Search Results for - Narrowed by: Computer security. - Ordinateurs -- Accès -- Contrôle.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Ordinateurs$002b--$002bAcc$0025C3$0025A8s$002b--$002bContr$0025C3$0025B4le.$002509Ordinateurs$002b--$002bAcc$0025C3$0025A8s$002b--$002bContr$0025C3$0025B4le.$0026ps$003d300$0026isd$003dtrue?2024-06-23T03:49:43ZBecoming the hacker : the playbook for getting inside the mind of an attackerent://SD_ILS/0/SD_ILS:23191292024-06-23T03:49:43Z2024-06-23T03:49:43Zby Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testingent://SD_ILS/0/SD_ILS:23198472024-06-23T03:49:43Z2024-06-23T03:49:43Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format: Electronic Resources<br/>Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessusent://SD_ILS/0/SD_ILS:23167002024-06-23T03:49:43Z2024-06-23T03:49:43Zby Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format: Electronic Resources<br/>Kali Linux tutorial for beginnersent://SD_ILS/0/SD_ILS:23175792024-06-23T03:49:43Z2024-06-23T03:49:43Zby Naja, Tarek, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar">https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789615173/?ar">https://learning.oreilly.com/videos/~/9781789615173/?ar</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploitent://SD_ILS/0/SD_ILS:23167902024-06-23T03:49:43Z2024-06-23T03:49:43Zby Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788990615/?ar">https://learning.oreilly.com/library/view/~/9781788990615/?ar</a><br/>Format: Electronic Resources<br/>Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysisent://SD_ILS/0/SD_ILS:23172312024-06-23T03:49:43Z2024-06-23T03:49:43Zby Bramwell, Phil, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295666">https://learning.oreilly.com/library/view/~/9781788295666</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295666/?ar">https://learning.oreilly.com/library/view/~/9781788295666/?ar</a><br/>Format: Electronic Resources<br/>Network scanning cookbook : practical network security using Nmap and Nessus 7ent://SD_ILS/0/SD_ILS:23177762024-06-23T03:49:43Z2024-06-23T03:49:43Zby Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux cookbook : effective penetration testing solutionsent://SD_ILS/0/SD_ILS:23142702024-06-23T03:49:43Z2024-06-23T03:49:43Zby Schultz, Corey P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390303/?ar">https://learning.oreilly.com/library/view/~/9781784390303/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux network scanning cookbook : take your penetration-testing skills to the next levelent://SD_ILS/0/SD_ILS:23134992024-06-23T03:49:43Z2024-06-23T03:49:43Zby Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format: Electronic Resources<br/>Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attackent://SD_ILS/0/SD_ILS:23155292024-06-23T03:49:43Z2024-06-23T03:49:43Zby Buchanan, Cameron, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788831925/?ar">https://go.oreilly.com/library-access/library/view/-/9781788831925/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788831925/?ar">https://learning.oreilly.com/library/view/~/9781788831925/?ar</a><br/>Format: Electronic Resources<br/>Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules.ent://SD_ILS/0/SD_ILS:23153202024-06-23T03:49:43Z2024-06-23T03:49:43Zby Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788624596/?ar">https://learning.oreilly.com/library/view/~/9781788624596/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutionsent://SD_ILS/0/SD_ILS:23146832024-06-23T03:49:43Z2024-06-23T03:49:43Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a>
<a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessmentsent://SD_ILS/0/SD_ILS:23132872024-06-23T03:49:43Z2024-06-23T03:49:43Zby Shah, Dhruv, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar">https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783982165/?ar">https://learning.oreilly.com/library/view/~/9781783982165/?ar</a><br/>Format: Electronic Resources<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:23134842024-06-23T03:49:43Z2024-06-23T03:49:43Zby Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format: Electronic Resources<br/>Understanding intrusion detection systems : detecting attackers and incidents inside your hosts and networksent://SD_ILS/0/SD_ILS:23111362024-06-23T03:49:43Z2024-06-23T03:49:43Zby Messier, Ric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491962701/?ar">https://learning.oreilly.com/videos/~/9781491962701/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491962701/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962701/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third editionent://SD_ILS/0/SD_ILS:23116552024-06-23T03:49:43Z2024-06-23T03:49:43Zby Johansen, Gerard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785888427/?ar">https://learning.oreilly.com/library/view/~/9781785888427/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar">https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploitent://SD_ILS/0/SD_ILS:23116042024-06-23T03:49:43Z2024-06-23T03:49:43Zby Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786463166/?ar">https://go.oreilly.com/library-access/library/view/-/9781786463166/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786463166/?ar">https://learning.oreilly.com/library/view/~/9781786463166/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786463166">https://learning.oreilly.com/library/view/~/9781786463166</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackersent://SD_ILS/0/SD_ILS:23110062024-06-23T03:49:43Z2024-06-23T03:49:43Zby Halton, Wolf, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782168492/?ar">https://learning.oreilly.com/library/view/~/9781782168492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782168492">https://learning.oreilly.com/library/view/~/9781782168492</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar</a><br/>Format: Electronic Resources<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:23011502024-06-23T03:49:43Z2024-06-23T03:49:43Zby Cherry, Denny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113/?ar">https://learning.oreilly.com/library/view/~/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113">https://learning.oreilly.com/library/view/~/9780128000113</a><br/>Format: Electronic Resources<br/>Mastering Windows Server 2012 R2ent://SD_ILS/0/SD_ILS:23011522024-06-23T03:49:43Z2024-06-23T03:49:43Zby Minasi, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar">https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118289426/?ar">https://learning.oreilly.com/library/view/~/9781118289426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118289426">https://learning.oreilly.com/library/view/~/9781118289426</a><br/>Format: Electronic Resources<br/>Intrusion detection networks : a key to collaborative securityent://SD_ILS/0/SD_ILS:23011122024-06-23T03:49:43Z2024-06-23T03:49:43Zby Fung, Carol, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564121/?ar">https://learning.oreilly.com/library/view/~/9781466564121/?ar</a><br/>Format: Electronic Resources<br/>Identity and access management : business performance through connected intelligenceent://SD_ILS/0/SD_ILS:23019312024-06-23T03:49:43Z2024-06-23T03:49:43Zby Osmanoglu, T. Ertem.<br/><a href="https://learning.oreilly.com/library/view/~/9780124081406/?ar">https://learning.oreilly.com/library/view/~/9780124081406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124081406">https://learning.oreilly.com/library/view/~/9780124081406</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar">https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approachent://SD_ILS/0/SD_ILS:23034752024-06-23T03:49:43Z2024-06-23T03:49:43Zby Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar">https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782162223/?ar">https://learning.oreilly.com/library/view/~/9781782162223/?ar</a><br/>Format: Electronic Resources<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:23022342024-06-23T03:49:43Z2024-06-23T03:49:43Zby Pathan, Al-Sakib Khan, editor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482203523">https://learning.oreilly.com/library/view/~/9781482203523</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar">https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482203523/?ar">https://learning.oreilly.com/library/view/~/9781482203523/?ar</a><br/>Format: Electronic Resources<br/>Federated identity primerent://SD_ILS/0/SD_ILS:22966982024-06-23T03:49:43Z2024-06-23T03:49:43Zby Rountree, Derrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar">https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124071896/?ar">https://learning.oreilly.com/library/view/~/9780124071896/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124071896">https://learning.oreilly.com/library/view/~/9780124071896</a><br/>Format: Electronic Resources<br/>Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linuxent://SD_ILS/0/SD_ILS:23003502024-06-23T03:49:43Z2024-06-23T03:49:43Zby Muniz, Joseph.<br/><a href="https://learning.oreilly.com/library/view/~/9781782163169">https://learning.oreilly.com/library/view/~/9781782163169</a>
<a href="https://learning.oreilly.com/library/view/~/9781782163169/?ar">https://learning.oreilly.com/library/view/~/9781782163169/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar">https://go.oreilly.com/library-access/library/view/-/9781782163169/?ar</a><br/>Format: Electronic Resources<br/>Metasploit : the penetration tester's guideent://SD_ILS/0/SD_ILS:22925812024-06-23T03:49:43Z2024-06-23T03:49:43Zby Kennedy, David, 1982-<br/><a href="https://learning.oreilly.com/library/view/~/9781593272883">https://learning.oreilly.com/library/view/~/9781593272883</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272883/?ar">https://learning.oreilly.com/library/view/~/9781593272883/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593272883/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272883/?ar</a><br/>Format: Electronic Resources<br/>Managed code rootkits : hooking into runtime environmentsent://SD_ILS/0/SD_ILS:22903072024-06-23T03:49:43Z2024-06-23T03:49:43Zby Metula, Erez.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495752/?ar">https://learning.oreilly.com/library/view/~/9781597495752/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495752">https://learning.oreilly.com/library/view/~/9781597495752</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495752/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495752/?ar</a><br/>Format: Electronic Resources<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:23135662024-06-23T03:49:43Z2024-06-23T03:49:43Zby Mjølsnes, Stig F., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781466506510">https://learning.oreilly.com/library/view/~/9781466506510</a>
<a href="https://learning.oreilly.com/library/view/~/9781466506510/?ar">https://learning.oreilly.com/library/view/~/9781466506510/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466506510/?ar">https://go.oreilly.com/library-access/library/view/-/9781466506510/?ar</a><br/>Format: Electronic Resources<br/>Practical intrusion analysis : prevention and detection for the twenty-first centuryent://SD_ILS/0/SD_ILS:22860802024-06-23T03:49:43Z2024-06-23T03:49:43Zby Trost, Ryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591890/?ar">https://learning.oreilly.com/library/view/~/9780321591890/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar</a><br/>Format: Electronic Resources<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:22852262024-06-23T03:49:43Z2024-06-23T03:49:43Zby Clark, Champ, III.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492249">https://learning.oreilly.com/library/view/~/9781597492249</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492249/?ar">https://learning.oreilly.com/library/view/~/9781597492249/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar</a><br/>Format: Electronic Resources<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:22891302024-06-23T03:49:43Z2024-06-23T03:49:43Zby Beale, Jay.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490993/?ar">https://learning.oreilly.com/library/view/~/9781597490993/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Electronic Resources<br/>Network security toolsent://SD_ILS/0/SD_ILS:22821582024-06-23T03:49:43Z2024-06-23T03:49:43Zby Clarke, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/0596007949">https://learning.oreilly.com/library/view/~/0596007949</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596007949/?ar">https://go.oreilly.com/library-access/library/view/-/0596007949/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007949/?ar">https://learning.oreilly.com/library/view/~/0596007949/?ar</a><br/>Format: Electronic Resources<br/>Snort cookbookent://SD_ILS/0/SD_ILS:22825852024-06-23T03:49:43Z2024-06-23T03:49:43Zby Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/0596007914">https://learning.oreilly.com/library/view/~/0596007914</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596007914/?ar">https://go.oreilly.com/library-access/library/view/-/0596007914/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007914/?ar">https://learning.oreilly.com/library/view/~/0596007914/?ar</a><br/>Format: Electronic Resources<br/>Rootkits : subverting the Windows kernelent://SD_ILS/0/SD_ILS:22859812024-06-23T03:49:43Z2024-06-23T03:49:43Zby Hoglund, Greg.<br/><a href="https://learning.oreilly.com/library/view/~/0321294319/?ar">https://learning.oreilly.com/library/view/~/0321294319/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321294319/?ar">https://go.oreilly.com/library-access/library/view/-/0321294319/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321294319">https://learning.oreilly.com/library/view/~/0321294319</a><br/>Format: Electronic Resources<br/>Managing security with Snort and IDS toolsent://SD_ILS/0/SD_ILS:22914502024-06-23T03:49:43Z2024-06-23T03:49:43Zby Cox, Kerry.<br/><a href="https://learning.oreilly.com/library/view/~/0596006616">https://learning.oreilly.com/library/view/~/0596006616</a>
<a href="https://learning.oreilly.com/library/view/~/0596006616/?ar">https://learning.oreilly.com/library/view/~/0596006616/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006616/?ar">https://go.oreilly.com/library-access/library/view/-/0596006616/?ar</a><br/>Format: Electronic Resources<br/>Intrusion detection with Snortent://SD_ILS/0/SD_ILS:22817042024-06-23T03:49:43Z2024-06-23T03:49:43Zby Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/157870281X">https://learning.oreilly.com/library/view/~/157870281X</a>
<a href="https://learning.oreilly.com/library/view/~/157870281X/?ar">https://learning.oreilly.com/library/view/~/157870281X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/157870281X/?ar">https://go.oreilly.com/library-access/library/view/-/157870281X/?ar</a><br/>Format: Electronic Resources<br/>Network security : private communication in a public worldent://SD_ILS/0/SD_ILS:22853752024-06-23T03:49:43Z2024-06-23T03:49:43Zby Kaufman, Charlie, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137155880/?ar">https://go.oreilly.com/library-access/library/view/-/9780137155880/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137155880/?ar">https://learning.oreilly.com/library/view/~/9780137155880/?ar</a><br/>Format: Electronic Resources<br/>