Search Results for - Narrowed by: Réseaux d'ordinateurs -- Sécurité -- Mesures. - 2019SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092019$0025092019$0026ps$003d300?2024-05-26T11:57:22ZIncident response primer : how to keep from getting pwned too hardent://SD_ILS/0/SD_ILS:23233162024-05-26T11:57:22Z2024-05-26T11:57:22Zby Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format: Electronic Resources<br/>Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risksent://SD_ILS/0/SD_ILS:23219542024-05-26T11:57:22Z2024-05-26T11:57:22Zby Born, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789807608/?ar">https://learning.oreilly.com/library/view/~/9781789807608/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807608">https://learning.oreilly.com/library/view/~/9781789807608</a><br/>Format: Electronic Resources<br/>Cyber resiliency solution for IBM Spectrum Scaleent://SD_ILS/0/SD_ILS:23221452024-05-26T11:57:22Z2024-05-26T11:57:22Zby IBM Storage Team, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457963/?ar">https://learning.oreilly.com/library/view/~/9780738457963/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar</a><br/>Format: Electronic Resources<br/>Practical cyber forensics : an incident-based approach to forensic investigationsent://SD_ILS/0/SD_ILS:23215212024-05-26T11:57:22Z2024-05-26T11:57:22Zby Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity of industrial systemsent://SD_ILS/0/SD_ILS:23212932024-05-26T11:57:22Z2024-05-26T11:57:22Zby Flaus, Jean-Marie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786304216/?ar">https://learning.oreilly.com/library/view/~/9781786304216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304216">https://learning.oreilly.com/library/view/~/9781786304216</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786304216/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304216/?ar</a><br/>Format: Electronic Resources<br/>PCI DSS : a pocket guideent://SD_ILS/0/SD_ILS:23221602024-05-26T11:57:22Z2024-05-26T11:57:22Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781641/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781641/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781641/?ar">https://learning.oreilly.com/library/view/~/9781787781641/?ar</a><br/>Format: Electronic Resources<br/>Waging cyber war : technical challenges and operational constraintsent://SD_ILS/0/SD_ILS:23219082024-05-26T11:57:22Z2024-05-26T11:57:22Zby Oakley, Jacob G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249505/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249505/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484249505/?ar">https://learning.oreilly.com/library/view/~/9781484249505/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity for dummiesent://SD_ILS/0/SD_ILS:23227472024-05-26T11:57:22Z2024-05-26T11:57:22Zby Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781494542450">https://learning.oreilly.com/library/view/~/9781494542450</a>
<a href="https://learning.oreilly.com/library/view/~/9781494542450/?ar">https://learning.oreilly.com/library/view/~/9781494542450/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar">https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar</a><br/>Format: Electronic Resources<br/>Pro Spring security : securing Spring Framework 5 and Boot 2-based Java applicationsent://SD_ILS/0/SD_ILS:23230722024-05-26T11:57:22Z2024-05-26T11:57:22Zby Scarioni, Carlo, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250525/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484250525/?ar">https://learning.oreilly.com/library/view/~/9781484250525/?ar</a><br/>Format: Electronic Resources<br/>The Complete Ethical Hacking Courseent://SD_ILS/0/SD_ILS:23231852024-05-26T11:57:22Z2024-05-26T11:57:22Zby Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format: Electronic Resources<br/>Mastering Active Directory - Second Editionent://SD_ILS/0/SD_ILS:23239792024-05-26T11:57:22Z2024-05-26T11:57:22Zby Francis, Dishan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789800203/?ar">https://learning.oreilly.com/library/view/~/9781789800203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar">https://go.oreilly.com/library-access/library/view/-/9781789800203/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789800203">https://learning.oreilly.com/library/view/~/9781789800203</a><br/>Format: Electronic Resources<br/>Computer security : art and scienceent://SD_ILS/0/SD_ILS:23184522024-05-26T11:57:22Z2024-05-26T11:57:22Zby Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format: Electronic Resources<br/>Practical cloud security : a guide for secure design and deploymentent://SD_ILS/0/SD_ILS:23190052024-05-26T11:57:22Z2024-05-26T11:57:22Zby Dotson, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492037507">https://learning.oreilly.com/library/view/~/9781492037507</a>
<a href="https://learning.oreilly.com/library/view/~/9781492037507/?ar">https://learning.oreilly.com/library/view/~/9781492037507/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar</a><br/>Format: Electronic Resources<br/>Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and dataent://SD_ILS/0/SD_ILS:23192382024-05-26T11:57:22Z2024-05-26T11:57:22Zby Nickel, Jochen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789132304/?ar">https://learning.oreilly.com/library/view/~/9781789132304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar">https://go.oreilly.com/library-access/library/view/-/9781789132304/?ar</a><br/>Format: Electronic Resources<br/>Practical security automation and testing : tools and techniques for automated security scanning and testing in DevSecOpsent://SD_ILS/0/SD_ILS:23190962024-05-26T11:57:22Z2024-05-26T11:57:22Zby Hsu, Tony Hsiang-Chih, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789802023/?ar">https://learning.oreilly.com/library/view/~/9781789802023/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789802023/?ar">https://go.oreilly.com/library-access/library/view/-/9781789802023/?ar</a><br/>Format: Electronic Resources<br/>Hands-on penetration testing with Kali NetHunter : spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the goent://SD_ILS/0/SD_ILS:23193612024-05-26T11:57:22Z2024-05-26T11:57:22Zby Singh, Glen D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995177/?ar">https://learning.oreilly.com/library/view/~/9781788995177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995177">https://learning.oreilly.com/library/view/~/9781788995177</a><br/>Format: Electronic Resources<br/>Threat and vulnerability assessment for enterprisesent://SD_ILS/0/SD_ILS:23192772024-05-26T11:57:22Z2024-05-26T11:57:22Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781838559205/?ar">https://learning.oreilly.com/videos/~/9781838559205/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar">https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar</a><br/>Format: Electronic Resources<br/>Hands-on AWS penetration testing with Kali Linux : set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormationent://SD_ILS/0/SD_ILS:23214092024-05-26T11:57:22Z2024-05-26T11:57:22Zby Gilbert, Karl, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789136722">https://learning.oreilly.com/library/view/~/9781789136722</a>
<a href="https://learning.oreilly.com/library/view/~/9781789136722/?ar">https://learning.oreilly.com/library/view/~/9781789136722/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar">https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar</a><br/>Format: Electronic Resources<br/>Hands-on pfSense 2.x for firewalls and routersent://SD_ILS/0/SD_ILS:23193342024-05-26T11:57:22Z2024-05-26T11:57:22Zby White, Jason, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789805017/?ar">https://go.oreilly.com/library-access/library/view/-/9781789805017/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789805017/?ar">https://learning.oreilly.com/videos/~/9781789805017/?ar</a><br/>Format: Electronic Resources<br/>Practical security : simple practices for defending your systemsent://SD_ILS/0/SD_ILS:23194022024-05-26T11:57:22Z2024-05-26T11:57:22Zby Zabicki, Roman, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar">https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679">https://learning.oreilly.com/library/view/~/9781680506679</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679/?ar">https://learning.oreilly.com/library/view/~/9781680506679/?ar</a><br/>Format: Electronic Resources<br/>The cybersecurity playbook : how every leader and employee can contribute to a culture of securityent://SD_ILS/0/SD_ILS:23215682024-05-26T11:57:22Z2024-05-26T11:57:22Zby Cerra, Allison, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar">https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196/?ar">https://learning.oreilly.com/library/view/~/9781119442196/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119442196">https://learning.oreilly.com/library/view/~/9781119442196</a><br/>Format: Electronic Resources<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:23195342024-05-26T11:57:22Z2024-05-26T11:57:22Zby Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a>
<a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format: Electronic Resources<br/>Security principles for the working architectent://SD_ILS/0/SD_ILS:23226912024-05-26T11:57:22Z2024-05-26T11:57:22Zby Woods, Eoin, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338215/?ar">https://learning.oreilly.com/videos/~/0636920338215/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920338215">https://learning.oreilly.com/videos/~/0636920338215</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar</a><br/>Format: Electronic Resources<br/>Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessonsent://SD_ILS/0/SD_ILS:23215502024-05-26T11:57:22Z2024-05-26T11:57:22Zby Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format: Electronic Resources<br/>Zero trust networks with VMware NSX : build highly secure network architectures for your data centersent://SD_ILS/0/SD_ILS:23226592024-05-26T11:57:22Z2024-05-26T11:57:22Zby Keeriyattil, Sreejith, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484254318">https://learning.oreilly.com/library/view/~/9781484254318</a>
<a href="https://learning.oreilly.com/library/view/~/9781484254318/?ar">https://learning.oreilly.com/library/view/~/9781484254318/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484254318/?ar">https://go.oreilly.com/library-access/library/view/-/9781484254318/?ar</a><br/>Format: Electronic Resources<br/>Fraud detection without feature engineeringent://SD_ILS/0/SD_ILS:23224342024-05-26T11:57:22Z2024-05-26T11:57:22Zby Vagata, Pamela, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540/?ar">https://learning.oreilly.com/videos/~/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540">https://learning.oreilly.com/videos/~/0636920339540</a><br/>Format: Electronic Resources<br/>Bug bounty hunting for web security : find and exploit vulnerabilities in web sites and applicationsent://SD_ILS/0/SD_ILS:23230372024-05-26T11:57:22Z2024-05-26T11:57:22Zby Sinha, Sanjib, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484253915/?ar">https://learning.oreilly.com/library/view/~/9781484253915/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484253915/?ar">https://go.oreilly.com/library-access/library/view/-/9781484253915/?ar</a><br/>Format: Electronic Resources<br/>Linux essentials for cybersecurity lab manualent://SD_ILS/0/SD_ILS:23175582024-05-26T11:57:22Z2024-05-26T11:57:22Zby Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format: Electronic Resources<br/>Data analytics for IT networks : developing innovative use casesent://SD_ILS/0/SD_ILS:23175592024-05-26T11:57:22Z2024-05-26T11:57:22Zby Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format: Electronic Resources<br/>Cyber operations : building, defending, and attacking modern computer networksent://SD_ILS/0/SD_ILS:23189142024-05-26T11:57:22Z2024-05-26T11:57:22Zby O'Leary, Mike, 1968- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242940">https://learning.oreilly.com/library/view/~/9781484242940</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242940/?ar">https://learning.oreilly.com/library/view/~/9781484242940/?ar</a><br/>Format: Electronic Resources<br/>Zabbix 4 network monitoring : monitor the performance of your network devices and applications using the all-new Zabbix 4.0ent://SD_ILS/0/SD_ILS:23190102024-05-26T11:57:22Z2024-05-26T11:57:22Zby Uytterhoeven, Patrik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340266/?ar">https://learning.oreilly.com/library/view/~/9781789340266/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity Ops with bash : attack, defend, and analyze from the command lineent://SD_ILS/0/SD_ILS:23192522024-05-26T11:57:22Z2024-05-26T11:57:22Zby Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Enterprise Mobility and Security trainingent://SD_ILS/0/SD_ILS:23195562024-05-26T11:57:22Z2024-05-26T11:57:22Zby Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format: Electronic Resources<br/>Becoming the hacker : the playbook for getting inside the mind of an attackerent://SD_ILS/0/SD_ILS:23191292024-05-26T11:57:22Z2024-05-26T11:57:22Zby Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Electronic Resources<br/>Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environmentsent://SD_ILS/0/SD_ILS:23220552024-05-26T11:57:22Z2024-05-26T11:57:22Zby Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format: Electronic Resources<br/>Web hacking : become a professional web pentesterent://SD_ILS/0/SD_ILS:23198312024-05-26T11:57:22Z2024-05-26T11:57:22Zby Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format: Electronic Resources<br/>Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualizationent://SD_ILS/0/SD_ILS:23189382024-05-26T11:57:22Z2024-05-26T11:57:22Zby Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134807614/?ar">https://learning.oreilly.com/library/view/~/9780134807614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807614">https://learning.oreilly.com/library/view/~/9780134807614</a><br/>Format: Electronic Resources<br/>Cyber smart : five habits to protect your family, money, and identity from cyber criminalsent://SD_ILS/0/SD_ILS:23188682024-05-26T11:57:22Z2024-05-26T11:57:22Zby McDonough, Bart R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469071503/?ar">https://learning.oreilly.com/library/view/~/9781469071503/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar">https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781469071503">https://learning.oreilly.com/library/view/~/9781469071503</a><br/>Format: Sound recording<br/>Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux 2019.1, the ultimate white hat hackers' toolkitent://SD_ILS/0/SD_ILS:23191142024-05-26T11:57:22Z2024-05-26T11:57:22Zby Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340563/?ar">https://learning.oreilly.com/library/view/~/9781789340563/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar</a><br/>Format: Electronic Resources<br/>Hands-on application penetration testing with Burp Suite : use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applicationsent://SD_ILS/0/SD_ILS:23193602024-05-26T11:57:22Z2024-05-26T11:57:22Zby Lozano, Carlos A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788994064/?ar">https://learning.oreilly.com/library/view/~/9781788994064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar">https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788994064">https://learning.oreilly.com/library/view/~/9781788994064</a><br/>Format: Electronic Resources<br/>Learning Python for forensics : leverage the power of Python in forensic investigationsent://SD_ILS/0/SD_ILS:23191162024-05-26T11:57:22Z2024-05-26T11:57:22Zby Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format: Electronic Resources<br/>Foundations of information security : a straightforward introductionent://SD_ILS/0/SD_ILS:23223132024-05-26T11:57:22Z2024-05-26T11:57:22Zby Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098122546/?ar">https://learning.oreilly.com/library/view/~/9781098122546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122546">https://learning.oreilly.com/library/view/~/9781098122546</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar</a><br/>Format: Electronic Resources<br/>Linux troubleshooting course with real life examplesent://SD_ILS/0/SD_ILS:23232382024-05-26T11:57:22Z2024-05-26T11:57:22Zby Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format: Electronic Resources<br/>How Lyft migrated to a service mesh with Envoyent://SD_ILS/0/SD_ILS:23232962024-05-26T11:57:22Z2024-05-26T11:57:22Zby Hochman, Daniel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338390/?ar">https://learning.oreilly.com/videos/~/0636920338390/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920338390">https://learning.oreilly.com/videos/~/0636920338390</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338390/?ar</a><br/>Format: Electronic Resources<br/>Qi ye shen tou ce shi he chi xu jian kong.ent://SD_ILS/0/SD_ILS:23322892024-05-26T11:57:22Z2024-05-26T11:57:22Zby Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format: Video recording<br/>Spring security : LiveLessonsent://SD_ILS/0/SD_ILS:23184932024-05-26T11:57:22Z2024-05-26T11:57:22Zby Long, Josh, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar">https://go.oreilly.com/library-access/library/view/-/9780135415054/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780135415054/?ar">https://learning.oreilly.com/videos/~/9780135415054/?ar</a><br/>Format: Electronic Resources<br/>Security with AI and machine learning : using advanced tools to improve application security at the edgeent://SD_ILS/0/SD_ILS:23190582024-05-26T11:57:22Z2024-05-26T11:57:22Zby Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format: Electronic Resources<br/>Hands-on network forensics : investigate network attacks and find evidence using common network forensic toolsent://SD_ILS/0/SD_ILS:23198362024-05-26T11:57:22Z2024-05-26T11:57:22Zby Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789344523/?ar">https://learning.oreilly.com/library/view/~/9781789344523/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testingent://SD_ILS/0/SD_ILS:23198472024-05-26T11:57:22Z2024-05-26T11:57:22Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format: Electronic Resources<br/>Protecting your web applications : solutions and strategies to combat cybersecurity threatsent://SD_ILS/0/SD_ILS:23211662024-05-26T11:57:22Z2024-05-26T11:57:22Zby Sloper, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492052791">https://learning.oreilly.com/library/view/~/9781492052791</a>
<a href="https://learning.oreilly.com/library/view/~/9781492052791/?ar">https://learning.oreilly.com/library/view/~/9781492052791/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar</a><br/>Format: Electronic Resources<br/>My online privacy for seniorsent://SD_ILS/0/SD_ILS:23194122024-05-26T11:57:22Z2024-05-26T11:57:22Zby Rich, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135381281/?ar">https://learning.oreilly.com/library/view/~/9780135381281/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar">https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers : cybersecurity advice from the best hackers in the worldent://SD_ILS/0/SD_ILS:23214522024-05-26T11:57:22Z2024-05-26T11:57:22Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format: Electronic Resources<br/>Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloudent://SD_ILS/0/SD_ILS:23214882024-05-26T11:57:22Z2024-05-26T11:57:22Zby Berkouwer, Sander, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806984">https://learning.oreilly.com/library/view/~/9781789806984</a>
<a href="https://learning.oreilly.com/library/view/~/9781789806984/?ar">https://learning.oreilly.com/library/view/~/9781789806984/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar</a><br/>Format: Electronic Resources<br/>Learn Kali Linux 2019 : perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wiresharkent://SD_ILS/0/SD_ILS:23237682024-05-26T11:57:22Z2024-05-26T11:57:22Zby Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789611809/?ar">https://learning.oreilly.com/library/view/~/9781789611809/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789611809">https://learning.oreilly.com/library/view/~/9781789611809</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar">https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar</a><br/>Format: Electronic Resources<br/>