Search Results for - Narrowed by: Computer security. - Guides et manuels. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Guides$002bet$002bmanuels.$002509Guides$002bet$002bmanuels.$0026ps$003d300? 2024-05-27T13:16:24Z The art of hacking : self paced traning kit for cyber security professionals ent://SD_ILS/0/SD_ILS:2315658 2024-05-27T13:16:24Z 2024-05-27T13:16:24Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854632/?ar">https://learning.oreilly.com/videos/~/9780134854632/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134854632/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854632/?ar</a><br/>Format:&#160;Electronic Resources<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:2316898 2024-05-27T13:16:24Z 2024-05-27T13:16:24Z by&#160;Harper, Allen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260108422/?ar">https://learning.oreilly.com/library/view/~/9781260108422/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260108422/?ar">https://go.oreilly.com/library-access/library/view/-/9781260108422/?ar</a><br/>Format:&#160;Electronic Resources<br/> The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets ent://SD_ILS/0/SD_ILS:2315032 2024-05-27T13:16:24Z 2024-05-27T13:16:24Z by&#160;Wallace, Michael, 1960- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814438770/?ar">https://learning.oreilly.com/library/view/~/9780814438770/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar">https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar</a><br/>Format:&#160;Electronic Resources<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:2311609 2024-05-27T13:16:24Z 2024-05-27T13:16:24Z by&#160;Griffor, Edward R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128038383/?ar">https://learning.oreilly.com/library/view/~/9780128038383/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar">https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128038383">https://learning.oreilly.com/library/view/~/9780128038383</a><br/>Format:&#160;Electronic Resources<br/> Information Security Management Handbook, Volume 6, 6th Edition ent://SD_ILS/0/SD_ILS:2323397 2024-05-27T13:16:24Z 2024-05-27T13:16:24Z by&#160;Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a> <a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format:&#160;Electronic Resources<br/> The antivirus hacker's handbook ent://SD_ILS/0/SD_ILS:2308160 2024-05-27T13:16:24Z 2024-05-27T13:16:24Z by&#160;Koret, Joxean, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119028758/?ar">https://learning.oreilly.com/library/view/~/9781119028758/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119028758/?ar">https://go.oreilly.com/library-access/library/view/-/9781119028758/?ar</a><br/>Format:&#160;Electronic Resources<br/> The security consultant's handbook ent://SD_ILS/0/SD_ILS:2309072 2024-05-27T13:16:24Z 2024-05-27T13:16:24Z by&#160;Bingley, Richard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287500">https://learning.oreilly.com/library/view/~/9781849287500</a> <a href="https://learning.oreilly.com/library/view/~/9781849287500/?ar">https://learning.oreilly.com/library/view/~/9781849287500/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar</a><br/>Format:&#160;Electronic Resources<br/> The InfoSec handbook : an introduction to information security ent://SD_ILS/0/SD_ILS:2304393 2024-05-27T13:16:24Z 2024-05-27T13:16:24Z by&#160;Rao, Umesh Hodeghatta, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263838">https://learning.oreilly.com/library/view/~/9781430263838</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430263838/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263838/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430263838/?ar">https://learning.oreilly.com/library/view/~/9781430263838/?ar</a><br/>Format:&#160;Electronic Resources<br/> Thor's Microsoft security bible : a collection of practical security techniques ent://SD_ILS/0/SD_ILS:2291971 2024-05-27T13:16:24Z 2024-05-27T13:16:24Z by&#160;Mullen, Timothy M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495738/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495738/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495738/?ar">https://learning.oreilly.com/library/view/~/9781597495738/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495738">https://learning.oreilly.com/library/view/~/9781597495738</a><br/>Format:&#160;Electronic Resources<br/>