Search Results for - Narrowed by: Microsoft Windows (Computer file) - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Microsoft$002bWindows$002b$002528Computer$002bfile$002529$002509Microsoft$002bWindows$002b$002528Computer$002bfile$002529$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-05-23T05:34:16ZWindows Network security fundamentalsent://SD_ILS/0/SD_ILS:23333842024-05-23T05:34:16Z2024-05-23T05:34:16Zby Weadock, Glenn E., presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206">https://learning.oreilly.com/videos/~/0636920671206</a>
<a href="https://learning.oreilly.com/videos/~/0636920671206/?ar">https://learning.oreilly.com/videos/~/0636920671206/?ar</a><br/>Format: Video recording<br/>Mastering Windows security and hardening : secure and protect your Windows environment from cyber threats using zero-trust security principlesent://SD_ILS/0/SD_ILS:23341562024-05-23T05:34:16Z2024-05-23T05:34:16Zby Dunkerley, Mark, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar">https://go.oreilly.com/library-access/library/view/-/9781803236544/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803236544/?ar">https://learning.oreilly.com/library/view/~/9781803236544/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803236544">https://learning.oreilly.com/library/view/~/9781803236544</a><br/>Format: Electronic Resources<br/>Mastering malware analysis : a malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacksent://SD_ILS/0/SD_ILS:23347332024-05-23T05:34:16Z2024-05-23T05:34:16Zby Kleymenov, Alexey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803240244/?ar">https://learning.oreilly.com/library/view/~/9781803240244/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240244">https://learning.oreilly.com/library/view/~/9781803240244</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar</a><br/>Format: Electronic Resources<br/>Mastering Windows security and hardening : secure and protect your Windows environment from intruders, malware attacks, and other cyber threats.ent://SD_ILS/0/SD_ILS:23259662024-05-23T05:34:16Z2024-05-23T05:34:16Zby Dunkerley, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216411">https://learning.oreilly.com/library/view/~/9781839216411</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216411/?ar">https://learning.oreilly.com/library/view/~/9781839216411/?ar</a><br/>Format: Electronic Resources<br/>Mastering Malware Analysis : the Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks.ent://SD_ILS/0/SD_ILS:23209222024-05-23T05:34:16Z2024-05-23T05:34:16Zby Kleymenov, Alexey.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar">https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789610789">https://learning.oreilly.com/library/view/~/9781789610789</a>
<a href="https://learning.oreilly.com/library/view/~/9781789610789/?ar">https://learning.oreilly.com/library/view/~/9781789610789/?ar</a><br/>Format: Electronic Resources<br/>Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysisent://SD_ILS/0/SD_ILS:23172312024-05-23T05:34:16Z2024-05-23T05:34:16Zby Bramwell, Phil, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295666">https://learning.oreilly.com/library/view/~/9781788295666</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295666/?ar">https://learning.oreilly.com/library/view/~/9781788295666/?ar</a><br/>Format: Electronic Resources<br/>Windows security monitoring : scenarios and patternsent://SD_ILS/0/SD_ILS:23159452024-05-23T05:34:16Z2024-05-23T05:34:16Zby Miroshnikov, Andrei, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar">https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119390640/?ar">https://learning.oreilly.com/library/view/~/9781119390640/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119390640">https://learning.oreilly.com/library/view/~/9781119390640</a><br/>Format: Electronic Resources<br/>Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malwareent://SD_ILS/0/SD_ILS:23170502024-05-23T05:34:16Z2024-05-23T05:34:16Zby K. A., Monnappa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar">https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788392501/?ar">https://learning.oreilly.com/library/view/~/9781788392501/?ar</a><br/>Format: Electronic Resources<br/>Windows virus and malware troubleshootingent://SD_ILS/0/SD_ILS:23129372024-05-23T05:34:16Z2024-05-23T05:34:16Zby Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format: Electronic Resources<br/>Digital privacy and security using windows : a practical guideent://SD_ILS/0/SD_ILS:23136582024-05-23T05:34:16Z2024-05-23T05:34:16Zby Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484227985/?ar">https://learning.oreilly.com/library/view/~/9781484227985/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484227985/?ar">https://go.oreilly.com/library-access/library/view/-/9781484227985/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484227985">https://learning.oreilly.com/library/view/~/9781484227985</a><br/>Format: Electronic Resources<br/>Windows forensics cookbook : 61 recipes to help you analyze Windows systemsent://SD_ILS/0/SD_ILS:23139902024-05-23T05:34:16Z2024-05-23T05:34:16Zby Sulkin, Oleg, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495/?ar">https://learning.oreilly.com/library/view/~/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495">https://learning.oreilly.com/library/view/~/9781784390495</a><br/>Format: Electronic Resources<br/>Practical Windows forensics : leverage the power of digital forensics for Windows systemsent://SD_ILS/0/SD_ILS:23110212024-05-23T05:34:16Z2024-05-23T05:34:16Zby Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:23100182024-05-23T05:34:16Z2024-05-23T05:34:16Zby Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar">https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128033357/?ar">https://learning.oreilly.com/library/view/~/9780128033357/?ar</a><br/>Format: Electronic Resources<br/>Mastering the Microsoft Deployment Toolkit : take a deep dive into the world of Windows desktop deployment using the Microsoft Deployment Toolkitent://SD_ILS/0/SD_ILS:23108132024-05-23T05:34:16Z2024-05-23T05:34:16Zby Stokes, Jeff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782172499/?ar">https://learning.oreilly.com/library/view/~/9781782172499/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782172499">https://learning.oreilly.com/library/view/~/9781782172499</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782172499/?ar">https://go.oreilly.com/library-access/library/view/-/9781782172499/?ar</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the windows registryent://SD_ILS/0/SD_ILS:22097602024-05-23T05:34:16Z2024-05-23T05:34:16Zby Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4438754">Click to View</a><br/>Format: Electronic Resources<br/>Hiding behind the keyboard : uncovering covert communication methods with forensic analysisent://SD_ILS/0/SD_ILS:22098132024-05-23T05:34:16Z2024-05-23T05:34:16Zby Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452264">Click to View</a><br/>Format: Electronic Resources<br/>Practical Windows forensics : leverage the power of digital forensics for Windows systemsent://SD_ILS/0/SD_ILS:22717192024-05-23T05:34:16Z2024-05-23T05:34:16Zby Shaaban, Ayman, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594307">Click to View</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:20590822024-05-23T05:34:16Z2024-05-23T05:34:16Zby Moskowitz, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4040685">Click to View</a><br/>Format: Electronic Resources<br/>Securing Windows networks : from system security basics to monitoring and auditingent://SD_ILS/0/SD_ILS:23085612024-05-23T05:34:16Z2024-05-23T05:34:16Zby Long, Mark, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar">https://go.oreilly.com/library-access/library/view/-/9781771374903/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771374903/?ar">https://learning.oreilly.com/videos/~/9781771374903/?ar</a><br/>Format: Electronic Resources<br/>Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setent://SD_ILS/0/SD_ILS:23084382024-05-23T05:34:16Z2024-05-23T05:34:16Zby Marak, Victor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785281518">https://learning.oreilly.com/library/view/~/9781785281518</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar">https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785281518/?ar">https://learning.oreilly.com/library/view/~/9781785281518/?ar</a><br/>Format: Electronic Resources<br/>Mastering Windows Server 2012 R2ent://SD_ILS/0/SD_ILS:23011522024-05-23T05:34:16Z2024-05-23T05:34:16Zby Minasi, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar">https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118289426/?ar">https://learning.oreilly.com/library/view/~/9781118289426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118289426">https://learning.oreilly.com/library/view/~/9781118289426</a><br/>Format: Electronic Resources<br/>Windows 8.1 administration pocket consultant : storage, security, & Networkingent://SD_ILS/0/SD_ILS:23023022024-05-23T05:34:16Z2024-05-23T05:34:16Zby Stanek, William R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735685536/?ar">https://go.oreilly.com/library-access/library/view/-/9780735685536/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735685536/?ar">https://learning.oreilly.com/library/view/~/9780735685536/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:23025922024-05-23T05:34:16Z2024-05-23T05:34:16Zby Carvey, Harlan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124171572/?ar">https://learning.oreilly.com/library/view/~/9780124171572/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:22988182024-05-23T05:34:16Z2024-05-23T05:34:16Zby Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9781118331743/?ar">https://learning.oreilly.com/library/view/~/9781118331743/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118331743/?ar">https://go.oreilly.com/library-access/library/view/-/9781118331743/?ar</a><br/>Format: Electronic Resources<br/>Mastering Windows network forensics and investigationent://SD_ILS/0/SD_ILS:22991762024-05-23T05:34:16Z2024-05-23T05:34:16Zby Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781118236086/?ar">https://learning.oreilly.com/library/view/~/9781118236086/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar">https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkitent://SD_ILS/0/SD_ILS:22958232024-05-23T05:34:16Z2024-05-23T05:34:16Zby Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems : digital forensics field guidesent://SD_ILS/0/SD_ILS:22946822024-05-23T05:34:16Z2024-05-23T05:34:16Zby Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format: Electronic Resources<br/>Manually removing viruses and malware from Windows 7ent://SD_ILS/0/SD_ILS:22967582024-05-23T05:34:16Z2024-05-23T05:34:16Zby Halsey, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar">https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781449338053/?ar">https://learning.oreilly.com/videos/~/9781449338053/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems digital forensics field guidesent://SD_ILS/0/SD_ILS:22057382024-05-23T05:34:16Z2024-05-23T05:34:16Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=921016">Click to View</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:23099952024-05-23T05:34:16Z2024-05-23T05:34:16Zby Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495806/?ar">https://learning.oreilly.com/library/view/~/9781597495806/?ar</a><br/>Format: Electronic Resources<br/>Programming Windows Identity Foundationent://SD_ILS/0/SD_ILS:22900152024-05-23T05:34:16Z2024-05-23T05:34:16Zby Bertocci, Vittorio.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735652040/?ar">https://go.oreilly.com/library-access/library/view/-/9780735652040/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735652040/?ar">https://learning.oreilly.com/library/view/~/9780735652040/?ar</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:22888912024-05-23T05:34:16Z2024-05-23T05:34:16Zby Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470581858/?ar">https://learning.oreilly.com/library/view/~/9780470581858/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470769805/?ar">https://learning.oreilly.com/library/view/~/9780470769805/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar">https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar">https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470769805">https://learning.oreilly.com/library/view/~/9780470769805</a><br/>Format: Electronic Resources<br/>ISO27001 in a Windows Environment : the best practice handbook for a Microsoft Windows environmentent://SD_ILS/0/SD_ILS:22900262024-05-23T05:34:16Z2024-05-23T05:34:16Zby Honan, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280495/?ar">https://learning.oreilly.com/library/view/~/9781849280495/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis DVD toolkit 2Eent://SD_ILS/0/SD_ILS:22878022024-05-23T05:34:16Z2024-05-23T05:34:16Zby Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format: Electronic Resources<br/>Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhement://SD_ILS/0/SD_ILS:22855802024-05-23T05:34:16Z2024-05-23T05:34:16Zby Walker, Andy (Andy G.), 1967-<br/><a href="https://learning.oreilly.com/library/view/~/9780789736727">https://learning.oreilly.com/library/view/~/9780789736727</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar">https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780789736727/?ar">https://learning.oreilly.com/library/view/~/9780789736727/?ar</a><br/>Format: Electronic Resources<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:22845172024-05-23T05:34:16Z2024-05-23T05:34:16Zby Varsalone, Jesse.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492447">https://learning.oreilly.com/library/view/~/9781597492447</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492447/?ar">https://learning.oreilly.com/library/view/~/9781597492447/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar</a><br/>Format: Electronic Resources<br/>Creating the secure managed desktop : using group policy, SoftGrid, Microsoft deployment toolkit, and other management toolsent://SD_ILS/0/SD_ILS:22887562024-05-23T05:34:16Z2024-05-23T05:34:16Zby Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470277645/?ar">https://learning.oreilly.com/library/view/~/9780470277645/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470277645/?ar">https://go.oreilly.com/library-access/library/view/-/9780470277645/?ar</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and troubleshootingent://SD_ILS/0/SD_ILS:22887632024-05-23T05:34:16Z2024-05-23T05:34:16Zby Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470275894/?ar">https://learning.oreilly.com/library/view/~/9780470275894/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar">https://go.oreilly.com/library-access/library/view/-/9780470275894/?ar</a><br/>Format: Electronic Resources<br/>Windows Vista security for dummiesent://SD_ILS/0/SD_ILS:22842182024-05-23T05:34:16Z2024-05-23T05:34:16Zby Koerner, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9780470118054">https://learning.oreilly.com/library/view/~/9780470118054</a>
<a href="https://learning.oreilly.com/library/view/~/9780470118054/?ar">https://learning.oreilly.com/library/view/~/9780470118054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar">https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:642462024-05-23T05:34:16Z2024-05-23T05:34:16Zby Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:642212024-05-23T05:34:16Z2024-05-23T05:34:16Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0707/2007270083-d.html">http://www.loc.gov/catdir/enhancements/fy0707/2007270083-d.html</a><br/>Format: Electronic Resources<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:642082024-05-23T05:34:16Z2024-05-23T05:34:16Zby Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0713/2007296500-d.html">http://www.loc.gov/catdir/enhancements/fy0713/2007296500-d.html</a><br/>Format: Electronic Resources<br/>Encryption in a Windows Environment : EFS File, 802.1x wireless, IPSec transport, and S/MIME exchangeent://SD_ILS/0/SD_ILS:23107702024-05-23T05:34:16Z2024-05-23T05:34:16Zby Morimoto, Rand.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0768668298/?ar">https://go.oreilly.com/library-access/library/view/-/0768668298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0768668298/?ar">https://learning.oreilly.com/library/view/~/0768668298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0768668298">https://learning.oreilly.com/library/view/~/0768668298</a><br/>Format: Electronic Resources<br/>Perl scripting for Windows security : live response, forensic analysis, and monitoringent://SD_ILS/0/SD_ILS:22849532024-05-23T05:34:16Z2024-05-23T05:34:16Zby Carvey, Harlan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491730/?ar">https://learning.oreilly.com/library/view/~/9781597491730/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491730/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491730/?ar</a><br/>Format: Electronic Resources<br/>Windows vista security : praxisorientierte Sicherheit für Profisent://SD_ILS/0/SD_ILS:22863082024-05-23T05:34:16Z2024-05-23T05:34:16Zby Nasarek, Marcus.<br/><a href="https://learning.oreilly.com/library/view/~/9783897214668">https://learning.oreilly.com/library/view/~/9783897214668</a>
<a href="https://learning.oreilly.com/library/view/~/9783897214668/?ar">https://learning.oreilly.com/library/view/~/9783897214668/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783897214668/?ar">https://go.oreilly.com/library-access/library/view/-/9783897214668/?ar</a><br/>Format: Electronic Resources<br/>Securing the Vista environmentent://SD_ILS/0/SD_ILS:22834092024-05-23T05:34:16Z2024-05-23T05:34:16Zby Gregory, Peter H.<br/><a href="https://learning.oreilly.com/library/view/~/9780596514303/?ar">https://learning.oreilly.com/library/view/~/9780596514303/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596514303">https://learning.oreilly.com/library/view/~/9780596514303</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar">https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar</a><br/>Format: Electronic Resources<br/>Windows Vista security : securing Vista against malicious attacksent://SD_ILS/0/SD_ILS:22848622024-05-23T05:34:16Z2024-05-23T05:34:16Zby Grimes, Roger A.<br/><a href="https://learning.oreilly.com/library/view/~/9780470101551">https://learning.oreilly.com/library/view/~/9780470101551</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470101551/?ar">https://go.oreilly.com/library-access/library/view/-/9780470101551/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470101551/?ar">https://learning.oreilly.com/library/view/~/9780470101551/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Windows XP networking and security : also covers Windows 2000ent://SD_ILS/0/SD_ILS:22824652024-05-23T05:34:16Z2024-05-23T05:34:16Zby Bott, Ed.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735620423/?ar">https://go.oreilly.com/library-access/library/view/-/0735620423/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735620423/?ar">https://learning.oreilly.com/library/view/~/0735620423/?ar</a><br/>Format: Electronic Resources<br/>How to cheat at Windows system administration using command line scriptsent://SD_ILS/0/SD_ILS:22841082024-05-23T05:34:16Z2024-05-23T05:34:16Zby Bhardwaj, Pawan K.<br/><a href="https://learning.oreilly.com/library/view/~/1597491055">https://learning.oreilly.com/library/view/~/1597491055</a>
<a href="https://www.sciencedirect.com/science/book/9781597491051">https://www.sciencedirect.com/science/book/9781597491051</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1597491055/?ar">https://go.oreilly.com/library-access/library/view/-/1597491055/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1597491055/?ar">https://learning.oreilly.com/library/view/~/1597491055/?ar</a><br/>Format: Electronic Resources<br/>Rootkits : subverting the Windows kernelent://SD_ILS/0/SD_ILS:22859812024-05-23T05:34:16Z2024-05-23T05:34:16Zby Hoglund, Greg.<br/><a href="https://learning.oreilly.com/library/view/~/0321294319/?ar">https://learning.oreilly.com/library/view/~/0321294319/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321294319/?ar">https://go.oreilly.com/library-access/library/view/-/0321294319/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321294319">https://learning.oreilly.com/library/view/~/0321294319</a><br/>Format: Electronic Resources<br/>Microsoft windows security resource kitent://SD_ILS/0/SD_ILS:22828202024-05-23T05:34:16Z2024-05-23T05:34:16Zby Smith, Ben, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780735621749">https://learning.oreilly.com/library/view/~/9780735621749</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar">https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735621749/?ar">https://learning.oreilly.com/library/view/~/9780735621749/?ar</a><br/>Format: Electronic Resources<br/>The .NET developer's guide to Windows securityent://SD_ILS/0/SD_ILS:23241532024-05-23T05:34:16Z2024-05-23T05:34:16Zby Brown, Keith, 1967 March 16-<br/><a href="https://learning.oreilly.com/library/view/~/0321228359">https://learning.oreilly.com/library/view/~/0321228359</a>
<a href="https://learning.oreilly.com/library/view/~/0321228359/?ar">https://learning.oreilly.com/library/view/~/0321228359/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321228359/?ar">https://go.oreilly.com/library-access/library/view/-/0321228359/?ar</a><br/>Format: Electronic Resources<br/>Check Point NG : next generation security administrationent://SD_ILS/0/SD_ILS:23060662024-05-23T05:34:16Z2024-05-23T05:34:16Zby Simonis, Drew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994749/?ar">https://learning.oreilly.com/library/view/~/9781928994749/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar</a><br/>Format: Electronic Resources<br/>Hack proofing Windows 2000 Serverent://SD_ILS/0/SD_ILS:656892024-05-23T05:34:16Z2024-05-23T05:34:16Zby Todd, Chad.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836494">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Microsoft Windows 2000 security handbookent://SD_ILS/0/SD_ILS:22811702024-05-23T05:34:16Z2024-05-23T05:34:16Zby Schmidt, Jeff, MCSE.<br/><a href="https://learning.oreilly.com/library/view/~/0789719991">https://learning.oreilly.com/library/view/~/0789719991</a>
<a href="https://learning.oreilly.com/library/view/~/0789719991/?ar">https://learning.oreilly.com/library/view/~/0789719991/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0789719991/?ar">https://go.oreilly.com/library-access/library/view/-/0789719991/?ar</a><br/>Format: Electronic Resources<br/>