Search Results for - Narrowed by: Computer security. - Internet -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Internet$002b--$002bSecurity$002bmeasures.$002509Internet$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue? 2024-09-22T12:18:06Z Deploying a modern security data lake ent://SD_ILS/0/SD_ILS:2333965 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Baum, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098134983/?ar">https://learning.oreilly.com/library/view/~/9781098134983/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar">https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098134983">https://learning.oreilly.com/library/view/~/9781098134983</a><br/>Format:&#160;Electronic Resources<br/> Burp Suite unfiltered : go from a beginner to advanced. ent://SD_ILS/0/SD_ILS:2335463 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Yadav, Avinash, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837639199">https://learning.oreilly.com/videos/~/9781837639199</a> <a href="https://learning.oreilly.com/videos/~/9781837639199/?ar">https://learning.oreilly.com/videos/~/9781837639199/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781837639199/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639199/?ar</a><br/>Format:&#160;Video recording<br/> The art of cyber security : a practical guide to winning the war on cyber crime ent://SD_ILS/0/SD_ILS:2333417 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Hibberd, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783676">https://learning.oreilly.com/library/view/~/9781787783676</a> <a href="https://learning.oreilly.com/library/view/~/9781787783676/?ar">https://learning.oreilly.com/library/view/~/9781787783676/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar</a><br/>Format:&#160;Electronic Resources<br/> ETHICAL GUIDE TO CYBER ANONYMITY concepts, tools,and techniques to be anonymous from criminals, unethical hackers, and governments ent://SD_ILS/0/SD_ILS:2335153 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Gunawardana, Kushantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801810210">https://learning.oreilly.com/library/view/~/9781801810210</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801810210/?ar">https://go.oreilly.com/library-access/library/view/-/9781801810210/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801810210/?ar">https://learning.oreilly.com/library/view/~/9781801810210/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacks ent://SD_ILS/0/SD_ILS:2329941 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Peiris, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119804062/?ar">https://learning.oreilly.com/library/view/~/9781119804062/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar">https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119804062">https://learning.oreilly.com/library/view/~/9781119804062</a><br/>Format:&#160;Electronic Resources<br/> Exposed : how revealing your data and eliminating privacy increases trust and liberates humanity ent://SD_ILS/0/SD_ILS:2326413 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a> <a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe ent://SD_ILS/0/SD_ILS:2324802 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format:&#160;Electronic Resources<br/> Linux essentials for cybersecurity lab manual ent://SD_ILS/0/SD_ILS:2317558 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web hacking : become a professional web pentester ent://SD_ILS/0/SD_ILS:2319831 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format:&#160;Electronic Resources<br/> My online privacy for seniors ent://SD_ILS/0/SD_ILS:2319412 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Rich, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135381281/?ar">https://learning.oreilly.com/library/view/~/9780135381281/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar">https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar</a><br/>Format:&#160;Electronic Resources<br/> Distributed Denial of Service (DDoS) : practical detection and defense ent://SD_ILS/0/SD_ILS:2318176 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Chou, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar">https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492026181">https://learning.oreilly.com/library/view/~/9781492026181</a> <a href="https://learning.oreilly.com/library/view/~/9781492026181/?ar">https://learning.oreilly.com/library/view/~/9781492026181/?ar</a><br/>Format:&#160;Electronic Resources<br/> Die Kunst der Anonymit&auml;t im Internet : so sch&uuml;tzen Sie Ihre Identit&auml;t und Ihre Daten ent://SD_ILS/0/SD_ILS:2315011 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format:&#160;Electronic Resources<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:2211615 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Li, Shancang, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4786871">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Personal cybersecurity : how to avoid and recover from cybercrime ent://SD_ILS/0/SD_ILS:2312349 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Waschke, Marvin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484224304/?ar">https://go.oreilly.com/library-access/library/view/-/9781484224304/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484224304/?ar">https://learning.oreilly.com/library/view/~/9781484224304/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484224304">https://learning.oreilly.com/library/view/~/9781484224304</a><br/>Format:&#160;Electronic Resources<br/> Google hacking for penetration testers ent://SD_ILS/0/SD_ILS:2309293 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Long, Johnny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029824/?ar">https://learning.oreilly.com/library/view/~/9780128029824/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for hospitals and healthcare facilities : a guide to detection and prevention ent://SD_ILS/0/SD_ILS:2311610 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Ayala, Luis, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484221556/?ar">https://go.oreilly.com/library-access/library/view/-/9781484221556/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484221556/?ar">https://learning.oreilly.com/library/view/~/9781484221556/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484221556">https://learning.oreilly.com/library/view/~/9781484221556</a><br/>Format:&#160;Electronic Resources<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:2304682 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Hexmoor, Henry, 1960- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128008911/?ar">https://learning.oreilly.com/library/view/~/9780128008911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128008911">https://learning.oreilly.com/library/view/~/9780128008911</a><br/>Format:&#160;Electronic Resources<br/> Web security : a whitehat perspective ent://SD_ILS/0/SD_ILS:2306712 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Wu, Hanqing, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592612/?ar">https://learning.oreilly.com/library/view/~/9781466592612/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466592612/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592612/?ar</a><br/>Format:&#160;Electronic Resources<br/> Beyond cybersecurity : protecting your digital business ent://SD_ILS/0/SD_ILS:2306934 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Kaplan, James M., 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119026846">https://learning.oreilly.com/library/view/~/9781119026846</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar">https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119026846/?ar">https://learning.oreilly.com/library/view/~/9781119026846/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise cybersecurity : how to build a successful cyberdefense program against advanced threats ent://SD_ILS/0/SD_ILS:2307313 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Donaldson, Scott E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430260837/?ar">https://go.oreilly.com/library-access/library/view/-/9781430260837/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430260837/?ar">https://learning.oreilly.com/library/view/~/9781430260837/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430260837">https://learning.oreilly.com/library/view/~/9781430260837</a><br/>Format:&#160;Electronic Resources<br/> Getting started with cybersecurity science ent://SD_ILS/0/SD_ILS:2308150 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Dykstra, Josiah, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491936528/?ar">https://go.oreilly.com/library-access/library/view/-/9781491936528/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491936528/?ar">https://learning.oreilly.com/videos/~/9781491936528/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web security : a whitehat perspective ent://SD_ILS/0/SD_ILS:2270388 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Wu, Hanqing, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1566016">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:2208145 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1798312">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security : principles and practices ent://SD_ILS/0/SD_ILS:2303412 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Security+ ent://SD_ILS/0/SD_ILS:2304906 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Long, Mark.<br/><a href="https://learning.oreilly.com/videos/~/9781771372831/?ar">https://learning.oreilly.com/videos/~/9781771372831/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar">https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:2302592 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Carvey, Harlan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124171572/?ar">https://learning.oreilly.com/library/view/~/9780124171572/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar</a><br/>Format:&#160;Electronic Resources<br/> Chinese cybersecurity and defense ent://SD_ILS/0/SD_ILS:2307130 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Ventre, Daniel, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119009139/?ar">https://learning.oreilly.com/library/view/~/9781119009139/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119009139/?ar">https://go.oreilly.com/library-access/library/view/-/9781119009139/?ar</a><br/>Format:&#160;Electronic Resources<br/> Iste : Chinese Cybersecurity and Cyberdefense. ent://SD_ILS/0/SD_ILS:1275401 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1765106">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Burp suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the job ent://SD_ILS/0/SD_ILS:2224344 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Mahajan, Akash, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1879299">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Datennutzungs- und datenschutzvertr&auml;ge : muster, klauseln, erl&auml;uterungen ent://SD_ILS/0/SD_ILS:2119102 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Moos, Flemming, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2129586">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:2207293 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1659012">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:2206025 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1058152">Click to View</a><br/>Format:&#160;Electronic Resources<br/> RC4 stream cipher and its variants ent://SD_ILS/0/SD_ILS:2293173 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Paul, Goutam.<br/><a href="https://learning.oreilly.com/library/view/~/9781439831373">https://learning.oreilly.com/library/view/~/9781439831373</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar">https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439831373/?ar">https://learning.oreilly.com/library/view/~/9781439831373/?ar</a><br/>Format:&#160;Electronic Resources<br/> An introduction to hacking and crimeware : a pocket guide ent://SD_ILS/0/SD_ILS:2294606 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Loewengart, Victoria, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283304">https://learning.oreilly.com/library/view/~/9781849283304</a> <a href="https://learning.oreilly.com/library/view/~/9781849283304/?ar">https://learning.oreilly.com/library/view/~/9781849283304/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283304/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283304/?ar</a><br/>Format:&#160;Electronic Resources<br/> 125 sposob&oacute;w na bezpieczeństwo sieci ent://SD_ILS/0/SD_ILS:2299439 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176357/?ar">https://learning.oreilly.com/library/view/~/9781457176357/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit ent://SD_ILS/0/SD_ILS:2295823 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:2205581 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=850700">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The web application hacker's handbook : finding and exploiting security flaws ent://SD_ILS/0/SD_ILS:2292844 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Stuttard, Dafydd, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9781118026472/?ar">https://learning.oreilly.com/library/view/~/9781118026472/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118026472/?ar">https://go.oreilly.com/library-access/library/view/-/9781118026472/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118026472">https://learning.oreilly.com/library/view/~/9781118026472</a><br/>Format:&#160;Electronic Resources<br/> Web commerce security : design and development ent://SD_ILS/0/SD_ILS:2292686 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Nahari, Hadi.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar">https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470624463/?ar">https://learning.oreilly.com/library/view/~/9780470624463/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470624463">https://learning.oreilly.com/library/view/~/9780470624463</a><br/>Format:&#160;Electronic Resources<br/> Web Commerce Security : Design and Development. ent://SD_ILS/0/SD_ILS:1228884 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Nahari, Hadi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706729">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The web application hacker's handbook finding and exploiting security flaws ent://SD_ILS/0/SD_ILS:2141490 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Stuttard, Dafydd.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=819008">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Spring Security 3. ent://SD_ILS/0/SD_ILS:1245197 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Mularien, Peter.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944051">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis DVD toolkit 2E ent://SD_ILS/0/SD_ILS:2287802 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format:&#160;Electronic Resources<br/> Distributed Systems Security : Issues, Processes and Solutions. ent://SD_ILS/0/SD_ILS:1205804 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Belapurkar, Abhijit.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=437429">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:2284509 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Long, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491761/?ar">https://learning.oreilly.com/library/view/~/9781597491761/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar</a><br/>Format:&#160;Electronic Resources<br/> Crimeware : understanding new attacks and defenses ent://SD_ILS/0/SD_ILS:2285587 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Jakobsson, Markus.<br/><a href="https://learning.oreilly.com/library/view/~/9780321553744/?ar">https://learning.oreilly.com/library/view/~/9780321553744/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar">https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Web services practical usage of standards and specifications ent://SD_ILS/0/SD_ILS:2261882 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Periorellis, Panos.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6</a><br/>Format:&#160;Electronic Resources<br/> The web application hacker's handbook : discovering and exploiting security flaws ent://SD_ILS/0/SD_ILS:2288534 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Stuttard, Dafydd, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470170779/?ar">https://learning.oreilly.com/library/view/~/9780470170779/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar">https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470170779">https://learning.oreilly.com/library/view/~/9780470170779</a><br/>Format:&#160;Electronic Resources<br/> Windows Forensic Analysis DVD Toolkit. ent://SD_ILS/0/SD_ILS:1196518 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Carvey, Harlan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328624">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How personal &amp; Internet security works ent://SD_ILS/0/SD_ILS:2282444 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Gralla, Preston.<br/><a href="https://learning.oreilly.com/library/view/~/0789735539/?ar">https://learning.oreilly.com/library/view/~/0789735539/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0789735539/?ar">https://go.oreilly.com/library-access/library/view/-/0789735539/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Internet security and acceleration (ISA) server 2004 administrator's pocket consultant ent://SD_ILS/0/SD_ILS:2282446 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Ratliff, Bud, 1970-<br/><a href="https://learning.oreilly.com/library/view/~/0735621888">https://learning.oreilly.com/library/view/~/0735621888</a> <a href="https://learning.oreilly.com/library/view/~/0735621888/?ar">https://learning.oreilly.com/library/view/~/0735621888/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0735621888/?ar">https://go.oreilly.com/library-access/library/view/-/0735621888/?ar</a><br/>Format:&#160;Electronic Resources<br/> Essential Computer Security : Everyone's Guide to Email, Internet, and Wireless Security. ent://SD_ILS/0/SD_ILS:1195846 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Bradley, T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=319200">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Essential computer security everyone's guide to e-mail, Internet, and wireless security ent://SD_ILS/0/SD_ILS:64324 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Bradley, Tony, 1969-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Windows, Linux, BSD i&ccedil;in ağ g&uuml;venliği ipu&ccedil;ları : 100 etkin g&uuml;venlik tekniği ent://SD_ILS/0/SD_ILS:18875 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Lockhart, Andrew.<br/>Format:&#160;Books<br/> Network security hacks ent://SD_ILS/0/SD_ILS:2282983 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596527632/?ar">https://go.oreilly.com/library-access/library/view/-/0596527632/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596527632">https://learning.oreilly.com/library/view/~/0596527632</a> <a href="https://learning.oreilly.com/library/view/~/0596527632/?ar">https://learning.oreilly.com/library/view/~/0596527632/?ar</a><br/>Format:&#160;Electronic Resources<br/> part-themed issue on internet security. ent://SD_ILS/0/SD_ILS:1190556 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Yague, Dr Mariemma.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=285507">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Essential computer security : everyone's guide to e-mail, Internet, and wireless security ent://SD_ILS/0/SD_ILS:2316026 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Bradley, Tony, 1969- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491143/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491143/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491143/?ar">https://learning.oreilly.com/library/view/~/9781597491143/?ar</a><br/>Format:&#160;Electronic Resources<br/> Aggressive Network Self-Defense. ent://SD_ILS/0/SD_ILS:1183008 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Wyler, Neil R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=225321">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:65437 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:2282271 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Wyler, Neil R.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836203">https://learning.oreilly.com/library/view/~/9781931836203</a> <a href="https://learning.oreilly.com/library/view/~/9781931836203/?ar">https://learning.oreilly.com/library/view/~/9781931836203/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836203/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836203/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781931836203">https://www.sciencedirect.com/science/book/9781931836203</a><br/>Format:&#160;Electronic Resources<br/> Network security hacks ent://SD_ILS/0/SD_ILS:2281377 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596006438/?ar">https://go.oreilly.com/library-access/library/view/-/0596006438/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596006438/?ar">https://learning.oreilly.com/library/view/~/0596006438/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596006438">https://learning.oreilly.com/library/view/~/0596006438</a><br/>Format:&#160;Electronic Resources<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:65621 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">An electronic book accessible through the World Wide Web; click for information</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2003062590.html">http://www.loc.gov/catdir/toc/els051/2003062590.html</a> Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003062590.html">http://www.loc.gov/catdir/description/els041/2003062590.html</a><br/>Format:&#160;Electronic Resources<br/> Google Hacking for Penetration Testers. ent://SD_ILS/0/SD_ILS:1192039 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Long, Johnny.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294147">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security : Secrets, Intruders and ID Tags. ent://SD_ILS/0/SD_ILS:1326744 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Internet security a jumpstart for systems administrators and IT managers ent://SD_ILS/0/SD_ILS:65631 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003279708.html">http://www.loc.gov/catdir/description/els041/2003279708.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els041/2003279708.html">http://www.loc.gov/catdir/toc/els041/2003279708.html</a><br/>Format:&#160;Electronic Resources<br/> Designing Network Security Second Edition ent://SD_ILS/0/SD_ILS:2319725 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Kaeo, Merike, author.<br/><a href="https://learning.oreilly.com/library/view/~/1587051176/?ar">https://learning.oreilly.com/library/view/~/1587051176/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587051176">https://learning.oreilly.com/library/view/~/1587051176</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587051176/?ar">https://go.oreilly.com/library-access/library/view/-/1587051176/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privacy defended : protecting yourself online ent://SD_ILS/0/SD_ILS:2280776 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Bahadur, Gary.<br/><a href="https://learning.oreilly.com/library/view/~/078972605X">https://learning.oreilly.com/library/view/~/078972605X</a> <a href="https://learning.oreilly.com/library/view/~/078972605X/?ar">https://learning.oreilly.com/library/view/~/078972605X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/078972605X/?ar">https://go.oreilly.com/library-access/library/view/-/078972605X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Special Issue On Internet Security. ent://SD_ILS/0/SD_ILS:1183888 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Warren, Mathew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=232281">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network Intrusion Detection, Third Edition ent://SD_ILS/0/SD_ILS:2319734 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Northcutt, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735712654/?ar">https://go.oreilly.com/library-access/library/view/-/0735712654/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735712654">https://learning.oreilly.com/library/view/~/0735712654</a> <a href="https://learning.oreilly.com/library/view/~/0735712654/?ar">https://learning.oreilly.com/library/view/~/0735712654/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:65761 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Traxler, Julie.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing Your E-commerce Web Site : The Only Way to Stop a Hacker is to Think Like One. ent://SD_ILS/0/SD_ILS:1192045 2024-09-22T12:18:06Z 2024-09-22T12:18:06Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294156">Click to View</a><br/>Format:&#160;Electronic Resources<br/>