Search Results for - Narrowed by: Data protection. - IYTE Library SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dLIBRARY$002509Library$0025091$00253AIYTE$002509IYTE$002bLibrary$0026ps$003d300? 2024-05-27T12:14:44Z Data governance ent://SD_ILS/0/SD_ILS:2335201 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Reichental, Jonathan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119906773/?ar">https://go.oreilly.com/library-access/library/view/-/9781119906773/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119906773">https://learning.oreilly.com/library/view/~/9781119906773</a> <a href="https://learning.oreilly.com/library/view/~/9781119906773/?ar">https://learning.oreilly.com/library/view/~/9781119906773/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning digital identity : design, deploy, and manage identity architectures ent://SD_ILS/0/SD_ILS:2334739 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Windley, Phillip J., 1958- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098117689/?ar">https://learning.oreilly.com/library/view/~/9781098117689/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098117689">https://learning.oreilly.com/library/view/~/9781098117689</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar">https://go.oreilly.com/library-access/library/view/-/9781098117689/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering cyber intelligence : gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense ent://SD_ILS/0/SD_ILS:2332668 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Dahj, Jean Nestor M.<br/><a href="https://learning.oreilly.com/library/view/~/9781800209404">https://learning.oreilly.com/library/view/~/9781800209404</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar">https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800209404/?ar">https://learning.oreilly.com/library/view/~/9781800209404/?ar</a><br/>Format:&#160;Electronic Resources<br/> Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000 ent://SD_ILS/0/SD_ILS:2332067 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;International Business Machines Corporation, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460406/?ar">https://learning.oreilly.com/library/view/~/9780738460406/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460406">https://learning.oreilly.com/library/view/~/9780738460406</a><br/>Format:&#160;Electronic Resources<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:2333211 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Moyo, Siegfried, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119863113">https://learning.oreilly.com/library/view/~/9781119863113</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar">https://go.oreilly.com/library-access/library/view/-/9781119863113/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119863113/?ar">https://learning.oreilly.com/library/view/~/9781119863113/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking artificial intelligence : a leader's guide from deepfakes to breaking deep learning ent://SD_ILS/0/SD_ILS:2332912 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Gibian, Davey, 1988- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663719379/?ar">https://go.oreilly.com/library-access/library/view/-/9781663719379/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781663719379">https://learning.oreilly.com/library/view/~/9781663719379</a> <a href="https://learning.oreilly.com/library/view/~/9781663719379/?ar">https://learning.oreilly.com/library/view/~/9781663719379/?ar</a><br/>Format:&#160;Sound recording<br/> Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy ent://SD_ILS/0/SD_ILS:2333950 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Shingornikar, Shashank, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460710/?ar">https://learning.oreilly.com/library/view/~/9780738460710/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460710/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460710">https://learning.oreilly.com/library/view/~/9780738460710</a><br/>Format:&#160;Electronic Resources<br/> Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict ent://SD_ILS/0/SD_ILS:2334696 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Borges, Dan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812818/?ar">https://learning.oreilly.com/library/view/~/9781801812818/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812818">https://learning.oreilly.com/library/view/~/9781801812818</a><br/>Format:&#160;Sound recording<br/> Data Privacy : a Runbook for Engineers. ent://SD_ILS/0/SD_ILS:2331650 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Bhajaria, Nishant.<br/><a href="https://learning.oreilly.com/library/view/~/9781617298998/?ar">https://learning.oreilly.com/library/view/~/9781617298998/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781617298998/?ar">https://go.oreilly.com/library-access/library/view/-/9781617298998/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617298998">https://learning.oreilly.com/library/view/~/9781617298998</a><br/>Format:&#160;Electronic Resources<br/> System and privacy data protection. ent://SD_ILS/0/SD_ILS:2331777 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a> <a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format:&#160;Video recording<br/> Transitioning to quantum-safe cryptography on IBM Z ent://SD_ILS/0/SD_ILS:2333933 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460680">https://learning.oreilly.com/library/view/~/9780738460680</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460680/?ar">https://learning.oreilly.com/library/view/~/9780738460680/?ar</a><br/>Format:&#160;Electronic Resources<br/> ASP.NET Core Security ent://SD_ILS/0/SD_ILS:2333962 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Wenz, Christian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781633439986/?ar">https://learning.oreilly.com/library/view/~/9781633439986/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781633439986">https://learning.oreilly.com/library/view/~/9781633439986</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781633439986/?ar">https://go.oreilly.com/library-access/library/view/-/9781633439986/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital Earth : cyber threats, privacy and ethics in an age of paranoia ent://SD_ILS/0/SD_ILS:2332896 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Katz, Sarah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783614">https://learning.oreilly.com/library/view/~/9781787783614</a> <a href="https://learning.oreilly.com/library/view/~/9781787783614/?ar">https://learning.oreilly.com/library/view/~/9781787783614/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar</a><br/>Format:&#160;Electronic Resources<br/> Pro Google cloud automation : with Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins ent://SD_ILS/0/SD_ILS:2327509 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Sabharwal, Navin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265734/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265734/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484265734/?ar">https://learning.oreilly.com/library/view/~/9781484265734/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484265734">https://learning.oreilly.com/library/view/~/9781484265734</a><br/>Format:&#160;Electronic Resources<br/> Google xi tong jia gou jie mi : gou jian an quan ke kao de xi tong = Building secure and reliable systems ent://SD_ILS/0/SD_ILS:2332928 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Adkins, Heather, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar">https://go.oreilly.com/library-access/library/view/-/9787115569257/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9787115569257/?ar">https://learning.oreilly.com/library/view/~/9787115569257/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9787115569257">https://learning.oreilly.com/library/view/~/9787115569257</a><br/>Format:&#160;Electronic Resources<br/> Secure operations and protections ent://SD_ILS/0/SD_ILS:2332092 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format:&#160;Video recording<br/> Mastering Active Directory - Third Edition ent://SD_ILS/0/SD_ILS:2331105 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format:&#160;Electronic Resources<br/> Big breaches : cybersecurity lessons for everyone ent://SD_ILS/0/SD_ILS:2328126 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Daswani, Neil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484266557">https://learning.oreilly.com/library/view/~/9781484266557</a> <a href="https://learning.oreilly.com/library/view/~/9781484266557/?ar">https://learning.oreilly.com/library/view/~/9781484266557/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar">https://go.oreilly.com/library-access/library/view/-/9781484266557/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:2327053 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Moschovitis, Christos J. P., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119658740">https://learning.oreilly.com/library/view/~/9781119658740</a> <a href="https://learning.oreilly.com/library/view/~/9781119658740/?ar">https://learning.oreilly.com/library/view/~/9781119658740/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar">https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar</a><br/>Format:&#160;Electronic Resources<br/> Self-sovereign identity : decentralized digital identity and verifiable credentials ent://SD_ILS/0/SD_ILS:2330270 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format:&#160;Electronic Resources<br/> Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisions ent://SD_ILS/0/SD_ILS:2328485 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Moore, Richard O., III, 1971- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469082707">https://learning.oreilly.com/library/view/~/9781469082707</a> <a href="https://learning.oreilly.com/library/view/~/9781469082707/?ar">https://learning.oreilly.com/library/view/~/9781469082707/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781469082707/?ar">https://go.oreilly.com/library-access/library/view/-/9781469082707/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for industrial scada systems ent://SD_ILS/0/SD_ILS:2351400 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Shaw, William T., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6468131">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Privileged attack vectors : building effective cyber-defense strategies to protect organizations ent://SD_ILS/0/SD_ILS:2324664 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259146/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484259146/?ar">https://learning.oreilly.com/library/view/~/9781484259146/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484259146">https://learning.oreilly.com/library/view/~/9781484259146</a><br/>Format:&#160;Electronic Resources<br/> Advanced API Security : OAuth 2. 0 and Beyond ent://SD_ILS/0/SD_ILS:2322734 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Siriwardena, Prabath.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484220504">https://learning.oreilly.com/library/view/~/9781484220504</a> <a href="https://learning.oreilly.com/library/view/~/9781484220504/?ar">https://learning.oreilly.com/library/view/~/9781484220504/?ar</a><br/>Format:&#160;Electronic Resources<br/> Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud ent://SD_ILS/0/SD_ILS:2326395 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Calles, Miguel A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261002/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484261002/?ar">https://learning.oreilly.com/library/view/~/9781484261002/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484261002">https://learning.oreilly.com/library/view/~/9781484261002</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Security, 2nd Edition ent://SD_ILS/0/SD_ILS:2331101 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a> <a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format:&#160;Electronic Resources<br/> Protecting Data Privacy Beyond the Trusted System of Record ent://SD_ILS/0/SD_ILS:2323918 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a> <a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data privacy and GDPR handbook ent://SD_ILS/0/SD_ILS:2322558 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Sharma, Sanjay (Financial executive), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119594246">https://learning.oreilly.com/library/view/~/9781119594246</a> <a href="https://learning.oreilly.com/library/view/~/9781119594246/?ar">https://learning.oreilly.com/library/view/~/9781119594246/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar">https://go.oreilly.com/library-access/library/view/-/9781119594246/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Complete 2020 Ethereum and Solidity Developer Bootcamp ent://SD_ILS/0/SD_ILS:2323478 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Wiesner, Thomas, author.<br/><a href="https://learning.oreilly.com/videos/~/9781800201019/?ar">https://learning.oreilly.com/videos/~/9781800201019/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar">https://go.oreilly.com/library-access/library/view/-/9781800201019/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781800201019">https://learning.oreilly.com/videos/~/9781800201019</a><br/>Format:&#160;Electronic Resources<br/> Building secure firmware : armoring the foundation of the platform ent://SD_ILS/0/SD_ILS:2326020 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Yao, Jiewen.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261064">https://learning.oreilly.com/library/view/~/9781484261064</a> <a href="https://learning.oreilly.com/library/view/~/9781484261064/?ar">https://learning.oreilly.com/library/view/~/9781484261064/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar</a><br/>Format:&#160;Electronic Resources<br/> Exposed : how revealing your data and eliminating privacy increases trust and liberates humanity ent://SD_ILS/0/SD_ILS:2326413 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a> <a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format:&#160;Electronic Resources<br/> Encryption for organizations and individuals : basics of contemporary and quantum cryptography ent://SD_ILS/0/SD_ILS:2325463 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Ciesla, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260562">https://learning.oreilly.com/library/view/~/9781484260562</a> <a href="https://learning.oreilly.com/library/view/~/9781484260562/?ar">https://learning.oreilly.com/library/view/~/9781484260562/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced ASP.NET Core 3 Security : understanding hacks, attacks, and vulnerabilities to secure your website ent://SD_ILS/0/SD_ILS:2326424 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Norberg, Scott, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260142/?ar">https://learning.oreilly.com/library/view/~/9781484260142/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484260142">https://learning.oreilly.com/library/view/~/9781484260142</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484260142/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260142/?ar</a><br/>Format:&#160;Electronic Resources<br/> ISO22301 : a Pocket Guide ent://SD_ILS/0/SD_ILS:2325278 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Drewitt, Tony, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781016/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781016/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787781016/?ar">https://learning.oreilly.com/library/view/~/9781787781016/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787781016">https://learning.oreilly.com/library/view/~/9781787781016</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:2321452 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Enterprise Mobility and Security training ent://SD_ILS/0/SD_ILS:2319556 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format:&#160;Electronic Resources<br/> Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments ent://SD_ILS/0/SD_ILS:2322055 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to choose the right digital leader for your company : Striking the right competence-credibility balance for digital leaders depends largely on how the role of the CDO is defined in a particular company ent://SD_ILS/0/SD_ILS:2321277 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Wade, Michael R., author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT60442/?ar">https://learning.oreilly.com/library/view/~/53863MIT60442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT60442">https://learning.oreilly.com/library/view/~/53863MIT60442</a> <a href="https://go.oreilly.com/library-access/library/view/-/53863MIT60442/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT60442/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to build privacy and security into deep learning models ent://SD_ILS/0/SD_ILS:2322791 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format:&#160;Electronic Resources<br/> Mastering Active Directory - Second Edition ent://SD_ILS/0/SD_ILS:2323979 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789800203/?ar">https://learning.oreilly.com/library/view/~/9781789800203/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar">https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789800203">https://learning.oreilly.com/library/view/~/9781789800203</a><br/>Format:&#160;Electronic Resources<br/> Karma-based API on Apple platforms : building privacy into iOS and macOS apps ent://SD_ILS/0/SD_ILS:2322061 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Carrasco Molina, Manuel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242919/?ar">https://learning.oreilly.com/library/view/~/9781484242919/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484242919/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242919/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing SQL Server encryption certificates : getting started with SQL Server encryption ent://SD_ILS/0/SD_ILS:2321359 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Blinn, Eric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484251515/?ar">https://learning.oreilly.com/videos/~/9781484251515/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484251515/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251515/?ar</a><br/>Format:&#160;Electronic Resources<br/> Modern defense in depth : an integrated approach to better web application security ent://SD_ILS/0/SD_ILS:2319873 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Gates, Stephen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492050360/?ar">https://learning.oreilly.com/library/view/~/9781492050360/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492050360">https://learning.oreilly.com/library/view/~/9781492050360</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar">https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar</a><br/>Format:&#160;Electronic Resources<br/> How digital trust drives culture change : privacy is a right, not a privilege : but organizations and leadership often struggle with it comes to adapting their culture toward digital trust and stewardship ent://SD_ILS/0/SD_ILS:2320855 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Abraham, Chon, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT60430/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT60430/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT60430/?ar">https://learning.oreilly.com/library/view/~/53863MIT60430/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT60430">https://learning.oreilly.com/library/view/~/53863MIT60430</a><br/>Format:&#160;Electronic Resources<br/> Take Control of Your Online Privacy, 4th Edition ent://SD_ILS/0/SD_ILS:2321070 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Kissell, Joe.<br/><a href="https://learning.oreilly.com/library/view/~/9781947282377">https://learning.oreilly.com/library/view/~/9781947282377</a> <a href="https://learning.oreilly.com/library/view/~/9781947282377/?ar">https://learning.oreilly.com/library/view/~/9781947282377/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781947282377/?ar">https://go.oreilly.com/library-access/library/view/-/9781947282377/?ar</a><br/>Format:&#160;Electronic Resources<br/> GDPR For Dummies ent://SD_ILS/0/SD_ILS:2327235 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Dibble, Suzanne, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119546092/?ar">https://learning.oreilly.com/library/view/~/9781119546092/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119546092/?ar">https://go.oreilly.com/library-access/library/view/-/9781119546092/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119546092">https://learning.oreilly.com/library/view/~/9781119546092</a><br/>Format:&#160;Electronic Resources<br/> Privileged attack vectors : building effective cyber-defense strategies to protect organizations ent://SD_ILS/0/SD_ILS:2314870 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format:&#160;Electronic Resources<br/> Solving Cyber Risk : Protecting Your Company and Society. ent://SD_ILS/0/SD_ILS:2318282 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Coburn, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781119490937">https://learning.oreilly.com/library/view/~/9781119490937</a> <a href="https://learning.oreilly.com/library/view/~/9781119490937/?ar">https://learning.oreilly.com/library/view/~/9781119490937/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar">https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Board's Role in Managing Cybersecurity Risks ent://SD_ILS/0/SD_ILS:2320749 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Rothrock, Ray, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT59221/?ar">https://learning.oreilly.com/library/view/~/53863MIT59221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT59221">https://learning.oreilly.com/library/view/~/53863MIT59221</a><br/>Format:&#160;Electronic Resources<br/> What is cybersecurity? ent://SD_ILS/0/SD_ILS:2318722 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheitsmanagement - Praxiswissen f&uuml;r IT Security Manager, 2. Auflage ent://SD_ILS/0/SD_ILS:2320105 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Harich, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9783958452756/?ar">https://learning.oreilly.com/library/view/~/9783958452756/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958452756">https://learning.oreilly.com/library/view/~/9783958452756</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing web applications : building a strategy for defense against malicious bots ent://SD_ILS/0/SD_ILS:2319261 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Gates, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar">https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492040279">https://learning.oreilly.com/library/view/~/9781492040279</a> <a href="https://learning.oreilly.com/library/view/~/9781492040279/?ar">https://learning.oreilly.com/library/view/~/9781492040279/?ar</a><br/>Format:&#160;Electronic Resources<br/> Take Control of 1Password, 4th Edition ent://SD_ILS/0/SD_ILS:2319474 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format:&#160;Electronic Resources<br/> Lessons Learned : How to protect critical information infrastructure ent://SD_ILS/0/SD_ILS:2315498 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Viira, Toomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849289597/?ar">https://learning.oreilly.com/library/view/~/9781849289597/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849289597/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289597/?ar</a><br/>Format:&#160;Electronic Resources<br/> Investigating the Cyber Breach : the digital forensics guide for the network engineer ent://SD_ILS/0/SD_ILS:2315345 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar">https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134755885/?ar">https://learning.oreilly.com/library/view/~/9780134755885/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM QRadar Version 7.3 : planning and installation guide ent://SD_ILS/0/SD_ILS:2315474 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Carabaguiaz, Elias, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442877/?ar">https://learning.oreilly.com/library/view/~/9780738442877/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar</a><br/>Format:&#160;Electronic Resources<br/> The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets ent://SD_ILS/0/SD_ILS:2315032 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Wallace, Michael, 1960- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814438770/?ar">https://learning.oreilly.com/library/view/~/9780814438770/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar">https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:2316152 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud computing security : foundations and challenges ent://SD_ILS/0/SD_ILS:2311524 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data hiding techniques in Windows OS : a practical approach to investigation and defense ent://SD_ILS/0/SD_ILS:2311629 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Hassan, Nihad Ahmad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128044964/?ar">https://learning.oreilly.com/library/view/~/9780128044964/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128044964/?ar">https://go.oreilly.com/library-access/library/view/-/9780128044964/?ar</a><br/>Format:&#160;Electronic Resources<br/> Distributed Networks ent://SD_ILS/0/SD_ILS:2319907 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format:&#160;Electronic Resources<br/> Guide: Reporting on an Entity's Cyberse. ent://SD_ILS/0/SD_ILS:2316756 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;AICPA Staff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781943546725/?ar">https://learning.oreilly.com/library/view/~/9781943546725/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar">https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781943546725">https://learning.oreilly.com/library/view/~/9781943546725</a><br/>Format:&#160;Electronic Resources<br/> Die Kunst der Anonymit&auml;t im Internet : so sch&uuml;tzen Sie Ihre Identit&auml;t und Ihre Daten ent://SD_ILS/0/SD_ILS:2315011 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format:&#160;Electronic Resources<br/> Mastering Active Directory : automate tasks by leveraging PowerShell for Active Directory Domain Services 2016 ent://SD_ILS/0/SD_ILS:2313809 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787289352">https://learning.oreilly.com/library/view/~/9781787289352</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar">https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787289352/?ar">https://learning.oreilly.com/library/view/~/9781787289352/?ar</a><br/>Format:&#160;Electronic Resources<br/> ISO 37001 : an Introduction to Anti-Bribery Management Systems. ent://SD_ILS/0/SD_ILS:2315020 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Field, Alan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar">https://go.oreilly.com/library-access/library/view/-/9781849289559/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849289559">https://learning.oreilly.com/library/view/~/9781849289559</a> <a href="https://learning.oreilly.com/library/view/~/9781849289559/?ar">https://learning.oreilly.com/library/view/~/9781849289559/?ar</a><br/>Format:&#160;Electronic Resources<br/> OAuth 2 in action ent://SD_ILS/0/SD_ILS:2313185 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Richer, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617293276/?ar">https://go.oreilly.com/library-access/library/view/-/9781617293276/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617293276">https://learning.oreilly.com/library/view/~/9781617293276</a> <a href="https://learning.oreilly.com/library/view/~/9781617293276/?ar">https://learning.oreilly.com/library/view/~/9781617293276/?ar</a><br/>Format:&#160;Electronic Resources<br/> Versteckte Botschaften : die faszinierende Geschichte der Steganografie ent://SD_ILS/0/SD_ILS:2314676 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Schmeh, Klaus, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492064855">https://learning.oreilly.com/library/view/~/9781492064855</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar">https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492064855/?ar">https://learning.oreilly.com/library/view/~/9781492064855/?ar</a><br/>Format:&#160;Electronic Resources<br/> Analyzing and securing social networks ent://SD_ILS/0/SD_ILS:2313385 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Thuraisingham, Bhavani M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar">https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482243284/?ar">https://learning.oreilly.com/library/view/~/9781482243284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482243284">https://learning.oreilly.com/library/view/~/9781482243284</a><br/>Format:&#160;Electronic Resources<br/> Data governance : frameworks and strategies ent://SD_ILS/0/SD_ILS:2309871 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Adler, John, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar">https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491942352/?ar">https://learning.oreilly.com/videos/~/9781491942352/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security policies, procedures, and standards : a practitioner's reference ent://SD_ILS/0/SD_ILS:2310749 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Landoll, Douglas J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482245912/?ar">https://learning.oreilly.com/library/view/~/9781482245912/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar">https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar</a><br/>Format:&#160;Electronic Resources<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:2310290 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Hadoop security : a hands-on approach to securing big data clusters ent://SD_ILS/0/SD_ILS:2310270 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Bean, Jeff, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar">https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771375054/?ar">https://learning.oreilly.com/videos/~/9781771375054/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM ProtecTIER implementation and best practices guide ent://SD_ILS/0/SD_ILS:2310839 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Orlando, Karen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738441696/?ar">https://learning.oreilly.com/library/view/~/9780738441696/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738441696/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441696/?ar</a><br/>Format:&#160;Electronic Resources<br/> You--for sale : protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:2308465 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Sumner, Stuart, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034231/?ar">https://learning.oreilly.com/library/view/~/9780128034231/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS 3.1 : the standard that killed SSL ent://SD_ILS/0/SD_ILS:2308468 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Williams, Branden R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128046494">https://learning.oreilly.com/library/view/~/9780128046494</a> <a href="https://learning.oreilly.com/library/view/~/9780128046494/?ar">https://learning.oreilly.com/library/view/~/9780128046494/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar">https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar</a><br/>Format:&#160;Electronic Resources<br/> The CISO Handbook ent://SD_ILS/0/SD_ILS:2323677 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Gentile, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031379">https://learning.oreilly.com/library/view/~/9781420031379</a> <a href="https://learning.oreilly.com/library/view/~/9781420031379/?ar">https://learning.oreilly.com/library/view/~/9781420031379/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information Security Management Handbook, Volume 6, 6th Edition ent://SD_ILS/0/SD_ILS:2323397 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a> <a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information theft prevention : theory and practice ent://SD_ILS/0/SD_ILS:2315550 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format:&#160;Electronic Resources<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:2313484 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format:&#160;Electronic Resources<br/> Information assurance handbook : effective computer security and risk management strategies ent://SD_ILS/0/SD_ILS:2304875 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Schou, Corey.<br/><a href="https://learning.oreilly.com/library/view/~/9780071821650">https://learning.oreilly.com/library/view/~/9780071821650</a> <a href="https://learning.oreilly.com/library/view/~/9780071821650/?ar">https://learning.oreilly.com/library/view/~/9780071821650/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar">https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar</a><br/>Format:&#160;Electronic Resources<br/> Measuring and managing information risk : a FAIR approach ent://SD_ILS/0/SD_ILS:2304245 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Freund, Jack, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar">https://go.oreilly.com/library-access/library/view/-/9780124202313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124202313/?ar">https://learning.oreilly.com/library/view/~/9780124202313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124202313">https://learning.oreilly.com/library/view/~/9780124202313</a><br/>Format:&#160;Electronic Resources<br/> Introduction to information security : LiveLessons (Sneak Peek Video Training) ent://SD_ILS/0/SD_ILS:2306346 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Aurnou, Scott, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar">https://go.oreilly.com/library-access/library/view/-/9780134135823/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780134135823/?ar">https://learning.oreilly.com/videos/~/9780134135823/?ar</a><br/>Format:&#160;Electronic Resources<br/> Multi-domain master data management : advanced MDM and data governance in practice ent://SD_ILS/0/SD_ILS:2306701 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Allen, Mark, 1953- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128008355/?ar">https://go.oreilly.com/library-access/library/view/-/9780128008355/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128008355/?ar">https://learning.oreilly.com/library/view/~/9780128008355/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128008355">https://learning.oreilly.com/library/view/~/9780128008355</a><br/>Format:&#160;Electronic Resources<br/> The cloud security ecosystem : technical, legal, business and management issues ent://SD_ILS/0/SD_ILS:2307649 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Ko, Ryan, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar">https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128017807/?ar">https://learning.oreilly.com/library/view/~/9780128017807/?ar</a><br/>Format:&#160;Electronic Resources<br/> Application of big data for national security : a practitioner's guide to emerging technologies ent://SD_ILS/0/SD_ILS:2306232 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Akhgar, Babak, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128019672/?ar">https://learning.oreilly.com/library/view/~/9780128019672/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128019672/?ar">https://go.oreilly.com/library-access/library/view/-/9780128019672/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128019672">https://learning.oreilly.com/library/view/~/9780128019672</a><br/>Format:&#160;Electronic Resources<br/> Hadoop security ent://SD_ILS/0/SD_ILS:2307773 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Spivey, Ben, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar">https://go.oreilly.com/library-access/library/view/-/9781491900970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491900970/?ar">https://learning.oreilly.com/library/view/~/9781491900970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491900970">https://learning.oreilly.com/library/view/~/9781491900970</a><br/>Format:&#160;Electronic Resources<br/> Implementing high availability and disaster recovery in IBM PureApplication Systems V2 ent://SD_ILS/0/SD_ILS:2306469 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Gadepalli, Venkata, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738440337">https://learning.oreilly.com/library/view/~/0738440337</a> <a href="https://learning.oreilly.com/library/view/~/0738440337/?ar">https://learning.oreilly.com/library/view/~/0738440337/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738440337/?ar">https://go.oreilly.com/library-access/library/view/-/0738440337/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning to love data science : explorations of emerging technologies and platforms for predictive analytics, machine learning, digital manufacturing, and supply chain optimization ent://SD_ILS/0/SD_ILS:2308913 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Barlow, Mike (Michael Alan), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491936573">https://learning.oreilly.com/library/view/~/9781491936573</a> <a href="https://learning.oreilly.com/library/view/~/9781491936573/?ar">https://learning.oreilly.com/library/view/~/9781491936573/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491936573/?ar">https://go.oreilly.com/library-access/library/view/-/9781491936573/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security, privacy, and governance : protecting data, and using data to protect systems ent://SD_ILS/0/SD_ILS:2307756 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Lorica, Ben, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar">https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491931042/?ar">https://learning.oreilly.com/videos/~/9781491931042/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheit im Unternehmen ent://SD_ILS/0/SD_ILS:2308324 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Harich, Thomas W., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958451285/?ar">https://learning.oreilly.com/library/view/~/9783958451285/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958451285">https://learning.oreilly.com/library/view/~/9783958451285</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar">https://go.oreilly.com/library-access/library/view/-/9783958451285/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering OAuth 2.0 : create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework ent://SD_ILS/0/SD_ILS:2309547 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Bihis, Charles, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784395407/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395407/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784395407">https://learning.oreilly.com/library/view/~/9781784395407</a> <a href="https://learning.oreilly.com/library/view/~/9781784395407/?ar">https://learning.oreilly.com/library/view/~/9781784395407/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Python forensics : master the art of digital forensics and analysis with Python ent://SD_ILS/0/SD_ILS:2309227 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Spreitzenbarth, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783988044/?ar">https://learning.oreilly.com/library/view/~/9781783988044/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar">https://go.oreilly.com/library-access/library/view/-/9781783988044/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783988044">https://learning.oreilly.com/library/view/~/9781783988044</a><br/>Format:&#160;Electronic Resources<br/> Risk centric threat modeling : process for attack simulation and threat analysis ent://SD_ILS/0/SD_ILS:2308792 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Uceda V&eacute;lez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format:&#160;Electronic Resources<br/> Sharing big data safely : managing data security ent://SD_ILS/0/SD_ILS:2309245 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Dunning, Ted, 1956- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491953624/?ar">https://go.oreilly.com/library-access/library/view/-/9781491953624/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491953624/?ar">https://learning.oreilly.com/library/view/~/9781491953624/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491953624">https://learning.oreilly.com/library/view/~/9781491953624</a><br/>Format:&#160;Electronic Resources<br/> Data protection and the cloud : are the risks too great? ent://SD_ILS/0/SD_ILS:2308847 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Ticher, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287135/?ar">https://learning.oreilly.com/library/view/~/9781849287135/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287135/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud storage security : a practical guide ent://SD_ILS/0/SD_ILS:2307935 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Wheeler, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029312/?ar">https://learning.oreilly.com/library/view/~/9780128029312/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029312/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security in computing ent://SD_ILS/0/SD_ILS:2305897 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Pfleeger, Charles P., 1948- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134085074/?ar">https://learning.oreilly.com/library/view/~/9780134085074/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar">https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar</a><br/>Format:&#160;Electronic Resources<br/> The privacy engineer's manifesto : getting from policy to code to QA to value ent://SD_ILS/0/SD_ILS:2302296 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Dennedy, Michelle Finneran.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263555">https://learning.oreilly.com/library/view/~/9781430263555</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430263555/?ar">https://learning.oreilly.com/library/view/~/9781430263555/?ar</a><br/>Format:&#160;Electronic Resources<br/> Responsive security : be ready to be secure ent://SD_ILS/0/SD_ILS:2300643 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Kang, Meng-Chow.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584310/?ar">https://learning.oreilly.com/library/view/~/9781466584310/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584310/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security management handbook . Volume 7 ent://SD_ILS/0/SD_ILS:2300299 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;O'Hanley, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar">https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466567498">https://learning.oreilly.com/library/view/~/9781466567498</a> <a href="https://learning.oreilly.com/library/view/~/9781466567498/?ar">https://learning.oreilly.com/library/view/~/9781466567498/?ar</a><br/>Format:&#160;Electronic Resources<br/> Total information risk management : maximizing the value of data and information assets ent://SD_ILS/0/SD_ILS:2299898 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Borek, Alexander.<br/><a href="https://learning.oreilly.com/library/view/~/9780124055476/?ar">https://learning.oreilly.com/library/view/~/9780124055476/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar">https://go.oreilly.com/library-access/library/view/-/9780124055476/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:2300180 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:2299279 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Scholz, James A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar">https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439841594/?ar">https://learning.oreilly.com/library/view/~/9781439841594/?ar</a><br/>Format:&#160;Electronic Resources<br/> Anti-hacker tool kit. ent://SD_ILS/0/SD_ILS:2303630 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Shema, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar">https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071800143/?ar">https://learning.oreilly.com/library/view/~/9780071800143/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deployment guide for Infosphere Guardium ent://SD_ILS/0/SD_ILS:2304011 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Chen, Whei-Jen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738439355/?ar">https://go.oreilly.com/library-access/library/view/-/0738439355/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738439355/?ar">https://learning.oreilly.com/library/view/~/0738439355/?ar</a><br/>Format:&#160;Electronic Resources<br/> Healthcare information privacy and security : regulatory compliance and data security in the age of electronic health records ent://SD_ILS/0/SD_ILS:2303646 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Robichau, Bernard Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430266778">https://learning.oreilly.com/library/view/~/9781430266778</a> <a href="https://learning.oreilly.com/library/view/~/9781430266778/?ar">https://learning.oreilly.com/library/view/~/9781430266778/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430266778/?ar">https://go.oreilly.com/library-access/library/view/-/9781430266778/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM ProtecTIER implementation and best practices guide ent://SD_ILS/0/SD_ILS:2304526 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Orlando, Karen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738440027/?ar">https://go.oreilly.com/library-access/library/view/-/0738440027/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738440027/?ar">https://learning.oreilly.com/library/view/~/0738440027/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security : principles and practices ent://SD_ILS/0/SD_ILS:2303412 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data stewardship : an actionable guide to effective data management and data governance ent://SD_ILS/0/SD_ILS:2301499 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Plotkin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780124103894/?ar">https://learning.oreilly.com/library/view/~/9780124103894/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124103894">https://learning.oreilly.com/library/view/~/9780124103894</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar">https://go.oreilly.com/library-access/library/view/-/9780124103894/?ar</a><br/>Format:&#160;Electronic Resources<br/> 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy ent://SD_ILS/0/SD_ILS:2304861 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format:&#160;Electronic Resources<br/> Practical Hadoop security ent://SD_ILS/0/SD_ILS:2305422 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Lakhe, Bhushan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265450">https://learning.oreilly.com/library/view/~/9781430265450</a> <a href="https://learning.oreilly.com/library/view/~/9781430265450/?ar">https://learning.oreilly.com/library/view/~/9781430265450/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar</a><br/>Format:&#160;Electronic Resources<br/> Dropbox : Sicher speichern und effektiv arbeiten in der Cloud ent://SD_ILS/0/SD_ILS:2308601 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Schilling, Christian O., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783826687235/?ar">https://learning.oreilly.com/library/view/~/9783826687235/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783826687235/?ar">https://go.oreilly.com/library-access/library/view/-/9783826687235/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Science and Technology of Counterterrorism ent://SD_ILS/0/SD_ILS:2319961 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Young, Carl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124200562">https://learning.oreilly.com/library/view/~/9780124200562</a> <a href="https://learning.oreilly.com/library/view/~/9780124200562/?ar">https://learning.oreilly.com/library/view/~/9780124200562/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated Security Systems Design, 2nd Edition ent://SD_ILS/0/SD_ILS:2320974 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Norman, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000229/?ar">https://learning.oreilly.com/library/view/~/9780128000229/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000229">https://learning.oreilly.com/library/view/~/9780128000229</a><br/>Format:&#160;Electronic Resources<br/> Anonymous Communication Networks ent://SD_ILS/0/SD_ILS:2327268 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Peng, Kun, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881606">https://learning.oreilly.com/library/view/~/9781439881606</a> <a href="https://learning.oreilly.com/library/view/~/9781439881606/?ar">https://learning.oreilly.com/library/view/~/9781439881606/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439881606/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881606/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security management principles ent://SD_ILS/0/SD_ILS:2299451 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Alexander, David (Information security practitioner)<br/><a href="https://learning.oreilly.com/library/view/~/9781780171753/?ar">https://learning.oreilly.com/library/view/~/9781780171753/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar">https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780171753">https://learning.oreilly.com/library/view/~/9781780171753</a><br/>Format:&#160;Electronic Resources<br/> Introduction to cyber-warfare : a multidisciplinary approach ent://SD_ILS/0/SD_ILS:2300196 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Shakarian, Paulo.<br/><a href="https://learning.oreilly.com/library/view/~/9780124078147">https://learning.oreilly.com/library/view/~/9780124078147</a> <a href="https://learning.oreilly.com/library/view/~/9780124078147/?ar">https://learning.oreilly.com/library/view/~/9780124078147/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar">https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar</a><br/>Format:&#160;Electronic Resources<br/> Surviving the Top Ten Challenges of Software Testing : a People-Oriented Approach ent://SD_ILS/0/SD_ILS:2305832 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Rice, William E. Perry. Randall W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489163/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133489163">https://learning.oreilly.com/library/view/~/9780133489163</a> <a href="https://learning.oreilly.com/library/view/~/9780133489163/?ar">https://learning.oreilly.com/library/view/~/9780133489163/?ar</a><br/>Format:&#160;Electronic Resources<br/> ISO27001/ISO27002 : a pocket guide ent://SD_ILS/0/SD_ILS:2310742 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285247/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285247/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285247/?ar">https://learning.oreilly.com/library/view/~/9781849285247/?ar</a><br/>Format:&#160;Electronic Resources<br/> Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day ent://SD_ILS/0/SD_ILS:2298053 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Yerrid, K. C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519960/?ar">https://learning.oreilly.com/library/view/~/9781849519960/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519960">https://learning.oreilly.com/library/view/~/9781849519960</a><br/>Format:&#160;Electronic Resources<br/> Oracle Data Guard 11gR2 Administration Beginner's Guide : Learn How to Build and Maintain Data Guard Configurations with Real-Life, Practical Examples ent://SD_ILS/0/SD_ILS:2299449 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Baransel, Emre.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849687904/?ar">https://go.oreilly.com/library-access/library/view/-/9781849687904/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849687904/?ar">https://learning.oreilly.com/library/view/~/9781849687904/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849687904">https://learning.oreilly.com/library/view/~/9781849687904</a><br/>Format:&#160;Electronic Resources<br/> Nine steps to success : an ISO27001:2013 implementation overview ent://SD_ILS/0/SD_ILS:2300436 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285117/?ar">https://learning.oreilly.com/library/view/~/9781849285117/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285117">https://learning.oreilly.com/library/view/~/9781849285117</a><br/>Format:&#160;Electronic Resources<br/> The PayPal official insider guide to internet security : spot scams and protect your online business ent://SD_ILS/0/SD_ILS:2297259 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Savage, Michelle.<br/><a href="https://learning.oreilly.com/library/view/~/9780133154573">https://learning.oreilly.com/library/view/~/9780133154573</a> <a href="https://learning.oreilly.com/library/view/~/9780133154573/?ar">https://learning.oreilly.com/library/view/~/9780133154573/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar">https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar</a><br/>Format:&#160;Electronic Resources<br/> Pragmatic security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:2297966 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Brotby, W. Krag.<br/><a href="https://learning.oreilly.com/library/view/~/9781439881538/?ar">https://learning.oreilly.com/library/view/~/9781439881538/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar">https://go.oreilly.com/library-access/library/view/-/9781439881538/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:2296616 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Raggo, Michael T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format:&#160;Electronic Resources<br/> Best Practices for the Formal Software Testing Process : a Menu of Testing Tasks ent://SD_ILS/0/SD_ILS:2320691 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Drabick, Rodger, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133489309/?ar">https://learning.oreilly.com/library/view/~/9780133489309/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133489309">https://learning.oreilly.com/library/view/~/9780133489309</a><br/>Format:&#160;Electronic Resources<br/> Strategic Information Management, 3rd Edition ent://SD_ILS/0/SD_ILS:2319914 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format:&#160;Electronic Resources<br/> Introduction to computer and network security : navigating shades of gray ent://SD_ILS/0/SD_ILS:2313482 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security management handbook. Volume 5 ent://SD_ILS/0/SD_ILS:2303124 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Tipton, Harold F.<br/><a href="https://learning.oreilly.com/library/view/~/9781439853467/?ar">https://learning.oreilly.com/library/view/~/9781439853467/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439853467/?ar">https://go.oreilly.com/library-access/library/view/-/9781439853467/?ar</a><br/>Format:&#160;Electronic Resources<br/> Analyzing computer security : a threat/vulnerability/countermeasure approach ent://SD_ILS/0/SD_ILS:2291806 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Pfleeger, Charles P., 1948-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar">https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132789493/?ar">https://learning.oreilly.com/library/view/~/9780132789493/?ar</a><br/>Format:&#160;Electronic Resources<br/> Der hypothetische Vergleich des [section][section] 269 StGB unter Berucksichtigung der tatsachlichen und normativen Vergleichbarkeit von Schrifturkunde und moderner (Computer-) Datenurkund ent://SD_ILS/0/SD_ILS:2350546 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Hoinghaus, Nils, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5782103">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information storage and management : storing, managing, and protecting digital information in classic, virtualized, and cloud environments ent://SD_ILS/0/SD_ILS:2296350 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;EMC Corporation.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118236963/?ar">https://go.oreilly.com/library-access/library/view/-/9781118236963/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118236963/?ar">https://learning.oreilly.com/library/view/~/9781118236963/?ar</a><br/>Format:&#160;Electronic Resources<br/> Once more unto the breach : managing information security in an uncertain world ent://SD_ILS/0/SD_ILS:2298022 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a> <a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format:&#160;Electronic Resources<br/> The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) ent://SD_ILS/0/SD_ILS:2294170 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format:&#160;Electronic Resources<br/> Getting started with OAuth 2.0 ent://SD_ILS/0/SD_ILS:2295150 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Boyd, Ryan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449317843/?ar">https://go.oreilly.com/library-access/library/view/-/9781449317843/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781449317843">https://learning.oreilly.com/library/view/~/9781449317843</a> <a href="https://learning.oreilly.com/library/view/~/9781449317843/?ar">https://learning.oreilly.com/library/view/~/9781449317843/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data governance : how to design, deploy and sustain an effective data governance program ent://SD_ILS/0/SD_ILS:2295485 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Ladley, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124158290/?ar">https://go.oreilly.com/library-access/library/view/-/9780124158290/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124158290/?ar">https://learning.oreilly.com/library/view/~/9780124158290/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124158290">https://learning.oreilly.com/library/view/~/9780124158290</a><br/>Format:&#160;Electronic Resources<br/> Internet and surveillance : the challenges of Web 2.0 and social media ent://SD_ILS/0/SD_ILS:2294996 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Fuchs, Christian, 1976-<br/><a href="https://learning.oreilly.com/library/view/~/9780415891608/?ar">https://learning.oreilly.com/library/view/~/9780415891608/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780415891608/?ar">https://go.oreilly.com/library-access/library/view/-/9780415891608/?ar</a><br/>Format:&#160;Electronic Resources<br/> Auditing cloud computing : a security and privacy guide ent://SD_ILS/0/SD_ILS:2292255 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format:&#160;Electronic Resources<br/> The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets ent://SD_ILS/0/SD_ILS:2290884 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Wallace, Michael, 1960-<br/><a href="https://learning.oreilly.com/library/view/~/9780814416136/?ar">https://learning.oreilly.com/library/view/~/9780814416136/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar">https://go.oreilly.com/library-access/library/view/-/9780814416136/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical risk management for the CIO ent://SD_ILS/0/SD_ILS:2291367 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Scherling, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439856543/?ar">https://learning.oreilly.com/library/view/~/9781439856543/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439856543">https://learning.oreilly.com/library/view/~/9781439856543</a><br/>Format:&#160;Electronic Resources<br/> CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:2291661 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Canavan, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar">https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470916216/?ar">https://learning.oreilly.com/library/view/~/9780470916216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470916216">https://learning.oreilly.com/library/view/~/9780470916216</a><br/>Format:&#160;Electronic Resources<br/> The chief information security officer : insights, tools and survival skills ent://SD_ILS/0/SD_ILS:2291384 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Kouns, Barry.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281966">https://learning.oreilly.com/library/view/~/9781849281966</a> <a href="https://learning.oreilly.com/library/view/~/9781849281966/?ar">https://learning.oreilly.com/library/view/~/9781849281966/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar</a><br/>Format:&#160;Electronic Resources<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:2291653 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Landoll, Douglas J.<br/><a href="https://learning.oreilly.com/library/view/~/9781439821497">https://learning.oreilly.com/library/view/~/9781439821497</a> <a href="https://learning.oreilly.com/library/view/~/9781439821497/?ar">https://learning.oreilly.com/library/view/~/9781439821497/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar">https://go.oreilly.com/library-access/library/view/-/9781439821497/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM system storage solutions for smarter systems ent://SD_ILS/0/SD_ILS:2292555 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Dufrasne, Bertrand.<br/><a href="https://learning.oreilly.com/library/view/~/073843583X/?ar">https://learning.oreilly.com/library/view/~/073843583X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/073843583X/?ar">https://go.oreilly.com/library-access/library/view/-/073843583X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Expert Oracle and Java security : programming secure Oracle database applications with Java ent://SD_ILS/0/SD_ILS:2293224 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Coffin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781430238317">https://learning.oreilly.com/library/view/~/9781430238317</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar">https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430238317/?ar">https://learning.oreilly.com/library/view/~/9781430238317/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Big Data. ent://SD_ILS/0/SD_ILS:2293554 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Craig, Terence.<br/><a href="https://learning.oreilly.com/library/view/~/9781449314842">https://learning.oreilly.com/library/view/~/9781449314842</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781449314842/?ar">https://go.oreilly.com/library-access/library/view/-/9781449314842/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781449314842/?ar">https://learning.oreilly.com/library/view/~/9781449314842/?ar</a><br/>Format:&#160;Electronic Resources<br/> Preventing good people from doing bad things : implementing least privilege ent://SD_ILS/0/SD_ILS:2293278 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format:&#160;Electronic Resources<br/> Mobile device security for dummies ent://SD_ILS/0/SD_ILS:2293515 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Campagna, Rich R.<br/><a href="https://learning.oreilly.com/library/view/~/9781118093801/?ar">https://learning.oreilly.com/library/view/~/9781118093801/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar">https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:2295995 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Tibble, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781439868355">https://learning.oreilly.com/library/view/~/9781439868355</a> <a href="https://learning.oreilly.com/library/view/~/9781439868355/?ar">https://learning.oreilly.com/library/view/~/9781439868355/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar">https://go.oreilly.com/library-access/library/view/-/9781439868355/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM System Storage TS7650, TS7650G, and TS7610 ent://SD_ILS/0/SD_ILS:2326793 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Osuna, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738435848">https://learning.oreilly.com/library/view/~/0738435848</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738435848/?ar">https://go.oreilly.com/library-access/library/view/-/0738435848/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738435848/?ar">https://learning.oreilly.com/library/view/~/0738435848/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security Breaches : Studies from Real Life. ent://SD_ILS/0/SD_ILS:2290674 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security strategy : from requirements to reality ent://SD_ILS/0/SD_ILS:2321638 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Stackpole, Bill. http://viaf.org/viaf/sourceID/LC%7cn2007046244<br/><a href="https://learning.oreilly.com/library/view/~/9781439827345">https://learning.oreilly.com/library/view/~/9781439827345</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar">https://go.oreilly.com/library-access/library/view/-/9781439827345/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439827345/?ar">https://learning.oreilly.com/library/view/~/9781439827345/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to survive a data breach : a pocket guide ent://SD_ILS/0/SD_ILS:2290079 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Mitchell, Stewart.<br/><a href="https://learning.oreilly.com/library/view/~/9781905356966">https://learning.oreilly.com/library/view/~/9781905356966</a> <a href="https://learning.oreilly.com/library/view/~/9781905356966/?ar">https://learning.oreilly.com/library/view/~/9781905356966/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Prompt Payment Act Answer Book ent://SD_ILS/0/SD_ILS:2315263 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263336">https://learning.oreilly.com/library/view/~/9781567263336</a> <a href="https://learning.oreilly.com/library/view/~/9781567263336/?ar">https://learning.oreilly.com/library/view/~/9781567263336/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Antideficiency Act Answer Book ent://SD_ILS/0/SD_ILS:2315273 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263343/?ar">https://learning.oreilly.com/library/view/~/9781567263343/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781567263343">https://learning.oreilly.com/library/view/~/9781567263343</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft ent://SD_ILS/0/SD_ILS:2321069 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 / ISO27002 : a pocket guide / Alan Calder. ent://SD_ILS/0/SD_ILS:2299817 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281669/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281669/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285230/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285230/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281669/?ar">https://learning.oreilly.com/library/view/~/9781849281669/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285230/?ar">https://learning.oreilly.com/library/view/~/9781849285230/?ar</a><br/>Format:&#160;Electronic Resources<br/> An introduction to information security and ISO27001 : a pocket guide ent://SD_ILS/0/SD_ILS:2288932 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Watkins, Steve, 1970-<br/><a href="https://learning.oreilly.com/library/view/~/9781905356683">https://learning.oreilly.com/library/view/~/9781905356683</a> <a href="https://learning.oreilly.com/library/view/~/9781905356683/?ar">https://learning.oreilly.com/library/view/~/9781905356683/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781905356683/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356683/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security management principles : an ISEB certificate ent://SD_ILS/0/SD_ILS:2290300 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Taylor, Andy.<br/><a href="https://learning.oreilly.com/library/view/~/9781902505909/?ar">https://learning.oreilly.com/library/view/~/9781902505909/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781902505909/?ar">https://go.oreilly.com/library-access/library/view/-/9781902505909/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781902505909">https://learning.oreilly.com/library/view/~/9781902505909</a><br/>Format:&#160;Electronic Resources<br/> Deployment guides series. IBM Tivoli Compliance Insight Manager ent://SD_ILS/0/SD_ILS:2294667 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;B&uuml;cker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738485705/?ar">https://go.oreilly.com/library-access/library/view/-/0738485705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738485705/?ar">https://learning.oreilly.com/library/view/~/0738485705/?ar</a><br/>Format:&#160;Electronic Resources<br/> Solving the Enigma : History of Cryptanalytic Bombe ent://SD_ILS/0/SD_ILS:2310798 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Wilcox, Jennifer.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100015SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100015SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100015SI">https://learning.oreilly.com/library/view/~/01120100015SI</a> <a href="https://learning.oreilly.com/library/view/~/01120100015SI/?ar">https://learning.oreilly.com/library/view/~/01120100015SI/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data Protection and Information Lifecycle Management. ent://SD_ILS/0/SD_ILS:2290466 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Petrocelli, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0131927574/?ar">https://go.oreilly.com/library-access/library/view/-/0131927574/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131927574/?ar">https://learning.oreilly.com/library/view/~/0131927574/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131927574">https://learning.oreilly.com/library/view/~/0131927574</a><br/>Format:&#160;Electronic Resources<br/> Digital identity ent://SD_ILS/0/SD_ILS:2293288 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Windley, Phillip J., 1958-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008783/?ar">https://go.oreilly.com/library-access/library/view/-/0596008783/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008783/?ar">https://learning.oreilly.com/library/view/~/0596008783/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008783">https://learning.oreilly.com/library/view/~/0596008783</a><br/>Format:&#160;Electronic Resources<br/> Building a global information assurance program ent://SD_ILS/0/SD_ILS:2322916 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Curts, Raymond J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780203997550/?ar">https://learning.oreilly.com/library/view/~/9780203997550/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar">https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malicious cryptography : exposing cryptovirology ent://SD_ILS/0/SD_ILS:2310281 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Young, Adam, 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar">https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780764568466">https://learning.oreilly.com/library/view/~/9780764568466</a> <a href="https://learning.oreilly.com/library/view/~/9780764568466/?ar">https://learning.oreilly.com/library/view/~/9780764568466/?ar</a><br/>Format:&#160;Electronic Resources<br/> HIGH-TECH CRIMES REVEALED : CYBERWAR STORIES FROM THE DIGITAL FRONT ent://SD_ILS/0/SD_ILS:2320688 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Branigan, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321218736/?ar">https://go.oreilly.com/library-access/library/view/-/0321218736/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321218736/?ar">https://learning.oreilly.com/library/view/~/0321218736/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321218736">https://learning.oreilly.com/library/view/~/0321218736</a><br/>Format:&#160;Electronic Resources<br/> Mapping security : the corporate security sourcebook for today's global economy ent://SD_ILS/0/SD_ILS:2315191 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Patterson, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321304527/?ar">https://go.oreilly.com/library-access/library/view/-/0321304527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321304527/?ar">https://learning.oreilly.com/library/view/~/0321304527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321304527">https://learning.oreilly.com/library/view/~/0321304527</a><br/>Format:&#160;Electronic Resources<br/> Assessing and Managing Security Risk in IT Systems ent://SD_ILS/0/SD_ILS:2326305 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;McCumber, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar">https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780203490426">https://learning.oreilly.com/library/view/~/9780203490426</a> <a href="https://learning.oreilly.com/library/view/~/9780203490426/?ar">https://learning.oreilly.com/library/view/~/9780203490426/?ar</a><br/>Format:&#160;Electronic Resources<br/> Firewalls and Internet Security : Repelling the Wily Hacker, Second Edition ent://SD_ILS/0/SD_ILS:2324785 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Cheswick, William, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/020163466X/?ar">https://go.oreilly.com/library-access/library/view/-/020163466X/?ar</a> <a href="https://learning.oreilly.com/library/view/~/020163466X/?ar">https://learning.oreilly.com/library/view/~/020163466X/?ar</a> <a href="https://learning.oreilly.com/library/view/~/020163466X">https://learning.oreilly.com/library/view/~/020163466X</a><br/>Format:&#160;Electronic Resources<br/> Security + Study Guide and DVD Training System ent://SD_ILS/0/SD_ILS:2320599 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Syngress, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836722">https://learning.oreilly.com/library/view/~/9781931836722</a> <a href="https://learning.oreilly.com/library/view/~/9781931836722/?ar">https://learning.oreilly.com/library/view/~/9781931836722/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar</a><br/>Format:&#160;Electronic Resources<br/> Inside the Security Mind : Making the Tough Decisions. ent://SD_ILS/0/SD_ILS:2322565 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Day, Kevin, 1975- author.<br/><a href="https://learning.oreilly.com/library/view/~/0131118293/?ar">https://learning.oreilly.com/library/view/~/0131118293/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131118293">https://learning.oreilly.com/library/view/~/0131118293</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131118293/?ar">https://go.oreilly.com/library-access/library/view/-/0131118293/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security Risks : the OCTAVESM Approach ent://SD_ILS/0/SD_ILS:2321582 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Alberts, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/0321118863/?ar">https://learning.oreilly.com/library/view/~/0321118863/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321118863/?ar">https://go.oreilly.com/library-access/library/view/-/0321118863/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321118863">https://learning.oreilly.com/library/view/~/0321118863</a><br/>Format:&#160;Electronic Resources<br/> Understanding PKI : Concepts, Standards, and Deployment Considerations, Second Edition ent://SD_ILS/0/SD_ILS:2321625 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Adams, Carlisle, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672323915/?ar">https://go.oreilly.com/library-access/library/view/-/0672323915/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672323915/?ar">https://learning.oreilly.com/library/view/~/0672323915/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672323915">https://learning.oreilly.com/library/view/~/0672323915</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing, Third Edition ent://SD_ILS/0/SD_ILS:2326579 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Pfleeger, Charles, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0130355488/?ar">https://go.oreilly.com/library-access/library/view/-/0130355488/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0130355488/?ar">https://learning.oreilly.com/library/view/~/0130355488/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0130355488">https://learning.oreilly.com/library/view/~/0130355488</a><br/>Format:&#160;Electronic Resources<br/> Writing Information Security Policies. ent://SD_ILS/0/SD_ILS:2310755 2024-05-27T12:14:44Z 2024-05-27T12:14:44Z by&#160;Barman, Scott, author.<br/><a href="https://learning.oreilly.com/library/view/~/157870264X/?ar">https://learning.oreilly.com/library/view/~/157870264X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/157870264X/?ar">https://go.oreilly.com/library-access/library/view/-/157870264X/?ar</a> <a href="https://learning.oreilly.com/library/view/~/157870264X">https://learning.oreilly.com/library/view/~/157870264X</a><br/>Format:&#160;Electronic Resources<br/>