Search Results for - Narrowed by: Electronic books. - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-05-23T20:17:26Z Sustainably investing in digital assets globally ent://SD_ILS/0/SD_ILS:2334066 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Ozelli, Selva, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119885627">https://learning.oreilly.com/library/view/~/9781119885627</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119885627/?ar">https://go.oreilly.com/library-access/library/view/-/9781119885627/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119885627/?ar">https://learning.oreilly.com/library/view/~/9781119885627/?ar</a><br/>Format:&#160;Electronic Resources<br/> The security culture playbook : an executive guide to reducing risk and developing your human defense layer ent://SD_ILS/0/SD_ILS:2332410 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119875239/?ar">https://learning.oreilly.com/library/view/~/9781119875239/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119875239">https://learning.oreilly.com/library/view/~/9781119875239</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar">https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar</a><br/>Format:&#160;Electronic Resources<br/> Purple team strategies : enhancing global security posture through uniting red and blue teams with adversary emulation ent://SD_ILS/0/SD_ILS:2333493 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Routin, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801074292/?ar">https://learning.oreilly.com/library/view/~/9781801074292/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801074292">https://learning.oreilly.com/library/view/~/9781801074292</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801074292/?ar">https://go.oreilly.com/library-access/library/view/-/9781801074292/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of cyber security : a practical guide to winning the war on cyber crime ent://SD_ILS/0/SD_ILS:2333417 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Hibberd, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783676">https://learning.oreilly.com/library/view/~/9781787783676</a> <a href="https://learning.oreilly.com/library/view/~/9781787783676/?ar">https://learning.oreilly.com/library/view/~/9781787783676/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783676/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building a Red Hat OpenShift environment on IBM Z ent://SD_ILS/0/SD_ILS:2334093 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Parziale, Lydia, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460741/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460741/?ar">https://learning.oreilly.com/library/view/~/9780738460741/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460741">https://learning.oreilly.com/library/view/~/9780738460741</a><br/>Format:&#160;Electronic Resources<br/> Secret key cryptography : ciphers, from simple to unbreakable ent://SD_ILS/0/SD_ILS:2334094 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Rubin, Frank (Cryptographer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781633439795">https://learning.oreilly.com/library/view/~/9781633439795</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar">https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781633439795/?ar">https://learning.oreilly.com/library/view/~/9781633439795/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Windows security and hardening : secure and protect your Windows environment from cyber threats using zero-trust security principles ent://SD_ILS/0/SD_ILS:2334156 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Dunkerley, Mark, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar">https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803236544/?ar">https://learning.oreilly.com/library/view/~/9781803236544/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803236544">https://learning.oreilly.com/library/view/~/9781803236544</a><br/>Format:&#160;Electronic Resources<br/> Designing secure software : a guide for developers ent://SD_ILS/0/SD_ILS:2329594 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Kohnfelder, Loren, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129804/?ar">https://learning.oreilly.com/library/view/~/9781098129804/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129804">https://learning.oreilly.com/library/view/~/9781098129804</a><br/>Format:&#160;Electronic Resources<br/> Trust in computer systems and the cloud ent://SD_ILS/0/SD_ILS:2330850 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Bursell, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119692324/?ar">https://learning.oreilly.com/library/view/~/9781119692324/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar">https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119692324">https://learning.oreilly.com/library/view/~/9781119692324</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity For Dummies ent://SD_ILS/0/SD_ILS:2332872 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119867180">https://learning.oreilly.com/library/view/~/9781119867180</a> <a href="https://learning.oreilly.com/library/view/~/9781119867180/?ar">https://learning.oreilly.com/library/view/~/9781119867180/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar">https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security awareness for dummies ent://SD_ILS/0/SD_ILS:2332874 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Winkler, Ira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar">https://go.oreilly.com/library-access/library/view/-/9781119720928/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119720928">https://learning.oreilly.com/library/view/~/9781119720928</a> <a href="https://learning.oreilly.com/library/view/~/9781119720928/?ar">https://learning.oreilly.com/library/view/~/9781119720928/?ar</a><br/>Format:&#160;Electronic Resources<br/> Snowflake access control : mastering the features for data privacy and regulatory compliance ent://SD_ILS/0/SD_ILS:2331907 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Larson, Jessica Megan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484280386">https://learning.oreilly.com/library/view/~/9781484280386</a> <a href="https://learning.oreilly.com/library/view/~/9781484280386/?ar">https://learning.oreilly.com/library/view/~/9781484280386/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar">https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical fraud prevention : fraud and AML analytics for Fintech and eCommerce, using SQL and Python ent://SD_ILS/0/SD_ILS:2332348 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Saporta, Gilit, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492093312/?ar">https://go.oreilly.com/library-access/library/view/-/9781492093312/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492093312/?ar">https://learning.oreilly.com/library/view/~/9781492093312/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492093312">https://learning.oreilly.com/library/view/~/9781492093312</a><br/>Format:&#160;Electronic Resources<br/> IBM Spectrum Virtualize, IBM FlashSystem, and IBM SAN volume controller security feature checklist ent://SD_ILS/0/SD_ILS:2332372 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Scales, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460437">https://learning.oreilly.com/library/view/~/9780738460437</a> <a href="https://learning.oreilly.com/library/view/~/9780738460437/?ar">https://learning.oreilly.com/library/view/~/9780738460437/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar</a><br/>Format:&#160;Electronic Resources<br/> Container storage and data protection for applications on Kubernetes ent://SD_ILS/0/SD_ILS:2332574 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127022/?ar">https://learning.oreilly.com/library/view/~/9781098127022/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098127022">https://learning.oreilly.com/library/view/~/9781098127022</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar</a><br/>Format:&#160;Electronic Resources<br/> Shifting left for application security : bridging the divide between DevOps and security with the right security tools ent://SD_ILS/0/SD_ILS:2332575 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a> <a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security Observability with eBPF ent://SD_ILS/0/SD_ILS:2332576 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Salazar, Jed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492096719">https://learning.oreilly.com/library/view/~/9781492096719</a> <a href="https://learning.oreilly.com/library/view/~/9781492096719/?ar">https://learning.oreilly.com/library/view/~/9781492096719/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar">https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar</a><br/>Format:&#160;Electronic Resources<br/> A hybrid cloud cyber security solution using IBM Spectrum Virtualize for public cloud on Azure and IBM Spectrum Virtualize safeguarded copy. ent://SD_ILS/0/SD_ILS:2331705 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z <a href="https://learning.oreilly.com/library/view/~/9780738460345/?ar">https://learning.oreilly.com/library/view/~/9780738460345/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460345">https://learning.oreilly.com/library/view/~/9780738460345</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar</a><br/>Format:&#160;Electronic Resources<br/> Offensive shellcode from scratch : get to grips with shellcode countermeasures and discover how to bypass them ent://SD_ILS/0/SD_ILS:2332537 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Pillay, Rishalin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar">https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803247427">https://learning.oreilly.com/library/view/~/9781803247427</a> <a href="https://learning.oreilly.com/library/view/~/9781803247427/?ar">https://learning.oreilly.com/library/view/~/9781803247427/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:2332538 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Pramanik, Sabyasachi, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119812494">https://learning.oreilly.com/library/view/~/9781119812494</a> <a href="https://learning.oreilly.com/library/view/~/9781119812494/?ar">https://learning.oreilly.com/library/view/~/9781119812494/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar">https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime : protecting your business, your family and yourself ent://SD_ILS/0/SD_ILS:2332545 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Wade, Todd author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175874/?ar">https://learning.oreilly.com/library/view/~/9781780175874/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780175874">https://learning.oreilly.com/library/view/~/9781780175874</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them ent://SD_ILS/0/SD_ILS:2332411 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format:&#160;Electronic Resources<br/> The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more ent://SD_ILS/0/SD_ILS:2332630 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format:&#160;Electronic Resources<br/> What is eBPF? ent://SD_ILS/0/SD_ILS:2332631 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Rice, Liz (Open Source engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492097266/?ar">https://learning.oreilly.com/library/view/~/9781492097266/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492097266">https://learning.oreilly.com/library/view/~/9781492097266</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar">https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing mit Metasploit : Praxiswissen f&uuml;r mehr IT-Sicherheit ent://SD_ILS/0/SD_ILS:2333963 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783747505649">https://learning.oreilly.com/library/view/~/9783747505649</a> <a href="https://learning.oreilly.com/library/view/~/9783747505649/?ar">https://learning.oreilly.com/library/view/~/9783747505649/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar">https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar</a><br/>Format:&#160;Electronic Resources<br/> IoT system testing : an IoT journey from devices to analytics and the edge ent://SD_ILS/0/SD_ILS:2334592 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Hagar, Jon Duncan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar">https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484282762/?ar">https://learning.oreilly.com/library/view/~/9781484282762/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484282762">https://learning.oreilly.com/library/view/~/9781484282762</a><br/>Format:&#160;Electronic Resources<br/> CEH v11 : certified ethical hacker version 11 practice tests ent://SD_ILS/0/SD_ILS:2330385 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar">https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119824510/?ar">https://learning.oreilly.com/library/view/~/9781119824510/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119824510">https://learning.oreilly.com/library/view/~/9781119824510</a><br/>Format:&#160;Electronic Resources<br/> Computer science security : concepts and tools ent://SD_ILS/0/SD_ILS:2334035 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Zaidoun, Ameur Salem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786307552/?ar">https://learning.oreilly.com/library/view/~/9781786307552/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar">https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786307552">https://learning.oreilly.com/library/view/~/9781786307552</a><br/>Format:&#160;Electronic Resources<br/> Cloud security for dummies ent://SD_ILS/0/SD_ILS:2332497 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a> <a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptions ent://SD_ILS/0/SD_ILS:2329799 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format:&#160;Electronic Resources<br/> Hacking ent://SD_ILS/0/SD_ILS:2332886 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Beaver, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119872191">https://learning.oreilly.com/library/view/~/9781119872191</a> <a href="https://learning.oreilly.com/library/view/~/9781119872191/?ar">https://learning.oreilly.com/library/view/~/9781119872191/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar">https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital Earth : cyber threats, privacy and ethics in an age of paranoia ent://SD_ILS/0/SD_ILS:2332896 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Katz, Sarah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787783614">https://learning.oreilly.com/library/view/~/9781787783614</a> <a href="https://learning.oreilly.com/library/view/~/9781787783614/?ar">https://learning.oreilly.com/library/view/~/9781787783614/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar">https://go.oreilly.com/library-access/library/view/-/9781787783614/?ar</a><br/>Format:&#160;Electronic Resources<br/> Python for cybersecurity : using Python for cyber offense and defense ent://SD_ILS/0/SD_ILS:2331574 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Poston, Howard E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar">https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119850649/?ar">https://learning.oreilly.com/library/view/~/9781119850649/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119850649">https://learning.oreilly.com/library/view/~/9781119850649</a><br/>Format:&#160;Electronic Resources<br/> Hacking : der umfassende Praxis-Guide : inkl. Pr&uuml;fungsvorbereitung zum CEHv11 ent://SD_ILS/0/SD_ILS:2331683 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Amberg, Eric, author<br/><a href="https://learning.oreilly.com/library/view/~/9783747504840">https://learning.oreilly.com/library/view/~/9783747504840</a> <a href="https://learning.oreilly.com/library/view/~/9783747504840/?ar">https://learning.oreilly.com/library/view/~/9783747504840/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar">https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security handbook : find out how to effectively secure cloud environments using AWS, Azure, and GCP ent://SD_ILS/0/SD_ILS:2332481 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Estrin, Eyal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800569195">https://learning.oreilly.com/library/view/~/9781800569195</a> <a href="https://learning.oreilly.com/library/view/~/9781800569195/?ar">https://learning.oreilly.com/library/view/~/9781800569195/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar">https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar</a><br/>Format:&#160;Electronic Resources<br/> The cybersecurity playbook for modern enterprises ent://SD_ILS/0/SD_ILS:2332323 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Wittkop, Jeremy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803248639/?ar">https://learning.oreilly.com/library/view/~/9781803248639/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803248639">https://learning.oreilly.com/library/view/~/9781803248639</a><br/>Format:&#160;Electronic Resources<br/> PRACTICAL INDUSTRIAL CYBERSECURITY ICS, Industry 4.0, and IIoT ent://SD_ILS/0/SD_ILS:2333070 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Brooks, Charles J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119883029/?ar">https://go.oreilly.com/library-access/library/view/-/9781119883029/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119883029/?ar">https://learning.oreilly.com/library/view/~/9781119883029/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119883029">https://learning.oreilly.com/library/view/~/9781119883029</a><br/>Format:&#160;Electronic Resources<br/> Operationalizing Threat Intelligence : a Guide to Developing and Operationalizing Cyber Threat Intelligence Programs. ent://SD_ILS/0/SD_ILS:2333075 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Wilhoit, Kyle.<br/><a href="https://learning.oreilly.com/library/view/~/9781801814683">https://learning.oreilly.com/library/view/~/9781801814683</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801814683/?ar">https://go.oreilly.com/library-access/library/view/-/9781801814683/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801814683/?ar">https://learning.oreilly.com/library/view/~/9781801814683/?ar</a><br/>Format:&#160;Electronic Resources<br/> CEH : Certified Ethical Hacker Practice Exams ent://SD_ILS/0/SD_ILS:2333635 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Walker, Matthew.<br/><a href="https://learning.oreilly.com/library/view/~/9781264269976">https://learning.oreilly.com/library/view/~/9781264269976</a> <a href="https://learning.oreilly.com/library/view/~/9781264269976/?ar">https://learning.oreilly.com/library/view/~/9781264269976/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar">https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar</a><br/>Format:&#160;Electronic Resources<br/> The ransomware dilemma : the decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attack ent://SD_ILS/0/SD_ILS:2333559 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Leo, Philipp, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63419">https://learning.oreilly.com/library/view/~/53863MIT63419</a> <a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT63419/?ar">https://learning.oreilly.com/library/view/~/53863MIT63419/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building cyber resilience before the next attack occurs : companies that are most successful in responding to cyberattacks leverage distributed leadership, crisis experience, and consistent communication ent://SD_ILS/0/SD_ILS:2333560 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Hepfer, Manuel, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63431/?ar">https://learning.oreilly.com/library/view/~/53863MIT63431/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT63431">https://learning.oreilly.com/library/view/~/53863MIT63431</a> <a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63431/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63431/?ar</a><br/>Format:&#160;Electronic Resources<br/> Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud ent://SD_ILS/0/SD_ILS:2333792 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Berkouwer, Sander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar">https://go.oreilly.com/library-access/library/view/-/9781803242507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803242507/?ar">https://learning.oreilly.com/library/view/~/9781803242507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803242507">https://learning.oreilly.com/library/view/~/9781803242507</a><br/>Format:&#160;Electronic Resources<br/> Deploying a modern security data lake ent://SD_ILS/0/SD_ILS:2333965 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Baum, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098134983/?ar">https://learning.oreilly.com/library/view/~/9781098134983/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar">https://go.oreilly.com/library-access/library/view/-/9781098134983/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098134983">https://learning.oreilly.com/library/view/~/9781098134983</a><br/>Format:&#160;Electronic Resources<br/> Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response. ent://SD_ILS/0/SD_ILS:2331491 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Hettema, Hinne.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801815512/?ar">https://learning.oreilly.com/library/view/~/9781801815512/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801815512">https://learning.oreilly.com/library/view/~/9781801815512</a><br/>Format:&#160;Electronic Resources<br/> Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory. ent://SD_ILS/0/SD_ILS:2331787 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Ostrovskaya, Svetlana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070331">https://learning.oreilly.com/library/view/~/9781801070331</a> <a href="https://learning.oreilly.com/library/view/~/9781801070331/?ar">https://learning.oreilly.com/library/view/~/9781801070331/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Defender for Cloud Cookbook : Protect Multicloud and Hybrid Cloud Environments, Manage Compliance and Strengthen Security Posture ent://SD_ILS/0/SD_ILS:2333592 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Kranjac, Sasha.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801076135/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076135/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801076135">https://learning.oreilly.com/library/view/~/9781801076135</a> <a href="https://learning.oreilly.com/library/view/~/9781801076135/?ar">https://learning.oreilly.com/library/view/~/9781801076135/?ar</a><br/>Format:&#160;Electronic Resources<br/> IF IT'S SMART, IT'S VULNERABLE ent://SD_ILS/0/SD_ILS:2333601 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Hypponen, Mikko, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119895183/?ar">https://go.oreilly.com/library-access/library/view/-/9781119895183/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119895183/?ar">https://learning.oreilly.com/library/view/~/9781119895183/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119895183">https://learning.oreilly.com/library/view/~/9781119895183</a><br/>Format:&#160;Electronic Resources<br/> Fight fire with fire : proactive cybersecurity strategies for today's leaders ent://SD_ILS/0/SD_ILS:2330914 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Tarun, Renee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119854265/?ar">https://learning.oreilly.com/library/view/~/9781119854265/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119854265">https://learning.oreilly.com/library/view/~/9781119854265</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and local government ent://SD_ILS/0/SD_ILS:2331746 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Norris, Donald F., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119788287/?ar">https://learning.oreilly.com/library/view/~/9781119788287/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119788287">https://learning.oreilly.com/library/view/~/9781119788287</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119788287/?ar">https://go.oreilly.com/library-access/library/view/-/9781119788287/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Azure security : keeping your Microsoft Azure workloads safe ent://SD_ILS/0/SD_ILS:2332927 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Toroman, Mustafa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803238555">https://learning.oreilly.com/library/view/~/9781803238555</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803238555/?ar">https://learning.oreilly.com/library/view/~/9781803238555/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadar ent://SD_ILS/0/SD_ILS:2332057 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;IBM Storage Team, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460260/?ar">https://learning.oreilly.com/library/view/~/9780738460260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460260">https://learning.oreilly.com/library/view/~/9780738460260</a><br/>Format:&#160;Electronic Resources<br/> CEH Certified Ethical Hacker Cert guide ent://SD_ILS/0/SD_ILS:2331621 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format:&#160;Electronic Resources<br/> Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacks ent://SD_ILS/0/SD_ILS:2329941 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Peiris, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119804062/?ar">https://learning.oreilly.com/library/view/~/9781119804062/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar">https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119804062">https://learning.oreilly.com/library/view/~/9781119804062</a><br/>Format:&#160;Electronic Resources<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:2330102 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sharp, Matthew K., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar">https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119782483/?ar">https://learning.oreilly.com/library/view/~/9781119782483/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119782483">https://learning.oreilly.com/library/view/~/9781119782483</a><br/>Format:&#160;Electronic Resources<br/> Phishing and communication channels a guide to identifying and mitigating phishing attacks ent://SD_ILS/0/SD_ILS:2331058 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sonowal, Gunikhan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484277447/?ar">https://learning.oreilly.com/library/view/~/9781484277447/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484277447">https://learning.oreilly.com/library/view/~/9781484277447</a><br/>Format:&#160;Electronic Resources<br/> Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environment ent://SD_ILS/0/SD_ILS:2356761 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Ackerman, Pascal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6730157">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data analytics : systems engineering - cybersecurity - project management ent://SD_ILS/0/SD_ILS:2275084 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Greco, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6457843">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Alice and Bob learn application security. ent://SD_ILS/0/SD_ILS:2325958 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Janca, Tanya.<br/><a href="https://learning.oreilly.com/library/view/~/9781119687351">https://learning.oreilly.com/library/view/~/9781119687351</a> <a href="https://learning.oreilly.com/library/view/~/9781119687351/?ar">https://learning.oreilly.com/library/view/~/9781119687351/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar">https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar</a><br/>Format:&#160;Electronic Resources<br/> Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering (CCE) ent://SD_ILS/0/SD_ILS:2326323 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Bochman, Andrew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781000292978/?ar">https://go.oreilly.com/library-access/library/view/-/9781000292978/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781000292978/?ar">https://learning.oreilly.com/library/view/~/9781000292978/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781000292978">https://learning.oreilly.com/library/view/~/9781000292978</a><br/>Format:&#160;Electronic Resources<br/> Artificial Intelligence, Cybersecurity and Cyber Defence ent://SD_ILS/0/SD_ILS:2328358 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a> <a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format:&#160;Electronic Resources<br/> Start-up secure : baking cybersecurity into your company from founding to exit ent://SD_ILS/0/SD_ILS:2327524 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Castaldo, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119700739">https://learning.oreilly.com/library/view/~/9781119700739</a> <a href="https://learning.oreilly.com/library/view/~/9781119700739/?ar">https://learning.oreilly.com/library/view/~/9781119700739/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar">https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar</a><br/>Format:&#160;Electronic Resources<br/> Lifecycle IoT Security for Engineers. ent://SD_ILS/0/SD_ILS:2337249 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Kaustubh, Dhondge.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6805253">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents ent://SD_ILS/0/SD_ILS:2351764 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Singh, Glen D., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6824393">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Comptia security+ certification practice exams, (Exam SY0-601). ent://SD_ILS/0/SD_ILS:2327137 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Lachance, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781260467987/?ar">https://learning.oreilly.com/library/view/~/9781260467987/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar">https://go.oreilly.com/library-access/library/view/-/9781260467987/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781260467987">https://learning.oreilly.com/library/view/~/9781260467987</a><br/>Format:&#160;Electronic Resources<br/> COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION EXAM GUIDE (EXAM CS0-002) ent://SD_ILS/0/SD_ILS:2326516 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Chapman, Brent.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar">https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781260464313">https://learning.oreilly.com/library/view/~/9781260464313</a> <a href="https://learning.oreilly.com/library/view/~/9781260464313/?ar">https://learning.oreilly.com/library/view/~/9781260464313/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information Risk Management : A practitioner's guide. ent://SD_ILS/0/SD_ILS:2337073 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sutton, David.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6733537">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Choose your InfoSec path : an interactive cybersecurity adventure for beginners ent://SD_ILS/0/SD_ILS:2328990 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Roxon, Alexander J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484270363">https://learning.oreilly.com/library/view/~/9781484270363</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484270363/?ar">https://learning.oreilly.com/library/view/~/9781484270363/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise DevOps for Architects ent://SD_ILS/0/SD_ILS:2330978 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Mulder, Jeroen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801812153">https://learning.oreilly.com/library/view/~/9781801812153</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812153/?ar">https://learning.oreilly.com/library/view/~/9781801812153/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity ABCs : delivering awareness, behaviours and culture change ent://SD_ILS/0/SD_ILS:2333926 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Barker, Jessica (Cyber security), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780174266/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174266/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780174266/?ar">https://learning.oreilly.com/library/view/~/9781780174266/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780174266">https://learning.oreilly.com/library/view/~/9781780174266</a><br/>Format:&#160;Electronic Resources<br/> Malware Analysis Techniques : Tricks for the Triage of Adversarial Software. ent://SD_ILS/0/SD_ILS:2329154 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Barker, Dylan.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212277">https://learning.oreilly.com/library/view/~/9781839212277</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839212277/?ar">https://learning.oreilly.com/library/view/~/9781839212277/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and Third-Party Risk : Third Party Threat Hunting ent://SD_ILS/0/SD_ILS:2329000 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Rasner, Gregory C.<br/><a href="https://learning.oreilly.com/library/view/~/9781119809555">https://learning.oreilly.com/library/view/~/9781119809555</a> <a href="https://learning.oreilly.com/library/view/~/9781119809555/?ar">https://learning.oreilly.com/library/view/~/9781119809555/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar">https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar</a><br/>Format:&#160;Electronic Resources<br/> Self-sovereign identity : decentralized digital identity and verifiable credentials ent://SD_ILS/0/SD_ILS:2330270 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format:&#160;Electronic Resources<br/> The official (ISC)2 CCSP CBK reference ent://SD_ILS/0/SD_ILS:2329305 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Fife, Leslie, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119603436/?ar">https://go.oreilly.com/library-access/library/view/-/9781119603436/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119603436/?ar">https://learning.oreilly.com/library/view/~/9781119603436/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119603436">https://learning.oreilly.com/library/view/~/9781119603436</a><br/>Format:&#160;Electronic Resources<br/> (ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests. ent://SD_ILS/0/SD_ILS:2329571 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Chapple, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781119787631">https://learning.oreilly.com/library/view/~/9781119787631</a> <a href="https://learning.oreilly.com/library/view/~/9781119787631/?ar">https://learning.oreilly.com/library/view/~/9781119787631/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119787631/?ar">https://go.oreilly.com/library-access/library/view/-/9781119787631/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with z/OS Data Set Encryption ent://SD_ILS/0/SD_ILS:2331252 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a> <a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format:&#160;Electronic Resources<br/> Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browser ent://SD_ILS/0/SD_ILS:2331570 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Segala, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar">https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801075336/?ar">https://learning.oreilly.com/library/view/~/9781801075336/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801075336">https://learning.oreilly.com/library/view/~/9781801075336</a><br/>Format:&#160;Electronic Resources<br/> Cyberjutsu : cybersecurity for the modern ninja ent://SD_ILS/0/SD_ILS:2326541 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a> <a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information Risk Management A practitioner's guide ent://SD_ILS/0/SD_ILS:2330297 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sutton, David author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175751">https://learning.oreilly.com/library/view/~/9781780175751</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780175751/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175751/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780175751/?ar">https://learning.oreilly.com/library/view/~/9781780175751/?ar</a><br/>Format:&#160;Electronic Resources<br/> CYBER SECURITY AND DIGITAL FORENSICS ent://SD_ILS/0/SD_ILS:2331441 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z <a href="https://learning.oreilly.com/library/view/~/9781119795636">https://learning.oreilly.com/library/view/~/9781119795636</a> <a href="https://learning.oreilly.com/library/view/~/9781119795636/?ar">https://learning.oreilly.com/library/view/~/9781119795636/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar">https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity in the COVID-19 pandemic ent://SD_ILS/0/SD_ILS:2327730 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Okereafor, Kenneth, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781000357653/?ar">https://learning.oreilly.com/library/view/~/9781000357653/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar">https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781000357653">https://learning.oreilly.com/library/view/~/9781000357653</a><br/>Format:&#160;Electronic Resources<br/> Secure edge computing : applications, techniques and challenges. ent://SD_ILS/0/SD_ILS:2329288 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Ahmed, Mohiuddin (Computer scientist), editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000427325/?ar">https://learning.oreilly.com/library/view/~/9781000427325/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781000427325">https://learning.oreilly.com/library/view/~/9781000427325</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar">https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar</a><br/>Format:&#160;Electronic Resources<br/> Art of attack : attacker mindset for security professionals. ent://SD_ILS/0/SD_ILS:2329433 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Reynolds, Maxie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119805465/?ar">https://learning.oreilly.com/library/view/~/9781119805465/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119805465">https://learning.oreilly.com/library/view/~/9781119805465</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar">https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar</a><br/>Format:&#160;Electronic Resources<br/> CISSP (ISC)2 certification practice exams and tests : over 1000 practice questions and explanations covering all 8 CISSP domains for exam version May 2021 ent://SD_ILS/0/SD_ILS:2329634 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Jordan, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800561373">https://learning.oreilly.com/library/view/~/9781800561373</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800561373/?ar">https://go.oreilly.com/library-access/library/view/-/9781800561373/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800561373/?ar">https://learning.oreilly.com/library/view/~/9781800561373/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security in education and practice ent://SD_ILS/0/SD_ILS:2351369 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Kaloyanova, Kalinka., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6424050">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical threat intelligence and data-driven threat huntingx : Practical threat intelligence and data-driven threat hunting : a hands-on guide to threat hunting with the ATT&amp;CK framework and open source tools ent://SD_ILS/0/SD_ILS:2353626 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Palacin, Valentina, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6462896">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict ent://SD_ILS/0/SD_ILS:2353735 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Borges, Dan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6640534">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:2358181 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Bhargava, Neeraj, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6693036">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The deviant security practices of cyber crime ent://SD_ILS/0/SD_ILS:2356733 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Van de Sandt, Erik H.A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6697091">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer security and encryption : an introduction ent://SD_ILS/0/SD_ILS:2237660 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Chauhan, S. R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6404902">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and resilience in the arctic ent://SD_ILS/0/SD_ILS:2242315 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Trump, Benjamin D., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6355988">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Medical device cybersecurity for engineers and manufacturers ent://SD_ILS/0/SD_ILS:2242337 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Wirth, Axel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6371470">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security operations in practice ent://SD_ILS/0/SD_ILS:2274223 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sheward, Mike, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6123931">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data privacy and GDPR handbook ent://SD_ILS/0/SD_ILS:2273935 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sharma, Sanjay, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986738">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : essential principles to secure your organisation ent://SD_ILS/0/SD_ILS:2221456 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6176700">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity : a self-teaching introduction ent://SD_ILS/0/SD_ILS:2221384 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Gupta, C. P., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6142332">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security controls evaluation, testing, and assessment handbook ent://SD_ILS/0/SD_ILS:2217906 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Johnson, Leighton, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5986757">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Successful cybersecurity professionals : how to change your behavior to protect your organization ent://SD_ILS/0/SD_ILS:2237591 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Brown, Steven, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6352009">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Ensuring network security through the use of the honeypot technique ent://SD_ILS/0/SD_ILS:2233146 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Selvaraj, Rajalakshmi, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5994500">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Developing a cybersecurity immune system for industry 4.0 ent://SD_ILS/0/SD_ILS:2237349 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Petrenko, Sergei, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6241958">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in the internet of things : challenges and solutions ent://SD_ILS/0/SD_ILS:2233412 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Hern&aacute;ndez Ramos, Jos&eacute; Luis, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6143723">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering Windows security and hardening : secure and protect your Windows environment from intruders, malware attacks, and other cyber threats. ent://SD_ILS/0/SD_ILS:2325966 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Dunkerley, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216411">https://learning.oreilly.com/library/view/~/9781839216411</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839216411/?ar">https://learning.oreilly.com/library/view/~/9781839216411/?ar</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Security+ SY0-601 Certification Guide - Second Edition ent://SD_ILS/0/SD_ILS:2327971 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Neil, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781800564244">https://learning.oreilly.com/library/view/~/9781800564244</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar">https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800564244/?ar">https://learning.oreilly.com/library/view/~/9781800564244/?ar</a><br/>Format:&#160;Electronic Resources<br/> SECURING CLOUD SERVICES;A PRAGMATIC APPROACH, SECOND EDITION. ent://SD_ILS/0/SD_ILS:2328081 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;LEE NEWCOMBE.<br/><a href="https://learning.oreilly.com/library/view/~/9781787782075">https://learning.oreilly.com/library/view/~/9781787782075</a> <a href="https://learning.oreilly.com/library/view/~/9781787782075/?ar">https://learning.oreilly.com/library/view/~/9781787782075/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar">https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:2323589 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format:&#160;Electronic Resources<br/> Hacking : der umfassende Praxis-Guide: inkl. Pr&uuml;fungsvorbereitung zum CEHv10 ent://SD_ILS/0/SD_ILS:2325946 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Amberg, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958452206/?ar">https://learning.oreilly.com/library/view/~/9783958452206/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958452206">https://learning.oreilly.com/library/view/~/9783958452206</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity ent://SD_ILS/0/SD_ILS:2325451 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Carey, Marcus J. (Cybersecurity professional)<br/><a href="https://learning.oreilly.com/library/view/~/9781119643418">https://learning.oreilly.com/library/view/~/9781119643418</a> <a href="https://learning.oreilly.com/library/view/~/9781119643418/?ar">https://learning.oreilly.com/library/view/~/9781119643418/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:2325452 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a> <a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security operations in practice ent://SD_ILS/0/SD_ILS:2333929 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175089/?ar">https://learning.oreilly.com/library/view/~/9781780175089/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780175089">https://learning.oreilly.com/library/view/~/9781780175089</a><br/>Format:&#160;Electronic Resources<br/> Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu ent://SD_ILS/0/SD_ILS:2332657 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format:&#160;Electronic Resources<br/> Data breaches : crisis and opportunity ent://SD_ILS/0/SD_ILS:2322222 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident response primer : how to keep from getting pwned too hard ent://SD_ILS/0/SD_ILS:2323316 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2322053 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced API Security : OAuth 2. 0 and Beyond ent://SD_ILS/0/SD_ILS:2322734 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Siriwardena, Prabath.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220504/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484220504">https://learning.oreilly.com/library/view/~/9781484220504</a> <a href="https://learning.oreilly.com/library/view/~/9781484220504/?ar">https://learning.oreilly.com/library/view/~/9781484220504/?ar</a><br/>Format:&#160;Electronic Resources<br/> Identity attack vectors : implementing an effective identity and access management solution ent://SD_ILS/0/SD_ILS:2322737 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484251652/?ar">https://learning.oreilly.com/library/view/~/9781484251652/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484251652">https://learning.oreilly.com/library/view/~/9781484251652</a><br/>Format:&#160;Electronic Resources<br/> Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe ent://SD_ILS/0/SD_ILS:2324802 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Security, 2nd Edition ent://SD_ILS/0/SD_ILS:2331101 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a> <a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for information professionals : concepts and applications ent://SD_ILS/0/SD_ILS:2356348 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Chang, Xiaqing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6232193">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity : the beginner's guide : a comprehensive guide to getting started in cybersecurity ent://SD_ILS/0/SD_ILS:2268197 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Ozkaya, Erdal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5781046">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies ent://SD_ILS/0/SD_ILS:2268290 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Parisi, Alessandro, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5847212">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT ent://SD_ILS/0/SD_ILS:2273439 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Tounsi, Wiem, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5763061">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Understanding security issues ent://SD_ILS/0/SD_ILS:2144594 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157542">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The business of cybersecurity : foundations and ideologies ent://SD_ILS/0/SD_ILS:2156901 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5770273">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity law : protect yourself and your customers ent://SD_ILS/0/SD_ILS:2156785 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Brathwaite, Shimon, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5719658">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How cyber security can protect your business : a guide for all stakeholders ent://SD_ILS/0/SD_ILS:2217830 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Wright, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5979597">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital asset valuation and cyber risk measurement : principles of cybernomics ent://SD_ILS/0/SD_ILS:2216808 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Ruan, Keyun, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5780982">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hardware security : a hands-on learning approach ent://SD_ILS/0/SD_ILS:2216544 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Bhunia, Swarup, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5754491">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Engineering secure and dependable software systems ent://SD_ILS/0/SD_ILS:2217525 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Pretschner, Alexander, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5899580">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber resilience ent://SD_ILS/0/SD_ILS:2232951 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Petrenko, Sergei, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5963879">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:2319220 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Tanner, Nadean H., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar">https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119552932/?ar">https://learning.oreilly.com/library/view/~/9781119552932/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119552932">https://learning.oreilly.com/library/view/~/9781119552932</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and privacy in cyber physical systems ent://SD_ILS/0/SD_ILS:2347187 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Maleh, Yassine, 1987- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5764472">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Exam ref MS-101 Microsoft 365 Mobility and Security ent://SD_ILS/0/SD_ILS:2321271 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Svidergol, Brian, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135574843/?ar">https://go.oreilly.com/library-access/library/view/-/9780135574843/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135574843/?ar">https://learning.oreilly.com/library/view/~/9780135574843/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber resiliency solution for IBM Spectrum Scale ent://SD_ILS/0/SD_ILS:2322145 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;IBM Storage Team, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457963/?ar">https://learning.oreilly.com/library/view/~/9780738457963/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar</a><br/>Format:&#160;Electronic Resources<br/> Beginning security with Microsoft technologies : protecting Office 365, devices, and data ent://SD_ILS/0/SD_ILS:2322123 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Lakshmi, Vasantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484248539/?ar">https://learning.oreilly.com/library/view/~/9781484248539/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar">https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux essentials for cybersecurity lab manual ent://SD_ILS/0/SD_ILS:2317558 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data analytics for IT networks : developing innovative use cases ent://SD_ILS/0/SD_ILS:2317559 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization ent://SD_ILS/0/SD_ILS:2318938 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134807614/?ar">https://learning.oreilly.com/library/view/~/9780134807614/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134807614">https://learning.oreilly.com/library/view/~/9780134807614</a><br/>Format:&#160;Electronic Resources<br/> Computer security : art and science ent://SD_ILS/0/SD_ILS:2318452 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical security : simple practices for defending your systems ent://SD_ILS/0/SD_ILS:2319402 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Zabicki, Roman, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar">https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781680506679">https://learning.oreilly.com/library/view/~/9781680506679</a> <a href="https://learning.oreilly.com/library/view/~/9781680506679/?ar">https://learning.oreilly.com/library/view/~/9781680506679/?ar</a><br/>Format:&#160;Electronic Resources<br/> Rootkits and bootkits : reversing modern malware and next generation threats ent://SD_ILS/0/SD_ILS:2314357 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Matrosov, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492071259/?ar">https://learning.oreilly.com/library/view/~/9781492071259/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar">https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492071259">https://learning.oreilly.com/library/view/~/9781492071259</a><br/>Format:&#160;Electronic Resources<br/> Learning Python for forensics : leverage the power of Python in forensic investigations ent://SD_ILS/0/SD_ILS:2319116 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format:&#160;Electronic Resources<br/> We have root : even more advice from Schneier on security ent://SD_ILS/0/SD_ILS:2321573 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643012">https://learning.oreilly.com/library/view/~/9781119643012</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643012/?ar">https://learning.oreilly.com/library/view/~/9781119643012/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:2321574 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Quade, Phil.<br/><a href="https://learning.oreilly.com/library/view/~/9781119617365">https://learning.oreilly.com/library/view/~/9781119617365</a> <a href="https://learning.oreilly.com/library/view/~/9781119617365/?ar">https://learning.oreilly.com/library/view/~/9781119617365/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar">https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing your cloud : IBM security for LinuxONE ent://SD_ILS/0/SD_ILS:2321597 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Alves, Edi Lopes, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457949/?ar">https://learning.oreilly.com/library/view/~/9780738457949/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security with AI and machine learning : using advanced tools to improve application security at the edge ent://SD_ILS/0/SD_ILS:2319058 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Ops with bash : attack, defend, and analyze from the command line ent://SD_ILS/0/SD_ILS:2319252 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a> <a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format:&#160;Electronic Resources<br/> Becoming the hacker : the playbook for getting inside the mind of an attacker ent://SD_ILS/0/SD_ILS:2319129 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format:&#160;Electronic Resources<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:2319534 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a> <a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with Ghidra ent://SD_ILS/0/SD_ILS:2322605 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar">https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098115265/?ar">https://learning.oreilly.com/library/view/~/9781098115265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098115265">https://learning.oreilly.com/library/view/~/9781098115265</a><br/>Format:&#160;Electronic Resources<br/> The complete Metasploit guide : explore effective penetration testing techniques with Metasploit ent://SD_ILS/0/SD_ILS:2327077 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838822477">https://learning.oreilly.com/library/view/~/9781838822477</a> <a href="https://learning.oreilly.com/library/view/~/9781838822477/?ar">https://learning.oreilly.com/library/view/~/9781838822477/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing mit mimikatz : Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchf&uuml;hren ent://SD_ILS/0/SD_ILS:2321348 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958459700">https://learning.oreilly.com/library/view/~/9783958459700</a> <a href="https://learning.oreilly.com/library/view/~/9783958459700/?ar">https://learning.oreilly.com/library/view/~/9783958459700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar">https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity ent://SD_ILS/0/SD_ILS:2321448 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643326">https://learning.oreilly.com/library/view/~/9781119643326</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643326/?ar">https://learning.oreilly.com/library/view/~/9781119643326/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical cyber forensics : an incident-based approach to forensic investigations ent://SD_ILS/0/SD_ILS:2321521 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with Linux on Z Encryption for data at-rest ent://SD_ILS/0/SD_ILS:2321973 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738457468/?ar">https://learning.oreilly.com/library/view/~/9780738457468/?ar</a><br/>Format:&#160;Electronic Resources<br/> Machine Learning et s&eacute;curit&eacute; ent://SD_ILS/0/SD_ILS:2326075 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar">https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9782412043561">https://learning.oreilly.com/library/view/~/9782412043561</a> <a href="https://learning.oreilly.com/library/view/~/9782412043561/?ar">https://learning.oreilly.com/library/view/~/9782412043561/?ar</a><br/>Format:&#160;Electronic Resources<br/> Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments ent://SD_ILS/0/SD_ILS:2322055 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your data ent://SD_ILS/0/SD_ILS:2322204 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Chakrabarty, Boudhayan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458014/?ar">https://learning.oreilly.com/library/view/~/9780738458014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458014">https://learning.oreilly.com/library/view/~/9780738458014</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar</a><br/>Format:&#160;Electronic Resources<br/> Serverless security : protect functions using the CLAD security model ent://SD_ILS/0/SD_ILS:2323066 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar">https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492082538/?ar">https://learning.oreilly.com/library/view/~/9781492082538/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492082538">https://learning.oreilly.com/library/view/~/9781492082538</a><br/>Format:&#160;Electronic Resources<br/> Informationssicherheit und Datenschutz : Handbuch f&uuml;r Praktiker und Begleitbuch zum T.I.S.P. ent://SD_ILS/0/SD_ILS:2322189 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Domnick, Andr&eacute;, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar">https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098123659/?ar">https://learning.oreilly.com/library/view/~/9781098123659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098123659">https://learning.oreilly.com/library/view/~/9781098123659</a><br/>Format:&#160;Electronic Resources<br/> System administration ethics : ten commandments for security and compliance in a modern cyber world ent://SD_ILS/0/SD_ILS:2322866 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Ljubuncic, Igor, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249888/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249888/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484249888/?ar">https://learning.oreilly.com/library/view/~/9781484249888/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing network infrastructure : discover practical network security with Nmap and Nessus 7 ent://SD_ILS/0/SD_ILS:2353372 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sairam, Jetty, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5742610">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Attribute-based access control ent://SD_ILS/0/SD_ILS:2240733 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Hu, Vincent C., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5430722">Click to View</a><br/>Format:&#160;Electronic Resources<br/> 99 privacy breaches to beware of : practical data protection tips from real-life experiences ent://SD_ILS/0/SD_ILS:2268306 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5879671">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Rethinking cybersecurity : strategy, mass effect, and states ent://SD_ILS/0/SD_ILS:2267175 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Lewis, James Andrew, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5233949">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Insider threats ent://SD_ILS/0/SD_ILS:2272622 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Arduin, Pierre-Emmanuel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5323674">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Empirical research for software security : foundations and experience ent://SD_ILS/0/SD_ILS:2108670 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5164090">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Online danger : how to protect yourself and your loved ones from the evil side of the internet ent://SD_ILS/0/SD_ILS:2146101 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Cole, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5893451">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; et RGPD : prot&eacute;gez votre PME : guide pratique pour s&eacute;curiser votre syst&egrave;me informatique et vous conformer au RGPD ent://SD_ILS/0/SD_ILS:2156542 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Ejzyn, Alain, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5496488">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Port cybersecurity : securing critical information infrastructures and supply chains ent://SD_ILS/0/SD_ILS:2213275 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Polemi, Nineta, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5118465">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical security ent://SD_ILS/0/SD_ILS:2212845 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4981408">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and resilience in intelligent data-centric systems and communication networks ent://SD_ILS/0/SD_ILS:2213104 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5090270">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Exploding data : reclaiming our cybersecurity in the digital age ent://SD_ILS/0/SD_ILS:2237232 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Chertoff, Michael, 1953- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6195359">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer security of instrumentation and control systems at nuclear facilities : technical guidance. ent://SD_ILS/0/SD_ILS:2230781 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z <a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5426853">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Selected readings in cybersecurity ent://SD_ILS/0/SD_ILS:2231448 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Choi, Young B., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5613263">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : design a security framework for an Internet connected ecosystem ent://SD_ILS/0/SD_ILS:2318628 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625821/?ar">https://learning.oreilly.com/library/view/~/9781788625821/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat hunting : a guide to proactive network defense ent://SD_ILS/0/SD_ILS:2318444 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Collins, Michael (Michael Patrick), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028260/?ar">https://learning.oreilly.com/library/view/~/9781492028260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492028260">https://learning.oreilly.com/library/view/~/9781492028260</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing mit Metasploit : Praxiswissen f&uuml;r mehr IT-Sicherheit ent://SD_ILS/0/SD_ILS:2316255 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958455979/?ar">https://learning.oreilly.com/library/view/~/9783958455979/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958455979">https://learning.oreilly.com/library/view/~/9783958455979</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar">https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network scanning cookbook : practical network security using Nmap and Nessus 7 ent://SD_ILS/0/SD_ILS:2317776 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:2316898 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Harper, Allen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260108422/?ar">https://learning.oreilly.com/library/view/~/9781260108422/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260108422/?ar">https://go.oreilly.com/library-access/library/view/-/9781260108422/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware data science : attack detection and attribution ent://SD_ILS/0/SD_ILS:2317388 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Saxe, Joshua, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067672">https://learning.oreilly.com/library/view/~/9781492067672</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492067672/?ar">https://learning.oreilly.com/library/view/~/9781492067672/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on red team tactics : a practical guide to mastering red team operations ent://SD_ILS/0/SD_ILS:2317792 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sharma, Himanshu, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995238">https://learning.oreilly.com/library/view/~/9781788995238</a> <a href="https://learning.oreilly.com/library/view/~/9781788995238/?ar">https://learning.oreilly.com/library/view/~/9781788995238/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:2316152 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux&reg; hardening in hostile networks : server security from TLS to TOR ent://SD_ILS/0/SD_ILS:2314177 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing open source libraries : managing vulnerabilities in open source code packages ent://SD_ILS/0/SD_ILS:2314890 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996980/?ar">https://learning.oreilly.com/library/view/~/9781491996980/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996980">https://learning.oreilly.com/library/view/~/9781491996980</a><br/>Format:&#160;Electronic Resources<br/> Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers ent://SD_ILS/0/SD_ILS:2316089 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated security technologies and solutions. Volume I, Cisco Security Solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content security ent://SD_ILS/0/SD_ILS:2316388 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Woland, Aaron T., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134807577/?ar">https://learning.oreilly.com/library/view/~/9780134807577/?ar</a><br/>Format:&#160;Electronic Resources<br/> Machine learning and security : protecting systems with data and algorithms ent://SD_ILS/0/SD_ILS:2315881 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar">https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491979891/?ar">https://learning.oreilly.com/library/view/~/9781491979891/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2316778 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows security monitoring : scenarios and patterns ent://SD_ILS/0/SD_ILS:2315945 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Miroshnikov, Andrei, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar">https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119390640/?ar">https://learning.oreilly.com/library/view/~/9781119390640/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119390640">https://learning.oreilly.com/library/view/~/9781119390640</a><br/>Format:&#160;Electronic Resources<br/> VMware NSX cookbook : over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere ent://SD_ILS/0/SD_ILS:2316400 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Wibowo, Bayu, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782174257/?ar">https://go.oreilly.com/library-access/library/view/-/9781782174257/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782174257/?ar">https://learning.oreilly.com/library/view/~/9781782174257/?ar</a><br/>Format:&#160;Electronic Resources<br/> Distributed Denial of Service (DDoS) : practical detection and defense ent://SD_ILS/0/SD_ILS:2318176 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Chou, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar">https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492026181">https://learning.oreilly.com/library/view/~/9781492026181</a> <a href="https://learning.oreilly.com/library/view/~/9781492026181/?ar">https://learning.oreilly.com/library/view/~/9781492026181/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing DevOps ent://SD_ILS/0/SD_ILS:2319465 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Vehent, Julien, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar">https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617294136">https://learning.oreilly.com/library/view/~/9781617294136</a> <a href="https://learning.oreilly.com/library/view/~/9781617294136/?ar">https://learning.oreilly.com/library/view/~/9781617294136/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital resilience : is your company ready for the next cyber threat? ent://SD_ILS/0/SD_ILS:2314734 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Rothrock, Ray A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814439258">https://learning.oreilly.com/library/view/~/9780814439258</a> <a href="https://learning.oreilly.com/library/view/~/9780814439258/?ar">https://learning.oreilly.com/library/view/~/9780814439258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar">https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar</a><br/>Format:&#160;Electronic Resources<br/> The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets ent://SD_ILS/0/SD_ILS:2315032 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Wallace, Michael, 1960- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814438770/?ar">https://learning.oreilly.com/library/view/~/9780814438770/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar">https://go.oreilly.com/library-access/library/view/-/9780814438770/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCSP Certified Cloud Security Professional practice exams ent://SD_ILS/0/SD_ILS:2316001 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Carter, Daniel, CISSP, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260031362">https://learning.oreilly.com/library/view/~/9781260031362</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260031362/?ar">https://go.oreilly.com/library-access/library/view/-/9781260031362/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781260031362/?ar">https://learning.oreilly.com/library/view/~/9781260031362/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with z/OS data set encryption ent://SD_ILS/0/SD_ILS:2316937 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738456874/?ar">https://learning.oreilly.com/library/view/~/9780738456874/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security on IBM z/VSE ent://SD_ILS/0/SD_ILS:2316940 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Hellner, Helmut, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738456911/?ar">https://learning.oreilly.com/library/view/~/9780738456911/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738456911/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456911/?ar</a><br/>Format:&#160;Electronic Resources<br/> An introduction to cyber modeling and simulation ent://SD_ILS/0/SD_ILS:2317081 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Couretas, Jerry M., 1966- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119420873">https://learning.oreilly.com/library/view/~/9781119420873</a> <a href="https://learning.oreilly.com/library/view/~/9781119420873/?ar">https://learning.oreilly.com/library/view/~/9781119420873/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119420873/?ar">https://go.oreilly.com/library-access/library/view/-/9781119420873/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering reverse engineering : re-engineer your ethical hacking skills ent://SD_ILS/0/SD_ILS:2319089 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Wong, Reginald, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788838849/?ar">https://learning.oreilly.com/library/view/~/9781788838849/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar">https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar</a><br/>Format:&#160;Electronic Resources<br/> Python penetration testing essentials : techniques for ethical hacking with Python ent://SD_ILS/0/SD_ILS:2316734 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Mohit, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789138962/?ar">https://learning.oreilly.com/library/view/~/9781789138962/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789138962/?ar">https://go.oreilly.com/library-access/library/view/-/9781789138962/?ar</a><br/>Format:&#160;Electronic Resources<br/> Serious cryptography : a practical introduction to modern encryption ent://SD_ILS/0/SD_ILS:2316208 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Aumasson, Jean-Philippe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067511">https://learning.oreilly.com/library/view/~/9781492067511</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492067511/?ar">https://learning.oreilly.com/library/view/~/9781492067511/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity essentials ent://SD_ILS/0/SD_ILS:2322482 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Brooks, Charles J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119362395/?ar">https://learning.oreilly.com/library/view/~/9781119362395/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar">https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar</a><br/>Format:&#160;Electronic Resources<br/> CompTIA security+ practice tests, exam SY0-501 ent://SD_ILS/0/SD_ILS:2322488 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Christy, S. Russell, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119416920/?ar">https://go.oreilly.com/library-access/library/view/-/9781119416920/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119416920/?ar">https://learning.oreilly.com/library/view/~/9781119416920/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119416920">https://learning.oreilly.com/library/view/~/9781119416920</a><br/>Format:&#160;Electronic Resources<br/> Hacking the hacker ent://SD_ILS/0/SD_ILS:2062795 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Grimes, Roger A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4845208">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Software update as a mechanism for resilience and security : proceedings of a Workshop. ent://SD_ILS/0/SD_ILS:2013724 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Johnson, Anne Frances, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Software-Update-as-a-Mechanism-for-Resilience-and-Security.pdf">An electronic book accessible through the World Wide Web; click for information.</a> <a href="http://doi.org/10.17226/24833">http://doi.org/10.17226/24833</a><br/>Format:&#160;Electronic Resources<br/> Wireshark for security professionals : using wireshark and the metasploit framework ent://SD_ILS/0/SD_ILS:2144097 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Bullock, Jessey, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4816492">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodell ent://SD_ILS/0/SD_ILS:2121325 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4830572">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime and business : strategies for global corporate security ent://SD_ILS/0/SD_ILS:2212362 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4863624">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data hiding techniques in Windows OS : a practical approach to investigation and defense ent://SD_ILS/0/SD_ILS:2210720 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4676113">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Preventing digital extortion : mitigate ransomware, DDoS, and other cyber-extortion attacks ent://SD_ILS/0/SD_ILS:2229356 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Thakkar, Dhanya, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4867419">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Spring security : secure your web applications, RESTful services, and microservice architectures ent://SD_ILS/0/SD_ILS:2230148 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Knutson, Mick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5165113">Click to View</a><br/>Format:&#160;Electronic Resources<br/> RIoT control : understanding and managing risks and the internet of things ent://SD_ILS/0/SD_ILS:2210795 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Macaulay, Tyson, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4691335">Click to View</a><br/>Format:&#160;Electronic Resources<br/> From corporate security to commercial force : a business leader's guide to security economics ent://SD_ILS/0/SD_ILS:2212386 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Cabric, Marko, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4865431">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:2211615 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Li, Shancang, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4786871">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules. ent://SD_ILS/0/SD_ILS:2315320 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788624596/?ar">https://learning.oreilly.com/library/view/~/9781788624596/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar</a><br/>Format:&#160;Electronic Resources<br/> Beginning ethical hacking with Python ent://SD_ILS/0/SD_ILS:2312262 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sinha, Sanjib.<br/><a href="https://learning.oreilly.com/library/view/~/9781484225417">https://learning.oreilly.com/library/view/~/9781484225417</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar">https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484225417/?ar">https://learning.oreilly.com/library/view/~/9781484225417/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : a practitioner's guide ent://SD_ILS/0/SD_ILS:2313763 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format:&#160;Electronic Resources<br/> Post-incident reviews : learning from failure for improved incident response ent://SD_ILS/0/SD_ILS:2318499 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Hand, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar">https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491986998">https://learning.oreilly.com/library/view/~/9781491986998</a> <a href="https://learning.oreilly.com/library/view/~/9781491986998/?ar">https://learning.oreilly.com/library/view/~/9781491986998/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of cyber safety : computer and mobile device safety made easy ent://SD_ILS/0/SD_ILS:2311432 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sammons, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166394/?ar">https://learning.oreilly.com/library/view/~/9780124166394/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124166394/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166394/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux cookbook : effective penetration testing solutions ent://SD_ILS/0/SD_ILS:2314270 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Schultz, Corey P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390303/?ar">https://learning.oreilly.com/library/view/~/9781784390303/?ar</a><br/>Format:&#160;Electronic Resources<br/> Agile application security : enabling security in a continuous delivery pipeline ent://SD_ILS/0/SD_ILS:2312360 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Bell, Laura, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491938836">https://learning.oreilly.com/library/view/~/9781491938836</a> <a href="https://learning.oreilly.com/library/view/~/9781491938836/?ar">https://learning.oreilly.com/library/view/~/9781491938836/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491938836/?ar">https://go.oreilly.com/library-access/library/view/-/9781491938836/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:2314683 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a> <a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privacy and the Internet of Things ent://SD_ILS/0/SD_ILS:2316648 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Rosner, Gilad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042822">https://learning.oreilly.com/library/view/~/9781492042822</a> <a href="https://learning.oreilly.com/library/view/~/9781492042822/?ar">https://learning.oreilly.com/library/view/~/9781492042822/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042822/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042822/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building a HIPAA-compliant cybersecurity program : using NIST 800-30 and CSF to secure protected health information ent://SD_ILS/0/SD_ILS:2318128 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Thompson, Eric C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230602/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230602/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230602/?ar">https://learning.oreilly.com/library/view/~/9781484230602/?ar</a><br/>Format:&#160;Electronic Resources<br/> VCP6-NV official cert guide : (exam #2VO-641) ent://SD_ILS/0/SD_ILS:2311292 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sena Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134133713">https://learning.oreilly.com/library/view/~/9780134133713</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar">https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134133713/?ar">https://learning.oreilly.com/library/view/~/9780134133713/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ransomware : defending against digital extortion ent://SD_ILS/0/SD_ILS:2311973 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Liska, Allan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491967874/?ar">https://learning.oreilly.com/library/view/~/9781491967874/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491967874">https://learning.oreilly.com/library/view/~/9781491967874</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar">https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCSP Certified Cloud Security Professional exam guide ent://SD_ILS/0/SD_ILS:2312248 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Carter, Daniel, CISSP.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781259835452/?ar">https://go.oreilly.com/library-access/library/view/-/9781259835452/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781259835452/?ar">https://learning.oreilly.com/library/view/~/9781259835452/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security engineering : a practical approach for systems and software assurance ent://SD_ILS/0/SD_ILS:2311996 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Mead, Nancy R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar">https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134189857/?ar">https://learning.oreilly.com/library/view/~/9780134189857/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident management for operations ent://SD_ILS/0/SD_ILS:2313545 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Schnepp, Rob, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491917619/?ar">https://learning.oreilly.com/library/view/~/9781491917619/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar">https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491917619">https://learning.oreilly.com/library/view/~/9781491917619</a><br/>Format:&#160;Electronic Resources<br/> Metasploit for beginners : create a threat-free environment with the best-in-class tool ent://SD_ILS/0/SD_ILS:2313840 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295970/?ar">https://learning.oreilly.com/library/view/~/9781788295970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295970">https://learning.oreilly.com/library/view/~/9781788295970</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux network scanning cookbook : take your penetration-testing skills to the next level ent://SD_ILS/0/SD_ILS:2313499 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format:&#160;Electronic Resources<br/> To improve cybersecurity, think like a hacker ent://SD_ILS/0/SD_ILS:2313125 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Esteves, Jos&eacute;, 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT58314">https://learning.oreilly.com/library/view/~/53863MIT58314</a> <a href="https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT58314/?ar">https://learning.oreilly.com/library/view/~/53863MIT58314/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows virus and malware troubleshooting ent://SD_ILS/0/SD_ILS:2312937 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security from first principles : a practical guide to the information security practice principles ent://SD_ILS/0/SD_ILS:2314425 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Jackson, Craig, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996911/?ar">https://learning.oreilly.com/library/view/~/9781491996911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996911">https://learning.oreilly.com/library/view/~/9781491996911</a><br/>Format:&#160;Electronic Resources<br/> Gray hat C# : a hacker's guide to creating and automating security tools ent://SD_ILS/0/SD_ILS:2312569 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Perry, Brandon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492023449">https://learning.oreilly.com/library/view/~/9781492023449</a> <a href="https://learning.oreilly.com/library/view/~/9781492023449/?ar">https://learning.oreilly.com/library/view/~/9781492023449/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492023449/?ar">https://go.oreilly.com/library-access/library/view/-/9781492023449/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments ent://SD_ILS/0/SD_ILS:2313287 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Shah, Dhruv, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar">https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783982165/?ar">https://learning.oreilly.com/library/view/~/9781783982165/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensics cookbook : 61 recipes to help you analyze Windows systems ent://SD_ILS/0/SD_ILS:2313990 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sulkin, Oleg, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390495/?ar">https://learning.oreilly.com/library/view/~/9781784390495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390495">https://learning.oreilly.com/library/view/~/9781784390495</a><br/>Format:&#160;Electronic Resources<br/> Mastering Metasploit : take your penetration testing an IT security skills to a whole new level with the secrets of Metasploit ent://SD_ILS/0/SD_ILS:2271834 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4709428">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber insecurity : navigating the perils of the next information age ent://SD_ILS/0/SD_ILS:2266098 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Harrison, Richard M., 1981- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4742078">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0 ent://SD_ILS/0/SD_ILS:2271758 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Olups, Rihards, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4643698">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackers ent://SD_ILS/0/SD_ILS:2271717 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Halton, Wolf, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594301">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical Windows forensics : leverage the power of digital forensics for Windows systems ent://SD_ILS/0/SD_ILS:2271719 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Shaaban, Ayman, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594307">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world ent://SD_ILS/0/SD_ILS:2271720 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Russell, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594308">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security in fixed and wireless networks ent://SD_ILS/0/SD_ILS:2279930 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Schafer, Gunter, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=7104366">Click to View</a><br/>Format:&#160;Electronic Resources<br/> 88 privacy breaches to beware of : practical data protection tips from real-life experiences ent://SD_ILS/0/SD_ILS:2265185 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4558135">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Facing cyber threats head on : protecting yourself and your business ent://SD_ILS/0/SD_ILS:2266274 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Minick, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4773207">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and human rights in the age of cyberveillance ent://SD_ILS/0/SD_ILS:2264105 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Kulesza, Joanna, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4098051">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes ent://SD_ILS/0/SD_ILS:2271774 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Kalsi, Tajinder, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4659132">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Chaotic secure communication : principles and technologies ent://SD_ILS/0/SD_ILS:2061285 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sun, Kehui, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4707910">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Linux server security : hack and defend ent://SD_ILS/0/SD_ILS:2060102 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Binnie, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4519259">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Meeting people via WiFi and Bluetooth ent://SD_ILS/0/SD_ILS:2098423 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Schroeder, Joshua, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189280">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Essential skills for hackers ent://SD_ILS/0/SD_ILS:2098424 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189281">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Selling information security to the board : a primer ent://SD_ILS/0/SD_ILS:2132583 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4519662">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information technology security fundamentals ent://SD_ILS/0/SD_ILS:2110952 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4009415">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in the digital era. Volume 1 ent://SD_ILS/0/SD_ILS:2060915 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4648717">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber security awareness for CEOs and management ent://SD_ILS/0/SD_ILS:2209372 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189279">Click to View</a><br/>Format:&#160;Electronic Resources<br/> OS X incident response : scripting and analysis ent://SD_ILS/0/SD_ILS:2210035 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Bradley, Jaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4526010">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Breaking into information security : crafting a custom career path to get the job you really want ent://SD_ILS/0/SD_ILS:2209344 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;More, Josh, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4187289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:2209444 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4334673">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building a corporate culture of security : strategies for strengthening organizational resiliency ent://SD_ILS/0/SD_ILS:2209738 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4425984">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security science : measuring the vulnerability to data compromises ent://SD_ILS/0/SD_ILS:2210328 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4567434">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Meeting security challenges through data analytics and decision support ent://SD_ILS/0/SD_ILS:2219758 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Shahbazian, E. (Elisa), editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4753391">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data breach aftermath and recovery for individuals and institutions : proceedings of a workshop ent://SD_ILS/0/SD_ILS:2228331 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Johnson, Anne, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4690560">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the windows registry ent://SD_ILS/0/SD_ILS:2209760 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4438754">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:2209813 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452264">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:2209814 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452265">Click to View</a><br/>Format:&#160;Electronic Resources<br/> You : for sale protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:2208965 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dns security : defending the domain name system ent://SD_ILS/0/SD_ILS:2210263 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556898">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:2210264 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556899">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Critical infrastructure protection against hybrid warfare security related challenges ent://SD_ILS/0/SD_ILS:2211397 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Niglia, Alessandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4753392">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackers ent://SD_ILS/0/SD_ILS:2311006 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Halton, Wolf, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782168492/?ar">https://learning.oreilly.com/library/view/~/9781782168492/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782168492">https://learning.oreilly.com/library/view/~/9781782168492</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition ent://SD_ILS/0/SD_ILS:2311655 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Johansen, Gerard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785888427/?ar">https://learning.oreilly.com/library/view/~/9781785888427/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar">https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT security risk control management : an audit preparation plan ent://SD_ILS/0/SD_ILS:2312542 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Pompon, Raymond, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484221402/?ar">https://learning.oreilly.com/library/view/~/9781484221402/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484221402/?ar">https://go.oreilly.com/library-access/library/view/-/9781484221402/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information theft prevention : theory and practice ent://SD_ILS/0/SD_ILS:2315550 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format:&#160;Electronic Resources<br/> Cracking security misconceptions : untangling common myths about modern information security ent://SD_ILS/0/SD_ILS:2316704 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Peterson, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042747">https://learning.oreilly.com/library/view/~/9781492042747</a> <a href="https://learning.oreilly.com/library/view/~/9781492042747/?ar">https://learning.oreilly.com/library/view/~/9781492042747/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for hospitals and healthcare facilities : a guide to detection and prevention ent://SD_ILS/0/SD_ILS:2311610 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Ayala, Luis, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484221556/?ar">https://go.oreilly.com/library-access/library/view/-/9781484221556/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484221556/?ar">https://learning.oreilly.com/library/view/~/9781484221556/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484221556">https://learning.oreilly.com/library/view/~/9781484221556</a><br/>Format:&#160;Electronic Resources<br/> Data Mining and Machine Learning in Cybersecurity ent://SD_ILS/0/SD_ILS:2313557 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Dua, Sumeet, author<br/><a href="https://learning.oreilly.com/library/view/~/9781439839430/?ar">https://learning.oreilly.com/library/view/~/9781439839430/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439839430/?ar">https://go.oreilly.com/library-access/library/view/-/9781439839430/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439839430">https://learning.oreilly.com/library/view/~/9781439839430</a><br/>Format:&#160;Electronic Resources<br/> Who are the bad guys and what do they want? ent://SD_ILS/0/SD_ILS:2318638 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Fell, Gregory J., 1964- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042464">https://learning.oreilly.com/library/view/~/9781492042464</a> <a href="https://learning.oreilly.com/library/view/~/9781492042464/?ar">https://learning.oreilly.com/library/view/~/9781492042464/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar</a><br/>Format:&#160;Electronic Resources<br/> A study of black hole attack solutions : on AODV routing protocol in MANET ent://SD_ILS/0/SD_ILS:2309038 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format:&#160;Electronic Resources<br/> Oracle Application Express administration : for DBAs and Developers ent://SD_ILS/0/SD_ILS:2311753 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Mignault, Francis, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484219584/?ar">https://learning.oreilly.com/library/view/~/9781484219584/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484219584/?ar">https://go.oreilly.com/library-access/library/view/-/9781484219584/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484219584">https://learning.oreilly.com/library/view/~/9781484219584</a><br/>Format:&#160;Electronic Resources<br/> People-centric security : transforming your enterprise security culture ent://SD_ILS/0/SD_ILS:2309517 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Hayden, Lance, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071846790/?ar">https://learning.oreilly.com/library/view/~/9780071846790/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar">https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber-physical attack recovery procedures : a step-by-step preparation and response guide ent://SD_ILS/0/SD_ILS:2311018 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Ayala, Luis, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220658/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220658/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484220658/?ar">https://learning.oreilly.com/library/view/~/9781484220658/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Windows forensics : leverage the power of digital forensics for Windows systems ent://SD_ILS/0/SD_ILS:2311021 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security policies, procedures, and standards : a practitioner's reference ent://SD_ILS/0/SD_ILS:2310749 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Landoll, Douglas J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482245912/?ar">https://learning.oreilly.com/library/view/~/9781482245912/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar">https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering the Microsoft Deployment Toolkit : take a deep dive into the world of Windows desktop deployment using the Microsoft Deployment Toolkit ent://SD_ILS/0/SD_ILS:2310813 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Stokes, Jeff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782172499/?ar">https://learning.oreilly.com/library/view/~/9781782172499/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782172499">https://learning.oreilly.com/library/view/~/9781782172499</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782172499/?ar">https://go.oreilly.com/library-access/library/view/-/9781782172499/?ar</a><br/>Format:&#160;Electronic Resources<br/> Essential cybersecurity science : build, test, and evaluate secure systems ent://SD_ILS/0/SD_ILS:2309193 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format:&#160;Electronic Resources<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:2310290 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format:&#160;Electronic Resources<br/> Dynamic SQL : applications, performance, and security : rapid response and flexibility in the face of changing business requirements ent://SD_ILS/0/SD_ILS:2310671 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Pollack, Edward, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484218112/?ar">https://go.oreilly.com/library-access/library/view/-/9781484218112/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484218112/?ar">https://learning.oreilly.com/library/view/~/9781484218112/?ar</a><br/>Format:&#160;Electronic Resources<br/> VCP6-DCV official cert guide : (exam #2VO-621) ent://SD_ILS/0/SD_ILS:2310569 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Davis, John A. (Software consultant), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134392974/?ar">https://learning.oreilly.com/library/view/~/9780134392974/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134392974/?ar">https://go.oreilly.com/library-access/library/view/-/9780134392974/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134392974">https://learning.oreilly.com/library/view/~/9780134392974</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity lexicon ent://SD_ILS/0/SD_ILS:2311137 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Ayala, Luis, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220689/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220689/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484220689/?ar">https://learning.oreilly.com/library/view/~/9781484220689/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:2310991 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing your cloud : IBM z/VM security for IBM z Systems and LinuxONE ent://SD_ILS/0/SD_ILS:2311804 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Parziale, Lydia, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442020/?ar">https://learning.oreilly.com/library/view/~/9780738442020/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738442020/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442020/?ar</a><br/>Format:&#160;Electronic Resources<br/> Google hacking for penetration testers ent://SD_ILS/0/SD_ILS:2309293 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Long, Johnny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029824/?ar">https://learning.oreilly.com/library/view/~/9780128029824/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar</a><br/>Format:&#160;Electronic Resources<br/> Thinking security : stopping next year's hackers ent://SD_ILS/0/SD_ILS:2308932 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Bellovin, Steven M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar">https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134278223">https://learning.oreilly.com/library/view/~/9780134278223</a> <a href="https://learning.oreilly.com/library/view/~/9780134278223/?ar">https://learning.oreilly.com/library/view/~/9780134278223/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes ent://SD_ILS/0/SD_ILS:2310585 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Kalsi, Tajinder, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785286421/?ar">https://learning.oreilly.com/library/view/~/9781785286421/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785286421/?ar">https://go.oreilly.com/library-access/library/view/-/9781785286421/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785286421">https://learning.oreilly.com/library/view/~/9781785286421</a><br/>Format:&#160;Electronic Resources<br/> Securing PHP apps ent://SD_ILS/0/SD_ILS:2311497 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Edmunds, Ben, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484221204/?ar">https://go.oreilly.com/library-access/library/view/-/9781484221204/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484221204/?ar">https://learning.oreilly.com/library/view/~/9781484221204/?ar</a><br/>Format:&#160;Electronic Resources<br/> The second economy : the race for trust, treasure and time in the cybersecurity war ent://SD_ILS/0/SD_ILS:2312552 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:2314416 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Bose, S., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789332579125/?ar">https://learning.oreilly.com/library/view/~/9789332579125/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar">https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9789332579125">https://learning.oreilly.com/library/view/~/9789332579125</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the V3rb0ten network ent://SD_ILS/0/SD_ILS:2309296 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format:&#160;Electronic Resources<br/> Are your bits flipped? : overcoming tech misconceptions ent://SD_ILS/0/SD_ILS:2310599 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Kissell, Joe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar">https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492017172/?ar">https://learning.oreilly.com/library/view/~/9781492017172/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world ent://SD_ILS/0/SD_ILS:2311027 2024-05-23T20:17:26Z 2024-05-23T20:17:26Z by&#160;Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785889639">https://learning.oreilly.com/library/view/~/9781785889639</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785889639/?ar">https://learning.oreilly.com/library/view/~/9781785889639/?ar</a><br/>Format:&#160;Electronic Resources<br/>