Search Results for - Narrowed by: Electronic books. - R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026ps$003d300$0026isd$003dtrue? 2024-06-20T04:26:32Z Hacking : der umfassende Praxis-Guide : inkl. Pr&uuml;fungsvorbereitung zum CEHv11 ent://SD_ILS/0/SD_ILS:2331683 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Amberg, Eric, author<br/><a href="https://learning.oreilly.com/library/view/~/9783747504840">https://learning.oreilly.com/library/view/~/9783747504840</a> <a href="https://learning.oreilly.com/library/view/~/9783747504840/?ar">https://learning.oreilly.com/library/view/~/9783747504840/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar">https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security handbook ent://SD_ILS/0/SD_ILS:2330245 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Jhanjhi, Noor Zaman, 1972- editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000540567">https://learning.oreilly.com/library/view/~/9781000540567</a> <a href="https://learning.oreilly.com/library/view/~/9781000540567/?ar">https://learning.oreilly.com/library/view/~/9781000540567/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781000540567/?ar">https://go.oreilly.com/library-access/library/view/-/9781000540567/?ar</a><br/>Format:&#160;Electronic Resources<br/> The security culture playbook : an executive guide to reducing risk and developing your human defense layer ent://SD_ILS/0/SD_ILS:2332410 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119875239/?ar">https://learning.oreilly.com/library/view/~/9781119875239/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119875239">https://learning.oreilly.com/library/view/~/9781119875239</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar">https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar</a><br/>Format:&#160;Electronic Resources<br/> Shifting left for application security : bridging the divide between DevOps and security with the right security tools ent://SD_ILS/0/SD_ILS:2332575 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a> <a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security for dummies ent://SD_ILS/0/SD_ILS:2332497 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a> <a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kerberos : Single Sign-on in gemischten Linux/Windows-Umgebungen. ent://SD_ILS/0/SD_ILS:2332670 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Pr&ouml;hl, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9781098141059/?ar">https://learning.oreilly.com/library/view/~/9781098141059/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098141059/?ar">https://go.oreilly.com/library-access/library/view/-/9781098141059/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098141059">https://learning.oreilly.com/library/view/~/9781098141059</a><br/>Format:&#160;Electronic Resources<br/> Python for cybersecurity : using Python for cyber offense and defense ent://SD_ILS/0/SD_ILS:2331574 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Poston, Howard E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar">https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119850649/?ar">https://learning.oreilly.com/library/view/~/9781119850649/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119850649">https://learning.oreilly.com/library/view/~/9781119850649</a><br/>Format:&#160;Electronic Resources<br/> Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000 ent://SD_ILS/0/SD_ILS:2332067 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;International Business Machines Corporation, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460406/?ar">https://learning.oreilly.com/library/view/~/9780738460406/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460406">https://learning.oreilly.com/library/view/~/9780738460406</a><br/>Format:&#160;Electronic Resources<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:2332538 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Pramanik, Sabyasachi, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119812494">https://learning.oreilly.com/library/view/~/9781119812494</a> <a href="https://learning.oreilly.com/library/view/~/9781119812494/?ar">https://learning.oreilly.com/library/view/~/9781119812494/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar">https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadar ent://SD_ILS/0/SD_ILS:2332057 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;IBM Storage Team, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460260/?ar">https://learning.oreilly.com/library/view/~/9780738460260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460260">https://learning.oreilly.com/library/view/~/9780738460260</a><br/>Format:&#160;Electronic Resources<br/> Pentesting Industrial Control Systems : an Ethical Hacker's Guide to Analyzing, Compromising, Mitigating, and Securing Industrial Processes. ent://SD_ILS/0/SD_ILS:2330864 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Smith, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800202382/?ar">https://learning.oreilly.com/library/view/~/9781800202382/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800202382">https://learning.oreilly.com/library/view/~/9781800202382</a><br/>Format:&#160;Electronic Resources<br/> Artificial Intelligence, Cybersecurity and Cyber Defence ent://SD_ILS/0/SD_ILS:2328358 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a> <a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format:&#160;Electronic Resources<br/> CEH v11 certified ethical hacker study guide ent://SD_ILS/0/SD_ILS:2329776 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119800286/?ar">https://learning.oreilly.com/library/view/~/9781119800286/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar">https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119800286">https://learning.oreilly.com/library/view/~/9781119800286</a><br/>Format:&#160;Electronic Resources<br/> Cyberjutsu : cybersecurity for the modern ninja ent://SD_ILS/0/SD_ILS:2326541 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a> <a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to hack like a ghost ent://SD_ILS/0/SD_ILS:2326507 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a> <a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing Azure for Ethical Hackers ent://SD_ILS/0/SD_ILS:2331077 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Okeyode, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212932/?ar">https://learning.oreilly.com/library/view/~/9781839212932/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839212932">https://learning.oreilly.com/library/view/~/9781839212932</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Active Directory - Third Edition ent://SD_ILS/0/SD_ILS:2331105 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Francis, Dishan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801070393/?ar">https://learning.oreilly.com/library/view/~/9781801070393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801070393">https://learning.oreilly.com/library/view/~/9781801070393</a><br/>Format:&#160;Electronic Resources<br/> Hacking : der umfassende Praxis-Guide: inkl. Pr&uuml;fungsvorbereitung zum CEHv10 ent://SD_ILS/0/SD_ILS:2325946 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Amberg, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958452206/?ar">https://learning.oreilly.com/library/view/~/9783958452206/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958452206">https://learning.oreilly.com/library/view/~/9783958452206</a><br/>Format:&#160;Electronic Resources<br/> Data breaches : crisis and opportunity ent://SD_ILS/0/SD_ILS:2322222 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web security for developers ent://SD_ILS/0/SD_ILS:2324422 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;McDonald, Malcolm (Computer programmer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098122683/?ar">https://learning.oreilly.com/library/view/~/9781098122683/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098122683">https://learning.oreilly.com/library/view/~/9781098122683</a><br/>Format:&#160;Electronic Resources<br/> Incident response primer : how to keep from getting pwned too hard ent://SD_ILS/0/SD_ILS:2323316 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:2323589 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format:&#160;Electronic Resources<br/> Web application security : exploitation and countermeasures for modern web applications ent://SD_ILS/0/SD_ILS:2323527 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Hoffman, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492053101/?ar">https://learning.oreilly.com/library/view/~/9781492053101/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492053101/?ar">https://go.oreilly.com/library-access/library/view/-/9781492053101/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492053101">https://learning.oreilly.com/library/view/~/9781492053101</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:2323627 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Sadiqui, Ali, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar">https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786305275">https://learning.oreilly.com/library/view/~/9781786305275</a> <a href="https://learning.oreilly.com/library/view/~/9781786305275/?ar">https://learning.oreilly.com/library/view/~/9781786305275/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe ent://SD_ILS/0/SD_ILS:2324802 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format:&#160;Electronic Resources<br/> AWS SECURITY COOKBOOK;PRACTICAL SOLUTIONS FOR MANAGING SECURITY POLICIES, MONITORING, AUDITING, AND COMPLIANCE WITH AWS ent://SD_ILS/0/SD_ILS:2323340 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;HEARTIN KANIKATHOTTU.<br/><a href="https://learning.oreilly.com/library/view/~/9781838826253">https://learning.oreilly.com/library/view/~/9781838826253</a> <a href="https://learning.oreilly.com/library/view/~/9781838826253/?ar">https://learning.oreilly.com/library/view/~/9781838826253/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar">https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical vulnerability management : a strategic approach to managing cyber risk ent://SD_ILS/0/SD_ILS:2325867 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Magnusson, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098125707/?ar">https://learning.oreilly.com/library/view/~/9781098125707/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098125707">https://learning.oreilly.com/library/view/~/9781098125707</a><br/>Format:&#160;Electronic Resources<br/> Container security : fundamental technology concepts that protect containerized applications ent://SD_ILS/0/SD_ILS:2323879 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Rice, Liz, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056690/?ar">https://learning.oreilly.com/library/view/~/9781492056690/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492056690/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056690/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492056690">https://learning.oreilly.com/library/view/~/9781492056690</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2322053 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Security, 2nd Edition ent://SD_ILS/0/SD_ILS:2331101 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a> <a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format:&#160;Electronic Resources<br/> Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu ent://SD_ILS/0/SD_ILS:2332657 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format:&#160;Electronic Resources<br/> Practical cyber forensics : an incident-based approach to forensic investigations ent://SD_ILS/0/SD_ILS:2321521 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber resiliency solution for IBM Spectrum Scale ent://SD_ILS/0/SD_ILS:2322145 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;IBM Storage Team, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457963/?ar">https://learning.oreilly.com/library/view/~/9780738457963/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS : a pocket guide ent://SD_ILS/0/SD_ILS:2322160 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781641/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781641/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787781641/?ar">https://learning.oreilly.com/library/view/~/9781787781641/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on AWS penetration testing with Kali Linux : set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation ent://SD_ILS/0/SD_ILS:2321409 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Gilbert, Karl, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789136722">https://learning.oreilly.com/library/view/~/9781789136722</a> <a href="https://learning.oreilly.com/library/view/~/9781789136722/?ar">https://learning.oreilly.com/library/view/~/9781789136722/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar">https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar</a><br/>Format:&#160;Electronic Resources<br/> Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments ent://SD_ILS/0/SD_ILS:2322055 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn Kali Linux 2019 : perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark ent://SD_ILS/0/SD_ILS:2323768 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789611809/?ar">https://learning.oreilly.com/library/view/~/9781789611809/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789611809">https://learning.oreilly.com/library/view/~/9781789611809</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar">https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar</a><br/>Format:&#160;Electronic Resources<br/> Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risks ent://SD_ILS/0/SD_ILS:2321954 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Born, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789807608/?ar">https://learning.oreilly.com/library/view/~/9781789807608/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807608">https://learning.oreilly.com/library/view/~/9781789807608</a><br/>Format:&#160;Electronic Resources<br/> Waging cyber war : technical challenges and operational constraints ent://SD_ILS/0/SD_ILS:2321908 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Oakley, Jacob G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249505/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249505/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484249505/?ar">https://learning.oreilly.com/library/view/~/9781484249505/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization ent://SD_ILS/0/SD_ILS:2318938 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134807614/?ar">https://learning.oreilly.com/library/view/~/9780134807614/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134807614">https://learning.oreilly.com/library/view/~/9780134807614</a><br/>Format:&#160;Electronic Resources<br/> Practical security automation and testing : tools and techniques for automated security scanning and testing in DevSecOps ent://SD_ILS/0/SD_ILS:2319096 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Hsu, Tony Hsiang-Chih, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789802023/?ar">https://learning.oreilly.com/library/view/~/9781789802023/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789802023/?ar">https://go.oreilly.com/library-access/library/view/-/9781789802023/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning Python for forensics : leverage the power of Python in forensic investigations ent://SD_ILS/0/SD_ILS:2319116 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data ent://SD_ILS/0/SD_ILS:2319238 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Nickel, Jochen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789132304/?ar">https://learning.oreilly.com/library/view/~/9781789132304/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar">https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Ops with bash : attack, defend, and analyze from the command line ent://SD_ILS/0/SD_ILS:2319252 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a> <a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical security : simple practices for defending your systems ent://SD_ILS/0/SD_ILS:2319402 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Zabicki, Roman, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar">https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781680506679">https://learning.oreilly.com/library/view/~/9781680506679</a> <a href="https://learning.oreilly.com/library/view/~/9781680506679/?ar">https://learning.oreilly.com/library/view/~/9781680506679/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on network forensics : investigate network attacks and find evidence using common network forensic tools ent://SD_ILS/0/SD_ILS:2319836 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789344523/?ar">https://learning.oreilly.com/library/view/~/9781789344523/?ar</a><br/>Format:&#160;Electronic Resources<br/> Protecting your web applications : solutions and strategies to combat cybersecurity threats ent://SD_ILS/0/SD_ILS:2321166 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Sloper, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492052791">https://learning.oreilly.com/library/view/~/9781492052791</a> <a href="https://learning.oreilly.com/library/view/~/9781492052791/?ar">https://learning.oreilly.com/library/view/~/9781492052791/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security : art and science ent://SD_ILS/0/SD_ILS:2318452 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux 2019.1, the ultimate white hat hackers' toolkit ent://SD_ILS/0/SD_ILS:2319114 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340563/?ar">https://learning.oreilly.com/library/view/~/9781789340563/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical cloud security : a guide for secure design and deployment ent://SD_ILS/0/SD_ILS:2319005 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Dotson, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492037507">https://learning.oreilly.com/library/view/~/9781492037507</a> <a href="https://learning.oreilly.com/library/view/~/9781492037507/?ar">https://learning.oreilly.com/library/view/~/9781492037507/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on application penetration testing with Burp Suite : use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications ent://SD_ILS/0/SD_ILS:2319360 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Lozano, Carlos A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788994064/?ar">https://learning.oreilly.com/library/view/~/9781788994064/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar">https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788994064">https://learning.oreilly.com/library/view/~/9781788994064</a><br/>Format:&#160;Electronic Resources<br/> Hands-on penetration testing with Kali NetHunter : spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go ent://SD_ILS/0/SD_ILS:2319361 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Singh, Glen D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995177/?ar">https://learning.oreilly.com/library/view/~/9781788995177/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995177">https://learning.oreilly.com/library/view/~/9781788995177</a><br/>Format:&#160;Electronic Resources<br/> Becoming the hacker : the playbook for getting inside the mind of an attacker ent://SD_ILS/0/SD_ILS:2319129 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format:&#160;Electronic Resources<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:2319534 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a> <a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux essentials for cybersecurity lab manual ent://SD_ILS/0/SD_ILS:2317558 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data analytics for IT networks : developing innovative use cases ent://SD_ILS/0/SD_ILS:2317559 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security with AI and machine learning : using advanced tools to improve application security at the edge ent://SD_ILS/0/SD_ILS:2319058 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity essentials ent://SD_ILS/0/SD_ILS:2322482 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Brooks, Charles J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119362395/?ar">https://learning.oreilly.com/library/view/~/9781119362395/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar">https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network scanning cookbook : practical network security using Nmap and Nessus 7 ent://SD_ILS/0/SD_ILS:2317776 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on red team tactics : a practical guide to mastering red team operations ent://SD_ILS/0/SD_ILS:2317792 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Sharma, Himanshu, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995238">https://learning.oreilly.com/library/view/~/9781788995238</a> <a href="https://learning.oreilly.com/library/view/~/9781788995238/?ar">https://learning.oreilly.com/library/view/~/9781788995238/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ansible quick start guide : Control and monitor infrastructures of any size, physical or virtual ent://SD_ILS/0/SD_ILS:2317798 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Alibi, Mohamed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789532937">https://learning.oreilly.com/library/view/~/9781789532937</a> <a href="https://learning.oreilly.com/library/view/~/9781789532937/?ar">https://learning.oreilly.com/library/view/~/9781789532937/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789532937/?ar">https://go.oreilly.com/library-access/library/view/-/9781789532937/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat hunting : a guide to proactive network defense ent://SD_ILS/0/SD_ILS:2318444 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Collins, Michael (Michael Patrick), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028260/?ar">https://learning.oreilly.com/library/view/~/9781492028260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492028260">https://learning.oreilly.com/library/view/~/9781492028260</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing microservice APIs : sustainable and scalable access control ent://SD_ILS/0/SD_ILS:2318425 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;McLarty, Matt, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492027140">https://learning.oreilly.com/library/view/~/9781492027140</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492027140/?ar">https://go.oreilly.com/library-access/library/view/-/9781492027140/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492027140/?ar">https://learning.oreilly.com/library/view/~/9781492027140/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kubernetes security : operating Kubernetes clusters and applications safely ent://SD_ILS/0/SD_ILS:2318519 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Rice, Liz, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492039075">https://learning.oreilly.com/library/view/~/9781492039075</a> <a href="https://learning.oreilly.com/library/view/~/9781492039075/?ar">https://learning.oreilly.com/library/view/~/9781492039075/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar</a><br/>Format:&#160;Electronic Resources<br/> Take Control of 1Password, 4th Edition ent://SD_ILS/0/SD_ILS:2319474 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format:&#160;Electronic Resources<br/> The Board's Role in Managing Cybersecurity Risks ent://SD_ILS/0/SD_ILS:2320749 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Rothrock, Ray, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT59221/?ar">https://learning.oreilly.com/library/view/~/53863MIT59221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT59221">https://learning.oreilly.com/library/view/~/53863MIT59221</a><br/>Format:&#160;Electronic Resources<br/> Hands-on bug hunting for penetration testers : a practical guide to help ethical hackers discover web application security flaws ent://SD_ILS/0/SD_ILS:2317823 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Marshall, Joseph, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789344202">https://learning.oreilly.com/library/view/~/9781789344202</a> <a href="https://learning.oreilly.com/library/view/~/9781789344202/?ar">https://learning.oreilly.com/library/view/~/9781789344202/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web application firewalls : securing modern web applications ent://SD_ILS/0/SD_ILS:2318497 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Russell, Chad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492032311">https://learning.oreilly.com/library/view/~/9781492032311</a> <a href="https://learning.oreilly.com/library/view/~/9781492032311/?ar">https://learning.oreilly.com/library/view/~/9781492032311/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheitsmanagement - Praxiswissen f&uuml;r IT Security Manager, 2. Auflage ent://SD_ILS/0/SD_ILS:2320105 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Harich, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9783958452756/?ar">https://learning.oreilly.com/library/view/~/9783958452756/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958452756">https://learning.oreilly.com/library/view/~/9783958452756</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar</a><br/>Format:&#160;Electronic Resources<br/> Modernizing cybersecurity operations with machine intelligence : advanced threat detection, hunting, and analysis ent://SD_ILS/0/SD_ILS:2318456 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Guerra, Peter, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar">https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492035992/?ar">https://learning.oreilly.com/library/view/~/9781492035992/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492035992">https://learning.oreilly.com/library/view/~/9781492035992</a><br/>Format:&#160;Electronic Resources<br/> Threat intelligence in practice : a practical guide to threat intelligence from successful organizations ent://SD_ILS/0/SD_ILS:2318435 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Liska, Allan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar">https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492049302/?ar">https://learning.oreilly.com/library/view/~/9781492049302/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492049302">https://learning.oreilly.com/library/view/~/9781492049302</a><br/>Format:&#160;Electronic Resources<br/> Burp Suite cookbook : practical recipes to help you master web penetration testing with Burp Suite ent://SD_ILS/0/SD_ILS:2317723 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Wear, Sunny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789531732">https://learning.oreilly.com/library/view/~/9781789531732</a> <a href="https://learning.oreilly.com/library/view/~/9781789531732/?ar">https://learning.oreilly.com/library/view/~/9781789531732/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : design a security framework for an Internet connected ecosystem ent://SD_ILS/0/SD_ILS:2318628 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625821/?ar">https://learning.oreilly.com/library/view/~/9781788625821/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM QRadar Version 7.3 : planning and installation guide ent://SD_ILS/0/SD_ILS:2315474 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Carabaguiaz, Elias, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442877/?ar">https://learning.oreilly.com/library/view/~/9780738442877/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:2316152 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format:&#160;Electronic Resources<br/> Fixing an insecure software life cycle : practical techniques for building security into existing software development programs ent://SD_ILS/0/SD_ILS:2316498 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Wright, April C., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028222">https://learning.oreilly.com/library/view/~/9781492028222</a> <a href="https://learning.oreilly.com/library/view/~/9781492028222/?ar">https://learning.oreilly.com/library/view/~/9781492028222/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492028222/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028222/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical monitoring : effective strategies for the real world ent://SD_ILS/0/SD_ILS:2314748 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Julian, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491957349/?ar">https://go.oreilly.com/library-access/library/view/-/9781491957349/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491957349/?ar">https://learning.oreilly.com/library/view/~/9781491957349/?ar</a><br/>Format:&#160;Electronic Resources<br/> Investigating the Cyber Breach : the digital forensics guide for the network engineer ent://SD_ILS/0/SD_ILS:2315345 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar">https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134755885/?ar">https://learning.oreilly.com/library/view/~/9780134755885/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux&reg; hardening in hostile networks : server security from TLS to TOR ent://SD_ILS/0/SD_ILS:2314177 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco Firepower Threat Defense (FTD) : configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP) ent://SD_ILS/0/SD_ILS:2314393 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Rajib, Nazmul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134679471">https://learning.oreilly.com/library/view/~/9780134679471</a> <a href="https://learning.oreilly.com/library/view/~/9780134679471/?ar">https://learning.oreilly.com/library/view/~/9780134679471/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar">https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar</a><br/>Format:&#160;Electronic Resources<br/> Monitoring anti-patterns ent://SD_ILS/0/SD_ILS:2315680 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Julian, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492036791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492036791/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492036791/?ar">https://learning.oreilly.com/library/view/~/9781492036791/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492036791">https://learning.oreilly.com/library/view/~/9781492036791</a><br/>Format:&#160;Electronic Resources<br/> Digital resilience : is your company ready for the next cyber threat? ent://SD_ILS/0/SD_ILS:2314734 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Rothrock, Ray A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814439258">https://learning.oreilly.com/library/view/~/9780814439258</a> <a href="https://learning.oreilly.com/library/view/~/9780814439258/?ar">https://learning.oreilly.com/library/view/~/9780814439258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar">https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2316778 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format:&#160;Electronic Resources<br/> Orchestrating and automating security for the Internet of Things : delivering advanced security capabilities from Edge to Cloud for IoT ent://SD_ILS/0/SD_ILS:2316233 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Sabella, Anthony, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134756936/?ar">https://go.oreilly.com/library-access/library/view/-/9780134756936/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134756936/?ar">https://learning.oreilly.com/library/view/~/9780134756936/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134756936">https://learning.oreilly.com/library/view/~/9780134756936</a><br/>Format:&#160;Electronic Resources<br/> Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linux ent://SD_ILS/0/SD_ILS:2315998 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Najera-Gutierrez, Gilberto, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar">https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788623377/?ar">https://learning.oreilly.com/library/view/~/9781788623377/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security automation : get to grips with automating your cloud security on AWS and OpenStack ent://SD_ILS/0/SD_ILS:2316344 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Priyam, Prashant, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627863/?ar">https://learning.oreilly.com/library/view/~/9781788627863/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers ent://SD_ILS/0/SD_ILS:2316089 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated security technologies and solutions. Volume I, Cisco Security Solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content security ent://SD_ILS/0/SD_ILS:2316388 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Woland, Aaron T., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134807577/?ar">https://learning.oreilly.com/library/view/~/9780134807577/?ar</a><br/>Format:&#160;Electronic Resources<br/> EVPN in the data center ent://SD_ILS/0/SD_ILS:2317148 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Dutt, Dinesh G., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492029045">https://learning.oreilly.com/library/view/~/9781492029045</a> <a href="https://learning.oreilly.com/library/view/~/9781492029045/?ar">https://learning.oreilly.com/library/view/~/9781492029045/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492029045/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029045/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking web performance : moving beyond the basics of web performance optimization ent://SD_ILS/0/SD_ILS:2316902 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Firtman, Maximiliano R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492039426/?ar">https://learning.oreilly.com/library/view/~/9781492039426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492039426">https://learning.oreilly.com/library/view/~/9781492039426</a><br/>Format:&#160;Electronic Resources<br/> Building a modern security program : adapting security for DevOps and cloud ent://SD_ILS/0/SD_ILS:2317166 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Lackey, Zane, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492044680/?ar">https://learning.oreilly.com/library/view/~/9781492044680/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492044680">https://learning.oreilly.com/library/view/~/9781492044680</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492044680/?ar">https://go.oreilly.com/library-access/library/view/-/9781492044680/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity incident response : how to contain, eradicate, and recover from incidents ent://SD_ILS/0/SD_ILS:2317670 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Thompson, Eric C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484238707/?ar">https://learning.oreilly.com/library/view/~/9781484238707/?ar</a><br/>Format:&#160;Electronic Resources<br/> Netzwerkprotokolle hacken : Sicherheisl&uuml;cken verstehen, analysieren und sch&uuml;tzen ent://SD_ILS/0/SD_ILS:2317121 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Forshaw, James, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492068631/?ar">https://learning.oreilly.com/library/view/~/9781492068631/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492068631/?ar">https://go.oreilly.com/library-access/library/view/-/9781492068631/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco next-generation security solutions : all-in-one Cisco ASA FirePOWER services, NGIPS, and AMP ent://SD_ILS/0/SD_ILS:2311054 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Santos, Omar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134213071/?ar">https://go.oreilly.com/library-access/library/view/-/9780134213071/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134213071/?ar">https://learning.oreilly.com/library/view/~/9780134213071/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134213071">https://learning.oreilly.com/library/view/~/9780134213071</a><br/>Format:&#160;Electronic Resources<br/> Cisco Intelligent WAN (IWAN) ent://SD_ILS/0/SD_ILS:2311998 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Edgeworth, Brad, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar">https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134423760/?ar">https://learning.oreilly.com/library/view/~/9780134423760/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134423760">https://learning.oreilly.com/library/view/~/9780134423760</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux, the ultimate hackers' arsenal ent://SD_ILS/0/SD_ILS:2313803 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787120235/?ar">https://learning.oreilly.com/library/view/~/9781787120235/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar">https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security and frontend performance : breaking the conundrum ent://SD_ILS/0/SD_ILS:2314781 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Burney, Sabrina, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492030157">https://learning.oreilly.com/library/view/~/9781492030157</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492030157/?ar">https://go.oreilly.com/library-access/library/view/-/9781492030157/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492030157/?ar">https://learning.oreilly.com/library/view/~/9781492030157/?ar</a><br/>Format:&#160;Electronic Resources<br/> Post-incident reviews : learning from failure for improved incident response ent://SD_ILS/0/SD_ILS:2318499 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Hand, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar">https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491986998">https://learning.oreilly.com/library/view/~/9781491986998</a> <a href="https://learning.oreilly.com/library/view/~/9781491986998/?ar">https://learning.oreilly.com/library/view/~/9781491986998/?ar</a><br/>Format:&#160;Electronic Resources<br/> Distributed Networks ent://SD_ILS/0/SD_ILS:2319907 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network and data security for non-engineers ent://SD_ILS/0/SD_ILS:2316046 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Groom, Frank M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781315350219/?ar">https://go.oreilly.com/library-access/library/view/-/9781315350219/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781315350219/?ar">https://learning.oreilly.com/library/view/~/9781315350219/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network functions virtualization (NFV) with a touch of SDN ent://SD_ILS/0/SD_ILS:2311983 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Chayapathi, Rajendra, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134464312">https://learning.oreilly.com/library/view/~/9780134464312</a> <a href="https://learning.oreilly.com/library/view/~/9780134464312/?ar">https://learning.oreilly.com/library/view/~/9780134464312/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134464312/?ar">https://go.oreilly.com/library-access/library/view/-/9780134464312/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics and incident response : an intelligent way to respond to attacks ent://SD_ILS/0/SD_ILS:2313915 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Johansen, Gerard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787288683">https://learning.oreilly.com/library/view/~/9781787288683</a> <a href="https://learning.oreilly.com/library/view/~/9781787288683/?ar">https://learning.oreilly.com/library/view/~/9781787288683/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787288683/?ar">https://go.oreilly.com/library-access/library/view/-/9781787288683/?ar</a><br/>Format:&#160;Electronic Resources<br/> Testing practitioner handbook : gain insights into the latest technology and business trends within testing domains ent://SD_ILS/0/SD_ILS:2313029 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Rajani, Renu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788299541/?ar">https://learning.oreilly.com/library/view/~/9781788299541/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar">https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensics cookbook : 61 recipes to help you analyze Windows systems ent://SD_ILS/0/SD_ILS:2313990 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Sulkin, Oleg, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390495/?ar">https://learning.oreilly.com/library/view/~/9781784390495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390495">https://learning.oreilly.com/library/view/~/9781784390495</a><br/>Format:&#160;Electronic Resources<br/> Zero trust networks : building secure systems in untrusted networks ent://SD_ILS/0/SD_ILS:2313595 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Gilman, Evan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491962183/?ar">https://learning.oreilly.com/library/view/~/9781491962183/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491962183">https://learning.oreilly.com/library/view/~/9781491962183</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491962183/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962183/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:2314683 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a> <a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security from first principles : a practical guide to the information security practice principles ent://SD_ILS/0/SD_ILS:2314425 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Jackson, Craig, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996911/?ar">https://learning.oreilly.com/library/view/~/9781491996911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996911">https://learning.oreilly.com/library/view/~/9781491996911</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux network scanning cookbook : take your penetration-testing skills to the next level ent://SD_ILS/0/SD_ILS:2313499 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing bootcamp : quickly get up and running with pentesting techniques ent://SD_ILS/0/SD_ILS:2313746 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Beltrame, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787288744/?ar">https://go.oreilly.com/library-access/library/view/-/9781787288744/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787288744/?ar">https://learning.oreilly.com/library/view/~/9781787288744/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787288744">https://learning.oreilly.com/library/view/~/9781787288744</a><br/>Format:&#160;Electronic Resources<br/> Applied network security : master the art of detecting and averting advanced network security attacks and techniques ent://SD_ILS/0/SD_ILS:2313288 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Salmon, Arthur, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786466273/?ar">https://learning.oreilly.com/library/view/~/9781786466273/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar">https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786466273">https://learning.oreilly.com/library/view/~/9781786466273</a><br/>Format:&#160;Electronic Resources<br/> Mastering Active Directory : automate tasks by leveraging PowerShell for Active Directory Domain Services 2016 ent://SD_ILS/0/SD_ILS:2313809 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787289352">https://learning.oreilly.com/library/view/~/9781787289352</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar">https://go.oreilly.com/library-access/library/view/-/9781787289352/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787289352/?ar">https://learning.oreilly.com/library/view/~/9781787289352/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Internet of risky things : trusting devices that surround us ent://SD_ILS/0/SD_ILS:2312464 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Smith, Sean, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491963616/?ar">https://go.oreilly.com/library-access/library/view/-/9781491963616/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491963616/?ar">https://learning.oreilly.com/library/view/~/9781491963616/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491963616">https://learning.oreilly.com/library/view/~/9781491963616</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for Web penetration testing : test and evaluate all aspects of the design and implementation ent://SD_ILS/0/SD_ILS:2313741 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;McPhee, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784395070">https://learning.oreilly.com/library/view/~/9781784395070</a> <a href="https://learning.oreilly.com/library/view/~/9781784395070/?ar">https://learning.oreilly.com/library/view/~/9781784395070/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781784395070/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395070/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco ISE for BYOD and secure unified access ent://SD_ILS/0/SD_ILS:2313856 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134586656/?ar">https://learning.oreilly.com/library/view/~/9780134586656/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134586656/?ar">https://go.oreilly.com/library-access/library/view/-/9780134586656/?ar</a><br/>Format:&#160;Electronic Resources<br/> IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices ent://SD_ILS/0/SD_ILS:2315099 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Guzman, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787280571/?ar">https://learning.oreilly.com/library/view/~/9781787280571/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787280571">https://learning.oreilly.com/library/view/~/9781787280571</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar">https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar</a><br/>Format:&#160;Electronic Resources<br/> Guide: Reporting on an Entity's Cyberse. ent://SD_ILS/0/SD_ILS:2316756 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;AICPA Staff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781943546725/?ar">https://learning.oreilly.com/library/view/~/9781943546725/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar">https://go.oreilly.com/library-access/library/view/-/9781943546725/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781943546725">https://learning.oreilly.com/library/view/~/9781943546725</a><br/>Format:&#160;Electronic Resources<br/> Enterprise cloud security and governance : efficiently set data protection and privacy principles ent://SD_ILS/0/SD_ILS:2315410 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Vora, Zeal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788299558/?ar">https://learning.oreilly.com/library/view/~/9781788299558/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788299558/?ar">https://go.oreilly.com/library-access/library/view/-/9781788299558/?ar</a><br/>Format:&#160;Electronic Resources<br/> Foundations of modern networking : SDN, NFV, QoE, IoT, and Cloud ent://SD_ILS/0/SD_ILS:2308800 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Stallings, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134175478/?ar">https://learning.oreilly.com/library/view/~/9780134175478/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar">https://go.oreilly.com/library-access/library/view/-/9780134175478/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure your Node.js web application : keep attackers out and users happy ent://SD_ILS/0/SD_ILS:2309949 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;D&uuml;&uuml;na, Karl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar">https://go.oreilly.com/library-access/library/view/-/9781680501780/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781680501780/?ar">https://learning.oreilly.com/library/view/~/9781680501780/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781680501780">https://learning.oreilly.com/library/view/~/9781680501780</a><br/>Format:&#160;Electronic Resources<br/> Are your bits flipped? : overcoming tech misconceptions ent://SD_ILS/0/SD_ILS:2310599 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Kissell, Joe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar">https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492017172/?ar">https://learning.oreilly.com/library/view/~/9781492017172/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Complete Guide to Cybersecurity Risks and Controls ent://SD_ILS/0/SD_ILS:2324524 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Kohnke, Anne, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar">https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781498740579/?ar">https://learning.oreilly.com/library/view/~/9781498740579/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781498740579">https://learning.oreilly.com/library/view/~/9781498740579</a><br/>Format:&#160;Electronic Resources<br/> Implementing DirectAccess with Windows Server 2016 ent://SD_ILS/0/SD_ILS:2311767 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Hicks, Richard M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484220597/?ar">https://learning.oreilly.com/library/view/~/9781484220597/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484220597/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220597/?ar</a><br/>Format:&#160;Electronic Resources<br/> Python : penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modules ent://SD_ILS/0/SD_ILS:2311849 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787128187">https://learning.oreilly.com/library/view/~/9781787128187</a> <a href="https://learning.oreilly.com/library/view/~/9781787128187/?ar">https://learning.oreilly.com/library/view/~/9781787128187/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar">https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar</a><br/>Format:&#160;Electronic Resources<br/> The second economy : the race for trust, treasure and time in the cybersecurity war ent://SD_ILS/0/SD_ILS:2312552 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format:&#160;Electronic Resources<br/> z/OS PKI Services : quick set-up for multiple CAs ent://SD_ILS/0/SD_ILS:2312432 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Winnard, Keith, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738443054/?ar">https://learning.oreilly.com/library/view/~/0738443054/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738443054/?ar">https://go.oreilly.com/library-access/library/view/-/0738443054/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738443054">https://learning.oreilly.com/library/view/~/0738443054</a><br/>Format:&#160;Electronic Resources<br/> Practical Windows forensics : leverage the power of digital forensics for Windows systems ent://SD_ILS/0/SD_ILS:2311021 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format:&#160;Electronic Resources<br/> Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools ent://SD_ILS/0/SD_ILS:2311022 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Rehim, Rejah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar">https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785280696/?ar">https://learning.oreilly.com/library/view/~/9781785280696/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785280696">https://learning.oreilly.com/library/view/~/9781785280696</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world ent://SD_ILS/0/SD_ILS:2311027 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785889639">https://learning.oreilly.com/library/view/~/9781785889639</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785889639/?ar">https://learning.oreilly.com/library/view/~/9781785889639/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it ent://SD_ILS/0/SD_ILS:2311529 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Cardwell, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar">https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785883491/?ar">https://learning.oreilly.com/library/view/~/9781785883491/?ar</a><br/>Format:&#160;Electronic Resources<br/> SELinux System Administration : ward off traditional security permissions and effectively secure your Linuxs systems with SELinux ent://SD_ILS/0/SD_ILS:2312410 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Vermeulen, Sven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787126954/?ar">https://go.oreilly.com/library-access/library/view/-/9781787126954/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787126954">https://learning.oreilly.com/library/view/~/9781787126954</a> <a href="https://learning.oreilly.com/library/view/~/9781787126954/?ar">https://learning.oreilly.com/library/view/~/9781787126954/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information theft prevention : theory and practice ent://SD_ILS/0/SD_ILS:2315550 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format:&#160;Electronic Resources<br/> People-centric security : transforming your enterprise security culture ent://SD_ILS/0/SD_ILS:2309517 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Hayden, Lance, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071846790/?ar">https://learning.oreilly.com/library/view/~/9780071846790/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar">https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:2310991 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advances in Network Management ent://SD_ILS/0/SD_ILS:2313639 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Ding, Jianguo, author<br/><a href="https://learning.oreilly.com/library/view/~/9781420064551">https://learning.oreilly.com/library/view/~/9781420064551</a> <a href="https://learning.oreilly.com/library/view/~/9781420064551/?ar">https://learning.oreilly.com/library/view/~/9781420064551/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420064551/?ar">https://go.oreilly.com/library-access/library/view/-/9781420064551/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:2314416 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Bose, S., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789332579125/?ar">https://learning.oreilly.com/library/view/~/9789332579125/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar">https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9789332579125">https://learning.oreilly.com/library/view/~/9789332579125</a><br/>Format:&#160;Electronic Resources<br/> Wireless communications security : solutions for the internet of things ent://SD_ILS/0/SD_ILS:2311624 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Penttinen, Jyrki T. J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119084396/?ar">https://learning.oreilly.com/library/view/~/9781119084396/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar">https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks ent://SD_ILS/0/SD_ILS:2310121 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Datt, Samir, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar">https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782174905/?ar">https://learning.oreilly.com/library/view/~/9781782174905/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782174905">https://learning.oreilly.com/library/view/~/9781782174905</a><br/>Format:&#160;Electronic Resources<br/> DevOpsSec : securing software through continuous delivery ent://SD_ILS/0/SD_ILS:2311196 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Bird, Jim, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491971413/?ar">https://go.oreilly.com/library-access/library/view/-/9781491971413/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491971413/?ar">https://learning.oreilly.com/library/view/~/9781491971413/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491971413">https://learning.oreilly.com/library/view/~/9781491971413</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the V3rb0ten network ent://SD_ILS/0/SD_ILS:2309296 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format:&#160;Electronic Resources<br/> Thinking security : stopping next year's hackers ent://SD_ILS/0/SD_ILS:2308932 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Bellovin, Steven M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar">https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134278223">https://learning.oreilly.com/library/view/~/9780134278223</a> <a href="https://learning.oreilly.com/library/view/~/9780134278223/?ar">https://learning.oreilly.com/library/view/~/9780134278223/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments ent://SD_ILS/0/SD_ILS:2309216 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Richter, Andy, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045046/?ar">https://learning.oreilly.com/library/view/~/9780128045046/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128045046/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045046/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security with NetFlow and IPFIX : big data analytics for information security ent://SD_ILS/0/SD_ILS:2308401 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Santos, Omar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134033549/?ar">https://go.oreilly.com/library-access/library/view/-/9780134033549/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134033549/?ar">https://learning.oreilly.com/library/view/~/9780134033549/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134033549">https://learning.oreilly.com/library/view/~/9780134033549</a><br/>Format:&#160;Electronic Resources<br/> Mastering identity and access management with Microsoft Azure : start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments ent://SD_ILS/0/SD_ILS:2311745 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Nickel, Jochen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785889448/?ar">https://learning.oreilly.com/library/view/~/9781785889448/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785889448">https://learning.oreilly.com/library/view/~/9781785889448</a><br/>Format:&#160;Electronic Resources<br/> Mastering modern web penetration testing : master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does! ent://SD_ILS/0/SD_ILS:2311896 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Prasad, Prakhar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar">https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785284588">https://learning.oreilly.com/library/view/~/9781785284588</a> <a href="https://learning.oreilly.com/library/view/~/9781785284588/?ar">https://learning.oreilly.com/library/view/~/9781785284588/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing : a complete pentesting guide facilitating smooth backtracking for working hackers : a course in three modules. ent://SD_ILS/0/SD_ILS:2312619 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287839/?ar">https://learning.oreilly.com/library/view/~/9781787287839/?ar</a><br/>Format:&#160;Electronic Resources<br/> Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0 ent://SD_ILS/0/SD_ILS:2311316 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Olups, Rihards, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782161288/?ar">https://learning.oreilly.com/library/view/~/9781782161288/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782161288/?ar">https://go.oreilly.com/library-access/library/view/-/9781782161288/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware diffusion models for modern complex networks : theory and applications ent://SD_ILS/0/SD_ILS:2313869 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Karyotis, Vasileios, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128027165/?ar">https://learning.oreilly.com/library/view/~/9780128027165/?ar</a><br/>Format:&#160;Electronic Resources<br/> A study of black hole attack solutions : on AODV routing protocol in MANET ent://SD_ILS/0/SD_ILS:2309038 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux ent://SD_ILS/0/SD_ILS:2310036 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Sak, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785285561">https://learning.oreilly.com/library/view/~/9781785285561</a> <a href="https://learning.oreilly.com/library/view/~/9781785285561/?ar">https://learning.oreilly.com/library/view/~/9781785285561/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar">https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar</a><br/>Format:&#160;Electronic Resources<br/> Google hacking for penetration testers ent://SD_ILS/0/SD_ILS:2309293 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Long, Johnny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029824/?ar">https://learning.oreilly.com/library/view/~/9780128029824/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar</a><br/>Format:&#160;Electronic Resources<br/> Essential cybersecurity science : build, test, and evaluate secure systems ent://SD_ILS/0/SD_ILS:2309193 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques ent://SD_ILS/0/SD_ILS:2310274 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Fadyushin, Vyacheslav, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785283154">https://learning.oreilly.com/library/view/~/9781785283154</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785283154/?ar">https://go.oreilly.com/library-access/library/view/-/9781785283154/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785283154/?ar">https://learning.oreilly.com/library/view/~/9781785283154/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cracking security misconceptions : untangling common myths about modern information security ent://SD_ILS/0/SD_ILS:2316704 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Peterson, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042747">https://learning.oreilly.com/library/view/~/9781492042747</a> <a href="https://learning.oreilly.com/library/view/~/9781492042747/?ar">https://learning.oreilly.com/library/view/~/9781492042747/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar</a><br/>Format:&#160;Electronic Resources<br/> The platform transformation : how IoT will change IT, and when ent://SD_ILS/0/SD_ILS:2316661 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Perry, Matthew J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042792/?ar">https://learning.oreilly.com/library/view/~/9781492042792/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492042792">https://learning.oreilly.com/library/view/~/9781492042792</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042792/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042792/?ar</a><br/>Format:&#160;Electronic Resources<br/> A practical guide to computer forensics investigations ent://SD_ILS/0/SD_ILS:2305632 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Hayes, Darren R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780132756174/?ar">https://learning.oreilly.com/library/view/~/9780132756174/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar">https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar</a><br/>Format:&#160;Electronic Resources<br/> The security data lake : leveraging big data technologies to build a common data repository for security ent://SD_ILS/0/SD_ILS:2318350 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Marty, Raffael, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491927748/?ar">https://learning.oreilly.com/library/view/~/9781491927748/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar">https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar</a><br/>Format:&#160;Electronic Resources<br/> Opportunities and challenges in the IoT : a conversation with Tim O'Reilly and Cory Doctorow ent://SD_ILS/0/SD_ILS:2318384 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;O'Reilly, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492048220/?ar">https://learning.oreilly.com/library/view/~/9781492048220/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492048220">https://learning.oreilly.com/library/view/~/9781492048220</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar">https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking and penetration testing guide ent://SD_ILS/0/SD_ILS:2314673 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Baloch, Rafay, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781351381345/?ar">https://learning.oreilly.com/library/view/~/9781351381345/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar">https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS : a pocket guide ent://SD_ILS/0/SD_ILS:2311270 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849288446/?ar">https://go.oreilly.com/library-access/library/view/-/9781849288446/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849288446/?ar">https://learning.oreilly.com/library/view/~/9781849288446/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM z/OS V2R2 : security ent://SD_ILS/0/SD_ILS:2309654 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Winnard, Keith, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738441276/?ar">https://learning.oreilly.com/library/view/~/9780738441276/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738441276">https://learning.oreilly.com/library/view/~/9780738441276</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738441276/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441276/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber operations : building, defending, and attacking modern computer networks ent://SD_ILS/0/SD_ILS:2308678 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;O'Leary, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484204573">https://learning.oreilly.com/library/view/~/9781484204573</a> <a href="https://learning.oreilly.com/library/view/~/9781484204573/?ar">https://learning.oreilly.com/library/view/~/9781484204573/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar">https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS : a pocket guide ent://SD_ILS/0/SD_ILS:2310744 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287838/?ar">https://learning.oreilly.com/library/view/~/9781849287838/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287838/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287838/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning penetration testing with Python : utilize Python scripting to execute effective and efficient penetration tests ent://SD_ILS/0/SD_ILS:2308640 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785282324/?ar">https://learning.oreilly.com/library/view/~/9781785282324/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785282324">https://learning.oreilly.com/library/view/~/9781785282324</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar">https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar</a><br/>Format:&#160;Electronic Resources<br/> Risk centric threat modeling : process for attack simulation and threat analysis ent://SD_ILS/0/SD_ILS:2308792 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Uceda V&eacute;lez, Tony, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780470500965/?ar">https://learning.oreilly.com/library/view/~/9780470500965/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar">https://go.oreilly.com/library-access/library/view/-/9780470500965/?ar</a><br/>Format:&#160;Electronic Resources<br/> Packet analysis with Wireshark : leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis ent://SD_ILS/0/SD_ILS:2309348 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Nath, Anish, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785887819/?ar">https://learning.oreilly.com/library/view/~/9781785887819/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785887819">https://learning.oreilly.com/library/view/~/9781785887819</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785887819/?ar">https://go.oreilly.com/library-access/library/view/-/9781785887819/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise software security : a confluence of disciplines ent://SD_ILS/0/SD_ILS:2305297 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Van Wyk, Kenneth R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780321604378/?ar">https://learning.oreilly.com/library/view/~/9780321604378/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321604378">https://learning.oreilly.com/library/view/~/9780321604378</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar">https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar</a><br/>Format:&#160;Electronic Resources<br/> Troubleshooting Puppet : troubleshoot your Puppet infrastructure to fix problems quickly ent://SD_ILS/0/SD_ILS:2308449 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Uphill, Thomas, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784398651/?ar">https://go.oreilly.com/library-access/library/view/-/9781784398651/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784398651/?ar">https://learning.oreilly.com/library/view/~/9781784398651/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784398651">https://learning.oreilly.com/library/view/~/9781784398651</a><br/>Format:&#160;Electronic Resources<br/> Web application security is a stack : how to CYA (cover your apps) completely ent://SD_ILS/0/SD_ILS:2308845 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;MacVittie, Lori A., 1969- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287050/?ar">https://learning.oreilly.com/library/view/~/9781849287050/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to network security : theory and practice ent://SD_ILS/0/SD_ILS:2311286 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Wang, Jie, 1961- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118939482/?ar">https://go.oreilly.com/library-access/library/view/-/9781118939482/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118939482/?ar">https://learning.oreilly.com/library/view/~/9781118939482/?ar</a><br/>Format:&#160;Electronic Resources<br/> Docker security : using containers safely in production ent://SD_ILS/0/SD_ILS:2316622 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Mouat, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042297/?ar">https://learning.oreilly.com/library/view/~/9781492042297/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042297/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Anomaly detection for monitoring : a statistical approach to time series anomaly detection ent://SD_ILS/0/SD_ILS:2316907 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Jinka, Preetam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492042341">https://learning.oreilly.com/library/view/~/9781492042341</a> <a href="https://learning.oreilly.com/library/view/~/9781492042341/?ar">https://learning.oreilly.com/library/view/~/9781492042341/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security program and policies : principles and practices ent://SD_ILS/0/SD_ILS:2302981 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Greene, Sari Stern, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133481181/?ar">https://go.oreilly.com/library-access/library/view/-/9780133481181/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133481181/?ar">https://learning.oreilly.com/library/view/~/9780133481181/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133481181">https://learning.oreilly.com/library/view/~/9780133481181</a><br/>Format:&#160;Electronic Resources<br/> Hacking point of sale : payment application secrets, threats, and solutions ent://SD_ILS/0/SD_ILS:2302623 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Gomzin, Slava, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118810071/?ar">https://learning.oreilly.com/library/view/~/9781118810071/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810071">https://learning.oreilly.com/library/view/~/9781118810071</a><br/>Format:&#160;Electronic Resources<br/> Network defense and countermeasures : principles and practices ent://SD_ILS/0/SD_ILS:2301435 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Easttom, Chuck, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780133384390">https://learning.oreilly.com/library/view/~/9780133384390</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133384390/?ar">https://go.oreilly.com/library-access/library/view/-/9780133384390/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133384390/?ar">https://learning.oreilly.com/library/view/~/9780133384390/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:2302592 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Carvey, Harlan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124171572/?ar">https://learning.oreilly.com/library/view/~/9780124171572/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar</a><br/>Format:&#160;Electronic Resources<br/> Identity and access management : business performance through connected intelligence ent://SD_ILS/0/SD_ILS:2301931 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Osmanoglu, T. Ertem.<br/><a href="https://learning.oreilly.com/library/view/~/9780124081406/?ar">https://learning.oreilly.com/library/view/~/9780124081406/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124081406">https://learning.oreilly.com/library/view/~/9780124081406</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar">https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security for service oriented architectures ent://SD_ILS/0/SD_ILS:2303292 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Williams, Walter (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584044">https://learning.oreilly.com/library/view/~/9781466584044</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466584044/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584044/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466584044/?ar">https://learning.oreilly.com/library/view/~/9781466584044/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:2303294 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network and system security ent://SD_ILS/0/SD_ILS:2301170 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124166899/?ar">https://learning.oreilly.com/library/view/~/9780124166899/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing Trust in Cyberspace. ent://SD_ILS/0/SD_ILS:2302307 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Thampi, Sabu M.<br/><a href="https://learning.oreilly.com/library/view/~/9781466568457/?ar">https://learning.oreilly.com/library/view/~/9781466568457/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466568457/?ar">https://go.oreilly.com/library-access/library/view/-/9781466568457/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466568457">https://learning.oreilly.com/library/view/~/9781466568457</a><br/>Format:&#160;Electronic Resources<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:2303092 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Middleton, Bruce, 1953- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482206470">https://learning.oreilly.com/library/view/~/9781482206470</a> <a href="https://learning.oreilly.com/library/view/~/9781482206470/?ar">https://learning.oreilly.com/library/view/~/9781482206470/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar">https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security : principles and practices ent://SD_ILS/0/SD_ILS:2303412 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated Security Systems Design, 2nd Edition ent://SD_ILS/0/SD_ILS:2320974 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Norman, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000229/?ar">https://learning.oreilly.com/library/view/~/9780128000229/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000229">https://learning.oreilly.com/library/view/~/9780128000229</a><br/>Format:&#160;Electronic Resources<br/> The Science and Technology of Counterterrorism ent://SD_ILS/0/SD_ILS:2319961 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Young, Carl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124200562">https://learning.oreilly.com/library/view/~/9780124200562</a> <a href="https://learning.oreilly.com/library/view/~/9780124200562/?ar">https://learning.oreilly.com/library/view/~/9780124200562/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory ent://SD_ILS/0/SD_ILS:2306747 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9781118824993/?ar">https://learning.oreilly.com/library/view/~/9781118824993/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar">https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar</a><br/>Format:&#160;Electronic Resources<br/> 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy ent://SD_ILS/0/SD_ILS:2304861 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format:&#160;Electronic Resources<br/> Anti-hacker tool kit. ent://SD_ILS/0/SD_ILS:2303630 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Shema, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar">https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071800143/?ar">https://learning.oreilly.com/library/view/~/9780071800143/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing information security breaches : studies from real life ent://SD_ILS/0/SD_ILS:2308836 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Krausz, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285964/?ar">https://learning.oreilly.com/library/view/~/9781849285964/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar</a><br/>Format:&#160;Electronic Resources<br/> Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:2308844 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Vladimirov, Andrew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849286008/?ar">https://go.oreilly.com/library-access/library/view/-/9781849286008/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849286008/?ar">https://learning.oreilly.com/library/view/~/9781849286008/?ar</a><br/>Format:&#160;Electronic Resources<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:2302234 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Pathan, Al-Sakib Khan, editor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482203523">https://learning.oreilly.com/library/view/~/9781482203523</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar">https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482203523/?ar">https://learning.oreilly.com/library/view/~/9781482203523/?ar</a><br/>Format:&#160;Electronic Resources<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:2303155 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Sood, Aditya K.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar">https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128006047/?ar">https://learning.oreilly.com/library/view/~/9780128006047/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity : managing systems, conducting testing, and investigating intrusions ent://SD_ILS/0/SD_ILS:2301524 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Mowbray, Thomas J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar">https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118697115/?ar">https://learning.oreilly.com/library/view/~/9781118697115/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118697115">https://learning.oreilly.com/library/view/~/9781118697115</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:2302626 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format:&#160;Electronic Resources<br/> Pro Spring security ent://SD_ILS/0/SD_ILS:2298698 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Scarioni, Carlo.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430248187/?ar">https://go.oreilly.com/library-access/library/view/-/9781430248187/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430248187/?ar">https://learning.oreilly.com/library/view/~/9781430248187/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430248187">https://learning.oreilly.com/library/view/~/9781430248187</a><br/>Format:&#160;Electronic Resources<br/> Windows 2012 server network security : securing your windows network systems and infrastructure ent://SD_ILS/0/SD_ILS:2298494 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Rountree, Derrick.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499583/?ar">https://learning.oreilly.com/library/view/~/9781597499583/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499583/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499583/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499583">https://learning.oreilly.com/library/view/~/9781597499583</a><br/>Format:&#160;Electronic Resources<br/> Iris biometric model for secured network access ent://SD_ILS/0/SD_ILS:2298466 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;El Khoury, Franjieh.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502147/?ar">https://learning.oreilly.com/library/view/~/9781466502147/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466502147">https://learning.oreilly.com/library/view/~/9781466502147</a><br/>Format:&#160;Electronic Resources<br/> UTM security with Fortinet : Mastering FortiOS ent://SD_ILS/0/SD_ILS:2296617 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Tam, Kenneth.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497473/?ar">https://learning.oreilly.com/library/view/~/9781597497473/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497473">https://learning.oreilly.com/library/view/~/9781597497473</a><br/>Format:&#160;Electronic Resources<br/> SolarWinds server &amp; application monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server &amp; Application Monitor with minimum hassle ent://SD_ILS/0/SD_ILS:2300919 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Brant, Justin M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783551019/?ar">https://go.oreilly.com/library-access/library/view/-/9781783551019/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783551019/?ar">https://learning.oreilly.com/library/view/~/9781783551019/?ar</a><br/>Format:&#160;Electronic Resources<br/> The practice of network security monitoring ent://SD_ILS/0/SD_ILS:2300232 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Bejtlich, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457185175/?ar">https://go.oreilly.com/library-access/library/view/-/9781457185175/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457185175/?ar">https://learning.oreilly.com/library/view/~/9781457185175/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security patterns in practice : designing secure architectures using software patterns ent://SD_ILS/0/SD_ILS:2300767 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Fernandez, Eduardo B., 1936-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar">https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119970484/?ar">https://learning.oreilly.com/library/view/~/9781119970484/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119970484">https://learning.oreilly.com/library/view/~/9781119970484</a><br/>Format:&#160;Electronic Resources<br/> Strategic Information Management, 3rd Edition ent://SD_ILS/0/SD_ILS:2319914 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format:&#160;Electronic Resources<br/> Best Practices for the Formal Software Testing Process : a Menu of Testing Tasks ent://SD_ILS/0/SD_ILS:2320691 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Drabick, Rodger, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133489309/?ar">https://learning.oreilly.com/library/view/~/9780133489309/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133489309">https://learning.oreilly.com/library/view/~/9780133489309</a><br/>Format:&#160;Electronic Resources<br/> The basics of web hacking : tools and techniques to attack the web ent://SD_ILS/0/SD_ILS:2300058 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format:&#160;Electronic Resources<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:2293442 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Speed, Tyler Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar">https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439809839/?ar">https://learning.oreilly.com/library/view/~/9781439809839/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCNP security VPN 642-647 official cert guide ent://SD_ILS/0/SD_ILS:2291830 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Hooper, Howard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132372046/?ar">https://go.oreilly.com/library-access/library/view/-/9780132372046/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132372046/?ar">https://learning.oreilly.com/library/view/~/9780132372046/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security first-step ent://SD_ILS/0/SD_ILS:2293683 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Thomas, Thomas M.<br/><a href="https://learning.oreilly.com/library/view/~/9781587204142/?ar">https://learning.oreilly.com/library/view/~/9781587204142/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587204142/?ar">https://go.oreilly.com/library-access/library/view/-/9781587204142/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:2296625 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Winterfeld, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047372/?ar">https://learning.oreilly.com/library/view/~/9780124047372/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124047372">https://learning.oreilly.com/library/view/~/9780124047372</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit ent://SD_ILS/0/SD_ILS:2295823 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:2296392 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Fichera, Joe, 1966-<br/><a href="https://learning.oreilly.com/library/view/~/9781597499620">https://learning.oreilly.com/library/view/~/9781597499620</a> <a href="https://learning.oreilly.com/library/view/~/9781597499620/?ar">https://learning.oreilly.com/library/view/~/9781597499620/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:2295951 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a> <a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kerberos : Single Sign-on in gemischten Linux/Windows-Umgebungen. ent://SD_ILS/0/SD_ILS:2295135 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Pr&ouml;hl, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9781457170393/?ar">https://learning.oreilly.com/library/view/~/9781457170393/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457170393/?ar">https://go.oreilly.com/library-access/library/view/-/9781457170393/?ar</a><br/>Format:&#160;Electronic Resources<br/> 125 sposob&oacute;w na bezpieczeństwo sieci ent://SD_ILS/0/SD_ILS:2299439 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176357/?ar">https://learning.oreilly.com/library/view/~/9781457176357/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web application security : a beginner's guide ent://SD_ILS/0/SD_ILS:2293762 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Sullivan, Bryan, 1974-<br/><a href="https://learning.oreilly.com/library/view/~/9780071776165/?ar">https://learning.oreilly.com/library/view/~/9780071776165/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071776165/?ar">https://go.oreilly.com/library-access/library/view/-/9780071776165/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071776165">https://learning.oreilly.com/library/view/~/9780071776165</a><br/>Format:&#160;Electronic Resources<br/> The tangled Web : a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:2293949 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Zalewski, Michal.<br/><a href="https://learning.oreilly.com/library/view/~/9781593273880">https://learning.oreilly.com/library/view/~/9781593273880</a> <a href="https://learning.oreilly.com/library/view/~/9781593273880/?ar">https://learning.oreilly.com/library/view/~/9781593273880/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar</a><br/>Format:&#160;Electronic Resources<br/> Reverse Deception Organized Cyber Threat Counter-Exploitation. ent://SD_ILS/0/SD_ILS:2295096 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Kilger, Dr Max.<br/><a href="https://learning.oreilly.com/library/view/~/9780071772495">https://learning.oreilly.com/library/view/~/9780071772495</a> <a href="https://learning.oreilly.com/library/view/~/9780071772495/?ar">https://learning.oreilly.com/library/view/~/9780071772495/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar">https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2296528 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;McClure, Stuart.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar">https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071780285/?ar">https://learning.oreilly.com/library/view/~/9780071780285/?ar</a><br/>Format:&#160;Electronic Resources<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:2295369 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Clarke, Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499637/?ar">https://learning.oreilly.com/library/view/~/9781597499637/?ar</a><br/>Format:&#160;Electronic Resources<br/> The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) ent://SD_ILS/0/SD_ILS:2294170 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Cappelli, Dawn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar">https://go.oreilly.com/library-access/library/view/-/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050/?ar">https://learning.oreilly.com/library/view/~/9780132906050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132906050">https://learning.oreilly.com/library/view/~/9780132906050</a><br/>Format:&#160;Electronic Resources<br/> Web commerce security : design and development ent://SD_ILS/0/SD_ILS:2292686 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Nahari, Hadi.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar">https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470624463/?ar">https://learning.oreilly.com/library/view/~/9780470624463/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470624463">https://learning.oreilly.com/library/view/~/9780470624463</a><br/>Format:&#160;Electronic Resources<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:2290966 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Davies, Joshua A. (Joshua Aaron)<br/><a href="https://learning.oreilly.com/library/view/~/9780470920411/?ar">https://learning.oreilly.com/library/view/~/9780470920411/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar">https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470920411">https://learning.oreilly.com/library/view/~/9780470920411</a><br/>Format:&#160;Electronic Resources<br/> Computer incident response and product security ent://SD_ILS/0/SD_ILS:2291715 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Rajnovic, Damir, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780132491518">https://learning.oreilly.com/library/view/~/9780132491518</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780132491518/?ar">https://go.oreilly.com/library-access/library/view/-/9780132491518/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132491518/?ar">https://learning.oreilly.com/library/view/~/9780132491518/?ar</a><br/>Format:&#160;Electronic Resources<br/> Preventing good people from doing bad things : implementing least privilege ent://SD_ILS/0/SD_ILS:2293278 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format:&#160;Electronic Resources<br/> CCNP security VPN 642-647 quick reference ent://SD_ILS/0/SD_ILS:2291506 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Matei, Cristian.<br/><a href="https://learning.oreilly.com/library/view/~/9780132567114/?ar">https://learning.oreilly.com/library/view/~/9780132567114/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780132567114/?ar">https://go.oreilly.com/library-access/library/view/-/9780132567114/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCNP security IPS 642-627 quick reference ent://SD_ILS/0/SD_ILS:2292178 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Halleen, Gary.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132582087/?ar">https://go.oreilly.com/library-access/library/view/-/9780132582087/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132582087/?ar">https://learning.oreilly.com/library/view/~/9780132582087/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical risk management for the CIO ent://SD_ILS/0/SD_ILS:2291367 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Scherling, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856543/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439856543/?ar">https://learning.oreilly.com/library/view/~/9781439856543/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439856543">https://learning.oreilly.com/library/view/~/9781439856543</a><br/>Format:&#160;Electronic Resources<br/> CCNP Security Firewall 642-617 official cert guide ent://SD_ILS/0/SD_ILS:2291846 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Hucaby, David.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132378635/?ar">https://go.oreilly.com/library-access/library/view/-/9780132378635/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132378635">https://learning.oreilly.com/library/view/~/9780132378635</a> <a href="https://learning.oreilly.com/library/view/~/9780132378635/?ar">https://learning.oreilly.com/library/view/~/9780132378635/?ar</a><br/>Format:&#160;Electronic Resources<br/> PKI uncovered ent://SD_ILS/0/SD_ILS:2291795 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Karamanian, Andre.<br/><a href="https://learning.oreilly.com/library/view/~/9781587059339/?ar">https://learning.oreilly.com/library/view/~/9781587059339/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587059339/?ar">https://go.oreilly.com/library-access/library/view/-/9781587059339/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer-Forensik : Computerstraftaten erkennen, ermitteln, aufkl&auml;ren ent://SD_ILS/0/SD_ILS:2297860 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Geschonneck, Alexander.<br/><a href="https://learning.oreilly.com/library/view/~/9781457170676/?ar">https://learning.oreilly.com/library/view/~/9781457170676/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457170676/?ar">https://go.oreilly.com/library-access/library/view/-/9781457170676/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCNP Security Firewall 642-617 quick reference ent://SD_ILS/0/SD_ILS:2291201 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780132567145/?ar">https://learning.oreilly.com/library/view/~/9780132567145/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780132567145/?ar">https://go.oreilly.com/library-access/library/view/-/9780132567145/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132567145">https://learning.oreilly.com/library/view/~/9780132567145</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:2309995 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495806/?ar">https://learning.oreilly.com/library/view/~/9781597495806/?ar</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the f0rb1dd3n network ent://SD_ILS/0/SD_ILS:2290700 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format:&#160;Electronic Resources<br/> Adaptive Security Management Architecture ent://SD_ILS/0/SD_ILS:2326064 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Tiller, James S.<br/><a href="https://learning.oreilly.com/library/view/~/9781420013375">https://learning.oreilly.com/library/view/~/9781420013375</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar">https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420013375/?ar">https://learning.oreilly.com/library/view/~/9781420013375/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network and system security ent://SD_ILS/0/SD_ILS:2288837 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495356">https://learning.oreilly.com/library/view/~/9781597495356</a> <a href="https://learning.oreilly.com/library/view/~/9781597495356/?ar">https://learning.oreilly.com/library/view/~/9781597495356/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical intrusion analysis : prevention and detection for the twenty-first century ent://SD_ILS/0/SD_ILS:2286080 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Trost, Ryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591890/?ar">https://learning.oreilly.com/library/view/~/9780321591890/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft ent://SD_ILS/0/SD_ILS:2321069 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security monitoring ent://SD_ILS/0/SD_ILS:2286050 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Fry, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780596157944/?ar">https://learning.oreilly.com/library/view/~/9780596157944/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596157944">https://learning.oreilly.com/library/view/~/9780596157944</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar">https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security bible ent://SD_ILS/0/SD_ILS:2288476 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Cole, Eric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar">https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470502495/?ar">https://learning.oreilly.com/library/view/~/9780470502495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis DVD toolkit 2E ent://SD_ILS/0/SD_ILS:2287802 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format:&#160;Electronic Resources<br/> Apache : receptury ent://SD_ILS/0/SD_ILS:2296868 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Bowen, Richard Cooper, 1971-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176425/?ar">https://learning.oreilly.com/library/view/~/9781457176425/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176425">https://learning.oreilly.com/library/view/~/9781457176425</a><br/>Format:&#160;Electronic Resources<br/> The Prompt Payment Act Answer Book ent://SD_ILS/0/SD_ILS:2315263 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263336">https://learning.oreilly.com/library/view/~/9781567263336</a> <a href="https://learning.oreilly.com/library/view/~/9781567263336/?ar">https://learning.oreilly.com/library/view/~/9781567263336/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Antideficiency Act Answer Book ent://SD_ILS/0/SD_ILS:2315273 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263343/?ar">https://learning.oreilly.com/library/view/~/9781567263343/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781567263343">https://learning.oreilly.com/library/view/~/9781567263343</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCSP SNAF quick reference ent://SD_ILS/0/SD_ILS:2285270 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781587058691/?ar">https://learning.oreilly.com/library/view/~/9781587058691/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587058691">https://learning.oreilly.com/library/view/~/9781587058691</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587058691/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058691/?ar</a><br/>Format:&#160;Electronic Resources<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:2285492 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Marty, Raffael, 1976-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar">https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321585530/?ar">https://learning.oreilly.com/library/view/~/9780321585530/?ar</a><br/>Format:&#160;Electronic Resources<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:2285986 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format:&#160;Electronic Resources<br/> Googling security : how much does Google know about you? ent://SD_ILS/0/SD_ILS:2285350 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Conti, Greg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321591265/?ar">https://learning.oreilly.com/library/view/~/9780321591265/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco secure firewall services module (FWSM) ent://SD_ILS/0/SD_ILS:2285484 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Blair, Ray, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781587056093">https://learning.oreilly.com/library/view/~/9781587056093</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587056093/?ar">https://go.oreilly.com/library-access/library/view/-/9781587056093/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587056093/?ar">https://learning.oreilly.com/library/view/~/9781587056093/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem ent://SD_ILS/0/SD_ILS:2285580 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Walker, Andy (Andy G.), 1967-<br/><a href="https://learning.oreilly.com/library/view/~/9780789736727">https://learning.oreilly.com/library/view/~/9780789736727</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar">https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780789736727/?ar">https://learning.oreilly.com/library/view/~/9780789736727/?ar</a><br/>Format:&#160;Electronic Resources<br/> Chained exploits : advanced hacking attacks from start to finish ent://SD_ILS/0/SD_ILS:2286103 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Whitaker, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780321620637">https://learning.oreilly.com/library/view/~/9780321620637</a> <a href="https://learning.oreilly.com/library/view/~/9780321620637/?ar">https://learning.oreilly.com/library/view/~/9780321620637/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar">https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar</a><br/>Format:&#160;Electronic Resources<br/> Screenos cookbook ent://SD_ILS/0/SD_ILS:2285572 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Brunner, Stefan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596510039/?ar">https://go.oreilly.com/library-access/library/view/-/9780596510039/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596510039">https://learning.oreilly.com/library/view/~/9780596510039</a> <a href="https://learning.oreilly.com/library/view/~/9780596510039/?ar">https://learning.oreilly.com/library/view/~/9780596510039/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security : know it all ent://SD_ILS/0/SD_ILS:2285962 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Joshi, James B. D.<br/><a href="https://learning.oreilly.com/library/view/~/9780080560151">https://learning.oreilly.com/library/view/~/9780080560151</a> <a href="https://learning.oreilly.com/library/view/~/9780080560151/?ar">https://learning.oreilly.com/library/view/~/9780080560151/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080560151/?ar">https://go.oreilly.com/library-access/library/view/-/9780080560151/?ar</a><br/>Format:&#160;Electronic Resources<br/> Software security engineering : a guide for project managers ent://SD_ILS/0/SD_ILS:2284470 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Allen, Julia H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar">https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321559685/?ar">https://learning.oreilly.com/library/view/~/9780321559685/?ar</a><br/>Format:&#160;Electronic Resources<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:2284693 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Hoffman, Daniel (Daniel V.), 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470238387/?ar">https://learning.oreilly.com/library/view/~/9780470238387/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar">https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470238387">https://learning.oreilly.com/library/view/~/9780470238387</a><br/>Format:&#160;Electronic Resources<br/> Integrating ISA Server 2006 with Microsoft Exchange 2007 ent://SD_ILS/0/SD_ILS:2285147 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Strachan, Fergus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492751/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492751/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492751/?ar">https://learning.oreilly.com/library/view/~/9781597492751/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kismet hacking ent://SD_ILS/0/SD_ILS:2285148 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Haines, Brad.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491174">https://learning.oreilly.com/library/view/~/9781597491174</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491174/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491174/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491174/?ar">https://learning.oreilly.com/library/view/~/9781597491174/?ar</a><br/>Format:&#160;Electronic Resources<br/> Scene of the cybercrime. ent://SD_ILS/0/SD_ILS:2285149 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492768">https://learning.oreilly.com/library/view/~/9781597492768</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492768/?ar">https://learning.oreilly.com/library/view/~/9781597492768/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:2284517 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Varsalone, Jesse.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492447">https://learning.oreilly.com/library/view/~/9781597492447</a> <a href="https://learning.oreilly.com/library/view/~/9781597492447/?ar">https://learning.oreilly.com/library/view/~/9781597492447/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar</a><br/>Format:&#160;Electronic Resources<br/> Is it safe? : protecting your computer, your business, and yourself online ent://SD_ILS/0/SD_ILS:2285554 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Miller, Michael, 1958-<br/><a href="https://learning.oreilly.com/library/view/~/9780768683080/?ar">https://learning.oreilly.com/library/view/~/9780768683080/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar">https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768683080">https://learning.oreilly.com/library/view/~/9780768683080</a><br/>Format:&#160;Electronic Resources<br/> Network security technologies and solutions ent://SD_ILS/0/SD_ILS:2285404 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Bhaiji, Fahim Hussain Yusuf.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780768681963/?ar">https://go.oreilly.com/library-access/library/view/-/9780768681963/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768681963/?ar">https://learning.oreilly.com/library/view/~/9780768681963/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:2286245 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Qian, Yi, 1962-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar">https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123735669/?ar">https://learning.oreilly.com/library/view/~/9780123735669/?ar</a><br/>Format:&#160;Electronic Resources<br/> Router security strategies : securing IP network traffic planes ent://SD_ILS/0/SD_ILS:2285614 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Schudel, Gregg.<br/><a href="https://learning.oreilly.com/library/view/~/9781587053368">https://learning.oreilly.com/library/view/~/9781587053368</a> <a href="https://learning.oreilly.com/library/view/~/9781587053368/?ar">https://learning.oreilly.com/library/view/~/9781587053368/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587053368/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053368/?ar</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 / ISO27002 : a pocket guide / Alan Calder. ent://SD_ILS/0/SD_ILS:2299817 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281669/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281669/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285230/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285230/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281669/?ar">https://learning.oreilly.com/library/view/~/9781849281669/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285230/?ar">https://learning.oreilly.com/library/view/~/9781849285230/?ar</a><br/>Format:&#160;Electronic Resources<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:2285140 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Hay, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492409">https://learning.oreilly.com/library/view/~/9781597492409</a> <a href="https://learning.oreilly.com/library/view/~/9781597492409/?ar">https://learning.oreilly.com/library/view/~/9781597492409/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical embedded security : building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:2284523 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Stapko, Timothy John.<br/><a href="https://learning.oreilly.com/library/view/~/9780750682152/?ar">https://learning.oreilly.com/library/view/~/9780750682152/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780750682152/?ar">https://go.oreilly.com/library-access/library/view/-/9780750682152/?ar</a><br/>Format:&#160;Electronic Resources<br/> Selecting the right NAP architecture. ent://SD_ILS/0/SD_ILS:2285817 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Microsoft Corporation.<br/><a href="https://learning.oreilly.com/library/view/~/30000LTI00079">https://learning.oreilly.com/library/view/~/30000LTI00079</a> <a href="https://learning.oreilly.com/library/view/~/30000LTI00079/?ar">https://learning.oreilly.com/library/view/~/30000LTI00079/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/30000LTI00079/?ar">https://go.oreilly.com/library-access/library/view/-/30000LTI00079/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2008 Active Directory domain services. ent://SD_ILS/0/SD_ILS:2285826 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Microsoft Corporation.<br/><a href="https://go.oreilly.com/library-access/library/view/-/30000LTI00073/?ar">https://go.oreilly.com/library-access/library/view/-/30000LTI00073/?ar</a> <a href="https://learning.oreilly.com/library/view/~/30000LTI00073/?ar">https://learning.oreilly.com/library/view/~/30000LTI00073/?ar</a> <a href="https://learning.oreilly.com/library/view/~/30000LTI00073">https://learning.oreilly.com/library/view/~/30000LTI00073</a><br/>Format:&#160;Electronic Resources<br/> Netzwerkangriffe von innen ent://SD_ILS/0/SD_ILS:2286474 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Ziegler, Paul Sebastian.<br/><a href="https://learning.oreilly.com/library/view/~/9783897217782">https://learning.oreilly.com/library/view/~/9783897217782</a> <a href="https://learning.oreilly.com/library/view/~/9783897217782/?ar">https://learning.oreilly.com/library/view/~/9783897217782/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783897217782/?ar">https://go.oreilly.com/library-access/library/view/-/9783897217782/?ar</a><br/>Format:&#160;Electronic Resources<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:2284509 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Long, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491761/?ar">https://learning.oreilly.com/library/view/~/9781597491761/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar</a><br/>Format:&#160;Electronic Resources<br/> Netcat power tools ent://SD_ILS/0/SD_ILS:2285156 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Kanclirz, Jan.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492577">https://learning.oreilly.com/library/view/~/9781597492577</a> <a href="https://learning.oreilly.com/library/view/~/9781597492577/?ar">https://learning.oreilly.com/library/view/~/9781597492577/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492577/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492577/?ar</a><br/>Format:&#160;Electronic Resources<br/> SOA security ent://SD_ILS/0/SD_ILS:2284936 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Kanneganti, Ramarao.<br/><a href="https://learning.oreilly.com/library/view/~/9781932394689">https://learning.oreilly.com/library/view/~/9781932394689</a> <a href="https://learning.oreilly.com/library/view/~/9781932394689/?ar">https://learning.oreilly.com/library/view/~/9781932394689/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar">https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar</a><br/>Format:&#160;Electronic Resources<br/> The craft of system security ent://SD_ILS/0/SD_ILS:2284058 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Smith, Sean W., 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780321434838">https://learning.oreilly.com/library/view/~/9780321434838</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321434838/?ar">https://go.oreilly.com/library-access/library/view/-/9780321434838/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321434838/?ar">https://learning.oreilly.com/library/view/~/9780321434838/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ajax security ent://SD_ILS/0/SD_ILS:2284335 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Hoffman, Billy, 1980-<br/><a href="https://learning.oreilly.com/library/view/~/9780321491930">https://learning.oreilly.com/library/view/~/9780321491930</a> <a href="https://learning.oreilly.com/library/view/~/9780321491930/?ar">https://learning.oreilly.com/library/view/~/9780321491930/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321491930/?ar">https://go.oreilly.com/library-access/library/view/-/9780321491930/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2008 networking and network access protection (NAP) ent://SD_ILS/0/SD_ILS:2284886 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Davies, Joseph, 1962-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735624221/?ar">https://go.oreilly.com/library-access/library/view/-/9780735624221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735624221/?ar">https://learning.oreilly.com/library/view/~/9780735624221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735624221">https://learning.oreilly.com/library/view/~/9780735624221</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Windows server 2008 security resource kit ent://SD_ILS/0/SD_ILS:2284887 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Johansson, Jesper M.<br/><a href="https://learning.oreilly.com/library/view/~/9780735625044/?ar">https://learning.oreilly.com/library/view/~/9780735625044/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735625044">https://learning.oreilly.com/library/view/~/9780735625044</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735625044/?ar">https://go.oreilly.com/library-access/library/view/-/9780735625044/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2008 PKI and certificate security ent://SD_ILS/0/SD_ILS:2284892 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Komar, Brian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735625167/?ar">https://go.oreilly.com/library-access/library/view/-/9780735625167/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735625167">https://learning.oreilly.com/library/view/~/9780735625167</a> <a href="https://learning.oreilly.com/library/view/~/9780735625167/?ar">https://learning.oreilly.com/library/view/~/9780735625167/?ar</a><br/>Format:&#160;Electronic Resources<br/> Botnets the killer web app ent://SD_ILS/0/SD_ILS:340160 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Schiller, Craig A.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406</a><br/>Format:&#160;Electronic Resources<br/> Network security assessment ent://SD_ILS/0/SD_ILS:2283925 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;McNab, Chris (Chris R.), 1980-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596510305/?ar">https://go.oreilly.com/library-access/library/view/-/9780596510305/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596510305/?ar">https://learning.oreilly.com/library/view/~/9780596510305/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596510305">https://learning.oreilly.com/library/view/~/9780596510305</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:2284630 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Dubrawsky, Ido.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492317/?ar">https://learning.oreilly.com/library/view/~/9781597492317/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492317">https://learning.oreilly.com/library/view/~/9781597492317</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2282490 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format:&#160;Electronic Resources<br/> Endpoint security ent://SD_ILS/0/SD_ILS:2283117 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Kadrich, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9780321436955/?ar">https://learning.oreilly.com/library/view/~/9780321436955/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321436955/?ar">https://go.oreilly.com/library-access/library/view/-/9780321436955/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security monitoring with Cisco security MARS ent://SD_ILS/0/SD_ILS:2283784 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Halleen, Gary.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587052705/?ar">https://go.oreilly.com/library-access/library/view/-/9781587052705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587052705/?ar">https://learning.oreilly.com/library/view/~/9781587052705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587052705">https://learning.oreilly.com/library/view/~/9781587052705</a><br/>Format:&#160;Electronic Resources<br/> Exploiting online games : cheating massively distributed systems ent://SD_ILS/0/SD_ILS:2283933 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Hoglund, Greg.<br/><a href="https://learning.oreilly.com/library/view/~/9780132271912/?ar">https://learning.oreilly.com/library/view/~/9780132271912/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780132271912/?ar">https://go.oreilly.com/library-access/library/view/-/9780132271912/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132271912">https://learning.oreilly.com/library/view/~/9780132271912</a><br/>Format:&#160;Electronic Resources<br/> AVIEN malware defense guide for the Enterprise ent://SD_ILS/0/SD_ILS:2284510 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Harley, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491648">https://learning.oreilly.com/library/view/~/9781597491648</a> <a href="https://learning.oreilly.com/library/view/~/9781597491648/?ar">https://learning.oreilly.com/library/view/~/9781597491648/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated Security Systems Design : Concepts, Specifications, and Implementation. ent://SD_ILS/0/SD_ILS:2286958 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Norman, Thomas L.<br/><a href="https://learning.oreilly.com/library/view/~/9780750679091/?ar">https://learning.oreilly.com/library/view/~/9780750679091/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780750679091/?ar">https://go.oreilly.com/library-access/library/view/-/9780750679091/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco ASA, PIX, and FWSM firewall handbook ent://SD_ILS/0/SD_ILS:2283808 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Hucaby, Dave.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587054570/?ar">https://go.oreilly.com/library-access/library/view/-/9781587054570/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587054570/?ar">https://learning.oreilly.com/library/view/~/9781587054570/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587054570">https://learning.oreilly.com/library/view/~/9781587054570</a><br/>Format:&#160;Electronic Resources<br/> End-to-end network security : defense-in-depth ent://SD_ILS/0/SD_ILS:2284052 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Santos, Omar.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587053320/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053320/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587053320/?ar">https://learning.oreilly.com/library/view/~/9781587053320/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587053320">https://learning.oreilly.com/library/view/~/9781587053320</a><br/>Format:&#160;Electronic Resources<br/> Cisco NAC appliance : enforcing host security with clean access ent://SD_ILS/0/SD_ILS:2283801 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Heary, Jamey.<br/><a href="https://learning.oreilly.com/library/view/~/9781587053061">https://learning.oreilly.com/library/view/~/9781587053061</a> <a href="https://learning.oreilly.com/library/view/~/9781587053061/?ar">https://learning.oreilly.com/library/view/~/9781587053061/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587053061/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053061/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco firewall technology ent://SD_ILS/0/SD_ILS:2282843 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781587053290/?ar">https://learning.oreilly.com/library/view/~/9781587053290/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587053290">https://learning.oreilly.com/library/view/~/9781587053290</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587053290/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053290/?ar</a><br/>Format:&#160;Electronic Resources<br/> Handbook of information security . Volume 1, Key concepts, infrastructure, standards, and protocols ent://SD_ILS/0/SD_ILS:2289169 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Bidgoli, Hossein.<br/><a href="https://learning.oreilly.com/library/view/~/9780471648307">https://learning.oreilly.com/library/view/~/9780471648307</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780471648307/?ar">https://go.oreilly.com/library-access/library/view/-/9780471648307/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780471648307/?ar">https://learning.oreilly.com/library/view/~/9780471648307/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security considerations in Lotus Notes and Domino 7 : making great security easier to implement ent://SD_ILS/0/SD_ILS:2295704 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Dahm, Frederic.<br/><a href="https://learning.oreilly.com/library/view/~/0738497347/?ar">https://learning.oreilly.com/library/view/~/0738497347/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738497347/?ar">https://go.oreilly.com/library-access/library/view/-/0738497347/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738497347">https://learning.oreilly.com/library/view/~/0738497347</a><br/>Format:&#160;Electronic Resources<br/> How to break Web software : functional and security testing of Web applications and Web services ent://SD_ILS/0/SD_ILS:2286432 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Andrews, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321657497/?ar">https://go.oreilly.com/library-access/library/view/-/9780321657497/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321657497/?ar">https://learning.oreilly.com/library/view/~/9780321657497/?ar</a><br/>Format:&#160;Electronic Resources<br/> Solving the Enigma : History of Cryptanalytic Bombe ent://SD_ILS/0/SD_ILS:2310798 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Wilcox, Jennifer.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100015SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100015SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100015SI">https://learning.oreilly.com/library/view/~/01120100015SI</a> <a href="https://learning.oreilly.com/library/view/~/01120100015SI/?ar">https://learning.oreilly.com/library/view/~/01120100015SI/?ar</a><br/>Format:&#160;Electronic Resources<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:2281991 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490481">https://learning.oreilly.com/library/view/~/9781597490481</a> <a href="https://www.sciencedirect.com/science/book/9781597490481">https://www.sciencedirect.com/science/book/9781597490481</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490481/?ar">https://learning.oreilly.com/library/view/~/9781597490481/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security basics ent://SD_ILS/0/SD_ILS:2282377 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Lehtinen, Rick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596006691/?ar">https://go.oreilly.com/library-access/library/view/-/0596006691/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596006691">https://learning.oreilly.com/library/view/~/0596006691</a> <a href="https://learning.oreilly.com/library/view/~/0596006691/?ar">https://learning.oreilly.com/library/view/~/0596006691/?ar</a><br/>Format:&#160;Electronic Resources<br/> Self-defending networks : the next generation of network security ent://SD_ILS/0/SD_ILS:2282790 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;De Capite, Duane.<br/><a href="https://learning.oreilly.com/library/view/~/1587052539/?ar">https://learning.oreilly.com/library/view/~/1587052539/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587052539/?ar">https://go.oreilly.com/library-access/library/view/-/1587052539/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587052539">https://learning.oreilly.com/library/view/~/1587052539</a><br/>Format:&#160;Electronic Resources<br/> The art of software security assessment : identifying and preventing software vulnerabilities ent://SD_ILS/0/SD_ILS:2282886 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Dowd, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321444426/?ar">https://go.oreilly.com/library-access/library/view/-/0321444426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321444426/?ar">https://learning.oreilly.com/library/view/~/0321444426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321444426">https://learning.oreilly.com/library/view/~/0321444426</a><br/>Format:&#160;Electronic Resources<br/> Deploying zone-based firewalls ent://SD_ILS/0/SD_ILS:2282730 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Pepelnjak, Ivan.<br/><a href="https://learning.oreilly.com/library/view/~/1587053101">https://learning.oreilly.com/library/view/~/1587053101</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587053101/?ar">https://go.oreilly.com/library-access/library/view/-/1587053101/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587053101/?ar">https://learning.oreilly.com/library/view/~/1587053101/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security hacks ent://SD_ILS/0/SD_ILS:2282983 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596527632/?ar">https://go.oreilly.com/library-access/library/view/-/0596527632/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596527632">https://learning.oreilly.com/library/view/~/0596527632</a> <a href="https://learning.oreilly.com/library/view/~/0596527632/?ar">https://learning.oreilly.com/library/view/~/0596527632/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security threat mitigation and response : understanding Cisco security MARS ent://SD_ILS/0/SD_ILS:2282999 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Tesch, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/1587052601">https://learning.oreilly.com/library/view/~/1587052601</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587052601/?ar">https://go.oreilly.com/library-access/library/view/-/1587052601/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587052601/?ar">https://learning.oreilly.com/library/view/~/1587052601/?ar</a><br/>Format:&#160;Electronic Resources<br/> SELinux by example : using security enhanced Linux ent://SD_ILS/0/SD_ILS:2283000 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Mayer, Frank, 1961-<br/><a href="https://learning.oreilly.com/library/view/~/0131963694/?ar">https://learning.oreilly.com/library/view/~/0131963694/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131963694/?ar">https://go.oreilly.com/library-access/library/view/-/0131963694/?ar</a><br/>Format:&#160;Electronic Resources<br/> Inside network security assessment : guarding your IT infrastructure ent://SD_ILS/0/SD_ILS:2282083 2024-06-20T04:26:32Z 2024-06-20T04:26:32Z by&#160;Gregg, Michael (Michael C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672328097/?ar">https://go.oreilly.com/library-access/library/view/-/0672328097/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672328097/?ar">https://learning.oreilly.com/library/view/~/0672328097/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672328097">https://learning.oreilly.com/library/view/~/0672328097</a><br/>Format:&#160;Electronic Resources<br/>