Search Results for - Narrowed by: Computer security. - Internet -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Internet$002b--$002bSecurity$002bmeasures.$002509Internet$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue?2024-09-22T12:18:06ZDeploying a modern security data lakeent://SD_ILS/0/SD_ILS:23339652024-09-22T12:18:06Z2024-09-22T12:18:06Zby Baum, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098134983/?ar">https://learning.oreilly.com/library/view/~/9781098134983/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar">https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098134983">https://learning.oreilly.com/library/view/~/9781098134983</a><br/>Format: Electronic Resources<br/>Burp Suite unfiltered : go from a beginner to advanced.ent://SD_ILS/0/SD_ILS:23354632024-09-22T12:18:06Z2024-09-22T12:18:06Zby Yadav, Avinash, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837639199">https://learning.oreilly.com/videos/~/9781837639199</a>
<a href="https://learning.oreilly.com/videos/~/9781837639199/?ar">https://learning.oreilly.com/videos/~/9781837639199/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837639199/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639199/?ar</a><br/>Format: Video recording<br/>The art of cyber security : a practical guide to winning the war on cyber crimeent://SD_ILS/0/SD_ILS:23334172024-09-22T12:18:06Z2024-09-22T12:18:06Zby Hibberd, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783676">https://learning.oreilly.com/library/view/~/9781787783676</a>
<a href="https://learning.oreilly.com/library/view/~/9781787783676/?ar">https://learning.oreilly.com/library/view/~/9781787783676/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar</a><br/>Format: Electronic Resources<br/>ETHICAL GUIDE TO CYBER ANONYMITY concepts, tools,and techniques to be anonymous from criminals, unethical hackers, and governmentsent://SD_ILS/0/SD_ILS:23351532024-09-22T12:18:06Z2024-09-22T12:18:06Zby Gunawardana, Kushantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801810210">https://learning.oreilly.com/library/view/~/9781801810210</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801810210/?ar">https://go.oreilly.com/library-access/library/view/-/9781801810210/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801810210/?ar">https://learning.oreilly.com/library/view/~/9781801810210/?ar</a><br/>Format: Electronic Resources<br/>Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacksent://SD_ILS/0/SD_ILS:23299412024-09-22T12:18:06Z2024-09-22T12:18:06Zby Peiris, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119804062/?ar">https://learning.oreilly.com/library/view/~/9781119804062/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar">https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119804062">https://learning.oreilly.com/library/view/~/9781119804062</a><br/>Format: Electronic Resources<br/>Exposed : how revealing your data and eliminating privacy increases trust and liberates humanityent://SD_ILS/0/SD_ILS:23264132024-09-22T12:18:06Z2024-09-22T12:18:06Zby Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a>
<a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format: Electronic Resources<br/>Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safeent://SD_ILS/0/SD_ILS:23248022024-09-22T12:18:06Z2024-09-22T12:18:06Zby Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format: Electronic Resources<br/>Linux essentials for cybersecurity lab manualent://SD_ILS/0/SD_ILS:23175582024-09-22T12:18:06Z2024-09-22T12:18:06Zby Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format: Electronic Resources<br/>Web hacking : become a professional web pentesterent://SD_ILS/0/SD_ILS:23198312024-09-22T12:18:06Z2024-09-22T12:18:06Zby Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format: Electronic Resources<br/>My online privacy for seniorsent://SD_ILS/0/SD_ILS:23194122024-09-22T12:18:06Z2024-09-22T12:18:06Zby Rich, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135381281/?ar">https://learning.oreilly.com/library/view/~/9780135381281/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar">https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar</a><br/>Format: Electronic Resources<br/>Distributed Denial of Service (DDoS) : practical detection and defenseent://SD_ILS/0/SD_ILS:23181762024-09-22T12:18:06Z2024-09-22T12:18:06Zby Chou, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar">https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492026181">https://learning.oreilly.com/library/view/~/9781492026181</a>
<a href="https://learning.oreilly.com/library/view/~/9781492026181/?ar">https://learning.oreilly.com/library/view/~/9781492026181/?ar</a><br/>Format: Electronic Resources<br/>Die Kunst der Anonymität im Internet : so schützen Sie Ihre Identität und Ihre Datenent://SD_ILS/0/SD_ILS:23150112024-09-22T12:18:06Z2024-09-22T12:18:06Zby Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format: Electronic Resources<br/>Securing the internet of thingsent://SD_ILS/0/SD_ILS:22116152024-09-22T12:18:06Z2024-09-22T12:18:06Zby Li, Shancang, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4786871">Click to View</a><br/>Format: Electronic Resources<br/>Personal cybersecurity : how to avoid and recover from cybercrimeent://SD_ILS/0/SD_ILS:23123492024-09-22T12:18:06Z2024-09-22T12:18:06Zby Waschke, Marvin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484224304/?ar">https://go.oreilly.com/library-access/library/view/-/9781484224304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484224304/?ar">https://learning.oreilly.com/library/view/~/9781484224304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484224304">https://learning.oreilly.com/library/view/~/9781484224304</a><br/>Format: Electronic Resources<br/>Google hacking for penetration testersent://SD_ILS/0/SD_ILS:23092932024-09-22T12:18:06Z2024-09-22T12:18:06Zby Long, Johnny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029824/?ar">https://learning.oreilly.com/library/view/~/9780128029824/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity for hospitals and healthcare facilities : a guide to detection and preventionent://SD_ILS/0/SD_ILS:23116102024-09-22T12:18:06Z2024-09-22T12:18:06Zby Ayala, Luis, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484221556/?ar">https://go.oreilly.com/library-access/library/view/-/9781484221556/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484221556/?ar">https://learning.oreilly.com/library/view/~/9781484221556/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484221556">https://learning.oreilly.com/library/view/~/9781484221556</a><br/>Format: Electronic Resources<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:23046822024-09-22T12:18:06Z2024-09-22T12:18:06Zby Hexmoor, Henry, 1960- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008911/?ar">https://learning.oreilly.com/library/view/~/9780128008911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128008911">https://learning.oreilly.com/library/view/~/9780128008911</a><br/>Format: Electronic Resources<br/>Web security : a whitehat perspectiveent://SD_ILS/0/SD_ILS:23067122024-09-22T12:18:06Z2024-09-22T12:18:06Zby Wu, Hanqing, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592612/?ar">https://learning.oreilly.com/library/view/~/9781466592612/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466592612/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592612/?ar</a><br/>Format: Electronic Resources<br/>Beyond cybersecurity : protecting your digital businessent://SD_ILS/0/SD_ILS:23069342024-09-22T12:18:06Z2024-09-22T12:18:06Zby Kaplan, James M., 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119026846">https://learning.oreilly.com/library/view/~/9781119026846</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar">https://go.oreilly.com/library-access/library/view/-/9781119026846/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119026846/?ar">https://learning.oreilly.com/library/view/~/9781119026846/?ar</a><br/>Format: Electronic Resources<br/>Enterprise cybersecurity : how to build a successful cyberdefense program against advanced threatsent://SD_ILS/0/SD_ILS:23073132024-09-22T12:18:06Z2024-09-22T12:18:06Zby Donaldson, Scott E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430260837/?ar">https://go.oreilly.com/library-access/library/view/-/9781430260837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430260837/?ar">https://learning.oreilly.com/library/view/~/9781430260837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430260837">https://learning.oreilly.com/library/view/~/9781430260837</a><br/>Format: Electronic Resources<br/>Getting started with cybersecurity scienceent://SD_ILS/0/SD_ILS:23081502024-09-22T12:18:06Z2024-09-22T12:18:06Zby Dykstra, Josiah, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491936528/?ar">https://go.oreilly.com/library-access/library/view/-/9781491936528/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491936528/?ar">https://learning.oreilly.com/videos/~/9781491936528/?ar</a><br/>Format: Electronic Resources<br/>Web security : a whitehat perspectiveent://SD_ILS/0/SD_ILS:22703882024-09-22T12:18:06Z2024-09-22T12:18:06Zby Wu, Hanqing, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1566016">Click to View</a><br/>Format: Electronic Resources<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:22081452024-09-22T12:18:06Z2024-09-22T12:18:06Zby Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1798312">Click to View</a><br/>Format: Electronic Resources<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:23034122024-09-22T12:18:06Z2024-09-22T12:18:06Zby Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format: Electronic Resources<br/>CompTIA Security+ent://SD_ILS/0/SD_ILS:23049062024-09-22T12:18:06Z2024-09-22T12:18:06Zby Long, Mark.<br/><a href="https://learning.oreilly.com/videos/~/9781771372831/?ar">https://learning.oreilly.com/videos/~/9781771372831/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar">https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:23025922024-09-22T12:18:06Z2024-09-22T12:18:06Zby Carvey, Harlan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124171572/?ar">https://learning.oreilly.com/library/view/~/9780124171572/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar</a><br/>Format: Electronic Resources<br/>Chinese cybersecurity and defenseent://SD_ILS/0/SD_ILS:23071302024-09-22T12:18:06Z2024-09-22T12:18:06Zby Ventre, Daniel, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119009139/?ar">https://learning.oreilly.com/library/view/~/9781119009139/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119009139/?ar">https://go.oreilly.com/library-access/library/view/-/9781119009139/?ar</a><br/>Format: Electronic Resources<br/>Iste : Chinese Cybersecurity and Cyberdefense.ent://SD_ILS/0/SD_ILS:12754012024-09-22T12:18:06Z2024-09-22T12:18:06Zby Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1765106">Click to View</a><br/>Format: Electronic Resources<br/>Burp suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the jobent://SD_ILS/0/SD_ILS:22243442024-09-22T12:18:06Z2024-09-22T12:18:06Zby Mahajan, Akash, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1879299">Click to View</a><br/>Format: Electronic Resources<br/>Datennutzungs- und datenschutzverträge : muster, klauseln, erläuterungenent://SD_ILS/0/SD_ILS:21191022024-09-22T12:18:06Z2024-09-22T12:18:06Zby Moos, Flemming, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2129586">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:22072932024-09-22T12:18:06Z2024-09-22T12:18:06Zby Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1659012">Click to View</a><br/>Format: Electronic Resources<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:22060252024-09-22T12:18:06Z2024-09-22T12:18:06Zby Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1058152">Click to View</a><br/>Format: Electronic Resources<br/>RC4 stream cipher and its variantsent://SD_ILS/0/SD_ILS:22931732024-09-22T12:18:06Z2024-09-22T12:18:06Zby Paul, Goutam.<br/><a href="https://learning.oreilly.com/library/view/~/9781439831373">https://learning.oreilly.com/library/view/~/9781439831373</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar">https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439831373/?ar">https://learning.oreilly.com/library/view/~/9781439831373/?ar</a><br/>Format: Electronic Resources<br/>An introduction to hacking and crimeware : a pocket guideent://SD_ILS/0/SD_ILS:22946062024-09-22T12:18:06Z2024-09-22T12:18:06Zby Loewengart, Victoria, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283304">https://learning.oreilly.com/library/view/~/9781849283304</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283304/?ar">https://learning.oreilly.com/library/view/~/9781849283304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283304/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283304/?ar</a><br/>Format: Electronic Resources<br/>125 sposobów na bezpieczeństwo siecient://SD_ILS/0/SD_ILS:22994392024-09-22T12:18:06Z2024-09-22T12:18:06Zby Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176357/?ar">https://learning.oreilly.com/library/view/~/9781457176357/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkitent://SD_ILS/0/SD_ILS:22958232024-09-22T12:18:06Z2024-09-22T12:18:06Zby Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:22055812024-09-22T12:18:06Z2024-09-22T12:18:06Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=850700">Click to View</a><br/>Format: Electronic Resources<br/>The web application hacker's handbook : finding and exploiting security flawsent://SD_ILS/0/SD_ILS:22928442024-09-22T12:18:06Z2024-09-22T12:18:06Zby Stuttard, Dafydd, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9781118026472/?ar">https://learning.oreilly.com/library/view/~/9781118026472/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118026472/?ar">https://go.oreilly.com/library-access/library/view/-/9781118026472/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118026472">https://learning.oreilly.com/library/view/~/9781118026472</a><br/>Format: Electronic Resources<br/>Web commerce security : design and developmentent://SD_ILS/0/SD_ILS:22926862024-09-22T12:18:06Z2024-09-22T12:18:06Zby Nahari, Hadi.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar">https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470624463/?ar">https://learning.oreilly.com/library/view/~/9780470624463/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470624463">https://learning.oreilly.com/library/view/~/9780470624463</a><br/>Format: Electronic Resources<br/>Web Commerce Security : Design and Development.ent://SD_ILS/0/SD_ILS:12288842024-09-22T12:18:06Z2024-09-22T12:18:06Zby Nahari, Hadi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706729">Click to View</a><br/>Format: Electronic Resources<br/>The web application hacker's handbook finding and exploiting security flawsent://SD_ILS/0/SD_ILS:21414902024-09-22T12:18:06Z2024-09-22T12:18:06Zby Stuttard, Dafydd.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=819008">Click to View</a><br/>Format: Electronic Resources<br/>Spring Security 3.ent://SD_ILS/0/SD_ILS:12451972024-09-22T12:18:06Z2024-09-22T12:18:06Zby Mularien, Peter.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944051">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis DVD toolkit 2Eent://SD_ILS/0/SD_ILS:22878022024-09-22T12:18:06Z2024-09-22T12:18:06Zby Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format: Electronic Resources<br/>Distributed Systems Security : Issues, Processes and Solutions.ent://SD_ILS/0/SD_ILS:12058042024-09-22T12:18:06Z2024-09-22T12:18:06Zby Belapurkar, Abhijit.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=437429">Click to View</a><br/>Format: Electronic Resources<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:22845092024-09-22T12:18:06Z2024-09-22T12:18:06Zby Long, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491761/?ar">https://learning.oreilly.com/library/view/~/9781597491761/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar</a><br/>Format: Electronic Resources<br/>Crimeware : understanding new attacks and defensesent://SD_ILS/0/SD_ILS:22855872024-09-22T12:18:06Z2024-09-22T12:18:06Zby Jakobsson, Markus.<br/><a href="https://learning.oreilly.com/library/view/~/9780321553744/?ar">https://learning.oreilly.com/library/view/~/9780321553744/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar">https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar</a><br/>Format: Electronic Resources<br/>Securing Web services practical usage of standards and specificationsent://SD_ILS/0/SD_ILS:22618822024-09-22T12:18:06Z2024-09-22T12:18:06Zby Periorellis, Panos.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6</a><br/>Format: Electronic Resources<br/>The web application hacker's handbook : discovering and exploiting security flawsent://SD_ILS/0/SD_ILS:22885342024-09-22T12:18:06Z2024-09-22T12:18:06Zby Stuttard, Dafydd, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470170779/?ar">https://learning.oreilly.com/library/view/~/9780470170779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar">https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470170779">https://learning.oreilly.com/library/view/~/9780470170779</a><br/>Format: Electronic Resources<br/>Windows Forensic Analysis DVD Toolkit.ent://SD_ILS/0/SD_ILS:11965182024-09-22T12:18:06Z2024-09-22T12:18:06Zby Carvey, Harlan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328624">Click to View</a><br/>Format: Electronic Resources<br/>How personal & Internet security worksent://SD_ILS/0/SD_ILS:22824442024-09-22T12:18:06Z2024-09-22T12:18:06Zby Gralla, Preston.<br/><a href="https://learning.oreilly.com/library/view/~/0789735539/?ar">https://learning.oreilly.com/library/view/~/0789735539/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0789735539/?ar">https://go.oreilly.com/library-access/library/view/-/0789735539/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Internet security and acceleration (ISA) server 2004 administrator's pocket consultantent://SD_ILS/0/SD_ILS:22824462024-09-22T12:18:06Z2024-09-22T12:18:06Zby Ratliff, Bud, 1970-<br/><a href="https://learning.oreilly.com/library/view/~/0735621888">https://learning.oreilly.com/library/view/~/0735621888</a>
<a href="https://learning.oreilly.com/library/view/~/0735621888/?ar">https://learning.oreilly.com/library/view/~/0735621888/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0735621888/?ar">https://go.oreilly.com/library-access/library/view/-/0735621888/?ar</a><br/>Format: Electronic Resources<br/>Essential Computer Security : Everyone's Guide to Email, Internet, and Wireless Security.ent://SD_ILS/0/SD_ILS:11958462024-09-22T12:18:06Z2024-09-22T12:18:06Zby Bradley, T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=319200">Click to View</a><br/>Format: Electronic Resources<br/>Essential computer security everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:643242024-09-22T12:18:06Z2024-09-22T12:18:06Zby Bradley, Tony, 1969-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Windows, Linux, BSD için ağ güvenliği ipuçları : 100 etkin güvenlik tekniğient://SD_ILS/0/SD_ILS:188752024-09-22T12:18:06Z2024-09-22T12:18:06Zby Lockhart, Andrew.<br/>Format: Books<br/>Network security hacksent://SD_ILS/0/SD_ILS:22829832024-09-22T12:18:06Z2024-09-22T12:18:06Zby Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596527632/?ar">https://go.oreilly.com/library-access/library/view/-/0596527632/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596527632">https://learning.oreilly.com/library/view/~/0596527632</a>
<a href="https://learning.oreilly.com/library/view/~/0596527632/?ar">https://learning.oreilly.com/library/view/~/0596527632/?ar</a><br/>Format: Electronic Resources<br/>part-themed issue on internet security.ent://SD_ILS/0/SD_ILS:11905562024-09-22T12:18:06Z2024-09-22T12:18:06Zby Yague, Dr Mariemma.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=285507">Click to View</a><br/>Format: Electronic Resources<br/>Essential computer security : everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:23160262024-09-22T12:18:06Z2024-09-22T12:18:06Zby Bradley, Tony, 1969- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491143/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491143/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491143/?ar">https://learning.oreilly.com/library/view/~/9781597491143/?ar</a><br/>Format: Electronic Resources<br/>Aggressive Network Self-Defense.ent://SD_ILS/0/SD_ILS:11830082024-09-22T12:18:06Z2024-09-22T12:18:06Zby Wyler, Neil R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=225321">Click to View</a><br/>Format: Electronic Resources<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:654372024-09-22T12:18:06Z2024-09-22T12:18:06Zby Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:22822712024-09-22T12:18:06Z2024-09-22T12:18:06Zby Wyler, Neil R.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836203">https://learning.oreilly.com/library/view/~/9781931836203</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836203/?ar">https://learning.oreilly.com/library/view/~/9781931836203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836203/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836203/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781931836203">https://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Electronic Resources<br/>Network security hacksent://SD_ILS/0/SD_ILS:22813772024-09-22T12:18:06Z2024-09-22T12:18:06Zby Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596006438/?ar">https://go.oreilly.com/library-access/library/view/-/0596006438/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006438/?ar">https://learning.oreilly.com/library/view/~/0596006438/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006438">https://learning.oreilly.com/library/view/~/0596006438</a><br/>Format: Electronic Resources<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:656212024-09-22T12:18:06Z2024-09-22T12:18:06Zby Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">An electronic book accessible through the World Wide Web; click for information</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2003062590.html">http://www.loc.gov/catdir/toc/els051/2003062590.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003062590.html">http://www.loc.gov/catdir/description/els041/2003062590.html</a><br/>Format: Electronic Resources<br/>Google Hacking for Penetration Testers.ent://SD_ILS/0/SD_ILS:11920392024-09-22T12:18:06Z2024-09-22T12:18:06Zby Long, Johnny.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294147">Click to View</a><br/>Format: Electronic Resources<br/>Security : Secrets, Intruders and ID Tags.ent://SD_ILS/0/SD_ILS:13267442024-09-22T12:18:06Z2024-09-22T12:18:06Zby Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411447">Click to View</a><br/>Format: Electronic Resources<br/>Internet security a jumpstart for systems administrators and IT managersent://SD_ILS/0/SD_ILS:656312024-09-22T12:18:06Z2024-09-22T12:18:06Zby Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003279708.html">http://www.loc.gov/catdir/description/els041/2003279708.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els041/2003279708.html">http://www.loc.gov/catdir/toc/els041/2003279708.html</a><br/>Format: Electronic Resources<br/>Designing Network Security Second Editionent://SD_ILS/0/SD_ILS:23197252024-09-22T12:18:06Z2024-09-22T12:18:06Zby Kaeo, Merike, author.<br/><a href="https://learning.oreilly.com/library/view/~/1587051176/?ar">https://learning.oreilly.com/library/view/~/1587051176/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587051176">https://learning.oreilly.com/library/view/~/1587051176</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587051176/?ar">https://go.oreilly.com/library-access/library/view/-/1587051176/?ar</a><br/>Format: Electronic Resources<br/>Privacy defended : protecting yourself onlineent://SD_ILS/0/SD_ILS:22807762024-09-22T12:18:06Z2024-09-22T12:18:06Zby Bahadur, Gary.<br/><a href="https://learning.oreilly.com/library/view/~/078972605X">https://learning.oreilly.com/library/view/~/078972605X</a>
<a href="https://learning.oreilly.com/library/view/~/078972605X/?ar">https://learning.oreilly.com/library/view/~/078972605X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/078972605X/?ar">https://go.oreilly.com/library-access/library/view/-/078972605X/?ar</a><br/>Format: Electronic Resources<br/>Special Issue On Internet Security.ent://SD_ILS/0/SD_ILS:11838882024-09-22T12:18:06Z2024-09-22T12:18:06Zby Warren, Mathew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=232281">Click to View</a><br/>Format: Electronic Resources<br/>Network Intrusion Detection, Third Editionent://SD_ILS/0/SD_ILS:23197342024-09-22T12:18:06Z2024-09-22T12:18:06Zby Northcutt, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735712654/?ar">https://go.oreilly.com/library-access/library/view/-/0735712654/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735712654">https://learning.oreilly.com/library/view/~/0735712654</a>
<a href="https://learning.oreilly.com/library/view/~/0735712654/?ar">https://learning.oreilly.com/library/view/~/0735712654/?ar</a><br/>Format: Electronic Resources<br/>Hack proofing your Web applicationsent://SD_ILS/0/SD_ILS:657612024-09-22T12:18:06Z2024-09-22T12:18:06Zby Traxler, Julie.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Hack Proofing Your E-commerce Web Site : The Only Way to Stop a Hacker is to Think Like One.ent://SD_ILS/0/SD_ILS:11920452024-09-22T12:18:06Z2024-09-22T12:18:06Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294156">Click to View</a><br/>Format: Electronic Resources<br/>