Search Results for - Narrowed by: Microsoft Windows (Computer file) - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Microsoft$002bWindows$002b$002528Computer$002bfile$002529$002509Microsoft$002bWindows$002b$002528Computer$002bfile$002529$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-05-23T05:34:16Z Windows Network security fundamentals ent://SD_ILS/0/SD_ILS:2333384 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Weadock, Glenn E., presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920671206">https://learning.oreilly.com/videos/~/0636920671206</a> <a href="https://learning.oreilly.com/videos/~/0636920671206/?ar">https://learning.oreilly.com/videos/~/0636920671206/?ar</a><br/>Format:&#160;Video recording<br/> Mastering Windows security and hardening : secure and protect your Windows environment from cyber threats using zero-trust security principles ent://SD_ILS/0/SD_ILS:2334156 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Dunkerley, Mark, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar">https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803236544/?ar">https://learning.oreilly.com/library/view/~/9781803236544/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803236544">https://learning.oreilly.com/library/view/~/9781803236544</a><br/>Format:&#160;Electronic Resources<br/> Mastering malware analysis : a malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks ent://SD_ILS/0/SD_ILS:2334733 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Kleymenov, Alexey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803240244/?ar">https://learning.oreilly.com/library/view/~/9781803240244/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240244">https://learning.oreilly.com/library/view/~/9781803240244</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Windows security and hardening : secure and protect your Windows environment from intruders, malware attacks, and other cyber threats. ent://SD_ILS/0/SD_ILS:2325966 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Dunkerley, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216411">https://learning.oreilly.com/library/view/~/9781839216411</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839216411/?ar">https://learning.oreilly.com/library/view/~/9781839216411/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Malware Analysis : the Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks. ent://SD_ILS/0/SD_ILS:2320922 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Kleymenov, Alexey.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar">https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789610789">https://learning.oreilly.com/library/view/~/9781789610789</a> <a href="https://learning.oreilly.com/library/view/~/9781789610789/?ar">https://learning.oreilly.com/library/view/~/9781789610789/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis ent://SD_ILS/0/SD_ILS:2317231 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Bramwell, Phil, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295666">https://learning.oreilly.com/library/view/~/9781788295666</a> <a href="https://learning.oreilly.com/library/view/~/9781788295666/?ar">https://learning.oreilly.com/library/view/~/9781788295666/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows security monitoring : scenarios and patterns ent://SD_ILS/0/SD_ILS:2315945 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Miroshnikov, Andrei, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar">https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119390640/?ar">https://learning.oreilly.com/library/view/~/9781119390640/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119390640">https://learning.oreilly.com/library/view/~/9781119390640</a><br/>Format:&#160;Electronic Resources<br/> Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware ent://SD_ILS/0/SD_ILS:2317050 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;K. A., Monnappa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar">https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788392501/?ar">https://learning.oreilly.com/library/view/~/9781788392501/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows virus and malware troubleshooting ent://SD_ILS/0/SD_ILS:2312937 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital privacy and security using windows : a practical guide ent://SD_ILS/0/SD_ILS:2313658 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484227985/?ar">https://learning.oreilly.com/library/view/~/9781484227985/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484227985/?ar">https://go.oreilly.com/library-access/library/view/-/9781484227985/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484227985">https://learning.oreilly.com/library/view/~/9781484227985</a><br/>Format:&#160;Electronic Resources<br/> Windows forensics cookbook : 61 recipes to help you analyze Windows systems ent://SD_ILS/0/SD_ILS:2313990 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Sulkin, Oleg, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390495/?ar">https://learning.oreilly.com/library/view/~/9781784390495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390495">https://learning.oreilly.com/library/view/~/9781784390495</a><br/>Format:&#160;Electronic Resources<br/> Practical Windows forensics : leverage the power of digital forensics for Windows systems ent://SD_ILS/0/SD_ILS:2311021 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:2310018 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar">https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128033357/?ar">https://learning.oreilly.com/library/view/~/9780128033357/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering the Microsoft Deployment Toolkit : take a deep dive into the world of Windows desktop deployment using the Microsoft Deployment Toolkit ent://SD_ILS/0/SD_ILS:2310813 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Stokes, Jeff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782172499/?ar">https://learning.oreilly.com/library/view/~/9781782172499/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782172499">https://learning.oreilly.com/library/view/~/9781782172499</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782172499/?ar">https://go.oreilly.com/library-access/library/view/-/9781782172499/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the windows registry ent://SD_ILS/0/SD_ILS:2209760 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4438754">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:2209813 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452264">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical Windows forensics : leverage the power of digital forensics for Windows systems ent://SD_ILS/0/SD_ILS:2271719 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Shaaban, Ayman, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594307">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:2059082 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Moskowitz, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4040685">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing Windows networks : from system security basics to monitoring and auditing ent://SD_ILS/0/SD_ILS:2308561 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Long, Mark, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar">https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771374903/?ar">https://learning.oreilly.com/videos/~/9781771374903/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set ent://SD_ILS/0/SD_ILS:2308438 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Marak, Victor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785281518">https://learning.oreilly.com/library/view/~/9781785281518</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar">https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785281518/?ar">https://learning.oreilly.com/library/view/~/9781785281518/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Windows Server 2012 R2 ent://SD_ILS/0/SD_ILS:2301152 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Minasi, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar">https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118289426/?ar">https://learning.oreilly.com/library/view/~/9781118289426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118289426">https://learning.oreilly.com/library/view/~/9781118289426</a><br/>Format:&#160;Electronic Resources<br/> Windows 8.1 administration pocket consultant : storage, security, &amp; Networking ent://SD_ILS/0/SD_ILS:2302302 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Stanek, William R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735685536/?ar">https://go.oreilly.com/library-access/library/view/-/9780735685536/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735685536/?ar">https://learning.oreilly.com/library/view/~/9780735685536/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:2302592 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Carvey, Harlan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124171572/?ar">https://learning.oreilly.com/library/view/~/9780124171572/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:2298818 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9781118331743/?ar">https://learning.oreilly.com/library/view/~/9781118331743/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118331743/?ar">https://go.oreilly.com/library-access/library/view/-/9781118331743/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Windows network forensics and investigation ent://SD_ILS/0/SD_ILS:2299176 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781118236086/?ar">https://learning.oreilly.com/library/view/~/9781118236086/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar">https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit ent://SD_ILS/0/SD_ILS:2295823 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems : digital forensics field guides ent://SD_ILS/0/SD_ILS:2294682 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format:&#160;Electronic Resources<br/> Manually removing viruses and malware from Windows 7 ent://SD_ILS/0/SD_ILS:2296758 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Halsey, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar">https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781449338053/?ar">https://learning.oreilly.com/videos/~/9781449338053/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems digital forensics field guides ent://SD_ILS/0/SD_ILS:2205738 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=921016">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:2309995 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495806/?ar">https://learning.oreilly.com/library/view/~/9781597495806/?ar</a><br/>Format:&#160;Electronic Resources<br/> Programming Windows Identity Foundation ent://SD_ILS/0/SD_ILS:2290015 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Bertocci, Vittorio.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735652040/?ar">https://go.oreilly.com/library-access/library/view/-/9780735652040/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735652040/?ar">https://learning.oreilly.com/library/view/~/9780735652040/?ar</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:2288891 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470581858/?ar">https://learning.oreilly.com/library/view/~/9780470581858/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470769805/?ar">https://learning.oreilly.com/library/view/~/9780470769805/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar">https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar">https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470769805">https://learning.oreilly.com/library/view/~/9780470769805</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 in a Windows Environment : the best practice handbook for a Microsoft Windows environment ent://SD_ILS/0/SD_ILS:2290026 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Honan, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280495/?ar">https://learning.oreilly.com/library/view/~/9781849280495/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis DVD toolkit 2E ent://SD_ILS/0/SD_ILS:2287802 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem ent://SD_ILS/0/SD_ILS:2285580 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Walker, Andy (Andy G.), 1967-<br/><a href="https://learning.oreilly.com/library/view/~/9780789736727">https://learning.oreilly.com/library/view/~/9780789736727</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar">https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780789736727/?ar">https://learning.oreilly.com/library/view/~/9780789736727/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:2284517 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Varsalone, Jesse.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492447">https://learning.oreilly.com/library/view/~/9781597492447</a> <a href="https://learning.oreilly.com/library/view/~/9781597492447/?ar">https://learning.oreilly.com/library/view/~/9781597492447/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar</a><br/>Format:&#160;Electronic Resources<br/> Creating the secure managed desktop : using group policy, SoftGrid, Microsoft deployment toolkit, and other management tools ent://SD_ILS/0/SD_ILS:2288756 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470277645/?ar">https://learning.oreilly.com/library/view/~/9780470277645/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470277645/?ar">https://go.oreilly.com/library-access/library/view/-/9780470277645/?ar</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and troubleshooting ent://SD_ILS/0/SD_ILS:2288763 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470275894/?ar">https://learning.oreilly.com/library/view/~/9780470275894/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar">https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Vista security for dummies ent://SD_ILS/0/SD_ILS:2284218 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Koerner, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9780470118054">https://learning.oreilly.com/library/view/~/9780470118054</a> <a href="https://learning.oreilly.com/library/view/~/9780470118054/?ar">https://learning.oreilly.com/library/view/~/9780470118054/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar">https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:64246 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:64221 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0707/2007270083-d.html">http://www.loc.gov/catdir/enhancements/fy0707/2007270083-d.html</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:64208 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0713/2007296500-d.html">http://www.loc.gov/catdir/enhancements/fy0713/2007296500-d.html</a><br/>Format:&#160;Electronic Resources<br/> Encryption in a Windows Environment : EFS File, 802.1x wireless, IPSec transport, and S/MIME exchange ent://SD_ILS/0/SD_ILS:2310770 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Morimoto, Rand.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0768668298/?ar">https://go.oreilly.com/library-access/library/view/-/0768668298/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0768668298/?ar">https://learning.oreilly.com/library/view/~/0768668298/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0768668298">https://learning.oreilly.com/library/view/~/0768668298</a><br/>Format:&#160;Electronic Resources<br/> Perl scripting for Windows security : live response, forensic analysis, and monitoring ent://SD_ILS/0/SD_ILS:2284953 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Carvey, Harlan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491730/?ar">https://learning.oreilly.com/library/view/~/9781597491730/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491730/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491730/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows vista security : praxisorientierte Sicherheit f&uuml;r Profis ent://SD_ILS/0/SD_ILS:2286308 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Nasarek, Marcus.<br/><a href="https://learning.oreilly.com/library/view/~/9783897214668">https://learning.oreilly.com/library/view/~/9783897214668</a> <a href="https://learning.oreilly.com/library/view/~/9783897214668/?ar">https://learning.oreilly.com/library/view/~/9783897214668/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783897214668/?ar">https://go.oreilly.com/library-access/library/view/-/9783897214668/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing the Vista environment ent://SD_ILS/0/SD_ILS:2283409 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Gregory, Peter H.<br/><a href="https://learning.oreilly.com/library/view/~/9780596514303/?ar">https://learning.oreilly.com/library/view/~/9780596514303/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596514303">https://learning.oreilly.com/library/view/~/9780596514303</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar">https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Vista security : securing Vista against malicious attacks ent://SD_ILS/0/SD_ILS:2284862 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Grimes, Roger A.<br/><a href="https://learning.oreilly.com/library/view/~/9780470101551">https://learning.oreilly.com/library/view/~/9780470101551</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470101551/?ar">https://go.oreilly.com/library-access/library/view/-/9780470101551/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470101551/?ar">https://learning.oreilly.com/library/view/~/9780470101551/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Windows XP networking and security : also covers Windows 2000 ent://SD_ILS/0/SD_ILS:2282465 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Bott, Ed.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735620423/?ar">https://go.oreilly.com/library-access/library/view/-/0735620423/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735620423/?ar">https://learning.oreilly.com/library/view/~/0735620423/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at Windows system administration using command line scripts ent://SD_ILS/0/SD_ILS:2284108 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Bhardwaj, Pawan K.<br/><a href="https://learning.oreilly.com/library/view/~/1597491055">https://learning.oreilly.com/library/view/~/1597491055</a> <a href="https://www.sciencedirect.com/science/book/9781597491051">https://www.sciencedirect.com/science/book/9781597491051</a> <a href="https://go.oreilly.com/library-access/library/view/-/1597491055/?ar">https://go.oreilly.com/library-access/library/view/-/1597491055/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1597491055/?ar">https://learning.oreilly.com/library/view/~/1597491055/?ar</a><br/>Format:&#160;Electronic Resources<br/> Rootkits : subverting the Windows kernel ent://SD_ILS/0/SD_ILS:2285981 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Hoglund, Greg.<br/><a href="https://learning.oreilly.com/library/view/~/0321294319/?ar">https://learning.oreilly.com/library/view/~/0321294319/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321294319/?ar">https://go.oreilly.com/library-access/library/view/-/0321294319/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321294319">https://learning.oreilly.com/library/view/~/0321294319</a><br/>Format:&#160;Electronic Resources<br/> Microsoft windows security resource kit ent://SD_ILS/0/SD_ILS:2282820 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Smith, Ben, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780735621749">https://learning.oreilly.com/library/view/~/9780735621749</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar">https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735621749/?ar">https://learning.oreilly.com/library/view/~/9780735621749/?ar</a><br/>Format:&#160;Electronic Resources<br/> The .NET developer's guide to Windows security ent://SD_ILS/0/SD_ILS:2324153 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Brown, Keith, 1967 March 16-<br/><a href="https://learning.oreilly.com/library/view/~/0321228359">https://learning.oreilly.com/library/view/~/0321228359</a> <a href="https://learning.oreilly.com/library/view/~/0321228359/?ar">https://learning.oreilly.com/library/view/~/0321228359/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321228359/?ar">https://go.oreilly.com/library-access/library/view/-/0321228359/?ar</a><br/>Format:&#160;Electronic Resources<br/> Check Point NG : next generation security administration ent://SD_ILS/0/SD_ILS:2306066 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Simonis, Drew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994749/?ar">https://learning.oreilly.com/library/view/~/9781928994749/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Windows 2000 Server ent://SD_ILS/0/SD_ILS:65689 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Todd, Chad.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836494">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Windows 2000 security handbook ent://SD_ILS/0/SD_ILS:2281170 2024-05-23T05:34:16Z 2024-05-23T05:34:16Z by&#160;Schmidt, Jeff, MCSE.<br/><a href="https://learning.oreilly.com/library/view/~/0789719991">https://learning.oreilly.com/library/view/~/0789719991</a> <a href="https://learning.oreilly.com/library/view/~/0789719991/?ar">https://learning.oreilly.com/library/view/~/0789719991/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0789719991/?ar">https://go.oreilly.com/library-access/library/view/-/0789719991/?ar</a><br/>Format:&#160;Electronic Resources<br/>