Search Results for - Narrowed by: Computer security. - 2021
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092021$0025092021$0026ps$003d300?
2024-05-28T06:03:20Z
Information security in education and practice
ent://SD_ILS/0/SD_ILS:2351369
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Kaloyanova, Kalinka., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6424050">Click to View</a><br/>Format: Electronic Resources<br/>
Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents
ent://SD_ILS/0/SD_ILS:2351764
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Singh, Glen D., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6824393">Click to View</a><br/>Format: Electronic Resources<br/>
Authentication and access control : practical cryptography methods and tools
ent://SD_ILS/0/SD_ILS:2327123
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Boonkrong, Sirapat, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265703">https://learning.oreilly.com/library/view/~/9781484265703</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265703/?ar">https://learning.oreilly.com/library/view/~/9781484265703/?ar</a><br/>Format: Electronic Resources<br/>
Choose your InfoSec path : an interactive cybersecurity adventure for beginners
ent://SD_ILS/0/SD_ILS:2328990
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Roxon, Alexander J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484270363">https://learning.oreilly.com/library/view/~/9781484270363</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270363/?ar">https://learning.oreilly.com/library/view/~/9781484270363/?ar</a><br/>Format: Electronic Resources<br/>
Certified ethical hacker (CEH) complete video course
ent://SD_ILS/0/SD_ILS:2332146
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar">https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137446797/?ar">https://learning.oreilly.com/videos/~/9780137446797/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137446797">https://learning.oreilly.com/videos/~/9780137446797</a><br/>Format: Video recording<br/>
8 steps to better security : a simple cyber resilience guide for business
ent://SD_ILS/0/SD_ILS:2330835
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Crawley, Kim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119811237/?ar">https://learning.oreilly.com/library/view/~/9781119811237/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119811237">https://learning.oreilly.com/library/view/~/9781119811237</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar">https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar</a><br/>Format: Electronic Resources<br/>
Securing AI.
ent://SD_ILS/0/SD_ILS:2332134
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Manjengwa, Shingai, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar">https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920672319/?ar">https://learning.oreilly.com/videos/~/0636920672319/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920672319">https://learning.oreilly.com/videos/~/0636920672319</a><br/>Format: Video recording<br/>
Intro to secure application deployment with Istio on Kubernetes.
ent://SD_ILS/0/SD_ILS:2332181
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Poddar, Neeraj, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202219">https://learning.oreilly.com/videos/~/10000MNHV202219</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202219/?ar">https://learning.oreilly.com/videos/~/10000MNHV202219/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar</a><br/>Format: Video recording<br/>
You can stop stupid : stopping losses from accidental and malicious actions
ent://SD_ILS/0/SD_ILS:2328968
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469078045">https://learning.oreilly.com/library/view/~/9781469078045</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469078045/?ar">https://go.oreilly.com/library-access/library/view/-/9781469078045/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469078045/?ar">https://learning.oreilly.com/library/view/~/9781469078045/?ar</a><br/>Format: Sound recording<br/>
Artificial Intelligence, Cybersecurity and Cyber Defence
ent://SD_ILS/0/SD_ILS:2328358
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format: Electronic Resources<br/>
Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict
ent://SD_ILS/0/SD_ILS:2329079
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Borges, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781801076203/?ar">https://learning.oreilly.com/library/view/~/9781801076203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076203">https://learning.oreilly.com/library/view/~/9781801076203</a><br/>Format: Electronic Resources<br/>
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests.
ent://SD_ILS/0/SD_ILS:2329571
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Chapple, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781119787631">https://learning.oreilly.com/library/view/~/9781119787631</a>
<a href="https://learning.oreilly.com/library/view/~/9781119787631/?ar">https://learning.oreilly.com/library/view/~/9781119787631/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119787631/?ar">https://go.oreilly.com/library-access/library/view/-/9781119787631/?ar</a><br/>Format: Electronic Resources<br/>
Information Risk Management A practitioner's guide
ent://SD_ILS/0/SD_ILS:2330297
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Sutton, David author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175751">https://learning.oreilly.com/library/view/~/9781780175751</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175751/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175751/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175751/?ar">https://learning.oreilly.com/library/view/~/9781780175751/?ar</a><br/>Format: Electronic Resources<br/>
Kubernetes security : attacking and defending Kubernetes
ent://SD_ILS/0/SD_ILS:2333386
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Martin, Andrew, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920668794/?ar">https://go.oreilly.com/library-access/library/view/-/0636920668794/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920668794/?ar">https://learning.oreilly.com/videos/~/0636920668794/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920668794">https://learning.oreilly.com/videos/~/0636920668794</a><br/>Format: Video recording<br/>
Alice and Bob learn application security.
ent://SD_ILS/0/SD_ILS:2325958
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Janca, Tanya.<br/><a href="https://learning.oreilly.com/library/view/~/9781119687351">https://learning.oreilly.com/library/view/~/9781119687351</a>
<a href="https://learning.oreilly.com/library/view/~/9781119687351/?ar">https://learning.oreilly.com/library/view/~/9781119687351/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar">https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar</a><br/>Format: Electronic Resources<br/>
Comptia security+ certification practice exams, (Exam SY0-601).
ent://SD_ILS/0/SD_ILS:2327137
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Lachance, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781260467987/?ar">https://learning.oreilly.com/library/view/~/9781260467987/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar">https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260467987">https://learning.oreilly.com/library/view/~/9781260467987</a><br/>Format: Electronic Resources<br/>
Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browser
ent://SD_ILS/0/SD_ILS:2331570
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Segala, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar">https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801075336/?ar">https://learning.oreilly.com/library/view/~/9781801075336/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801075336">https://learning.oreilly.com/library/view/~/9781801075336</a><br/>Format: Electronic Resources<br/>
Cyber Crisis
ent://SD_ILS/0/SD_ILS:2331316
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Cole, Eric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666125313">https://learning.oreilly.com/library/view/~/9781666125313</a>
<a href="https://learning.oreilly.com/library/view/~/9781666125313/?ar">https://learning.oreilly.com/library/view/~/9781666125313/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar">https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar</a><br/>Format: Electronic Resources<br/>
Crypto
ent://SD_ILS/0/SD_ILS:2331323
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Levy, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar">https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781666117615">https://learning.oreilly.com/library/view/~/9781666117615</a>
<a href="https://learning.oreilly.com/library/view/~/9781666117615/?ar">https://learning.oreilly.com/library/view/~/9781666117615/?ar</a><br/>Format: Electronic Resources<br/>
Information Risk Management : A practitioner's guide.
ent://SD_ILS/0/SD_ILS:2337073
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Sutton, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6733537">Click to View</a><br/>Format: Electronic Resources<br/>
Lifecycle IoT Security for Engineers.
ent://SD_ILS/0/SD_ILS:2337249
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Kaustubh, Dhondge.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6805253">Click to View</a><br/>Format: Electronic Resources<br/>
Strategy, leadership, and AI in the cyber ecosystem : the role of digital societies in information governance and decision making
ent://SD_ILS/0/SD_ILS:2326455
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Jahankhani, Hamid.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128214596/?ar">https://go.oreilly.com/library-access/library/view/-/9780128214596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128214596/?ar">https://learning.oreilly.com/library/view/~/9780128214596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128214596">https://learning.oreilly.com/library/view/~/9780128214596</a><br/>Format: Electronic Resources<br/>
COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION EXAM GUIDE (EXAM CS0-002)
ent://SD_ILS/0/SD_ILS:2326516
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Chapman, Brent.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar">https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260464313">https://learning.oreilly.com/library/view/~/9781260464313</a>
<a href="https://learning.oreilly.com/library/view/~/9781260464313/?ar">https://learning.oreilly.com/library/view/~/9781260464313/?ar</a><br/>Format: Electronic Resources<br/>
How cybersecurity really works : a hands-on guide for total beginners
ent://SD_ILS/0/SD_ILS:2328036
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Grubb, Sam (Cyber security consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999/?ar">https://learning.oreilly.com/library/view/~/9781098128999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128999">https://learning.oreilly.com/library/view/~/9781098128999</a><br/>Format: Electronic Resources<br/>
Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environment
ent://SD_ILS/0/SD_ILS:2356761
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Ackerman, Pascal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6730157">Click to View</a><br/>Format: Electronic Resources<br/>
The deviant security practices of cyber crime
ent://SD_ILS/0/SD_ILS:2356733
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Van de Sandt, Erik H.A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6697091">Click to View</a><br/>Format: Electronic Resources<br/>
Cyber security on Azure : an it professional's guide to Microsoft Azure security
ent://SD_ILS/0/SD_ILS:2327167
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484265314/?ar">https://learning.oreilly.com/library/view/~/9781484265314/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265314">https://learning.oreilly.com/library/view/~/9781484265314</a><br/>Format: Electronic Resources<br/>
Big breaches : cybersecurity lessons for everyone
ent://SD_ILS/0/SD_ILS:2328126
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Daswani, Neil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484266557">https://learning.oreilly.com/library/view/~/9781484266557</a>
<a href="https://learning.oreilly.com/library/view/~/9781484266557/?ar">https://learning.oreilly.com/library/view/~/9781484266557/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar">https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar</a><br/>Format: Electronic Resources<br/>
Android software internals quick reference : a field manual and security reference guide to Java-based Android components
ent://SD_ILS/0/SD_ILS:2328407
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Stevenson, James, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269145/?ar">https://learning.oreilly.com/library/view/~/9781484269145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269145">https://learning.oreilly.com/library/view/~/9781484269145</a><br/>Format: Electronic Resources<br/>
The official (ISC)2 CCSP CBK reference
ent://SD_ILS/0/SD_ILS:2329305
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Fife, Leslie, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119603436/?ar">https://go.oreilly.com/library-access/library/view/-/9781119603436/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119603436/?ar">https://learning.oreilly.com/library/view/~/9781119603436/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119603436">https://learning.oreilly.com/library/view/~/9781119603436</a><br/>Format: Electronic Resources<br/>
Implementing identity management on AWS : a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments
ent://SD_ILS/0/SD_ILS:2330023
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Lehtinen, Jon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800562288">https://learning.oreilly.com/library/view/~/9781800562288</a>
<a href="https://learning.oreilly.com/library/view/~/9781800562288/?ar">https://learning.oreilly.com/library/view/~/9781800562288/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar">https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar</a><br/>Format: Electronic Resources<br/>
CISSP (ISC)2 certification practice exams and tests : over 1000 practice questions and explanations covering all 8 CISSP domains for exam version May 2021
ent://SD_ILS/0/SD_ILS:2329634
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Jordan, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800561373">https://learning.oreilly.com/library/view/~/9781800561373</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800561373/?ar">https://go.oreilly.com/library-access/library/view/-/9781800561373/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800561373/?ar">https://learning.oreilly.com/library/view/~/9781800561373/?ar</a><br/>Format: Electronic Resources<br/>
Cyberjutsu : cybersecurity for the modern ninja
ent://SD_ILS/0/SD_ILS:2326541
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format: Electronic Resources<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:2327053
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Moschovitis, Christos J. P., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119658740">https://learning.oreilly.com/library/view/~/9781119658740</a>
<a href="https://learning.oreilly.com/library/view/~/9781119658740/?ar">https://learning.oreilly.com/library/view/~/9781119658740/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar">https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar</a><br/>Format: Electronic Resources<br/>
A complete guide to Burp Suite : learn to detect application vulnerabilities
ent://SD_ILS/0/SD_ILS:2326430
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484264027/?ar">https://learning.oreilly.com/library/view/~/9781484264027/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484264027/?ar">https://go.oreilly.com/library-access/library/view/-/9781484264027/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484264027">https://learning.oreilly.com/library/view/~/9781484264027</a><br/>Format: Electronic Resources<br/>
Start-up secure : baking cybersecurity into your company from founding to exit
ent://SD_ILS/0/SD_ILS:2327524
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Castaldo, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119700739">https://learning.oreilly.com/library/view/~/9781119700739</a>
<a href="https://learning.oreilly.com/library/view/~/9781119700739/?ar">https://learning.oreilly.com/library/view/~/9781119700739/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar">https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity in the COVID-19 pandemic
ent://SD_ILS/0/SD_ILS:2327730
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Okereafor, Kenneth, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781000357653/?ar">https://learning.oreilly.com/library/view/~/9781000357653/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar">https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000357653">https://learning.oreilly.com/library/view/~/9781000357653</a><br/>Format: Electronic Resources<br/>
Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environment
ent://SD_ILS/0/SD_ILS:2330315
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800202092/?ar">https://learning.oreilly.com/library/view/~/9781800202092/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202092">https://learning.oreilly.com/library/view/~/9781800202092</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar</a><br/>Format: Electronic Resources<br/>
Enterprise DevOps for Architects
ent://SD_ILS/0/SD_ILS:2330978
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Mulder, Jeroen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801812153">https://learning.oreilly.com/library/view/~/9781801812153</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812153/?ar">https://learning.oreilly.com/library/view/~/9781801812153/?ar</a><br/>Format: Electronic Resources<br/>
CYBER SECURITY AND DIGITAL FORENSICS
ent://SD_ILS/0/SD_ILS:2331441
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
<a href="https://learning.oreilly.com/library/view/~/9781119795636">https://learning.oreilly.com/library/view/~/9781119795636</a>
<a href="https://learning.oreilly.com/library/view/~/9781119795636/?ar">https://learning.oreilly.com/library/view/~/9781119795636/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar">https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar</a><br/>Format: Electronic Resources<br/>
Getting Started with z/OS Data Set Encryption
ent://SD_ILS/0/SD_ILS:2331252
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format: Electronic Resources<br/>
Real-world cryptography
ent://SD_ILS/0/SD_ILS:2332150
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Wong, David, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781617296710VE">https://learning.oreilly.com/videos/~/9781617296710VE</a>
<a href="https://learning.oreilly.com/videos/~/9781617296710VE/?ar">https://learning.oreilly.com/videos/~/9781617296710VE/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar</a><br/>Format: Video recording<br/>
Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering (CCE)
ent://SD_ILS/0/SD_ILS:2326323
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Bochman, Andrew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781000292978/?ar">https://go.oreilly.com/library-access/library/view/-/9781000292978/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000292978/?ar">https://learning.oreilly.com/library/view/~/9781000292978/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000292978">https://learning.oreilly.com/library/view/~/9781000292978</a><br/>Format: Electronic Resources<br/>
Protective security : creating military-grade defenses for your digital business
ent://SD_ILS/0/SD_ILS:2328579
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Seaman, Jim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484269084">https://learning.oreilly.com/library/view/~/9781484269084</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269084/?ar">https://learning.oreilly.com/library/view/~/9781484269084/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity and Third-Party Risk : Third Party Threat Hunting
ent://SD_ILS/0/SD_ILS:2329000
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Rasner, Gregory C.<br/><a href="https://learning.oreilly.com/library/view/~/9781119809555">https://learning.oreilly.com/library/view/~/9781119809555</a>
<a href="https://learning.oreilly.com/library/view/~/9781119809555/?ar">https://learning.oreilly.com/library/view/~/9781119809555/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar">https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar</a><br/>Format: Electronic Resources<br/>
Malware Analysis Techniques : Tricks for the Triage of Adversarial Software.
ent://SD_ILS/0/SD_ILS:2329154
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Barker, Dylan.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212277">https://learning.oreilly.com/library/view/~/9781839212277</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212277/?ar">https://learning.oreilly.com/library/view/~/9781839212277/?ar</a><br/>Format: Electronic Resources<br/>
Threat hunting with elastic stack : solve complex security challenges with integrated prevention, detection, and response
ent://SD_ILS/0/SD_ILS:2329469
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Pease, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801073783/?ar">https://go.oreilly.com/library-access/library/view/-/9781801073783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801073783">https://learning.oreilly.com/library/view/~/9781801073783</a>
<a href="https://learning.oreilly.com/library/view/~/9781801073783/?ar">https://learning.oreilly.com/library/view/~/9781801073783/?ar</a><br/>Format: Electronic Resources<br/>
Secure edge computing : applications, techniques and challenges.
ent://SD_ILS/0/SD_ILS:2329288
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Ahmed, Mohiuddin (Computer scientist), editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000427325/?ar">https://learning.oreilly.com/library/view/~/9781000427325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000427325">https://learning.oreilly.com/library/view/~/9781000427325</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar">https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar</a><br/>Format: Electronic Resources<br/>
Self-sovereign identity : decentralized digital identity and verifiable credentials
ent://SD_ILS/0/SD_ILS:2330270
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format: Electronic Resources<br/>
Azure security handbook : a comprehensive guide for defending your enterprise environment
ent://SD_ILS/0/SD_ILS:2329802
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Ots, Karl.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272923">https://learning.oreilly.com/library/view/~/9781484272923</a>
<a href="https://learning.oreilly.com/library/view/~/9781484272923/?ar">https://learning.oreilly.com/library/view/~/9781484272923/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar</a><br/>Format: Electronic Resources<br/>
Real-world cryptography
ent://SD_ILS/0/SD_ILS:2330383
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Wong, David (Cryptography engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710">https://learning.oreilly.com/library/view/~/9781617296710</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710/?ar">https://learning.oreilly.com/library/view/~/9781617296710/?ar</a><br/>Format: Electronic Resources<br/>
Threat modeling a practical guide for developing teams
ent://SD_ILS/0/SD_ILS:2331156
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Tarandach, Izar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056546/?ar">https://learning.oreilly.com/library/view/~/9781492056546/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492056546">https://learning.oreilly.com/library/view/~/9781492056546</a><br/>Format: Electronic Resources<br/>
Real-world cryptography
ent://SD_ILS/0/SD_ILS:2332808
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Wong, David (Cryptography engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617296710AU">https://learning.oreilly.com/library/view/~/9781617296710AU</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710AU/?ar">https://learning.oreilly.com/library/view/~/9781617296710AU/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar</a><br/>Format: Sound recording<br/>
Cybersecurity ABCs : delivering awareness, behaviours and culture change
ent://SD_ILS/0/SD_ILS:2333926
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Barker, Jessica (Cyber security), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780174266/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174266/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780174266/?ar">https://learning.oreilly.com/library/view/~/9781780174266/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780174266">https://learning.oreilly.com/library/view/~/9781780174266</a><br/>Format: Electronic Resources<br/>
Red Hat and IT security : with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditing
ent://SD_ILS/0/SD_ILS:2326514
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Chatterjee, Rithik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484264348">https://learning.oreilly.com/library/view/~/9781484264348</a>
<a href="https://learning.oreilly.com/library/view/~/9781484264348/?ar">https://learning.oreilly.com/library/view/~/9781484264348/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar">https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity Manager's Guide
ent://SD_ILS/0/SD_ILS:2327020
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Barnum, Todd.<br/><a href="https://learning.oreilly.com/library/view/~/9781492076209">https://learning.oreilly.com/library/view/~/9781492076209</a>
<a href="https://learning.oreilly.com/library/view/~/9781492076209/?ar">https://learning.oreilly.com/library/view/~/9781492076209/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar">https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar</a><br/>Format: Electronic Resources<br/>
Cyber threat intelligence : the no-nonsense guide for CISOs and Security Managers
ent://SD_ILS/0/SD_ILS:2329637
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Roberts, Aaron.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272206">https://learning.oreilly.com/library/view/~/9781484272206</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484272206/?ar">https://learning.oreilly.com/library/view/~/9781484272206/?ar</a><br/>Format: Electronic Resources<br/>
Art of attack : attacker mindset for security professionals.
ent://SD_ILS/0/SD_ILS:2329433
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Reynolds, Maxie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119805465/?ar">https://learning.oreilly.com/library/view/~/9781119805465/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119805465">https://learning.oreilly.com/library/view/~/9781119805465</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar">https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar</a><br/>Format: Electronic Resources<br/>
Practical threat intelligence and data-driven threat huntingx : Practical threat intelligence and data-driven threat hunting : a hands-on guide to threat hunting with the ATT&CK framework and open source tools
ent://SD_ILS/0/SD_ILS:2353626
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Palacin, Valentina, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6462896">Click to View</a><br/>Format: Electronic Resources<br/>
Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict
ent://SD_ILS/0/SD_ILS:2353735
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Borges, Dan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6640534">Click to View</a><br/>Format: Electronic Resources<br/>
Artificial intelligence and data mining approaches in security frameworks
ent://SD_ILS/0/SD_ILS:2358181
2024-05-28T06:03:20Z
2024-05-28T06:03:20Z
by Bhargava, Neeraj, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6693036">Click to View</a><br/>Format: Electronic Resources<br/>