.com/library/view/~/9781484204573</a>
<a href="https://learning.oreilly.com/library/view/~/9781484204573/?ar">https://learning.oreilly.com/library/view/~/9781484204573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar">https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar</a><br/>Format: Electronic Resources<br/>The security data lake : leveraging big data technologies to build a common data repository for securityent://SD_ILS/0/SD_ILS:23183502024-05-25T12:26:58Z2024-05-25T12:26:58Zby Marty, Raffael, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491927748/?ar">https://learning.oreilly.com/library/view/~/9781491927748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar">https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar</a><br/>Format: Electronic Resources<br/>Opportunities and challenges in the IoT : a conversation with Tim O'Reilly and Cory Doctorowent://SD_ILS/0/SD_ILS:23183842024-05-25T12:26:58Z2024-05-25T12:26:58Zby O'Reilly, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492048220/?ar">https://learning.oreilly.com/library/view/~/9781492048220/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492048220">https://learning.oreilly.com/library/view/~/9781492048220</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar">https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar</a><br/>Format: Electronic Resources<br/>Mastering XenApp : master the skills required to implement Citrix XenApp 7.6 to deploy a complete Citrix-hosted application from scratchent://SD_ILS/0/SD_ILS:23528662024-05-25T12:26:58Z2024-05-25T12:26:58Zby Jha, Sunny, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191098">Click to View</a><br/>Format: Electronic Resources<br/>