Search Results for - Narrowed by: Computer security. - Internet videos. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Internet$002bvideos.$002509Internet$002bvideos.$0026ps$003d300? 2024-05-30T09:20:37Z Threat modeling with Owasp Threat Dragon &amp; risk rating a vulnerability. ent://SD_ILS/0/SD_ILS:2332599 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Fisher, Derek, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202248/?ar">https://learning.oreilly.com/videos/~/10000MNHV202248/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202248">https://learning.oreilly.com/videos/~/10000MNHV202248</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar</a><br/>Format:&#160;Video recording<br/> Finding your cyber security path. ent://SD_ILS/0/SD_ILS:2332701 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Miller, Alyssa, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202258">https://learning.oreilly.com/videos/~/10000MNHV202258</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202258/?ar">https://learning.oreilly.com/videos/~/10000MNHV202258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar</a><br/>Format:&#160;Video recording<br/> Ransomware ent://SD_ILS/0/SD_ILS:2332705 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Messdaghi, Chlo&eacute;, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar">https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920702641/?ar">https://learning.oreilly.com/videos/~/0636920702641/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920702641">https://learning.oreilly.com/videos/~/0636920702641</a><br/>Format:&#160;Video recording<br/> Learn man in the middle attacks from scratch. ent://SD_ILS/0/SD_ILS:2332269 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar">https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803243245/?ar">https://learning.oreilly.com/videos/~/9781803243245/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803243245">https://learning.oreilly.com/videos/~/9781803243245</a><br/>Format:&#160;Video recording<br/> The complete cybersecurity bootcamp ent://SD_ILS/0/SD_ILS:2333407 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137949397">https://learning.oreilly.com/videos/~/9780137949397</a> <a href="https://learning.oreilly.com/videos/~/9780137949397/?ar">https://learning.oreilly.com/videos/~/9780137949397/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar">https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar</a><br/>Format:&#160;Video recording<br/> AWS security : compliance and observability setup and AWS account bootstrap walkthrough. ent://SD_ILS/0/SD_ILS:2334241 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Kascic, Eric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNCS2022141/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNCS2022141/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNCS2022141/?ar">https://learning.oreilly.com/videos/~/10000MNCS2022141/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNCS2022141">https://learning.oreilly.com/videos/~/10000MNCS2022141</a><br/>Format:&#160;Video recording<br/> Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linux ent://SD_ILS/0/SD_ILS:2332265 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar">https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803239750/?ar">https://learning.oreilly.com/videos/~/9781803239750/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803239750">https://learning.oreilly.com/videos/~/9781803239750</a><br/>Format:&#160;Video recording<br/> Single sign-on and passwordless authentication : an overview. ent://SD_ILS/0/SD_ILS:2333558 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Ovcharov, Andrey, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202294">https://learning.oreilly.com/videos/~/10000MNHV202294</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202294/?ar">https://learning.oreilly.com/videos/~/10000MNHV202294/?ar</a><br/>Format:&#160;Video recording<br/> The unbreakable one-time pad cipher. ent://SD_ILS/0/SD_ILS:2333562 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Rubin, Frank (Cryptographer), presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202291/?ar">https://learning.oreilly.com/videos/~/10000MNHV202291/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202291">https://learning.oreilly.com/videos/~/10000MNHV202291</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202291/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202291/?ar</a><br/>Format:&#160;Video recording<br/> System and privacy data protection. ent://SD_ILS/0/SD_ILS:2331777 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a> <a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format:&#160;Video recording<br/> Threat Intelligence and threat hunting ent://SD_ILS/0/SD_ILS:2331779 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137896301/?ar">https://learning.oreilly.com/videos/~/9780137896301/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar">https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137896301">https://learning.oreilly.com/videos/~/9780137896301</a><br/>Format:&#160;Video recording<br/> Making sense of application security. ent://SD_ILS/0/SD_ILS:2332363 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Saikali, Adib, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202229">https://learning.oreilly.com/videos/~/10000MNHV202229</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202229/?ar">https://learning.oreilly.com/videos/~/10000MNHV202229/?ar</a><br/>Format:&#160;Video recording<br/> Case study : how Tools &amp; Solutions survived a ransomware attack. ent://SD_ILS/0/SD_ILS:2332364 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Majumdar, Partha, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar">https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0636920673859">https://learning.oreilly.com/library/view/~/0636920673859</a> <a href="https://learning.oreilly.com/library/view/~/0636920673859/?ar">https://learning.oreilly.com/library/view/~/0636920673859/?ar</a><br/>Format:&#160;Video recording<br/> Hands-on threat modeling ent://SD_ILS/0/SD_ILS:2333383 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Deleersnyder, Sebastien, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671268">https://learning.oreilly.com/videos/~/0636920671268</a> <a href="https://learning.oreilly.com/videos/~/0636920671268/?ar">https://learning.oreilly.com/videos/~/0636920671268/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar</a><br/>Format:&#160;Video recording<br/> Windows Network security fundamentals ent://SD_ILS/0/SD_ILS:2333384 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Weadock, Glenn E., presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920671206">https://learning.oreilly.com/videos/~/0636920671206</a> <a href="https://learning.oreilly.com/videos/~/0636920671206/?ar">https://learning.oreilly.com/videos/~/0636920671206/?ar</a><br/>Format:&#160;Video recording<br/> Security superstream : zero trust ent://SD_ILS/0/SD_ILS:2334748 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Messdaghi, Chlo&eacute;, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920817680">https://learning.oreilly.com/videos/~/0636920817680</a> <a href="https://learning.oreilly.com/videos/~/0636920817680/?ar">https://learning.oreilly.com/videos/~/0636920817680/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920817680/?ar">https://go.oreilly.com/library-access/library/view/-/0636920817680/?ar</a><br/>Format:&#160;Video recording<br/> Burp Suite unfiltered : go from a beginner to advanced. ent://SD_ILS/0/SD_ILS:2335463 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Yadav, Avinash, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837639199">https://learning.oreilly.com/videos/~/9781837639199</a> <a href="https://learning.oreilly.com/videos/~/9781837639199/?ar">https://learning.oreilly.com/videos/~/9781837639199/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781837639199/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639199/?ar</a><br/>Format:&#160;Video recording<br/> Cyber security for absolute beginners. Part 02. ent://SD_ILS/0/SD_ILS:2335513 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837639403/?ar">https://learning.oreilly.com/videos/~/9781837639403/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837639403">https://learning.oreilly.com/videos/~/9781837639403</a><br/>Format:&#160;Video recording<br/> Practical cyber hacking skills for beginners. ent://SD_ILS/0/SD_ILS:2335514 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar">https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837636181">https://learning.oreilly.com/videos/~/9781837636181</a> <a href="https://learning.oreilly.com/videos/~/9781837636181/?ar">https://learning.oreilly.com/videos/~/9781837636181/?ar</a><br/>Format:&#160;Video recording<br/> Identity and access management fundamentals. ent://SD_ILS/0/SD_ILS:2335277 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Kohli, Harpreet, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671145/?ar">https://learning.oreilly.com/videos/~/0636920671145/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920671145">https://learning.oreilly.com/videos/~/0636920671145</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar</a><br/>Format:&#160;Video recording<br/> Web hacking expert : full-stack exploitation mastery. ent://SD_ILS/0/SD_ILS:2335278 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Czagan, Dawid, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837639717">https://learning.oreilly.com/videos/~/9781837639717</a> <a href="https://learning.oreilly.com/videos/~/9781837639717/?ar">https://learning.oreilly.com/videos/~/9781837639717/?ar</a><br/>Format:&#160;Video recording<br/> Becoming a cyber security professional : a beginner's career guide. ent://SD_ILS/0/SD_ILS:2335522 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837638321/?ar">https://go.oreilly.com/library-access/library/view/-/9781837638321/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837638321">https://learning.oreilly.com/videos/~/9781837638321</a> <a href="https://learning.oreilly.com/videos/~/9781837638321/?ar">https://learning.oreilly.com/videos/~/9781837638321/?ar</a><br/>Format:&#160;Video recording<br/> Security superstream : security in the cloud. ent://SD_ILS/0/SD_ILS:2334923 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Messdaghi, Chlo&eacute;, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920835578/?ar">https://go.oreilly.com/library-access/library/view/-/0636920835578/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920835578/?ar">https://learning.oreilly.com/videos/~/0636920835578/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920835578">https://learning.oreilly.com/videos/~/0636920835578</a><br/>Format:&#160;Video recording<br/> Web hacker's toolbox : tools used by successful hackers. ent://SD_ILS/0/SD_ILS:2335459 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Czagan, Dawid, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837632831/?ar">https://learning.oreilly.com/videos/~/9781837632831/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837632831">https://learning.oreilly.com/videos/~/9781837632831</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar</a><br/>Format:&#160;Video recording<br/> Getting started with cybersecurity science ent://SD_ILS/0/SD_ILS:2333381 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Dykstra, Josiah, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920670926">https://learning.oreilly.com/videos/~/0636920670926</a> <a href="https://learning.oreilly.com/videos/~/0636920670926/?ar">https://learning.oreilly.com/videos/~/0636920670926/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar">https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar</a><br/>Format:&#160;Video recording<br/> Infrastructure &amp; ops hour with Sam Newman. eBPF with Liz Rice ent://SD_ILS/0/SD_ILS:2334144 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Newman, Sam, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920788362/?ar">https://go.oreilly.com/library-access/library/view/-/0636920788362/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920788362">https://learning.oreilly.com/videos/~/0636920788362</a> <a href="https://learning.oreilly.com/videos/~/0636920788362/?ar">https://learning.oreilly.com/videos/~/0636920788362/?ar</a><br/>Format:&#160;Video recording<br/> Risk management for cyber security managers. ent://SD_ILS/0/SD_ILS:2335524 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Oni, Alexander, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837639878/?ar">https://learning.oreilly.com/videos/~/9781837639878/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781837639878/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639878/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837639878">https://learning.oreilly.com/videos/~/9781837639878</a><br/>Format:&#160;Video recording<br/> Cyber security for absolute beginners, Part 01. ent://SD_ILS/0/SD_ILS:2335525 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Oni, Alexander, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837630943/?ar">https://learning.oreilly.com/videos/~/9781837630943/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837630943">https://learning.oreilly.com/videos/~/9781837630943</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar">https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar</a><br/>Format:&#160;Video recording<br/> Real-world cryptography ent://SD_ILS/0/SD_ILS:2332150 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Wong, David, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781617296710VE">https://learning.oreilly.com/videos/~/9781617296710VE</a> <a href="https://learning.oreilly.com/videos/~/9781617296710VE/?ar">https://learning.oreilly.com/videos/~/9781617296710VE/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar</a><br/>Format:&#160;Video recording<br/> Securing AI. ent://SD_ILS/0/SD_ILS:2332134 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Manjengwa, Shingai, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar">https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920672319/?ar">https://learning.oreilly.com/videos/~/0636920672319/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920672319">https://learning.oreilly.com/videos/~/0636920672319</a><br/>Format:&#160;Video recording<br/> Certified ethical hacker (CEH) complete video course ent://SD_ILS/0/SD_ILS:2332146 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar">https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137446797/?ar">https://learning.oreilly.com/videos/~/9780137446797/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137446797">https://learning.oreilly.com/videos/~/9780137446797</a><br/>Format:&#160;Video recording<br/> Intro to secure application deployment with Istio on Kubernetes. ent://SD_ILS/0/SD_ILS:2332181 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Poddar, Neeraj, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202219">https://learning.oreilly.com/videos/~/10000MNHV202219</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202219/?ar">https://learning.oreilly.com/videos/~/10000MNHV202219/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar</a><br/>Format:&#160;Video recording<br/> Kubernetes security : attacking and defending Kubernetes ent://SD_ILS/0/SD_ILS:2333386 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Martin, Andrew, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920668794/?ar">https://go.oreilly.com/library-access/library/view/-/0636920668794/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920668794/?ar">https://learning.oreilly.com/videos/~/0636920668794/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920668794">https://learning.oreilly.com/videos/~/0636920668794</a><br/>Format:&#160;Video recording<br/> JSON web tokens and alternatives. ent://SD_ILS/0/SD_ILS:2332693 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Madden, Neil, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202163/?ar">https://learning.oreilly.com/videos/~/10000MNLV202163/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202163">https://learning.oreilly.com/videos/~/10000MNLV202163</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar</a><br/>Format:&#160;Video recording<br/> Mission impossible : DevSecOps. ent://SD_ILS/0/SD_ILS:2333679 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Kuenzli, Stephen, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202146/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202146/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202146">https://learning.oreilly.com/videos/~/10000MNLV202146</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202146/?ar">https://learning.oreilly.com/videos/~/10000MNLV202146/?ar</a><br/>Format:&#160;Video recording<br/> Qi ye shen tou ce shi he chi xu jian kong. ent://SD_ILS/0/SD_ILS:2332289 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a> <a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a> <a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format:&#160;Video recording<br/> Practical cloud security. ent://SD_ILS/0/SD_ILS:2334616 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Dotson, Chris, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar">https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492060727">https://learning.oreilly.com/videos/~/9781492060727</a> <a href="https://learning.oreilly.com/videos/~/9781492060727/?ar">https://learning.oreilly.com/videos/~/9781492060727/?ar</a><br/>Format:&#160;Video recording<br/> Hei ke wang luo ying yong : wang luo qin ru ying yong. ent://SD_ILS/0/SD_ILS:2332288 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a> <a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format:&#160;Video recording<br/> Preparing and exploring security data for machine learning. ent://SD_ILS/0/SD_ILS:2334770 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032335">https://learning.oreilly.com/videos/~/9781492032335</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492032335/?ar">https://learning.oreilly.com/videos/~/9781492032335/?ar</a><br/>Format:&#160;Video recording<br/> Supervised machine learning in security applications. ent://SD_ILS/0/SD_ILS:2334773 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032410">https://learning.oreilly.com/videos/~/9781492032410</a> <a href="https://learning.oreilly.com/videos/~/9781492032410/?ar">https://learning.oreilly.com/videos/~/9781492032410/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar</a><br/>Format:&#160;Video recording<br/> Unsupervised machine learning in security applications. ent://SD_ILS/0/SD_ILS:2334784 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032373">https://learning.oreilly.com/videos/~/9781492032373</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492032373/?ar">https://learning.oreilly.com/videos/~/9781492032373/?ar</a><br/>Format:&#160;Video recording<br/> An quan shen tou ce shi. ent://SD_ILS/0/SD_ILS:2332437 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882021010401/?ar">https://learning.oreilly.com/videos/~/8882021010401/?ar</a> <a href="https://learning.oreilly.com/videos/~/8882021010401">https://learning.oreilly.com/videos/~/8882021010401</a> <a href="https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar</a><br/>Format:&#160;Video recording<br/> Operating system forensic analysis. ent://SD_ILS/0/SD_ILS:2334792 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029205">https://learning.oreilly.com/videos/~/9781492029205</a> <a href="https://learning.oreilly.com/videos/~/9781492029205/?ar">https://learning.oreilly.com/videos/~/9781492029205/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492029205/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029205/?ar</a><br/>Format:&#160;Video recording<br/> Forensic analysis of disk-based evidence. ent://SD_ILS/0/SD_ILS:2334798 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Messier, Ric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029120/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029120/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492029120/?ar">https://learning.oreilly.com/videos/~/9781492029120/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492029120">https://learning.oreilly.com/videos/~/9781492029120</a><br/>Format:&#160;Video recording<br/> Capture and analysis of network-based evidence. ent://SD_ILS/0/SD_ILS:2334767 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Messier, Ric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492029182">https://learning.oreilly.com/videos/~/9781492029182</a> <a href="https://learning.oreilly.com/videos/~/9781492029182/?ar">https://learning.oreilly.com/videos/~/9781492029182/?ar</a><br/>Format:&#160;Video recording<br/> Forensic analysis of computer memory. ent://SD_ILS/0/SD_ILS:2334797 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029144">https://learning.oreilly.com/videos/~/9781492029144</a> <a href="https://learning.oreilly.com/videos/~/9781492029144/?ar">https://learning.oreilly.com/videos/~/9781492029144/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar</a><br/>Format:&#160;Video recording<br/> Managing SSH clients and servers. ent://SD_ILS/0/SD_ILS:2334344 2024-05-30T09:20:37Z 2024-05-30T09:20:37Z by&#160;Wallen, Jack, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar">https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492031666">https://learning.oreilly.com/videos/~/9781492031666</a> <a href="https://learning.oreilly.com/videos/~/9781492031666/?ar">https://learning.oreilly.com/videos/~/9781492031666/?ar</a><br/>Format:&#160;Video recording<br/>