Search Results for - Narrowed by: Computer security. - 2021 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092021$0025092021$0026ps$003d300? 2024-05-28T06:03:20Z Information security in education and practice ent://SD_ILS/0/SD_ILS:2351369 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Kaloyanova, Kalinka., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6424050">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents ent://SD_ILS/0/SD_ILS:2351764 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Singh, Glen D., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6824393">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Authentication and access control : practical cryptography methods and tools ent://SD_ILS/0/SD_ILS:2327123 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Boonkrong, Sirapat, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484265703">https://learning.oreilly.com/library/view/~/9781484265703</a> <a href="https://learning.oreilly.com/library/view/~/9781484265703/?ar">https://learning.oreilly.com/library/view/~/9781484265703/?ar</a><br/>Format:&#160;Electronic Resources<br/> Choose your InfoSec path : an interactive cybersecurity adventure for beginners ent://SD_ILS/0/SD_ILS:2328990 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Roxon, Alexander J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484270363">https://learning.oreilly.com/library/view/~/9781484270363</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484270363/?ar">https://learning.oreilly.com/library/view/~/9781484270363/?ar</a><br/>Format:&#160;Electronic Resources<br/> Certified ethical hacker (CEH) complete video course ent://SD_ILS/0/SD_ILS:2332146 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar">https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137446797/?ar">https://learning.oreilly.com/videos/~/9780137446797/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137446797">https://learning.oreilly.com/videos/~/9780137446797</a><br/>Format:&#160;Video recording<br/> 8 steps to better security : a simple cyber resilience guide for business ent://SD_ILS/0/SD_ILS:2330835 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Crawley, Kim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119811237/?ar">https://learning.oreilly.com/library/view/~/9781119811237/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119811237">https://learning.oreilly.com/library/view/~/9781119811237</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar">https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing AI. ent://SD_ILS/0/SD_ILS:2332134 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Manjengwa, Shingai, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar">https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920672319/?ar">https://learning.oreilly.com/videos/~/0636920672319/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920672319">https://learning.oreilly.com/videos/~/0636920672319</a><br/>Format:&#160;Video recording<br/> Intro to secure application deployment with Istio on Kubernetes. ent://SD_ILS/0/SD_ILS:2332181 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Poddar, Neeraj, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202219">https://learning.oreilly.com/videos/~/10000MNHV202219</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202219/?ar">https://learning.oreilly.com/videos/~/10000MNHV202219/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar</a><br/>Format:&#160;Video recording<br/> You can stop stupid : stopping losses from accidental and malicious actions ent://SD_ILS/0/SD_ILS:2328968 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469078045">https://learning.oreilly.com/library/view/~/9781469078045</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781469078045/?ar">https://go.oreilly.com/library-access/library/view/-/9781469078045/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781469078045/?ar">https://learning.oreilly.com/library/view/~/9781469078045/?ar</a><br/>Format:&#160;Sound recording<br/> Artificial Intelligence, Cybersecurity and Cyber Defence ent://SD_ILS/0/SD_ILS:2328358 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a> <a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format:&#160;Electronic Resources<br/> Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict ent://SD_ILS/0/SD_ILS:2329079 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Borges, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781801076203/?ar">https://learning.oreilly.com/library/view/~/9781801076203/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801076203">https://learning.oreilly.com/library/view/~/9781801076203</a><br/>Format:&#160;Electronic Resources<br/> (ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests. ent://SD_ILS/0/SD_ILS:2329571 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Chapple, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781119787631">https://learning.oreilly.com/library/view/~/9781119787631</a> <a href="https://learning.oreilly.com/library/view/~/9781119787631/?ar">https://learning.oreilly.com/library/view/~/9781119787631/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119787631/?ar">https://go.oreilly.com/library-access/library/view/-/9781119787631/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information Risk Management A practitioner's guide ent://SD_ILS/0/SD_ILS:2330297 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Sutton, David author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175751">https://learning.oreilly.com/library/view/~/9781780175751</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780175751/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175751/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780175751/?ar">https://learning.oreilly.com/library/view/~/9781780175751/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kubernetes security : attacking and defending Kubernetes ent://SD_ILS/0/SD_ILS:2333386 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Martin, Andrew, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920668794/?ar">https://go.oreilly.com/library-access/library/view/-/0636920668794/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920668794/?ar">https://learning.oreilly.com/videos/~/0636920668794/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920668794">https://learning.oreilly.com/videos/~/0636920668794</a><br/>Format:&#160;Video recording<br/> Alice and Bob learn application security. ent://SD_ILS/0/SD_ILS:2325958 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Janca, Tanya.<br/><a href="https://learning.oreilly.com/library/view/~/9781119687351">https://learning.oreilly.com/library/view/~/9781119687351</a> <a href="https://learning.oreilly.com/library/view/~/9781119687351/?ar">https://learning.oreilly.com/library/view/~/9781119687351/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar">https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar</a><br/>Format:&#160;Electronic Resources<br/> Comptia security+ certification practice exams, (Exam SY0-601). ent://SD_ILS/0/SD_ILS:2327137 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Lachance, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781260467987/?ar">https://learning.oreilly.com/library/view/~/9781260467987/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar">https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781260467987">https://learning.oreilly.com/library/view/~/9781260467987</a><br/>Format:&#160;Electronic Resources<br/> Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browser ent://SD_ILS/0/SD_ILS:2331570 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Segala, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar">https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801075336/?ar">https://learning.oreilly.com/library/view/~/9781801075336/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801075336">https://learning.oreilly.com/library/view/~/9781801075336</a><br/>Format:&#160;Electronic Resources<br/> Cyber Crisis ent://SD_ILS/0/SD_ILS:2331316 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Cole, Eric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666125313">https://learning.oreilly.com/library/view/~/9781666125313</a> <a href="https://learning.oreilly.com/library/view/~/9781666125313/?ar">https://learning.oreilly.com/library/view/~/9781666125313/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar">https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar</a><br/>Format:&#160;Electronic Resources<br/> Crypto ent://SD_ILS/0/SD_ILS:2331323 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Levy, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar">https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781666117615">https://learning.oreilly.com/library/view/~/9781666117615</a> <a href="https://learning.oreilly.com/library/view/~/9781666117615/?ar">https://learning.oreilly.com/library/view/~/9781666117615/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information Risk Management : A practitioner's guide. ent://SD_ILS/0/SD_ILS:2337073 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Sutton, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6733537">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Lifecycle IoT Security for Engineers. ent://SD_ILS/0/SD_ILS:2337249 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Kaustubh, Dhondge.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6805253">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Strategy, leadership, and AI in the cyber ecosystem : the role of digital societies in information governance and decision making ent://SD_ILS/0/SD_ILS:2326455 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Jahankhani, Hamid.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128214596/?ar">https://go.oreilly.com/library-access/library/view/-/9780128214596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128214596/?ar">https://learning.oreilly.com/library/view/~/9780128214596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128214596">https://learning.oreilly.com/library/view/~/9780128214596</a><br/>Format:&#160;Electronic Resources<br/> COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION EXAM GUIDE (EXAM CS0-002) ent://SD_ILS/0/SD_ILS:2326516 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Chapman, Brent.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar">https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781260464313">https://learning.oreilly.com/library/view/~/9781260464313</a> <a href="https://learning.oreilly.com/library/view/~/9781260464313/?ar">https://learning.oreilly.com/library/view/~/9781260464313/?ar</a><br/>Format:&#160;Electronic Resources<br/> How cybersecurity really works : a hands-on guide for total beginners ent://SD_ILS/0/SD_ILS:2328036 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Grubb, Sam (Cyber security consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098128999/?ar">https://learning.oreilly.com/library/view/~/9781098128999/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098128999">https://learning.oreilly.com/library/view/~/9781098128999</a><br/>Format:&#160;Electronic Resources<br/> Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environment ent://SD_ILS/0/SD_ILS:2356761 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Ackerman, Pascal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6730157">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The deviant security practices of cyber crime ent://SD_ILS/0/SD_ILS:2356733 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Van de Sandt, Erik H.A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6697091">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber security on Azure : an it professional's guide to Microsoft Azure security ent://SD_ILS/0/SD_ILS:2327167 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484265314/?ar">https://learning.oreilly.com/library/view/~/9781484265314/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484265314">https://learning.oreilly.com/library/view/~/9781484265314</a><br/>Format:&#160;Electronic Resources<br/> Big breaches : cybersecurity lessons for everyone ent://SD_ILS/0/SD_ILS:2328126 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Daswani, Neil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484266557">https://learning.oreilly.com/library/view/~/9781484266557</a> <a href="https://learning.oreilly.com/library/view/~/9781484266557/?ar">https://learning.oreilly.com/library/view/~/9781484266557/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar">https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar</a><br/>Format:&#160;Electronic Resources<br/> Android software internals quick reference : a field manual and security reference guide to Java-based Android components ent://SD_ILS/0/SD_ILS:2328407 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Stevenson, James, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484269145/?ar">https://learning.oreilly.com/library/view/~/9781484269145/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484269145">https://learning.oreilly.com/library/view/~/9781484269145</a><br/>Format:&#160;Electronic Resources<br/> The official (ISC)2 CCSP CBK reference ent://SD_ILS/0/SD_ILS:2329305 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Fife, Leslie, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119603436/?ar">https://go.oreilly.com/library-access/library/view/-/9781119603436/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119603436/?ar">https://learning.oreilly.com/library/view/~/9781119603436/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119603436">https://learning.oreilly.com/library/view/~/9781119603436</a><br/>Format:&#160;Electronic Resources<br/> Implementing identity management on AWS : a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments ent://SD_ILS/0/SD_ILS:2330023 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Lehtinen, Jon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800562288">https://learning.oreilly.com/library/view/~/9781800562288</a> <a href="https://learning.oreilly.com/library/view/~/9781800562288/?ar">https://learning.oreilly.com/library/view/~/9781800562288/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar">https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar</a><br/>Format:&#160;Electronic Resources<br/> CISSP (ISC)2 certification practice exams and tests : over 1000 practice questions and explanations covering all 8 CISSP domains for exam version May 2021 ent://SD_ILS/0/SD_ILS:2329634 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Jordan, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800561373">https://learning.oreilly.com/library/view/~/9781800561373</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800561373/?ar">https://go.oreilly.com/library-access/library/view/-/9781800561373/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800561373/?ar">https://learning.oreilly.com/library/view/~/9781800561373/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyberjutsu : cybersecurity for the modern ninja ent://SD_ILS/0/SD_ILS:2326541 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a> <a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:2327053 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Moschovitis, Christos J. P., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119658740">https://learning.oreilly.com/library/view/~/9781119658740</a> <a href="https://learning.oreilly.com/library/view/~/9781119658740/?ar">https://learning.oreilly.com/library/view/~/9781119658740/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar">https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar</a><br/>Format:&#160;Electronic Resources<br/> A complete guide to Burp Suite : learn to detect application vulnerabilities ent://SD_ILS/0/SD_ILS:2326430 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484264027/?ar">https://learning.oreilly.com/library/view/~/9781484264027/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484264027/?ar">https://go.oreilly.com/library-access/library/view/-/9781484264027/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484264027">https://learning.oreilly.com/library/view/~/9781484264027</a><br/>Format:&#160;Electronic Resources<br/> Start-up secure : baking cybersecurity into your company from founding to exit ent://SD_ILS/0/SD_ILS:2327524 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Castaldo, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119700739">https://learning.oreilly.com/library/view/~/9781119700739</a> <a href="https://learning.oreilly.com/library/view/~/9781119700739/?ar">https://learning.oreilly.com/library/view/~/9781119700739/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar">https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity in the COVID-19 pandemic ent://SD_ILS/0/SD_ILS:2327730 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Okereafor, Kenneth, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781000357653/?ar">https://learning.oreilly.com/library/view/~/9781000357653/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar">https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781000357653">https://learning.oreilly.com/library/view/~/9781000357653</a><br/>Format:&#160;Electronic Resources<br/> Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environment ent://SD_ILS/0/SD_ILS:2330315 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800202092/?ar">https://learning.oreilly.com/library/view/~/9781800202092/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800202092">https://learning.oreilly.com/library/view/~/9781800202092</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise DevOps for Architects ent://SD_ILS/0/SD_ILS:2330978 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Mulder, Jeroen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801812153">https://learning.oreilly.com/library/view/~/9781801812153</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812153/?ar">https://learning.oreilly.com/library/view/~/9781801812153/?ar</a><br/>Format:&#160;Electronic Resources<br/> CYBER SECURITY AND DIGITAL FORENSICS ent://SD_ILS/0/SD_ILS:2331441 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z <a href="https://learning.oreilly.com/library/view/~/9781119795636">https://learning.oreilly.com/library/view/~/9781119795636</a> <a href="https://learning.oreilly.com/library/view/~/9781119795636/?ar">https://learning.oreilly.com/library/view/~/9781119795636/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar">https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with z/OS Data Set Encryption ent://SD_ILS/0/SD_ILS:2331252 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a> <a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format:&#160;Electronic Resources<br/> Real-world cryptography ent://SD_ILS/0/SD_ILS:2332150 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Wong, David, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781617296710VE">https://learning.oreilly.com/videos/~/9781617296710VE</a> <a href="https://learning.oreilly.com/videos/~/9781617296710VE/?ar">https://learning.oreilly.com/videos/~/9781617296710VE/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar</a><br/>Format:&#160;Video recording<br/> Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering (CCE) ent://SD_ILS/0/SD_ILS:2326323 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Bochman, Andrew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781000292978/?ar">https://go.oreilly.com/library-access/library/view/-/9781000292978/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781000292978/?ar">https://learning.oreilly.com/library/view/~/9781000292978/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781000292978">https://learning.oreilly.com/library/view/~/9781000292978</a><br/>Format:&#160;Electronic Resources<br/> Protective security : creating military-grade defenses for your digital business ent://SD_ILS/0/SD_ILS:2328579 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Seaman, Jim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484269084">https://learning.oreilly.com/library/view/~/9781484269084</a> <a href="https://learning.oreilly.com/library/view/~/9781484269084/?ar">https://learning.oreilly.com/library/view/~/9781484269084/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and Third-Party Risk : Third Party Threat Hunting ent://SD_ILS/0/SD_ILS:2329000 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Rasner, Gregory C.<br/><a href="https://learning.oreilly.com/library/view/~/9781119809555">https://learning.oreilly.com/library/view/~/9781119809555</a> <a href="https://learning.oreilly.com/library/view/~/9781119809555/?ar">https://learning.oreilly.com/library/view/~/9781119809555/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar">https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware Analysis Techniques : Tricks for the Triage of Adversarial Software. ent://SD_ILS/0/SD_ILS:2329154 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Barker, Dylan.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212277">https://learning.oreilly.com/library/view/~/9781839212277</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839212277/?ar">https://learning.oreilly.com/library/view/~/9781839212277/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat hunting with elastic stack : solve complex security challenges with integrated prevention, detection, and response ent://SD_ILS/0/SD_ILS:2329469 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Pease, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801073783/?ar">https://go.oreilly.com/library-access/library/view/-/9781801073783/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801073783">https://learning.oreilly.com/library/view/~/9781801073783</a> <a href="https://learning.oreilly.com/library/view/~/9781801073783/?ar">https://learning.oreilly.com/library/view/~/9781801073783/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure edge computing : applications, techniques and challenges. ent://SD_ILS/0/SD_ILS:2329288 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Ahmed, Mohiuddin (Computer scientist), editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000427325/?ar">https://learning.oreilly.com/library/view/~/9781000427325/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781000427325">https://learning.oreilly.com/library/view/~/9781000427325</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar">https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar</a><br/>Format:&#160;Electronic Resources<br/> Self-sovereign identity : decentralized digital identity and verifiable credentials ent://SD_ILS/0/SD_ILS:2330270 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format:&#160;Electronic Resources<br/> Azure security handbook : a comprehensive guide for defending your enterprise environment ent://SD_ILS/0/SD_ILS:2329802 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Ots, Karl.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272923">https://learning.oreilly.com/library/view/~/9781484272923</a> <a href="https://learning.oreilly.com/library/view/~/9781484272923/?ar">https://learning.oreilly.com/library/view/~/9781484272923/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar</a><br/>Format:&#160;Electronic Resources<br/> Real-world cryptography ent://SD_ILS/0/SD_ILS:2330383 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Wong, David (Cryptography engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296710">https://learning.oreilly.com/library/view/~/9781617296710</a> <a href="https://learning.oreilly.com/library/view/~/9781617296710/?ar">https://learning.oreilly.com/library/view/~/9781617296710/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling a practical guide for developing teams ent://SD_ILS/0/SD_ILS:2331156 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Tarandach, Izar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056546/?ar">https://learning.oreilly.com/library/view/~/9781492056546/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492056546">https://learning.oreilly.com/library/view/~/9781492056546</a><br/>Format:&#160;Electronic Resources<br/> Real-world cryptography ent://SD_ILS/0/SD_ILS:2332808 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Wong, David (Cryptography engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617296710AU">https://learning.oreilly.com/library/view/~/9781617296710AU</a> <a href="https://learning.oreilly.com/library/view/~/9781617296710AU/?ar">https://learning.oreilly.com/library/view/~/9781617296710AU/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar</a><br/>Format:&#160;Sound recording<br/> Cybersecurity ABCs : delivering awareness, behaviours and culture change ent://SD_ILS/0/SD_ILS:2333926 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Barker, Jessica (Cyber security), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780174266/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174266/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780174266/?ar">https://learning.oreilly.com/library/view/~/9781780174266/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780174266">https://learning.oreilly.com/library/view/~/9781780174266</a><br/>Format:&#160;Electronic Resources<br/> Red Hat and IT security : with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditing ent://SD_ILS/0/SD_ILS:2326514 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Chatterjee, Rithik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484264348">https://learning.oreilly.com/library/view/~/9781484264348</a> <a href="https://learning.oreilly.com/library/view/~/9781484264348/?ar">https://learning.oreilly.com/library/view/~/9781484264348/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar">https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Manager's Guide ent://SD_ILS/0/SD_ILS:2327020 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Barnum, Todd.<br/><a href="https://learning.oreilly.com/library/view/~/9781492076209">https://learning.oreilly.com/library/view/~/9781492076209</a> <a href="https://learning.oreilly.com/library/view/~/9781492076209/?ar">https://learning.oreilly.com/library/view/~/9781492076209/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar">https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber threat intelligence : the no-nonsense guide for CISOs and Security Managers ent://SD_ILS/0/SD_ILS:2329637 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Roberts, Aaron.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272206">https://learning.oreilly.com/library/view/~/9781484272206</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484272206/?ar">https://learning.oreilly.com/library/view/~/9781484272206/?ar</a><br/>Format:&#160;Electronic Resources<br/> Art of attack : attacker mindset for security professionals. ent://SD_ILS/0/SD_ILS:2329433 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Reynolds, Maxie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119805465/?ar">https://learning.oreilly.com/library/view/~/9781119805465/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119805465">https://learning.oreilly.com/library/view/~/9781119805465</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar">https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical threat intelligence and data-driven threat huntingx : Practical threat intelligence and data-driven threat hunting : a hands-on guide to threat hunting with the ATT&amp;CK framework and open source tools ent://SD_ILS/0/SD_ILS:2353626 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Palacin, Valentina, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6462896">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict ent://SD_ILS/0/SD_ILS:2353735 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Borges, Dan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6640534">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:2358181 2024-05-28T06:03:20Z 2024-05-28T06:03:20Z by&#160;Bhargava, Neeraj, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6693036">Click to View</a><br/>Format:&#160;Electronic Resources<br/>