Search Results for - Narrowed by: Electronic books. - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-05-23T20:17:26ZSustainably investing in digital assets globallyent://SD_ILS/0/SD_ILS:23340662024-05-23T20:17:26Z2024-05-23T20:17:26Zby Ozelli, Selva, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119885627">https://learning.oreilly.com/library/view/~/9781119885627</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119885627/?ar">https://go.oreilly.com/library-access/library/view/-/9781119885627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119885627/?ar">https://learning.oreilly.com/library/view/~/9781119885627/?ar</a><br/>Format: Electronic Resources<br/>The security culture playbook : an executive guide to reducing risk and developing your human defense layerent://SD_ILS/0/SD_ILS:23324102024-05-23T20:17:26Z2024-05-23T20:17:26Zby Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119875239/?ar">https://learning.oreilly.com/library/view/~/9781119875239/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119875239">https://learning.oreilly.com/library/view/~/9781119875239</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar">https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar</a><br/>Format: Electronic Resources<br/>Purple team strategies : enhancing global security posture through uniting red and blue teams with adversary emulationent://SD_ILS/0/SD_ILS:23334932024-05-23T20:17:26Z2024-05-23T20:17:26Zby Routin, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801074292/?ar">https://learning.oreilly.com/library/view/~/9781801074292/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801074292">https://learning.oreilly.com/library/view/~/9781801074292</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801074292/?ar">https://go.oreilly.com/library-access/library/view/-/9781801074292/?ar</a><br/>Format: Electronic Resources<br/>The art of cyber security : a practical guide to winning the war on cyber crimeent://SD_ILS/0/SD_ILS:23334172024-05-23T20:17:26Z2024-05-23T20:17:26Zby Hibberd, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783676">https://learning.oreilly.com/library/view/~/9781787783676</a>
<a href="https://learning.oreilly.com/library/view/~/9781787783676/?ar">https://learning.oreilly.com/library/view/~/9781787783676/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar</a><br/>Format: Electronic Resources<br/>Building a Red Hat OpenShift environment on IBM Zent://SD_ILS/0/SD_ILS:23340932024-05-23T20:17:26Z2024-05-23T20:17:26Zby Parziale, Lydia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460741/?ar">https://learning.oreilly.com/library/view/~/9780738460741/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460741">https://learning.oreilly.com/library/view/~/9780738460741</a><br/>Format: Electronic Resources<br/>Secret key cryptography : ciphers, from simple to unbreakableent://SD_ILS/0/SD_ILS:23340942024-05-23T20:17:26Z2024-05-23T20:17:26Zby Rubin, Frank (Cryptographer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781633439795">https://learning.oreilly.com/library/view/~/9781633439795</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar">https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781633439795/?ar">https://learning.oreilly.com/library/view/~/9781633439795/?ar</a><br/>Format: Electronic Resources<br/>Mastering Windows security and hardening : secure and protect your Windows environment from cyber threats using zero-trust security principlesent://SD_ILS/0/SD_ILS:23341562024-05-23T20:17:26Z2024-05-23T20:17:26Zby Dunkerley, Mark, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar">https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803236544/?ar">https://learning.oreilly.com/library/view/~/9781803236544/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803236544">https://learning.oreilly.com/library/view/~/9781803236544</a><br/>Format: Electronic Resources<br/>Designing secure software : a guide for developersent://SD_ILS/0/SD_ILS:23295942024-05-23T20:17:26Z2024-05-23T20:17:26Zby Kohnfelder, Loren, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129804/?ar">https://learning.oreilly.com/library/view/~/9781098129804/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129804">https://learning.oreilly.com/library/view/~/9781098129804</a><br/>Format: Electronic Resources<br/>Trust in computer systems and the cloudent://SD_ILS/0/SD_ILS:23308502024-05-23T20:17:26Z2024-05-23T20:17:26Zby Bursell, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119692324/?ar">https://learning.oreilly.com/library/view/~/9781119692324/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar">https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119692324">https://learning.oreilly.com/library/view/~/9781119692324</a><br/>Format: Electronic Resources<br/>Cybersecurity For Dummiesent://SD_ILS/0/SD_ILS:23328722024-05-23T20:17:26Z2024-05-23T20:17:26Zby Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119867180">https://learning.oreilly.com/library/view/~/9781119867180</a>
<a href="https://learning.oreilly.com/library/view/~/9781119867180/?ar">https://learning.oreilly.com/library/view/~/9781119867180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar">https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar</a><br/>Format: Electronic Resources<br/>Security awareness for dummiesent://SD_ILS/0/SD_ILS:23328742024-05-23T20:17:26Z2024-05-23T20:17:26Zby Winkler, Ira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar">https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119720928">https://learning.oreilly.com/library/view/~/9781119720928</a>
<a href="https://learning.oreilly.com/library/view/~/9781119720928/?ar">https://learning.oreilly.com/library/view/~/9781119720928/?ar</a><br/>Format: Electronic Resources<br/>Snowflake access control : mastering the features for data privacy and regulatory complianceent://SD_ILS/0/SD_ILS:23319072024-05-23T20:17:26Z2024-05-23T20:17:26Zby Larson, Jessica Megan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484280386">https://learning.oreilly.com/library/view/~/9781484280386</a>
<a href="https://learning.oreilly.com/library/view/~/9781484280386/?ar">https://learning.oreilly.com/library/view/~/9781484280386/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar">https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar</a><br/>Format: Electronic Resources<br/>Practical fraud prevention : fraud and AML analytics for Fintech and eCommerce, using SQL and Pythonent://SD_ILS/0/SD_ILS:23323482024-05-23T20:17:26Z2024-05-23T20:17:26Zby Saporta, Gilit, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492093312/?ar">https://go.oreilly.com/library-access/library/view/-/9781492093312/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492093312/?ar">https://learning.oreilly.com/library/view/~/9781492093312/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492093312">https://learning.oreilly.com/library/view/~/9781492093312</a><br/>Format: Electronic Resources<br/>IBM Spectrum Virtualize, IBM FlashSystem, and IBM SAN volume controller security feature checklistent://SD_ILS/0/SD_ILS:23323722024-05-23T20:17:26Z2024-05-23T20:17:26Zby Scales, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460437">https://learning.oreilly.com/library/view/~/9780738460437</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460437/?ar">https://learning.oreilly.com/library/view/~/9780738460437/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar</a><br/>Format: Electronic Resources<br/>Container storage and data protection for applications on Kubernetesent://SD_ILS/0/SD_ILS:23325742024-05-23T20:17:26Z2024-05-23T20:17:26Zby Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127022/?ar">https://learning.oreilly.com/library/view/~/9781098127022/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127022">https://learning.oreilly.com/library/view/~/9781098127022</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar</a><br/>Format: Electronic Resources<br/>Shifting left for application security : bridging the divide between DevOps and security with the right security toolsent://SD_ILS/0/SD_ILS:23325752024-05-23T20:17:26Z2024-05-23T20:17:26Zby Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format: Electronic Resources<br/>Security Observability with eBPFent://SD_ILS/0/SD_ILS:23325762024-05-23T20:17:26Z2024-05-23T20:17:26Zby Salazar, Jed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492096719">https://learning.oreilly.com/library/view/~/9781492096719</a>
<a href="https://learning.oreilly.com/library/view/~/9781492096719/?ar">https://learning.oreilly.com/library/view/~/9781492096719/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar">https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar</a><br/>Format: Electronic Resources<br/>A hybrid cloud cyber security solution using IBM Spectrum Virtualize for public cloud on Azure and IBM Spectrum Virtualize safeguarded copy.ent://SD_ILS/0/SD_ILS:23317052024-05-23T20:17:26Z2024-05-23T20:17:26Z<a href="https://learning.oreilly.com/library/view/~/9780738460345/?ar">https://learning.oreilly.com/library/view/~/9780738460345/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460345">https://learning.oreilly.com/library/view/~/9780738460345</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar</a><br/>Format: Electronic Resources<br/>Offensive shellcode from scratch : get to grips with shellcode countermeasures and discover how to bypass thement://SD_ILS/0/SD_ILS:23325372024-05-23T20:17:26Z2024-05-23T20:17:26Zby Pillay, Rishalin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar">https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803247427">https://learning.oreilly.com/library/view/~/9781803247427</a>
<a href="https://learning.oreilly.com/library/view/~/9781803247427/?ar">https://learning.oreilly.com/library/view/~/9781803247427/?ar</a><br/>Format: Electronic Resources<br/>Cyber security and network securityent://SD_ILS/0/SD_ILS:23325382024-05-23T20:17:26Z2024-05-23T20:17:26Zby Pramanik, Sabyasachi, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119812494">https://learning.oreilly.com/library/view/~/9781119812494</a>
<a href="https://learning.oreilly.com/library/view/~/9781119812494/?ar">https://learning.oreilly.com/library/view/~/9781119812494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar">https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar</a><br/>Format: Electronic Resources<br/>Cybercrime : protecting your business, your family and yourselfent://SD_ILS/0/SD_ILS:23325452024-05-23T20:17:26Z2024-05-23T20:17:26Zby Wade, Todd author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175874/?ar">https://learning.oreilly.com/library/view/~/9781780175874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175874">https://learning.oreilly.com/library/view/~/9781780175874</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar</a><br/>Format: Electronic Resources<br/>Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through thement://SD_ILS/0/SD_ILS:23324112024-05-23T20:17:26Z2024-05-23T20:17:26Zby Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format: Electronic Resources<br/>The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and moreent://SD_ILS/0/SD_ILS:23326302024-05-23T20:17:26Z2024-05-23T20:17:26Zby Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format: Electronic Resources<br/>What is eBPF?ent://SD_ILS/0/SD_ILS:23326312024-05-23T20:17:26Z2024-05-23T20:17:26Zby Rice, Liz (Open Source engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492097266/?ar">https://learning.oreilly.com/library/view/~/9781492097266/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492097266">https://learning.oreilly.com/library/view/~/9781492097266</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar">https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar</a><br/>Format: Electronic Resources<br/>Penetration Testing mit Metasploit : Praxiswissen für mehr IT-Sicherheitent://SD_ILS/0/SD_ILS:23339632024-05-23T20:17:26Z2024-05-23T20:17:26Zby Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783747505649">https://learning.oreilly.com/library/view/~/9783747505649</a>
<a href="https://learning.oreilly.com/library/view/~/9783747505649/?ar">https://learning.oreilly.com/library/view/~/9783747505649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar">https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar</a><br/>Format: Electronic Resources<br/>IoT system testing : an IoT journey from devices to analytics and the edgeent://SD_ILS/0/SD_ILS:23345922024-05-23T20:17:26Z2024-05-23T20:17:26Zby Hagar, Jon Duncan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar">https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484282762/?ar">https://learning.oreilly.com/library/view/~/9781484282762/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484282762">https://learning.oreilly.com/library/view/~/9781484282762</a><br/>Format: Electronic Resources<br/>CEH v11 : certified ethical hacker version 11 practice testsent://SD_ILS/0/SD_ILS:23303852024-05-23T20:17:26Z2024-05-23T20:17:26Zby Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar">https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119824510/?ar">https://learning.oreilly.com/library/view/~/9781119824510/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119824510">https://learning.oreilly.com/library/view/~/9781119824510</a><br/>Format: Electronic Resources<br/>Computer science security : concepts and toolsent://SD_ILS/0/SD_ILS:23340352024-05-23T20:17:26Z2024-05-23T20:17:26Zby Zaidoun, Ameur Salem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786307552/?ar">https://learning.oreilly.com/library/view/~/9781786307552/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar">https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786307552">https://learning.oreilly.com/library/view/~/9781786307552</a><br/>Format: Electronic Resources<br/>Cloud security for dummiesent://SD_ILS/0/SD_ILS:23324972024-05-23T20:17:26Z2024-05-23T20:17:26Zby Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a>
<a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format: Electronic Resources<br/>Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptionsent://SD_ILS/0/SD_ILS:23297992024-05-23T20:17:26Z2024-05-23T20:17:26Zby Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format: Electronic Resources<br/>Hackingent://SD_ILS/0/SD_ILS:23328862024-05-23T20:17:26Z2024-05-23T20:17:26Zby Beaver, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119872191">https://learning.oreilly.com/library/view/~/9781119872191</a>
<a href="https://learning.oreilly.com/library/view/~/9781119872191/?ar">https://learning.oreilly.com/library/view/~/9781119872191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar">https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar</a><br/>Format: Electronic Resources<br/>Digital Earth : cyber threats, privacy and ethics in an age of paranoiaent://SD_ILS/0/SD_ILS:23328962024-05-23T20:17:26Z2024-05-23T20:17:26Zby Katz, Sarah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783614">https://learning.oreilly.com/library/view/~/9781787783614</a>
<a href="https://learning.oreilly.com/library/view/~/9781787783614/?ar">https://learning.oreilly.com/library/view/~/9781787783614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar</a><br/>Format: Electronic Resources<br/>Python for cybersecurity : using Python for cyber offense and defenseent://SD_ILS/0/SD_ILS:23315742024-05-23T20:17:26Z2024-05-23T20:17:26Zby Poston, Howard E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar">https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649/?ar">https://learning.oreilly.com/library/view/~/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649">https://learning.oreilly.com/library/view/~/9781119850649</a><br/>Format: Electronic Resources<br/>Hacking : der umfassende Praxis-Guide : inkl. Prüfungsvorbereitung zum CEHv11ent://SD_ILS/0/SD_ILS:23316832024-05-23T20:17:26Z2024-05-23T20:17:26Zby Amberg, Eric, author<br/><a href="https://learning.oreilly.com/library/view/~/9783747504840">https://learning.oreilly.com/library/view/~/9783747504840</a>
<a href="https://learning.oreilly.com/library/view/~/9783747504840/?ar">https://learning.oreilly.com/library/view/~/9783747504840/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar">https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar</a><br/>Format: Electronic Resources<br/>Cloud security handbook : find out how to effectively secure cloud environments using AWS, Azure, and GCPent://SD_ILS/0/SD_ILS:23324812024-05-23T20:17:26Z2024-05-23T20:17:26Zby Estrin, Eyal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800569195">https://learning.oreilly.com/library/view/~/9781800569195</a>
<a href="https://learning.oreilly.com/library/view/~/9781800569195/?ar">https://learning.oreilly.com/library/view/~/9781800569195/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar">https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar</a><br/>Format: Electronic Resources<br/>The cybersecurity playbook for modern enterprisesent://SD_ILS/0/SD_ILS:23323232024-05-23T20:17:26Z2024-05-23T20:17:26Zby Wittkop, Jeremy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639/?ar">https://learning.oreilly.com/library/view/~/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639">https://learning.oreilly.com/library/view/~/9781803248639</a><br/>Format: Electronic Resources<br/>PRACTICAL INDUSTRIAL CYBERSECURITY ICS, Industry 4.0, and IIoTent://SD_ILS/0/SD_ILS:23330702024-05-23T20:17:26Z2024-05-23T20:17:26Zby Brooks, Charles J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119883029/?ar">https://go.oreilly.com/library-access/library/view/-/9781119883029/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119883029/?ar">https://learning.oreilly.com/library/view/~/9781119883029/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119883029">https://learning.oreilly.com/library/view/~/9781119883029</a><br/>Format: Electronic Resources<br/>Operationalizing Threat Intelligence : a Guide to Developing and Operationalizing Cyber Threat Intelligence Programs.ent://SD_ILS/0/SD_ILS:23330752024-05-23T20:17:26Z2024-05-23T20:17:26Zby Wilhoit, Kyle.<br/><a href="https://learning.oreilly.com/library/view/~/9781801814683">https://learning.oreilly.com/library/view/~/9781801814683</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801814683/?ar">https://go.oreilly.com/library-access/library/view/-/9781801814683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801814683/?ar">https://learning.oreilly.com/library/view/~/9781801814683/?ar</a><br/>Format: Electronic Resources<br/>CEH : Certified Ethical Hacker Practice Examsent://SD_ILS/0/SD_ILS:23336352024-05-23T20:17:26Z2024-05-23T20:17:26Zby Walker, Matthew.<br/><a href="https://learning.oreilly.com/library/view/~/9781264269976">https://learning.oreilly.com/library/view/~/9781264269976</a>
<a href="https://learning.oreilly.com/library/view/~/9781264269976/?ar">https://learning.oreilly.com/library/view/~/9781264269976/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar">https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar</a><br/>Format: Electronic Resources<br/>The ransomware dilemma : the decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attackent://SD_ILS/0/SD_ILS:23335592024-05-23T20:17:26Z2024-05-23T20:17:26Zby Leo, Philipp, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63419">https://learning.oreilly.com/library/view/~/53863MIT63419</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT63419/?ar">https://learning.oreilly.com/library/view/~/53863MIT63419/?ar</a><br/>Format: Electronic Resources<br/>Building cyber resilience before the next attack occurs : companies that are most successful in responding to cyberattacks leverage distributed leadership, crisis experience, and consistent communicationent://SD_ILS/0/SD_ILS:23335602024-05-23T20:17:26Z2024-05-23T20:17:26Zby Hepfer, Manuel, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63431/?ar">https://learning.oreilly.com/library/view/~/53863MIT63431/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT63431">https://learning.oreilly.com/library/view/~/53863MIT63431</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63431/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63431/?ar</a><br/>Format: Electronic Resources<br/>Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloudent://SD_ILS/0/SD_ILS:23337922024-05-23T20:17:26Z2024-05-23T20:17:26Zby Berkouwer, Sander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar">https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242507/?ar">https://learning.oreilly.com/library/view/~/9781803242507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242507">https://learning.oreilly.com/library/view/~/9781803242507</a><br/>Format: Electronic Resources<br/>Deploying a modern security data lakeent://SD_ILS/0/SD_ILS:23339652024-05-23T20:17:26Z2024-05-23T20:17:26Zby Baum, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098134983/?ar">https://learning.oreilly.com/library/view/~/9781098134983/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar">https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098134983">https://learning.oreilly.com/library/view/~/9781098134983</a><br/>Format: Electronic Resources<br/>Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response.ent://SD_ILS/0/SD_ILS:23314912024-05-23T20:17:26Z2024-05-23T20:17:26Zby Hettema, Hinne.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512/?ar">https://learning.oreilly.com/library/view/~/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512">https://learning.oreilly.com/library/view/~/9781801815512</a><br/>Format: Electronic Resources<br/>Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory.ent://SD_ILS/0/SD_ILS:23317872024-05-23T20:17:26Z2024-05-23T20:17:26Zby Ostrovskaya, Svetlana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070331">https://learning.oreilly.com/library/view/~/9781801070331</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070331/?ar">https://learning.oreilly.com/library/view/~/9781801070331/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Defender for Cloud Cookbook : Protect Multicloud and Hybrid Cloud Environments, Manage Compliance and Strengthen Security Postureent://SD_ILS/0/SD_ILS:23335922024-05-23T20:17:26Z2024-05-23T20:17:26Zby Kranjac, Sasha.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801076135/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076135/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076135">https://learning.oreilly.com/library/view/~/9781801076135</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076135/?ar">https://learning.oreilly.com/library/view/~/9781801076135/?ar</a><br/>Format: Electronic Resources<br/>IF IT'S SMART, IT'S VULNERABLEent://SD_ILS/0/SD_ILS:23336012024-05-23T20:17:26Z2024-05-23T20:17:26Zby Hypponen, Mikko, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119895183/?ar">https://go.oreilly.com/library-access/library/view/-/9781119895183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119895183/?ar">https://learning.oreilly.com/library/view/~/9781119895183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119895183">https://learning.oreilly.com/library/view/~/9781119895183</a><br/>Format: Electronic Resources<br/>Fight fire with fire : proactive cybersecurity strategies for today's leadersent://SD_ILS/0/SD_ILS:23309142024-05-23T20:17:26Z2024-05-23T20:17:26Zby Tarun, Renee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119854265/?ar">https://learning.oreilly.com/library/view/~/9781119854265/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119854265">https://learning.oreilly.com/library/view/~/9781119854265</a><br/>Format: Electronic Resources<br/>Cybersecurity and local governmentent://SD_ILS/0/SD_ILS:23317462024-05-23T20:17:26Z2024-05-23T20:17:26Zby Norris, Donald F., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119788287/?ar">https://learning.oreilly.com/library/view/~/9781119788287/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119788287">https://learning.oreilly.com/library/view/~/9781119788287</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119788287/?ar">https://go.oreilly.com/library-access/library/view/-/9781119788287/?ar</a><br/>Format: Electronic Resources<br/>Mastering Azure security : keeping your Microsoft Azure workloads safeent://SD_ILS/0/SD_ILS:23329272024-05-23T20:17:26Z2024-05-23T20:17:26Zby Toroman, Mustafa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803238555">https://learning.oreilly.com/library/view/~/9781803238555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238555/?ar">https://learning.oreilly.com/library/view/~/9781803238555/?ar</a><br/>Format: Electronic Resources<br/>Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadarent://SD_ILS/0/SD_ILS:23320572024-05-23T20:17:26Z2024-05-23T20:17:26Zby IBM Storage Team, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260/?ar">https://learning.oreilly.com/library/view/~/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260">https://learning.oreilly.com/library/view/~/9780738460260</a><br/>Format: Electronic Resources<br/>CEH Certified Ethical Hacker Cert guideent://SD_ILS/0/SD_ILS:23316212024-05-23T20:17:26Z2024-05-23T20:17:26Zby Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format: Electronic Resources<br/>Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacksent://SD_ILS/0/SD_ILS:23299412024-05-23T20:17:26Z2024-05-23T20:17:26Zby Peiris, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119804062/?ar">https://learning.oreilly.com/library/view/~/9781119804062/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar">https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119804062">https://learning.oreilly.com/library/view/~/9781119804062</a><br/>Format: Electronic Resources<br/>The CISO evolution : business knowledge for cybersecurity executivesent://SD_ILS/0/SD_ILS:23301022024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sharp, Matthew K., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar">https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119782483/?ar">https://learning.oreilly.com/library/view/~/9781119782483/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119782483">https://learning.oreilly.com/library/view/~/9781119782483</a><br/>Format: Electronic Resources<br/>Phishing and communication channels a guide to identifying and mitigating phishing attacksent://SD_ILS/0/SD_ILS:23310582024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sonowal, Gunikhan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277447/?ar">https://learning.oreilly.com/library/view/~/9781484277447/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277447">https://learning.oreilly.com/library/view/~/9781484277447</a><br/>Format: Electronic Resources<br/>Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environmentent://SD_ILS/0/SD_ILS:23567612024-05-23T20:17:26Z2024-05-23T20:17:26Zby Ackerman, Pascal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6730157">Click to View</a><br/>Format: Electronic Resources<br/>Data analytics : systems engineering - cybersecurity - project managementent://SD_ILS/0/SD_ILS:22750842024-05-23T20:17:26Z2024-05-23T20:17:26Zby Greco, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6457843">Click to View</a><br/>Format: Electronic Resources<br/>Alice and Bob learn application security.ent://SD_ILS/0/SD_ILS:23259582024-05-23T20:17:26Z2024-05-23T20:17:26Zby Janca, Tanya.<br/><a href="https://learning.oreilly.com/library/view/~/9781119687351">https://learning.oreilly.com/library/view/~/9781119687351</a>
<a href="https://learning.oreilly.com/library/view/~/9781119687351/?ar">https://learning.oreilly.com/library/view/~/9781119687351/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar">https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar</a><br/>Format: Electronic Resources<br/>Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering (CCE)ent://SD_ILS/0/SD_ILS:23263232024-05-23T20:17:26Z2024-05-23T20:17:26Zby Bochman, Andrew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781000292978/?ar">https://go.oreilly.com/library-access/library/view/-/9781000292978/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000292978/?ar">https://learning.oreilly.com/library/view/~/9781000292978/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000292978">https://learning.oreilly.com/library/view/~/9781000292978</a><br/>Format: Electronic Resources<br/>Artificial Intelligence, Cybersecurity and Cyber Defenceent://SD_ILS/0/SD_ILS:23283582024-05-23T20:17:26Z2024-05-23T20:17:26Zby Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format: Electronic Resources<br/>Start-up secure : baking cybersecurity into your company from founding to exitent://SD_ILS/0/SD_ILS:23275242024-05-23T20:17:26Z2024-05-23T20:17:26Zby Castaldo, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119700739">https://learning.oreilly.com/library/view/~/9781119700739</a>
<a href="https://learning.oreilly.com/library/view/~/9781119700739/?ar">https://learning.oreilly.com/library/view/~/9781119700739/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar">https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar</a><br/>Format: Electronic Resources<br/>Lifecycle IoT Security for Engineers.ent://SD_ILS/0/SD_ILS:23372492024-05-23T20:17:26Z2024-05-23T20:17:26Zby Kaustubh, Dhondge.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6805253">Click to View</a><br/>Format: Electronic Resources<br/>Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidentsent://SD_ILS/0/SD_ILS:23517642024-05-23T20:17:26Z2024-05-23T20:17:26Zby Singh, Glen D., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6824393">Click to View</a><br/>Format: Electronic Resources<br/>Comptia security+ certification practice exams, (Exam SY0-601).ent://SD_ILS/0/SD_ILS:23271372024-05-23T20:17:26Z2024-05-23T20:17:26Zby Lachance, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781260467987/?ar">https://learning.oreilly.com/library/view/~/9781260467987/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar">https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260467987">https://learning.oreilly.com/library/view/~/9781260467987</a><br/>Format: Electronic Resources<br/>COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION EXAM GUIDE (EXAM CS0-002)ent://SD_ILS/0/SD_ILS:23265162024-05-23T20:17:26Z2024-05-23T20:17:26Zby Chapman, Brent.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar">https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260464313">https://learning.oreilly.com/library/view/~/9781260464313</a>
<a href="https://learning.oreilly.com/library/view/~/9781260464313/?ar">https://learning.oreilly.com/library/view/~/9781260464313/?ar</a><br/>Format: Electronic Resources<br/>Information Risk Management : A practitioner's guide.ent://SD_ILS/0/SD_ILS:23370732024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sutton, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6733537">Click to View</a><br/>Format: Electronic Resources<br/>Choose your InfoSec path : an interactive cybersecurity adventure for beginnersent://SD_ILS/0/SD_ILS:23289902024-05-23T20:17:26Z2024-05-23T20:17:26Zby Roxon, Alexander J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484270363">https://learning.oreilly.com/library/view/~/9781484270363</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270363/?ar">https://learning.oreilly.com/library/view/~/9781484270363/?ar</a><br/>Format: Electronic Resources<br/>Enterprise DevOps for Architectsent://SD_ILS/0/SD_ILS:23309782024-05-23T20:17:26Z2024-05-23T20:17:26Zby Mulder, Jeroen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801812153">https://learning.oreilly.com/library/view/~/9781801812153</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812153/?ar">https://learning.oreilly.com/library/view/~/9781801812153/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity ABCs : delivering awareness, behaviours and culture changeent://SD_ILS/0/SD_ILS:23339262024-05-23T20:17:26Z2024-05-23T20:17:26Zby Barker, Jessica (Cyber security), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780174266/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174266/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780174266/?ar">https://learning.oreilly.com/library/view/~/9781780174266/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780174266">https://learning.oreilly.com/library/view/~/9781780174266</a><br/>Format: Electronic Resources<br/>Malware Analysis Techniques : Tricks for the Triage of Adversarial Software.ent://SD_ILS/0/SD_ILS:23291542024-05-23T20:17:26Z2024-05-23T20:17:26Zby Barker, Dylan.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212277">https://learning.oreilly.com/library/view/~/9781839212277</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212277/?ar">https://learning.oreilly.com/library/view/~/9781839212277/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity and Third-Party Risk : Third Party Threat Huntingent://SD_ILS/0/SD_ILS:23290002024-05-23T20:17:26Z2024-05-23T20:17:26Zby Rasner, Gregory C.<br/><a href="https://learning.oreilly.com/library/view/~/9781119809555">https://learning.oreilly.com/library/view/~/9781119809555</a>
<a href="https://learning.oreilly.com/library/view/~/9781119809555/?ar">https://learning.oreilly.com/library/view/~/9781119809555/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar">https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar</a><br/>Format: Electronic Resources<br/>Self-sovereign identity : decentralized digital identity and verifiable credentialsent://SD_ILS/0/SD_ILS:23302702024-05-23T20:17:26Z2024-05-23T20:17:26Zby Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format: Electronic Resources<br/>The official (ISC)2 CCSP CBK referenceent://SD_ILS/0/SD_ILS:23293052024-05-23T20:17:26Z2024-05-23T20:17:26Zby Fife, Leslie, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119603436/?ar">https://go.oreilly.com/library-access/library/view/-/9781119603436/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119603436/?ar">https://learning.oreilly.com/library/view/~/9781119603436/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119603436">https://learning.oreilly.com/library/view/~/9781119603436</a><br/>Format: Electronic Resources<br/>(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests.ent://SD_ILS/0/SD_ILS:23295712024-05-23T20:17:26Z2024-05-23T20:17:26Zby Chapple, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781119787631">https://learning.oreilly.com/library/view/~/9781119787631</a>
<a href="https://learning.oreilly.com/library/view/~/9781119787631/?ar">https://learning.oreilly.com/library/view/~/9781119787631/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119787631/?ar">https://go.oreilly.com/library-access/library/view/-/9781119787631/?ar</a><br/>Format: Electronic Resources<br/>Getting Started with z/OS Data Set Encryptionent://SD_ILS/0/SD_ILS:23312522024-05-23T20:17:26Z2024-05-23T20:17:26Zby White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format: Electronic Resources<br/>Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browserent://SD_ILS/0/SD_ILS:23315702024-05-23T20:17:26Z2024-05-23T20:17:26Zby Segala, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar">https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801075336/?ar">https://learning.oreilly.com/library/view/~/9781801075336/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801075336">https://learning.oreilly.com/library/view/~/9781801075336</a><br/>Format: Electronic Resources<br/>Cyberjutsu : cybersecurity for the modern ninjaent://SD_ILS/0/SD_ILS:23265412024-05-23T20:17:26Z2024-05-23T20:17:26Zby McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format: Electronic Resources<br/>Information Risk Management A practitioner's guideent://SD_ILS/0/SD_ILS:23302972024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sutton, David author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175751">https://learning.oreilly.com/library/view/~/9781780175751</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175751/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175751/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175751/?ar">https://learning.oreilly.com/library/view/~/9781780175751/?ar</a><br/>Format: Electronic Resources<br/>CYBER SECURITY AND DIGITAL FORENSICSent://SD_ILS/0/SD_ILS:23314412024-05-23T20:17:26Z2024-05-23T20:17:26Z<a href="https://learning.oreilly.com/library/view/~/9781119795636">https://learning.oreilly.com/library/view/~/9781119795636</a>
<a href="https://learning.oreilly.com/library/view/~/9781119795636/?ar">https://learning.oreilly.com/library/view/~/9781119795636/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar">https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity in the COVID-19 pandemicent://SD_ILS/0/SD_ILS:23277302024-05-23T20:17:26Z2024-05-23T20:17:26Zby Okereafor, Kenneth, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781000357653/?ar">https://learning.oreilly.com/library/view/~/9781000357653/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar">https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000357653">https://learning.oreilly.com/library/view/~/9781000357653</a><br/>Format: Electronic Resources<br/>Secure edge computing : applications, techniques and challenges.ent://SD_ILS/0/SD_ILS:23292882024-05-23T20:17:26Z2024-05-23T20:17:26Zby Ahmed, Mohiuddin (Computer scientist), editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000427325/?ar">https://learning.oreilly.com/library/view/~/9781000427325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000427325">https://learning.oreilly.com/library/view/~/9781000427325</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar">https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar</a><br/>Format: Electronic Resources<br/>Art of attack : attacker mindset for security professionals.ent://SD_ILS/0/SD_ILS:23294332024-05-23T20:17:26Z2024-05-23T20:17:26Zby Reynolds, Maxie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119805465/?ar">https://learning.oreilly.com/library/view/~/9781119805465/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119805465">https://learning.oreilly.com/library/view/~/9781119805465</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar">https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar</a><br/>Format: Electronic Resources<br/>CISSP (ISC)2 certification practice exams and tests : over 1000 practice questions and explanations covering all 8 CISSP domains for exam version May 2021ent://SD_ILS/0/SD_ILS:23296342024-05-23T20:17:26Z2024-05-23T20:17:26Zby Jordan, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800561373">https://learning.oreilly.com/library/view/~/9781800561373</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800561373/?ar">https://go.oreilly.com/library-access/library/view/-/9781800561373/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800561373/?ar">https://learning.oreilly.com/library/view/~/9781800561373/?ar</a><br/>Format: Electronic Resources<br/>Information security in education and practiceent://SD_ILS/0/SD_ILS:23513692024-05-23T20:17:26Z2024-05-23T20:17:26Zby Kaloyanova, Kalinka., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6424050">Click to View</a><br/>Format: Electronic Resources<br/>Practical threat intelligence and data-driven threat huntingx : Practical threat intelligence and data-driven threat hunting : a hands-on guide to threat hunting with the ATT&CK framework and open source toolsent://SD_ILS/0/SD_ILS:23536262024-05-23T20:17:26Z2024-05-23T20:17:26Zby Palacin, Valentina, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6462896">Click to View</a><br/>Format: Electronic Resources<br/>Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflictent://SD_ILS/0/SD_ILS:23537352024-05-23T20:17:26Z2024-05-23T20:17:26Zby Borges, Dan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6640534">Click to View</a><br/>Format: Electronic Resources<br/>Artificial intelligence and data mining approaches in security frameworksent://SD_ILS/0/SD_ILS:23581812024-05-23T20:17:26Z2024-05-23T20:17:26Zby Bhargava, Neeraj, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6693036">Click to View</a><br/>Format: Electronic Resources<br/>The deviant security practices of cyber crimeent://SD_ILS/0/SD_ILS:23567332024-05-23T20:17:26Z2024-05-23T20:17:26Zby Van de Sandt, Erik H.A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6697091">Click to View</a><br/>Format: Electronic Resources<br/>Computer security and encryption : an introductionent://SD_ILS/0/SD_ILS:22376602024-05-23T20:17:26Z2024-05-23T20:17:26Zby Chauhan, S. R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6404902">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity and resilience in the arcticent://SD_ILS/0/SD_ILS:22423152024-05-23T20:17:26Z2024-05-23T20:17:26Zby Trump, Benjamin D., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6355988">Click to View</a><br/>Format: Electronic Resources<br/>Medical device cybersecurity for engineers and manufacturersent://SD_ILS/0/SD_ILS:22423372024-05-23T20:17:26Z2024-05-23T20:17:26Zby Wirth, Axel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6371470">Click to View</a><br/>Format: Electronic Resources<br/>Security operations in practiceent://SD_ILS/0/SD_ILS:22742232024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sheward, Mike, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6123931">Click to View</a><br/>Format: Electronic Resources<br/>Data privacy and GDPR handbookent://SD_ILS/0/SD_ILS:22739352024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sharma, Sanjay, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986738">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security : essential principles to secure your organisationent://SD_ILS/0/SD_ILS:22214562024-05-23T20:17:26Z2024-05-23T20:17:26Zby Calder, Alan, 1957- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6176700">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity : a self-teaching introductionent://SD_ILS/0/SD_ILS:22213842024-05-23T20:17:26Z2024-05-23T20:17:26Zby Gupta, C. P., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6142332">Click to View</a><br/>Format: Electronic Resources<br/>Security controls evaluation, testing, and assessment handbookent://SD_ILS/0/SD_ILS:22179062024-05-23T20:17:26Z2024-05-23T20:17:26Zby Johnson, Leighton, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986757">Click to View</a><br/>Format: Electronic Resources<br/>Successful cybersecurity professionals : how to change your behavior to protect your organizationent://SD_ILS/0/SD_ILS:22375912024-05-23T20:17:26Z2024-05-23T20:17:26Zby Brown, Steven, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6352009">Click to View</a><br/>Format: Electronic Resources<br/>Ensuring network security through the use of the honeypot techniqueent://SD_ILS/0/SD_ILS:22331462024-05-23T20:17:26Z2024-05-23T20:17:26Zby Selvaraj, Rajalakshmi, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5994500">Click to View</a><br/>Format: Electronic Resources<br/>Developing a cybersecurity immune system for industry 4.0ent://SD_ILS/0/SD_ILS:22373492024-05-23T20:17:26Z2024-05-23T20:17:26Zby Petrenko, Sergei, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6241958">Click to View</a><br/>Format: Electronic Resources<br/>Security and privacy in the internet of things : challenges and solutionsent://SD_ILS/0/SD_ILS:22334122024-05-23T20:17:26Z2024-05-23T20:17:26Zby Hernández Ramos, José Luis, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6143723">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Windows security and hardening : secure and protect your Windows environment from intruders, malware attacks, and other cyber threats.ent://SD_ILS/0/SD_ILS:23259662024-05-23T20:17:26Z2024-05-23T20:17:26Zby Dunkerley, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216411">https://learning.oreilly.com/library/view/~/9781839216411</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216411/?ar">https://learning.oreilly.com/library/view/~/9781839216411/?ar</a><br/>Format: Electronic Resources<br/>CompTIA Security+ SY0-601 Certification Guide - Second Editionent://SD_ILS/0/SD_ILS:23279712024-05-23T20:17:26Z2024-05-23T20:17:26Zby Neil, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781800564244">https://learning.oreilly.com/library/view/~/9781800564244</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar">https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800564244/?ar">https://learning.oreilly.com/library/view/~/9781800564244/?ar</a><br/>Format: Electronic Resources<br/>SECURING CLOUD SERVICES;A PRAGMATIC APPROACH, SECOND EDITION.ent://SD_ILS/0/SD_ILS:23280812024-05-23T20:17:26Z2024-05-23T20:17:26Zby LEE NEWCOMBE.<br/><a href="https://learning.oreilly.com/library/view/~/9781787782075">https://learning.oreilly.com/library/view/~/9781787782075</a>
<a href="https://learning.oreilly.com/library/view/~/9781787782075/?ar">https://learning.oreilly.com/library/view/~/9781787782075/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar">https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadershipent://SD_ILS/0/SD_ILS:23235892024-05-23T20:17:26Z2024-05-23T20:17:26Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format: Electronic Resources<br/>Hacking : der umfassende Praxis-Guide: inkl. Prüfungsvorbereitung zum CEHv10ent://SD_ILS/0/SD_ILS:23259462024-05-23T20:17:26Z2024-05-23T20:17:26Zby Amberg, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206/?ar">https://learning.oreilly.com/library/view/~/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206">https://learning.oreilly.com/library/view/~/9783958452206</a><br/>Format: Electronic Resources<br/>Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurityent://SD_ILS/0/SD_ILS:23254512024-05-23T20:17:26Z2024-05-23T20:17:26Zby Carey, Marcus J. (Cybersecurity professional)<br/><a href="https://learning.oreilly.com/library/view/~/9781119643418">https://learning.oreilly.com/library/view/~/9781119643418</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643418/?ar">https://learning.oreilly.com/library/view/~/9781119643418/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar</a><br/>Format: Electronic Resources<br/>Hands on hackingent://SD_ILS/0/SD_ILS:23254522024-05-23T20:17:26Z2024-05-23T20:17:26Zby Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format: Electronic Resources<br/>Security operations in practiceent://SD_ILS/0/SD_ILS:23339292024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175089/?ar">https://learning.oreilly.com/library/view/~/9781780175089/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175089">https://learning.oreilly.com/library/view/~/9781780175089</a><br/>Format: Electronic Resources<br/>Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsuent://SD_ILS/0/SD_ILS:23326572024-05-23T20:17:26Z2024-05-23T20:17:26Zby Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format: Electronic Resources<br/>Data breaches : crisis and opportunityent://SD_ILS/0/SD_ILS:23222222024-05-23T20:17:26Z2024-05-23T20:17:26Zby Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format: Electronic Resources<br/>Incident response primer : how to keep from getting pwned too hardent://SD_ILS/0/SD_ILS:23233162024-05-23T20:17:26Z2024-05-23T20:17:26Zby Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format: Electronic Resources<br/>Microsoft Azure security centerent://SD_ILS/0/SD_ILS:23220532024-05-23T20:17:26Z2024-05-23T20:17:26Zby Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format: Electronic Resources<br/>Advanced API Security : OAuth 2. 0 and Beyondent://SD_ILS/0/SD_ILS:23227342024-05-23T20:17:26Z2024-05-23T20:17:26Zby Siriwardena, Prabath.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220504">https://learning.oreilly.com/library/view/~/9781484220504</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220504/?ar">https://learning.oreilly.com/library/view/~/9781484220504/?ar</a><br/>Format: Electronic Resources<br/>Identity attack vectors : implementing an effective identity and access management solutionent://SD_ILS/0/SD_ILS:23227372024-05-23T20:17:26Z2024-05-23T20:17:26Zby Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484251652/?ar">https://learning.oreilly.com/library/view/~/9781484251652/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484251652">https://learning.oreilly.com/library/view/~/9781484251652</a><br/>Format: Electronic Resources<br/>Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safeent://SD_ILS/0/SD_ILS:23248022024-05-23T20:17:26Z2024-05-23T20:17:26Zby Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format: Electronic Resources<br/>Cloud Computing Security, 2nd Editionent://SD_ILS/0/SD_ILS:23311012024-05-23T20:17:26Z2024-05-23T20:17:26Zby Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity for information professionals : concepts and applicationsent://SD_ILS/0/SD_ILS:23563482024-05-23T20:17:26Z2024-05-23T20:17:26Zby Chang, Xiaqing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6232193">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity : the beginner's guide : a comprehensive guide to getting started in cybersecurityent://SD_ILS/0/SD_ILS:22681972024-05-23T20:17:26Z2024-05-23T20:17:26Zby Ozkaya, Erdal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5781046">Click to View</a><br/>Format: Electronic Resources<br/>Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomaliesent://SD_ILS/0/SD_ILS:22682902024-05-23T20:17:26Z2024-05-23T20:17:26Zby Parisi, Alessandro, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5847212">Click to View</a><br/>Format: Electronic Resources<br/>Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoTent://SD_ILS/0/SD_ILS:22734392024-05-23T20:17:26Z2024-05-23T20:17:26Zby Tounsi, Wiem, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5763061">Click to View</a><br/>Format: Electronic Resources<br/>Understanding security issuesent://SD_ILS/0/SD_ILS:21445942024-05-23T20:17:26Z2024-05-23T20:17:26Zby Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157542">Click to View</a><br/>Format: Electronic Resources<br/>The business of cybersecurity : foundations and ideologiesent://SD_ILS/0/SD_ILS:21569012024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5770273">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity law : protect yourself and your customersent://SD_ILS/0/SD_ILS:21567852024-05-23T20:17:26Z2024-05-23T20:17:26Zby Brathwaite, Shimon, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5719658">Click to View</a><br/>Format: Electronic Resources<br/>How cyber security can protect your business : a guide for all stakeholdersent://SD_ILS/0/SD_ILS:22178302024-05-23T20:17:26Z2024-05-23T20:17:26Zby Wright, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5979597">Click to View</a><br/>Format: Electronic Resources<br/>Digital asset valuation and cyber risk measurement : principles of cybernomicsent://SD_ILS/0/SD_ILS:22168082024-05-23T20:17:26Z2024-05-23T20:17:26Zby Ruan, Keyun, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5780982">Click to View</a><br/>Format: Electronic Resources<br/>Hardware security : a hands-on learning approachent://SD_ILS/0/SD_ILS:22165442024-05-23T20:17:26Z2024-05-23T20:17:26Zby Bhunia, Swarup, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5754491">Click to View</a><br/>Format: Electronic Resources<br/>Engineering secure and dependable software systemsent://SD_ILS/0/SD_ILS:22175252024-05-23T20:17:26Z2024-05-23T20:17:26Zby Pretschner, Alexander, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5899580">Click to View</a><br/>Format: Electronic Resources<br/>Cyber resilienceent://SD_ILS/0/SD_ILS:22329512024-05-23T20:17:26Z2024-05-23T20:17:26Zby Petrenko, Sergei, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5963879">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:23192202024-05-23T20:17:26Z2024-05-23T20:17:26Zby Tanner, Nadean H., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar">https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119552932/?ar">https://learning.oreilly.com/library/view/~/9781119552932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119552932">https://learning.oreilly.com/library/view/~/9781119552932</a><br/>Format: Electronic Resources<br/>Cybersecurity and privacy in cyber physical systemsent://SD_ILS/0/SD_ILS:23471872024-05-23T20:17:26Z2024-05-23T20:17:26Zby Maleh, Yassine, 1987- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5764472">Click to View</a><br/>Format: Electronic Resources<br/>Exam ref MS-101 Microsoft 365 Mobility and Securityent://SD_ILS/0/SD_ILS:23212712024-05-23T20:17:26Z2024-05-23T20:17:26Zby Svidergol, Brian, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135574843/?ar">https://go.oreilly.com/library-access/library/view/-/9780135574843/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135574843/?ar">https://learning.oreilly.com/library/view/~/9780135574843/?ar</a><br/>Format: Electronic Resources<br/>Cyber resiliency solution for IBM Spectrum Scaleent://SD_ILS/0/SD_ILS:23221452024-05-23T20:17:26Z2024-05-23T20:17:26Zby IBM Storage Team, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457963/?ar">https://learning.oreilly.com/library/view/~/9780738457963/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar</a><br/>Format: Electronic Resources<br/>Beginning security with Microsoft technologies : protecting Office 365, devices, and dataent://SD_ILS/0/SD_ILS:23221232024-05-23T20:17:26Z2024-05-23T20:17:26Zby Lakshmi, Vasantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484248539/?ar">https://learning.oreilly.com/library/view/~/9781484248539/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar">https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar</a><br/>Format: Electronic Resources<br/>Linux essentials for cybersecurity lab manualent://SD_ILS/0/SD_ILS:23175582024-05-23T20:17:26Z2024-05-23T20:17:26Zby Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format: Electronic Resources<br/>Data analytics for IT networks : developing innovative use casesent://SD_ILS/0/SD_ILS:23175592024-05-23T20:17:26Z2024-05-23T20:17:26Zby Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format: Electronic Resources<br/>Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualizationent://SD_ILS/0/SD_ILS:23189382024-05-23T20:17:26Z2024-05-23T20:17:26Zby Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134807614/?ar">https://learning.oreilly.com/library/view/~/9780134807614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807614">https://learning.oreilly.com/library/view/~/9780134807614</a><br/>Format: Electronic Resources<br/>Computer security : art and scienceent://SD_ILS/0/SD_ILS:23184522024-05-23T20:17:26Z2024-05-23T20:17:26Zby Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format: Electronic Resources<br/>Practical security : simple practices for defending your systemsent://SD_ILS/0/SD_ILS:23194022024-05-23T20:17:26Z2024-05-23T20:17:26Zby Zabicki, Roman, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar">https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679">https://learning.oreilly.com/library/view/~/9781680506679</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679/?ar">https://learning.oreilly.com/library/view/~/9781680506679/?ar</a><br/>Format: Electronic Resources<br/>Rootkits and bootkits : reversing modern malware and next generation threatsent://SD_ILS/0/SD_ILS:23143572024-05-23T20:17:26Z2024-05-23T20:17:26Zby Matrosov, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492071259/?ar">https://learning.oreilly.com/library/view/~/9781492071259/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar">https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492071259">https://learning.oreilly.com/library/view/~/9781492071259</a><br/>Format: Electronic Resources<br/>Learning Python for forensics : leverage the power of Python in forensic investigationsent://SD_ILS/0/SD_ILS:23191162024-05-23T20:17:26Z2024-05-23T20:17:26Zby Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format: Electronic Resources<br/>We have root : even more advice from Schneier on securityent://SD_ILS/0/SD_ILS:23215732024-05-23T20:17:26Z2024-05-23T20:17:26Zby Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643012">https://learning.oreilly.com/library/view/~/9781119643012</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643012/?ar">https://learning.oreilly.com/library/view/~/9781119643012/?ar</a><br/>Format: Electronic Resources<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:23215742024-05-23T20:17:26Z2024-05-23T20:17:26Zby Quade, Phil.<br/><a href="https://learning.oreilly.com/library/view/~/9781119617365">https://learning.oreilly.com/library/view/~/9781119617365</a>
<a href="https://learning.oreilly.com/library/view/~/9781119617365/?ar">https://learning.oreilly.com/library/view/~/9781119617365/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar">https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar</a><br/>Format: Electronic Resources<br/>Securing your cloud : IBM security for LinuxONEent://SD_ILS/0/SD_ILS:23215972024-05-23T20:17:26Z2024-05-23T20:17:26Zby Alves, Edi Lopes, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457949/?ar">https://learning.oreilly.com/library/view/~/9780738457949/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar</a><br/>Format: Electronic Resources<br/>Security with AI and machine learning : using advanced tools to improve application security at the edgeent://SD_ILS/0/SD_ILS:23190582024-05-23T20:17:26Z2024-05-23T20:17:26Zby Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format: Electronic Resources<br/>Cybersecurity Ops with bash : attack, defend, and analyze from the command lineent://SD_ILS/0/SD_ILS:23192522024-05-23T20:17:26Z2024-05-23T20:17:26Zby Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format: Electronic Resources<br/>Becoming the hacker : the playbook for getting inside the mind of an attackerent://SD_ILS/0/SD_ILS:23191292024-05-23T20:17:26Z2024-05-23T20:17:26Zby Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Electronic Resources<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:23195342024-05-23T20:17:26Z2024-05-23T20:17:26Zby Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a>
<a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format: Electronic Resources<br/>Getting Started with Ghidraent://SD_ILS/0/SD_ILS:23226052024-05-23T20:17:26Z2024-05-23T20:17:26Zby Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar">https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265/?ar">https://learning.oreilly.com/library/view/~/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265">https://learning.oreilly.com/library/view/~/9781098115265</a><br/>Format: Electronic Resources<br/>The complete Metasploit guide : explore effective penetration testing techniques with Metasploitent://SD_ILS/0/SD_ILS:23270772024-05-23T20:17:26Z2024-05-23T20:17:26Zby Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477">https://learning.oreilly.com/library/view/~/9781838822477</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477/?ar">https://learning.oreilly.com/library/view/~/9781838822477/?ar</a><br/>Format: Electronic Resources<br/>Penetration Testing mit mimikatz : Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführenent://SD_ILS/0/SD_ILS:23213482024-05-23T20:17:26Z2024-05-23T20:17:26Zby Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958459700">https://learning.oreilly.com/library/view/~/9783958459700</a>
<a href="https://learning.oreilly.com/library/view/~/9783958459700/?ar">https://learning.oreilly.com/library/view/~/9783958459700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar">https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurityent://SD_ILS/0/SD_ILS:23214482024-05-23T20:17:26Z2024-05-23T20:17:26Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643326">https://learning.oreilly.com/library/view/~/9781119643326</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643326/?ar">https://learning.oreilly.com/library/view/~/9781119643326/?ar</a><br/>Format: Electronic Resources<br/>Practical cyber forensics : an incident-based approach to forensic investigationsent://SD_ILS/0/SD_ILS:23215212024-05-23T20:17:26Z2024-05-23T20:17:26Zby Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format: Electronic Resources<br/>Getting started with Linux on Z Encryption for data at-restent://SD_ILS/0/SD_ILS:23219732024-05-23T20:17:26Z2024-05-23T20:17:26Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738457468/?ar">https://learning.oreilly.com/library/view/~/9780738457468/?ar</a><br/>Format: Electronic Resources<br/>Machine Learning et sécuritéent://SD_ILS/0/SD_ILS:23260752024-05-23T20:17:26Z2024-05-23T20:17:26Zby Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar">https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9782412043561">https://learning.oreilly.com/library/view/~/9782412043561</a>
<a href="https://learning.oreilly.com/library/view/~/9782412043561/?ar">https://learning.oreilly.com/library/view/~/9782412043561/?ar</a><br/>Format: Electronic Resources<br/>Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environmentsent://SD_ILS/0/SD_ILS:23220552024-05-23T20:17:26Z2024-05-23T20:17:26Zby Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format: Electronic Resources<br/>Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your dataent://SD_ILS/0/SD_ILS:23222042024-05-23T20:17:26Z2024-05-23T20:17:26Zby Chakrabarty, Boudhayan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458014/?ar">https://learning.oreilly.com/library/view/~/9780738458014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458014">https://learning.oreilly.com/library/view/~/9780738458014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar</a><br/>Format: Electronic Resources<br/>Serverless security : protect functions using the CLAD security modelent://SD_ILS/0/SD_ILS:23230662024-05-23T20:17:26Z2024-05-23T20:17:26Zby Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar">https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538/?ar">https://learning.oreilly.com/library/view/~/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538">https://learning.oreilly.com/library/view/~/9781492082538</a><br/>Format: Electronic Resources<br/>Informationssicherheit und Datenschutz : Handbuch für Praktiker und Begleitbuch zum T.I.S.P.ent://SD_ILS/0/SD_ILS:23221892024-05-23T20:17:26Z2024-05-23T20:17:26Zby Domnick, André, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar">https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098123659/?ar">https://learning.oreilly.com/library/view/~/9781098123659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098123659">https://learning.oreilly.com/library/view/~/9781098123659</a><br/>Format: Electronic Resources<br/>System administration ethics : ten commandments for security and compliance in a modern cyber worldent://SD_ILS/0/SD_ILS:23228662024-05-23T20:17:26Z2024-05-23T20:17:26Zby Ljubuncic, Igor, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249888/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249888/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484249888/?ar">https://learning.oreilly.com/library/view/~/9781484249888/?ar</a><br/>Format: Electronic Resources<br/>Securing network infrastructure : discover practical network security with Nmap and Nessus 7ent://SD_ILS/0/SD_ILS:23533722024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sairam, Jetty, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5742610">Click to View</a><br/>Format: Electronic Resources<br/>Attribute-based access controlent://SD_ILS/0/SD_ILS:22407332024-05-23T20:17:26Z2024-05-23T20:17:26Zby Hu, Vincent C., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5430722">Click to View</a><br/>Format: Electronic Resources<br/>99 privacy breaches to beware of : practical data protection tips from real-life experiencesent://SD_ILS/0/SD_ILS:22683062024-05-23T20:17:26Z2024-05-23T20:17:26Zby Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5879671">Click to View</a><br/>Format: Electronic Resources<br/>Rethinking cybersecurity : strategy, mass effect, and statesent://SD_ILS/0/SD_ILS:22671752024-05-23T20:17:26Z2024-05-23T20:17:26Zby Lewis, James Andrew, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5233949">Click to View</a><br/>Format: Electronic Resources<br/>Insider threatsent://SD_ILS/0/SD_ILS:22726222024-05-23T20:17:26Z2024-05-23T20:17:26Zby Arduin, Pierre-Emmanuel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5323674">Click to View</a><br/>Format: Electronic Resources<br/>Empirical research for software security : foundations and experienceent://SD_ILS/0/SD_ILS:21086702024-05-23T20:17:26Z2024-05-23T20:17:26Zby ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5164090">Click to View</a><br/>Format: Electronic Resources<br/>Online danger : how to protect yourself and your loved ones from the evil side of the internetent://SD_ILS/0/SD_ILS:21461012024-05-23T20:17:26Z2024-05-23T20:17:26Zby Cole, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5893451">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité et RGPD : protégez votre PME : guide pratique pour sécuriser votre système informatique et vous conformer au RGPDent://SD_ILS/0/SD_ILS:21565422024-05-23T20:17:26Z2024-05-23T20:17:26Zby Ejzyn, Alain, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5496488">Click to View</a><br/>Format: Electronic Resources<br/>Port cybersecurity : securing critical information infrastructures and supply chainsent://SD_ILS/0/SD_ILS:22132752024-05-23T20:17:26Z2024-05-23T20:17:26Zby Polemi, Nineta, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5118465">Click to View</a><br/>Format: Electronic Resources<br/>The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical securityent://SD_ILS/0/SD_ILS:22128452024-05-23T20:17:26Z2024-05-23T20:17:26Zby Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4981408">Click to View</a><br/>Format: Electronic Resources<br/>Security and resilience in intelligent data-centric systems and communication networksent://SD_ILS/0/SD_ILS:22131042024-05-23T20:17:26Z2024-05-23T20:17:26Zby Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5090270">Click to View</a><br/>Format: Electronic Resources<br/>Exploding data : reclaiming our cybersecurity in the digital ageent://SD_ILS/0/SD_ILS:22372322024-05-23T20:17:26Z2024-05-23T20:17:26Zby Chertoff, Michael, 1953- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6195359">Click to View</a><br/>Format: Electronic Resources<br/>Computer security of instrumentation and control systems at nuclear facilities : technical guidance.ent://SD_ILS/0/SD_ILS:22307812024-05-23T20:17:26Z2024-05-23T20:17:26Z<a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5426853">Click to View</a><br/>Format: Electronic Resources<br/>Selected readings in cybersecurityent://SD_ILS/0/SD_ILS:22314482024-05-23T20:17:26Z2024-05-23T20:17:26Zby Choi, Young B., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5613263">Click to View</a><br/>Format: Electronic Resources<br/>Practical internet of things security : design a security framework for an Internet connected ecosystement://SD_ILS/0/SD_ILS:23186282024-05-23T20:17:26Z2024-05-23T20:17:26Zby Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625821/?ar">https://learning.oreilly.com/library/view/~/9781788625821/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar</a><br/>Format: Electronic Resources<br/>Threat hunting : a guide to proactive network defenseent://SD_ILS/0/SD_ILS:23184442024-05-23T20:17:26Z2024-05-23T20:17:26Zby Collins, Michael (Michael Patrick), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028260/?ar">https://learning.oreilly.com/library/view/~/9781492028260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028260">https://learning.oreilly.com/library/view/~/9781492028260</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar</a><br/>Format: Electronic Resources<br/>Penetration Testing mit Metasploit : Praxiswissen für mehr IT-Sicherheitent://SD_ILS/0/SD_ILS:23162552024-05-23T20:17:26Z2024-05-23T20:17:26Zby Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958455979/?ar">https://learning.oreilly.com/library/view/~/9783958455979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958455979">https://learning.oreilly.com/library/view/~/9783958455979</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar">https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar</a><br/>Format: Electronic Resources<br/>Network scanning cookbook : practical network security using Nmap and Nessus 7ent://SD_ILS/0/SD_ILS:23177762024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format: Electronic Resources<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:23168982024-05-23T20:17:26Z2024-05-23T20:17:26Zby Harper, Allen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260108422/?ar">https://learning.oreilly.com/library/view/~/9781260108422/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260108422/?ar">https://go.oreilly.com/library-access/library/view/-/9781260108422/?ar</a><br/>Format: Electronic Resources<br/>Malware data science : attack detection and attributionent://SD_ILS/0/SD_ILS:23173882024-05-23T20:17:26Z2024-05-23T20:17:26Zby Saxe, Joshua, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067672">https://learning.oreilly.com/library/view/~/9781492067672</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067672/?ar">https://learning.oreilly.com/library/view/~/9781492067672/?ar</a><br/>Format: Electronic Resources<br/>Hands-on red team tactics : a practical guide to mastering red team operationsent://SD_ILS/0/SD_ILS:23177922024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sharma, Himanshu, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995238">https://learning.oreilly.com/library/view/~/9781788995238</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995238/?ar">https://learning.oreilly.com/library/view/~/9781788995238/?ar</a><br/>Format: Electronic Resources<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:23161522024-05-23T20:17:26Z2024-05-23T20:17:26Zby Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format: Electronic Resources<br/>Linux® hardening in hostile networks : server security from TLS to TORent://SD_ILS/0/SD_ILS:23141772024-05-23T20:17:26Z2024-05-23T20:17:26Zby Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format: Electronic Resources<br/>Securing open source libraries : managing vulnerabilities in open source code packagesent://SD_ILS/0/SD_ILS:23148902024-05-23T20:17:26Z2024-05-23T20:17:26Zby Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996980/?ar">https://learning.oreilly.com/library/view/~/9781491996980/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996980">https://learning.oreilly.com/library/view/~/9781491996980</a><br/>Format: Electronic Resources<br/>Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackersent://SD_ILS/0/SD_ILS:23160892024-05-23T20:17:26Z2024-05-23T20:17:26Zby Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format: Electronic Resources<br/>Integrated security technologies and solutions. Volume I, Cisco Security Solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content securityent://SD_ILS/0/SD_ILS:23163882024-05-23T20:17:26Z2024-05-23T20:17:26Zby Woland, Aaron T., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807577/?ar">https://learning.oreilly.com/library/view/~/9780134807577/?ar</a><br/>Format: Electronic Resources<br/>Machine learning and security : protecting systems with data and algorithmsent://SD_ILS/0/SD_ILS:23158812024-05-23T20:17:26Z2024-05-23T20:17:26Zby Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar">https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491979891/?ar">https://learning.oreilly.com/library/view/~/9781491979891/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Azure security centerent://SD_ILS/0/SD_ILS:23167782024-05-23T20:17:26Z2024-05-23T20:17:26Zby Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format: Electronic Resources<br/>Windows security monitoring : scenarios and patternsent://SD_ILS/0/SD_ILS:23159452024-05-23T20:17:26Z2024-05-23T20:17:26Zby Miroshnikov, Andrei, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar">https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119390640/?ar">https://learning.oreilly.com/library/view/~/9781119390640/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119390640">https://learning.oreilly.com/library/view/~/9781119390640</a><br/>Format: Electronic Resources<br/>VMware NSX cookbook : over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphereent://SD_ILS/0/SD_ILS:23164002024-05-23T20:17:26Z2024-05-23T20:17:26Zby Wibowo, Bayu, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782174257/?ar">https://go.oreilly.com/library-access/library/view/-/9781782174257/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174257/?ar">https://learning.oreilly.com/library/view/~/9781782174257/?ar</a><br/>Format: Electronic Resources<br/>Distributed Denial of Service (DDoS) : practical detection and defenseent://SD_ILS/0/SD_ILS:23181762024-05-23T20:17:26Z2024-05-23T20:17:26Zby Chou, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar">https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492026181">https://learning.oreilly.com/library/view/~/9781492026181</a>
<a href="https://learning.oreilly.com/library/view/~/9781492026181/?ar">https://learning.oreilly.com/library/view/~/9781492026181/?ar</a><br/>Format: Electronic Resources<br/>Securing DevOpsent://SD_ILS/0/SD_ILS:23194652024-05-23T20:17:26Z2024-05-23T20:17:26Zby Vehent, Julien, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar">https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617294136">https://learning.oreilly.com/library/view/~/9781617294136</a>
<a href="https://learning.oreilly.com/library/view/~/9781617294136/?ar">https://learning.oreilly.com/library/view/~/9781617294136/?ar</a><br/>Format: Electronic Resources<br/>Digital resilience : is your company ready for the next cyber threat?ent://SD_ILS/0/SD_ILS:23147342024-05-23T20:17:26Z2024-05-23T20:17:26Zby Rothrock, Ray A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814439258">https://learning.oreilly.com/library/view/~/9780814439258</a>
<a href="https://learning.oreilly.com/library/view/~/9780814439258/?ar">https://learning.oreilly.com/library/view/~/9780814439258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar">https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar</a><br/>Format: Electronic Resources<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:23150322024-05-23T20:17:26Z2024-05-23T20:17:26Zby Wallace, Michael, 1960- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814438770/?ar">https://learning.oreilly.com/library/view/~/9780814438770/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar">https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar</a><br/>Format: Electronic Resources<br/>CCSP Certified Cloud Security Professional practice examsent://SD_ILS/0/SD_ILS:23160012024-05-23T20:17:26Z2024-05-23T20:17:26Zby Carter, Daniel, CISSP, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260031362">https://learning.oreilly.com/library/view/~/9781260031362</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260031362/?ar">https://go.oreilly.com/library-access/library/view/-/9781260031362/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260031362/?ar">https://learning.oreilly.com/library/view/~/9781260031362/?ar</a><br/>Format: Electronic Resources<br/>Getting started with z/OS data set encryptionent://SD_ILS/0/SD_ILS:23169372024-05-23T20:17:26Z2024-05-23T20:17:26Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738456874/?ar">https://learning.oreilly.com/library/view/~/9780738456874/?ar</a><br/>Format: Electronic Resources<br/>Security on IBM z/VSEent://SD_ILS/0/SD_ILS:23169402024-05-23T20:17:26Z2024-05-23T20:17:26Zby Hellner, Helmut, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738456911/?ar">https://learning.oreilly.com/library/view/~/9780738456911/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738456911/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456911/?ar</a><br/>Format: Electronic Resources<br/>An introduction to cyber modeling and simulationent://SD_ILS/0/SD_ILS:23170812024-05-23T20:17:26Z2024-05-23T20:17:26Zby Couretas, Jerry M., 1966- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119420873">https://learning.oreilly.com/library/view/~/9781119420873</a>
<a href="https://learning.oreilly.com/library/view/~/9781119420873/?ar">https://learning.oreilly.com/library/view/~/9781119420873/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119420873/?ar">https://go.oreilly.com/library-access/library/view/-/9781119420873/?ar</a><br/>Format: Electronic Resources<br/>Mastering reverse engineering : re-engineer your ethical hacking skillsent://SD_ILS/0/SD_ILS:23190892024-05-23T20:17:26Z2024-05-23T20:17:26Zby Wong, Reginald, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788838849/?ar">https://learning.oreilly.com/library/view/~/9781788838849/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar">https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar</a><br/>Format: Electronic Resources<br/>Python penetration testing essentials : techniques for ethical hacking with Pythonent://SD_ILS/0/SD_ILS:23167342024-05-23T20:17:26Z2024-05-23T20:17:26Zby Mohit, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789138962/?ar">https://learning.oreilly.com/library/view/~/9781789138962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789138962/?ar">https://go.oreilly.com/library-access/library/view/-/9781789138962/?ar</a><br/>Format: Electronic Resources<br/>Serious cryptography : a practical introduction to modern encryptionent://SD_ILS/0/SD_ILS:23162082024-05-23T20:17:26Z2024-05-23T20:17:26Zby Aumasson, Jean-Philippe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067511">https://learning.oreilly.com/library/view/~/9781492067511</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067511/?ar">https://learning.oreilly.com/library/view/~/9781492067511/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity essentialsent://SD_ILS/0/SD_ILS:23224822024-05-23T20:17:26Z2024-05-23T20:17:26Zby Brooks, Charles J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119362395/?ar">https://learning.oreilly.com/library/view/~/9781119362395/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar">https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar</a><br/>Format: Electronic Resources<br/>CompTIA security+ practice tests, exam SY0-501ent://SD_ILS/0/SD_ILS:23224882024-05-23T20:17:26Z2024-05-23T20:17:26Zby Christy, S. Russell, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119416920/?ar">https://go.oreilly.com/library-access/library/view/-/9781119416920/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119416920/?ar">https://learning.oreilly.com/library/view/~/9781119416920/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119416920">https://learning.oreilly.com/library/view/~/9781119416920</a><br/>Format: Electronic Resources<br/>Hacking the hackerent://SD_ILS/0/SD_ILS:20627952024-05-23T20:17:26Z2024-05-23T20:17:26Zby Grimes, Roger A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4845208">Click to View</a><br/>Format: Electronic Resources<br/>Software update as a mechanism for resilience and security : proceedings of a Workshop.ent://SD_ILS/0/SD_ILS:20137242024-05-23T20:17:26Z2024-05-23T20:17:26Zby Johnson, Anne Frances, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Software-Update-as-a-Mechanism-for-Resilience-and-Security.pdf">An electronic book accessible through the World Wide Web; click for information.</a>
<a href="http://doi.org/10.17226/24833">http://doi.org/10.17226/24833</a><br/>Format: Electronic Resources<br/>Wireshark for security professionals : using wireshark and the metasploit frameworkent://SD_ILS/0/SD_ILS:21440972024-05-23T20:17:26Z2024-05-23T20:17:26Zby Bullock, Jessey, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4816492">Click to View</a><br/>Format: Electronic Resources<br/>IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodellent://SD_ILS/0/SD_ILS:21213252024-05-23T20:17:26Z2024-05-23T20:17:26Zby Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4830572">Click to View</a><br/>Format: Electronic Resources<br/>Cybercrime and business : strategies for global corporate securityent://SD_ILS/0/SD_ILS:22123622024-05-23T20:17:26Z2024-05-23T20:17:26Zby Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4863624">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:22107202024-05-23T20:17:26Z2024-05-23T20:17:26Zby Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4676113">Click to View</a><br/>Format: Electronic Resources<br/>Preventing digital extortion : mitigate ransomware, DDoS, and other cyber-extortion attacksent://SD_ILS/0/SD_ILS:22293562024-05-23T20:17:26Z2024-05-23T20:17:26Zby Thakkar, Dhanya, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4867419">Click to View</a><br/>Format: Electronic Resources<br/>Spring security : secure your web applications, RESTful services, and microservice architecturesent://SD_ILS/0/SD_ILS:22301482024-05-23T20:17:26Z2024-05-23T20:17:26Zby Knutson, Mick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5165113">Click to View</a><br/>Format: Electronic Resources<br/>RIoT control : understanding and managing risks and the internet of thingsent://SD_ILS/0/SD_ILS:22107952024-05-23T20:17:26Z2024-05-23T20:17:26Zby Macaulay, Tyson, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4691335">Click to View</a><br/>Format: Electronic Resources<br/>From corporate security to commercial force : a business leader's guide to security economicsent://SD_ILS/0/SD_ILS:22123862024-05-23T20:17:26Z2024-05-23T20:17:26Zby Cabric, Marko, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4865431">Click to View</a><br/>Format: Electronic Resources<br/>Securing the internet of thingsent://SD_ILS/0/SD_ILS:22116152024-05-23T20:17:26Z2024-05-23T20:17:26Zby Li, Shancang, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4786871">Click to View</a><br/>Format: Electronic Resources<br/>Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules.ent://SD_ILS/0/SD_ILS:23153202024-05-23T20:17:26Z2024-05-23T20:17:26Zby Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788624596/?ar">https://learning.oreilly.com/library/view/~/9781788624596/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar</a><br/>Format: Electronic Resources<br/>Beginning ethical hacking with Pythonent://SD_ILS/0/SD_ILS:23122622024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sinha, Sanjib.<br/><a href="https://learning.oreilly.com/library/view/~/9781484225417">https://learning.oreilly.com/library/view/~/9781484225417</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar">https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484225417/?ar">https://learning.oreilly.com/library/view/~/9781484225417/?ar</a><br/>Format: Electronic Resources<br/>Cyber security : a practitioner's guideent://SD_ILS/0/SD_ILS:23137632024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format: Electronic Resources<br/>Post-incident reviews : learning from failure for improved incident responseent://SD_ILS/0/SD_ILS:23184992024-05-23T20:17:26Z2024-05-23T20:17:26Zby Hand, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar">https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491986998">https://learning.oreilly.com/library/view/~/9781491986998</a>
<a href="https://learning.oreilly.com/library/view/~/9781491986998/?ar">https://learning.oreilly.com/library/view/~/9781491986998/?ar</a><br/>Format: Electronic Resources<br/>The basics of cyber safety : computer and mobile device safety made easyent://SD_ILS/0/SD_ILS:23114322024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sammons, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166394/?ar">https://learning.oreilly.com/library/view/~/9780124166394/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124166394/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166394/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux cookbook : effective penetration testing solutionsent://SD_ILS/0/SD_ILS:23142702024-05-23T20:17:26Z2024-05-23T20:17:26Zby Schultz, Corey P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390303/?ar">https://learning.oreilly.com/library/view/~/9781784390303/?ar</a><br/>Format: Electronic Resources<br/>Agile application security : enabling security in a continuous delivery pipelineent://SD_ILS/0/SD_ILS:23123602024-05-23T20:17:26Z2024-05-23T20:17:26Zby Bell, Laura, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491938836">https://learning.oreilly.com/library/view/~/9781491938836</a>
<a href="https://learning.oreilly.com/library/view/~/9781491938836/?ar">https://learning.oreilly.com/library/view/~/9781491938836/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491938836/?ar">https://go.oreilly.com/library-access/library/view/-/9781491938836/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutionsent://SD_ILS/0/SD_ILS:23146832024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a>
<a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format: Electronic Resources<br/>Privacy and the Internet of Thingsent://SD_ILS/0/SD_ILS:23166482024-05-23T20:17:26Z2024-05-23T20:17:26Zby Rosner, Gilad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042822">https://learning.oreilly.com/library/view/~/9781492042822</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042822/?ar">https://learning.oreilly.com/library/view/~/9781492042822/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042822/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042822/?ar</a><br/>Format: Electronic Resources<br/>Building a HIPAA-compliant cybersecurity program : using NIST 800-30 and CSF to secure protected health informationent://SD_ILS/0/SD_ILS:23181282024-05-23T20:17:26Z2024-05-23T20:17:26Zby Thompson, Eric C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230602/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230602/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230602/?ar">https://learning.oreilly.com/library/view/~/9781484230602/?ar</a><br/>Format: Electronic Resources<br/>VCP6-NV official cert guide : (exam #2VO-641)ent://SD_ILS/0/SD_ILS:23112922024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sena Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134133713">https://learning.oreilly.com/library/view/~/9780134133713</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar">https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134133713/?ar">https://learning.oreilly.com/library/view/~/9780134133713/?ar</a><br/>Format: Electronic Resources<br/>Ransomware : defending against digital extortionent://SD_ILS/0/SD_ILS:23119732024-05-23T20:17:26Z2024-05-23T20:17:26Zby Liska, Allan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491967874/?ar">https://learning.oreilly.com/library/view/~/9781491967874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491967874">https://learning.oreilly.com/library/view/~/9781491967874</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar">https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar</a><br/>Format: Electronic Resources<br/>CCSP Certified Cloud Security Professional exam guideent://SD_ILS/0/SD_ILS:23122482024-05-23T20:17:26Z2024-05-23T20:17:26Zby Carter, Daniel, CISSP.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781259835452/?ar">https://go.oreilly.com/library-access/library/view/-/9781259835452/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781259835452/?ar">https://learning.oreilly.com/library/view/~/9781259835452/?ar</a><br/>Format: Electronic Resources<br/>Cyber security engineering : a practical approach for systems and software assuranceent://SD_ILS/0/SD_ILS:23119962024-05-23T20:17:26Z2024-05-23T20:17:26Zby Mead, Nancy R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar">https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134189857/?ar">https://learning.oreilly.com/library/view/~/9780134189857/?ar</a><br/>Format: Electronic Resources<br/>Incident management for operationsent://SD_ILS/0/SD_ILS:23135452024-05-23T20:17:26Z2024-05-23T20:17:26Zby Schnepp, Rob, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491917619/?ar">https://learning.oreilly.com/library/view/~/9781491917619/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar">https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491917619">https://learning.oreilly.com/library/view/~/9781491917619</a><br/>Format: Electronic Resources<br/>Metasploit for beginners : create a threat-free environment with the best-in-class toolent://SD_ILS/0/SD_ILS:23138402024-05-23T20:17:26Z2024-05-23T20:17:26Zby Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970/?ar">https://learning.oreilly.com/library/view/~/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970">https://learning.oreilly.com/library/view/~/9781788295970</a><br/>Format: Electronic Resources<br/>Kali Linux network scanning cookbook : take your penetration-testing skills to the next levelent://SD_ILS/0/SD_ILS:23134992024-05-23T20:17:26Z2024-05-23T20:17:26Zby Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format: Electronic Resources<br/>To improve cybersecurity, think like a hackerent://SD_ILS/0/SD_ILS:23131252024-05-23T20:17:26Z2024-05-23T20:17:26Zby Esteves, José, 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT58314">https://learning.oreilly.com/library/view/~/53863MIT58314</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT58314/?ar">https://learning.oreilly.com/library/view/~/53863MIT58314/?ar</a><br/>Format: Electronic Resources<br/>Windows virus and malware troubleshootingent://SD_ILS/0/SD_ILS:23129372024-05-23T20:17:26Z2024-05-23T20:17:26Zby Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format: Electronic Resources<br/>Security from first principles : a practical guide to the information security practice principlesent://SD_ILS/0/SD_ILS:23144252024-05-23T20:17:26Z2024-05-23T20:17:26Zby Jackson, Craig, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996911/?ar">https://learning.oreilly.com/library/view/~/9781491996911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996911">https://learning.oreilly.com/library/view/~/9781491996911</a><br/>Format: Electronic Resources<br/>Gray hat C# : a hacker's guide to creating and automating security toolsent://SD_ILS/0/SD_ILS:23125692024-05-23T20:17:26Z2024-05-23T20:17:26Zby Perry, Brandon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492023449">https://learning.oreilly.com/library/view/~/9781492023449</a>
<a href="https://learning.oreilly.com/library/view/~/9781492023449/?ar">https://learning.oreilly.com/library/view/~/9781492023449/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492023449/?ar">https://go.oreilly.com/library-access/library/view/-/9781492023449/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessmentsent://SD_ILS/0/SD_ILS:23132872024-05-23T20:17:26Z2024-05-23T20:17:26Zby Shah, Dhruv, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar">https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783982165/?ar">https://learning.oreilly.com/library/view/~/9781783982165/?ar</a><br/>Format: Electronic Resources<br/>Windows forensics cookbook : 61 recipes to help you analyze Windows systemsent://SD_ILS/0/SD_ILS:23139902024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sulkin, Oleg, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495/?ar">https://learning.oreilly.com/library/view/~/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495">https://learning.oreilly.com/library/view/~/9781784390495</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : take your penetration testing an IT security skills to a whole new level with the secrets of Metasploitent://SD_ILS/0/SD_ILS:22718342024-05-23T20:17:26Z2024-05-23T20:17:26Zby Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4709428">Click to View</a><br/>Format: Electronic Resources<br/>Cyber insecurity : navigating the perils of the next information ageent://SD_ILS/0/SD_ILS:22660982024-05-23T20:17:26Z2024-05-23T20:17:26Zby Harrison, Richard M., 1981- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4742078">Click to View</a><br/>Format: Electronic Resources<br/>Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0ent://SD_ILS/0/SD_ILS:22717582024-05-23T20:17:26Z2024-05-23T20:17:26Zby Olups, Rihards, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4643698">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackersent://SD_ILS/0/SD_ILS:22717172024-05-23T20:17:26Z2024-05-23T20:17:26Zby Halton, Wolf, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594301">Click to View</a><br/>Format: Electronic Resources<br/>Practical Windows forensics : leverage the power of digital forensics for Windows systemsent://SD_ILS/0/SD_ILS:22717192024-05-23T20:17:26Z2024-05-23T20:17:26Zby Shaaban, Ayman, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594307">Click to View</a><br/>Format: Electronic Resources<br/>Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldent://SD_ILS/0/SD_ILS:22717202024-05-23T20:17:26Z2024-05-23T20:17:26Zby Russell, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594308">Click to View</a><br/>Format: Electronic Resources<br/>Security in fixed and wireless networksent://SD_ILS/0/SD_ILS:22799302024-05-23T20:17:26Z2024-05-23T20:17:26Zby Schafer, Gunter, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=7104366">Click to View</a><br/>Format: Electronic Resources<br/>88 privacy breaches to beware of : practical data protection tips from real-life experiencesent://SD_ILS/0/SD_ILS:22651852024-05-23T20:17:26Z2024-05-23T20:17:26Zby Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4558135">Click to View</a><br/>Format: Electronic Resources<br/>Facing cyber threats head on : protecting yourself and your businessent://SD_ILS/0/SD_ILS:22662742024-05-23T20:17:26Z2024-05-23T20:17:26Zby Minick, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4773207">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity and human rights in the age of cyberveillanceent://SD_ILS/0/SD_ILS:22641052024-05-23T20:17:26Z2024-05-23T20:17:26Zby Kulesza, Joanna, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4098051">Click to View</a><br/>Format: Electronic Resources<br/>Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipesent://SD_ILS/0/SD_ILS:22717742024-05-23T20:17:26Z2024-05-23T20:17:26Zby Kalsi, Tajinder, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4659132">Click to View</a><br/>Format: Electronic Resources<br/>Chaotic secure communication : principles and technologiesent://SD_ILS/0/SD_ILS:20612852024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sun, Kehui, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4707910">Click to View</a><br/>Format: Electronic Resources<br/>Linux server security : hack and defendent://SD_ILS/0/SD_ILS:20601022024-05-23T20:17:26Z2024-05-23T20:17:26Zby Binnie, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4519259">Click to View</a><br/>Format: Electronic Resources<br/>Meeting people via WiFi and Bluetoothent://SD_ILS/0/SD_ILS:20984232024-05-23T20:17:26Z2024-05-23T20:17:26Zby Schroeder, Joshua, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189280">Click to View</a><br/>Format: Electronic Resources<br/>Essential skills for hackersent://SD_ILS/0/SD_ILS:20984242024-05-23T20:17:26Z2024-05-23T20:17:26Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189281">Click to View</a><br/>Format: Electronic Resources<br/>Selling information security to the board : a primerent://SD_ILS/0/SD_ILS:21325832024-05-23T20:17:26Z2024-05-23T20:17:26Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4519662">Click to View</a><br/>Format: Electronic Resources<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:21109522024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4009415">Click to View</a><br/>Format: Electronic Resources<br/>Security and privacy in the digital era. Volume 1ent://SD_ILS/0/SD_ILS:20609152024-05-23T20:17:26Z2024-05-23T20:17:26Zby Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4648717">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security awareness for CEOs and managementent://SD_ILS/0/SD_ILS:22093722024-05-23T20:17:26Z2024-05-23T20:17:26Zby Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189279">Click to View</a><br/>Format: Electronic Resources<br/>OS X incident response : scripting and analysisent://SD_ILS/0/SD_ILS:22100352024-05-23T20:17:26Z2024-05-23T20:17:26Zby Bradley, Jaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4526010">Click to View</a><br/>Format: Electronic Resources<br/>Breaking into information security : crafting a custom career path to get the job you really wantent://SD_ILS/0/SD_ILS:22093442024-05-23T20:17:26Z2024-05-23T20:17:26Zby More, Josh, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4187289">Click to View</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:22094442024-05-23T20:17:26Z2024-05-23T20:17:26Zby Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4334673">Click to View</a><br/>Format: Electronic Resources<br/>Building a corporate culture of security : strategies for strengthening organizational resiliencyent://SD_ILS/0/SD_ILS:22097382024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4425984">Click to View</a><br/>Format: Electronic Resources<br/>Information security science : measuring the vulnerability to data compromisesent://SD_ILS/0/SD_ILS:22103282024-05-23T20:17:26Z2024-05-23T20:17:26Zby Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4567434">Click to View</a><br/>Format: Electronic Resources<br/>Meeting security challenges through data analytics and decision supportent://SD_ILS/0/SD_ILS:22197582024-05-23T20:17:26Z2024-05-23T20:17:26Zby Shahbazian, E. (Elisa), editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4753391">Click to View</a><br/>Format: Electronic Resources<br/>Data breach aftermath and recovery for individuals and institutions : proceedings of a workshopent://SD_ILS/0/SD_ILS:22283312024-05-23T20:17:26Z2024-05-23T20:17:26Zby Johnson, Anne, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4690560">Click to View</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the windows registryent://SD_ILS/0/SD_ILS:22097602024-05-23T20:17:26Z2024-05-23T20:17:26Zby Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4438754">Click to View</a><br/>Format: Electronic Resources<br/>Hiding behind the keyboard : uncovering covert communication methods with forensic analysisent://SD_ILS/0/SD_ILS:22098132024-05-23T20:17:26Z2024-05-23T20:17:26Zby Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452264">Click to View</a><br/>Format: Electronic Resources<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:22098142024-05-23T20:17:26Z2024-05-23T20:17:26Zby Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452265">Click to View</a><br/>Format: Electronic Resources<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:22089652024-05-23T20:17:26Z2024-05-23T20:17:26Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format: Electronic Resources<br/>Dns security : defending the domain name systement://SD_ILS/0/SD_ILS:22102632024-05-23T20:17:26Z2024-05-23T20:17:26Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556898">Click to View</a><br/>Format: Electronic Resources<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:22102642024-05-23T20:17:26Z2024-05-23T20:17:26Zby Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556899">Click to View</a><br/>Format: Electronic Resources<br/>Critical infrastructure protection against hybrid warfare security related challengesent://SD_ILS/0/SD_ILS:22113972024-05-23T20:17:26Z2024-05-23T20:17:26Zby Niglia, Alessandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4753392">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackersent://SD_ILS/0/SD_ILS:23110062024-05-23T20:17:26Z2024-05-23T20:17:26Zby Halton, Wolf, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782168492/?ar">https://learning.oreilly.com/library/view/~/9781782168492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782168492">https://learning.oreilly.com/library/view/~/9781782168492</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third editionent://SD_ILS/0/SD_ILS:23116552024-05-23T20:17:26Z2024-05-23T20:17:26Zby Johansen, Gerard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785888427/?ar">https://learning.oreilly.com/library/view/~/9781785888427/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar">https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar</a><br/>Format: Electronic Resources<br/>IT security risk control management : an audit preparation planent://SD_ILS/0/SD_ILS:23125422024-05-23T20:17:26Z2024-05-23T20:17:26Zby Pompon, Raymond, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484221402/?ar">https://learning.oreilly.com/library/view/~/9781484221402/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484221402/?ar">https://go.oreilly.com/library-access/library/view/-/9781484221402/?ar</a><br/>Format: Electronic Resources<br/>Information theft prevention : theory and practiceent://SD_ILS/0/SD_ILS:23155502024-05-23T20:17:26Z2024-05-23T20:17:26Zby Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format: Electronic Resources<br/>Cracking security misconceptions : untangling common myths about modern information securityent://SD_ILS/0/SD_ILS:23167042024-05-23T20:17:26Z2024-05-23T20:17:26Zby Peterson, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042747">https://learning.oreilly.com/library/view/~/9781492042747</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042747/?ar">https://learning.oreilly.com/library/view/~/9781492042747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity for hospitals and healthcare facilities : a guide to detection and preventionent://SD_ILS/0/SD_ILS:23116102024-05-23T20:17:26Z2024-05-23T20:17:26Zby Ayala, Luis, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484221556/?ar">https://go.oreilly.com/library-access/library/view/-/9781484221556/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484221556/?ar">https://learning.oreilly.com/library/view/~/9781484221556/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484221556">https://learning.oreilly.com/library/view/~/9781484221556</a><br/>Format: Electronic Resources<br/>Data Mining and Machine Learning in Cybersecurityent://SD_ILS/0/SD_ILS:23135572024-05-23T20:17:26Z2024-05-23T20:17:26Zby Dua, Sumeet, author<br/><a href="https://learning.oreilly.com/library/view/~/9781439839430/?ar">https://learning.oreilly.com/library/view/~/9781439839430/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439839430/?ar">https://go.oreilly.com/library-access/library/view/-/9781439839430/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439839430">https://learning.oreilly.com/library/view/~/9781439839430</a><br/>Format: Electronic Resources<br/>Who are the bad guys and what do they want?ent://SD_ILS/0/SD_ILS:23186382024-05-23T20:17:26Z2024-05-23T20:17:26Zby Fell, Gregory J., 1964- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042464">https://learning.oreilly.com/library/view/~/9781492042464</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042464/?ar">https://learning.oreilly.com/library/view/~/9781492042464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar</a><br/>Format: Electronic Resources<br/>A study of black hole attack solutions : on AODV routing protocol in MANETent://SD_ILS/0/SD_ILS:23090382024-05-23T20:17:26Z2024-05-23T20:17:26Zby Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format: Electronic Resources<br/>Oracle Application Express administration : for DBAs and Developersent://SD_ILS/0/SD_ILS:23117532024-05-23T20:17:26Z2024-05-23T20:17:26Zby Mignault, Francis, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484219584/?ar">https://learning.oreilly.com/library/view/~/9781484219584/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484219584/?ar">https://go.oreilly.com/library-access/library/view/-/9781484219584/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484219584">https://learning.oreilly.com/library/view/~/9781484219584</a><br/>Format: Electronic Resources<br/>People-centric security : transforming your enterprise security cultureent://SD_ILS/0/SD_ILS:23095172024-05-23T20:17:26Z2024-05-23T20:17:26Zby Hayden, Lance, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071846790/?ar">https://learning.oreilly.com/library/view/~/9780071846790/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar">https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar</a><br/>Format: Electronic Resources<br/>Cyber-physical attack recovery procedures : a step-by-step preparation and response guideent://SD_ILS/0/SD_ILS:23110182024-05-23T20:17:26Z2024-05-23T20:17:26Zby Ayala, Luis, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220658/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220658/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220658/?ar">https://learning.oreilly.com/library/view/~/9781484220658/?ar</a><br/>Format: Electronic Resources<br/>Practical Windows forensics : leverage the power of digital forensics for Windows systemsent://SD_ILS/0/SD_ILS:23110212024-05-23T20:17:26Z2024-05-23T20:17:26Zby Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format: Electronic Resources<br/>Information security policies, procedures, and standards : a practitioner's referenceent://SD_ILS/0/SD_ILS:23107492024-05-23T20:17:26Z2024-05-23T20:17:26Zby Landoll, Douglas J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482245912/?ar">https://learning.oreilly.com/library/view/~/9781482245912/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar">https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar</a><br/>Format: Electronic Resources<br/>Mastering the Microsoft Deployment Toolkit : take a deep dive into the world of Windows desktop deployment using the Microsoft Deployment Toolkitent://SD_ILS/0/SD_ILS:23108132024-05-23T20:17:26Z2024-05-23T20:17:26Zby Stokes, Jeff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782172499/?ar">https://learning.oreilly.com/library/view/~/9781782172499/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782172499">https://learning.oreilly.com/library/view/~/9781782172499</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782172499/?ar">https://go.oreilly.com/library-access/library/view/-/9781782172499/?ar</a><br/>Format: Electronic Resources<br/>Essential cybersecurity science : build, test, and evaluate secure systemsent://SD_ILS/0/SD_ILS:23091932024-05-23T20:17:26Z2024-05-23T20:17:26Zby Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:23102902024-05-23T20:17:26Z2024-05-23T20:17:26Zby Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format: Electronic Resources<br/>Dynamic SQL : applications, performance, and security : rapid response and flexibility in the face of changing business requirementsent://SD_ILS/0/SD_ILS:23106712024-05-23T20:17:26Z2024-05-23T20:17:26Zby Pollack, Edward, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484218112/?ar">https://go.oreilly.com/library-access/library/view/-/9781484218112/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484218112/?ar">https://learning.oreilly.com/library/view/~/9781484218112/?ar</a><br/>Format: Electronic Resources<br/>VCP6-DCV official cert guide : (exam #2VO-621)ent://SD_ILS/0/SD_ILS:23105692024-05-23T20:17:26Z2024-05-23T20:17:26Zby Davis, John A. (Software consultant), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134392974/?ar">https://learning.oreilly.com/library/view/~/9780134392974/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134392974/?ar">https://go.oreilly.com/library-access/library/view/-/9780134392974/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134392974">https://learning.oreilly.com/library/view/~/9780134392974</a><br/>Format: Electronic Resources<br/>Cybersecurity lexiconent://SD_ILS/0/SD_ILS:23111372024-05-23T20:17:26Z2024-05-23T20:17:26Zby Ayala, Luis, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220689/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220689/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220689/?ar">https://learning.oreilly.com/library/view/~/9781484220689/?ar</a><br/>Format: Electronic Resources<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:23109912024-05-23T20:17:26Z2024-05-23T20:17:26Zby Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format: Electronic Resources<br/>Securing your cloud : IBM z/VM security for IBM z Systems and LinuxONEent://SD_ILS/0/SD_ILS:23118042024-05-23T20:17:26Z2024-05-23T20:17:26Zby Parziale, Lydia, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442020/?ar">https://learning.oreilly.com/library/view/~/9780738442020/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738442020/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442020/?ar</a><br/>Format: Electronic Resources<br/>Google hacking for penetration testersent://SD_ILS/0/SD_ILS:23092932024-05-23T20:17:26Z2024-05-23T20:17:26Zby Long, Johnny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029824/?ar">https://learning.oreilly.com/library/view/~/9780128029824/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar</a><br/>Format: Electronic Resources<br/>Thinking security : stopping next year's hackersent://SD_ILS/0/SD_ILS:23089322024-05-23T20:17:26Z2024-05-23T20:17:26Zby Bellovin, Steven M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar">https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134278223">https://learning.oreilly.com/library/view/~/9780134278223</a>
<a href="https://learning.oreilly.com/library/view/~/9780134278223/?ar">https://learning.oreilly.com/library/view/~/9780134278223/?ar</a><br/>Format: Electronic Resources<br/>Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipesent://SD_ILS/0/SD_ILS:23105852024-05-23T20:17:26Z2024-05-23T20:17:26Zby Kalsi, Tajinder, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785286421/?ar">https://learning.oreilly.com/library/view/~/9781785286421/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785286421/?ar">https://go.oreilly.com/library-access/library/view/-/9781785286421/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785286421">https://learning.oreilly.com/library/view/~/9781785286421</a><br/>Format: Electronic Resources<br/>Securing PHP appsent://SD_ILS/0/SD_ILS:23114972024-05-23T20:17:26Z2024-05-23T20:17:26Zby Edmunds, Ben, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484221204/?ar">https://go.oreilly.com/library-access/library/view/-/9781484221204/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484221204/?ar">https://learning.oreilly.com/library/view/~/9781484221204/?ar</a><br/>Format: Electronic Resources<br/>The second economy : the race for trust, treasure and time in the cybersecurity warent://SD_ILS/0/SD_ILS:23125522024-05-23T20:17:26Z2024-05-23T20:17:26Zby Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format: Electronic Resources<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:23144162024-05-23T20:17:26Z2024-05-23T20:17:26Zby Bose, S., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789332579125/?ar">https://learning.oreilly.com/library/view/~/9789332579125/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar">https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9789332579125">https://learning.oreilly.com/library/view/~/9789332579125</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:23092962024-05-23T20:17:26Z2024-05-23T20:17:26Zby Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format: Electronic Resources<br/>Are your bits flipped? : overcoming tech misconceptionsent://SD_ILS/0/SD_ILS:23105992024-05-23T20:17:26Z2024-05-23T20:17:26Zby Kissell, Joe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar">https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492017172/?ar">https://learning.oreilly.com/library/view/~/9781492017172/?ar</a><br/>Format: Electronic Resources<br/>Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldent://SD_ILS/0/SD_ILS:23110272024-05-23T20:17:26Z2024-05-23T20:17:26Zby Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785889639">https://learning.oreilly.com/library/view/~/9781785889639</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889639/?ar">https://learning.oreilly.com/library/view/~/9781785889639/?ar</a><br/>Format: Electronic Resources<br/>