Search Results for - Narrowed by: R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures. - COMPUTERS -- Security -- General. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$0026ps$003d300? 2024-05-28T03:53:55Z Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing ent://SD_ILS/0/SD_ILS:2319847 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux&reg; hardening in hostile networks : server security from TLS to TOR ent://SD_ILS/0/SD_ILS:2314177 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain ent://SD_ILS/0/SD_ILS:2317092 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Gupta, Rajneesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990189">https://learning.oreilly.com/library/view/~/9781788990189</a> <a href="https://learning.oreilly.com/library/view/~/9781788990189/?ar">https://learning.oreilly.com/library/view/~/9781788990189/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical cyber intelligence : how action-based intelligence can be an effective response to incidents ent://SD_ILS/0/SD_ILS:2316348 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Bautista, Wilson, Jr., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788625562">https://learning.oreilly.com/library/view/~/9781788625562</a> <a href="https://learning.oreilly.com/library/view/~/9781788625562/?ar">https://learning.oreilly.com/library/view/~/9781788625562/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn social engineering : learn the art of human hacking with an internationally renowned expert ent://SD_ILS/0/SD_ILS:2316546 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar">https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788837927/?ar">https://learning.oreilly.com/library/view/~/9781788837927/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security with pfSense : architect, deploy, and operate enterprise-grade firewalls ent://SD_ILS/0/SD_ILS:2317295 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Aggarwal, Manuj, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789532975">https://learning.oreilly.com/library/view/~/9781789532975</a> <a href="https://learning.oreilly.com/library/view/~/9781789532975/?ar">https://learning.oreilly.com/library/view/~/9781789532975/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789532975/?ar">https://go.oreilly.com/library-access/library/view/-/9781789532975/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOps ent://SD_ILS/0/SD_ILS:2317298 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Hsu, Tony, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788995504/?ar">https://learning.oreilly.com/library/view/~/9781788995504/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995504">https://learning.oreilly.com/library/view/~/9781788995504</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar</a><br/>Format:&#160;Electronic Resources<br/> Open source intelligence methods and tools : a practical guide to online intelligence ent://SD_ILS/0/SD_ILS:2316916 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232132">https://learning.oreilly.com/library/view/~/9781484232132</a> <a href="https://learning.oreilly.com/library/view/~/9781484232132/?ar">https://learning.oreilly.com/library/view/~/9781484232132/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar</a><br/>Format:&#160;Electronic Resources<br/> Industrial cybersecurity : efficiently secure critical infrastructure systems ent://SD_ILS/0/SD_ILS:2314674 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788395151/?ar">https://learning.oreilly.com/library/view/~/9781788395151/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar">https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788395151">https://learning.oreilly.com/library/view/~/9781788395151</a><br/>Format:&#160;Electronic Resources<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:2311609 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Griffor, Edward R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128038383/?ar">https://learning.oreilly.com/library/view/~/9780128038383/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar">https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128038383">https://learning.oreilly.com/library/view/~/9780128038383</a><br/>Format:&#160;Electronic Resources<br/> Cloud computing security : foundations and challenges ent://SD_ILS/0/SD_ILS:2311524 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:2311833 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128093658/?ar">https://learning.oreilly.com/library/view/~/9780128093658/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar">https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128093658">https://learning.oreilly.com/library/view/~/9780128093658</a><br/>Format:&#160;Electronic Resources<br/> Network forensics ent://SD_ILS/0/SD_ILS:2313739 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119328285">https://learning.oreilly.com/library/view/~/9781119328285</a> <a href="https://learning.oreilly.com/library/view/~/9781119328285/?ar">https://learning.oreilly.com/library/view/~/9781119328285/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119328285/?ar">https://go.oreilly.com/library-access/library/view/-/9781119328285/?ar</a><br/>Format:&#160;Electronic Resources<br/> IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices ent://SD_ILS/0/SD_ILS:2315099 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Guzman, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787280571/?ar">https://learning.oreilly.com/library/view/~/9781787280571/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787280571">https://learning.oreilly.com/library/view/~/9781787280571</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar">https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent training : take your security awareness program to the next level ent://SD_ILS/0/SD_ILS:2313452 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Schroeder, Jordan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484228357/?ar">https://learning.oreilly.com/library/view/~/9781484228357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484228357">https://learning.oreilly.com/library/view/~/9781484228357</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux, the ultimate hackers' arsenal ent://SD_ILS/0/SD_ILS:2313803 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787120235/?ar">https://learning.oreilly.com/library/view/~/9781787120235/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar">https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security on Azure : an IT professionals guide to Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2313788 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484227404/?ar">https://learning.oreilly.com/library/view/~/9781484227404/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484227404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484227404/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484227404">https://learning.oreilly.com/library/view/~/9781484227404</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2313301 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128039298">https://learning.oreilly.com/library/view/~/9780128039298</a> <a href="https://learning.oreilly.com/library/view/~/9780128039298/?ar">https://learning.oreilly.com/library/view/~/9780128039298/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar">https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world ent://SD_ILS/0/SD_ILS:2311027 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785889639">https://learning.oreilly.com/library/view/~/9781785889639</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785889639/?ar">https://learning.oreilly.com/library/view/~/9781785889639/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:2310991 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format:&#160;Electronic Resources<br/> Wireless communications security : solutions for the internet of things ent://SD_ILS/0/SD_ILS:2311624 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Penttinen, Jyrki T. J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119084396/?ar">https://learning.oreilly.com/library/view/~/9781119084396/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar">https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2309318 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar">https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119154686/?ar">https://learning.oreilly.com/library/view/~/9781119154686/?ar</a><br/>Format:&#160;Electronic Resources<br/> Essential cybersecurity science : build, test, and evaluate secure systems ent://SD_ILS/0/SD_ILS:2309193 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking and penetration testing guide ent://SD_ILS/0/SD_ILS:2314673 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Baloch, Rafay, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781351381345/?ar">https://learning.oreilly.com/library/view/~/9781351381345/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar">https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing systems : applied security architecture and threat models ent://SD_ILS/0/SD_ILS:2307464 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Schoenfield, Brook S. E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482233988/?ar">https://go.oreilly.com/library-access/library/view/-/9781482233988/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482233988/?ar">https://learning.oreilly.com/library/view/~/9781482233988/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482233988">https://learning.oreilly.com/library/view/~/9781482233988</a><br/>Format:&#160;Electronic Resources<br/> Getting started with Windows Server Security : develop and implement a secure Microsoft infrastructure platform using native and built-in tools ent://SD_ILS/0/SD_ILS:2306681 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Sivarajan, Santhosh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784398729/?ar">https://learning.oreilly.com/library/view/~/9781784398729/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781784398729/?ar">https://go.oreilly.com/library-access/library/view/-/9781784398729/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning penetration testing with Python : utilize Python scripting to execute effective and efficient penetration tests ent://SD_ILS/0/SD_ILS:2308640 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785282324/?ar">https://learning.oreilly.com/library/view/~/9781785282324/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785282324">https://learning.oreilly.com/library/view/~/9781785282324</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar">https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber operations : building, defending, and attacking modern computer networks ent://SD_ILS/0/SD_ILS:2308678 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;O'Leary, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484204573">https://learning.oreilly.com/library/view/~/9781484204573</a> <a href="https://learning.oreilly.com/library/view/~/9781484204573/?ar">https://learning.oreilly.com/library/view/~/9781484204573/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar">https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar</a><br/>Format:&#160;Electronic Resources<br/> The network security test lab : a step-by-step guide ent://SD_ILS/0/SD_ILS:2308043 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118987056/?ar">https://learning.oreilly.com/library/view/~/9781118987056/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar">https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118987056">https://learning.oreilly.com/library/view/~/9781118987056</a><br/>Format:&#160;Electronic Resources<br/> The security consultant's handbook ent://SD_ILS/0/SD_ILS:2309072 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Bingley, Richard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287500">https://learning.oreilly.com/library/view/~/9781849287500</a> <a href="https://learning.oreilly.com/library/view/~/9781849287500/?ar">https://learning.oreilly.com/library/view/~/9781849287500/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar</a><br/>Format:&#160;Electronic Resources<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:2301474 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;DeFranco, Joanna F.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466564527/?ar">https://learning.oreilly.com/library/view/~/9781466564527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466564527">https://learning.oreilly.com/library/view/~/9781466564527</a><br/>Format:&#160;Electronic Resources<br/> Hacking with Kali : practical penetration testing techniques ent://SD_ILS/0/SD_ILS:2301946 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Broad, James.<br/><a href="https://learning.oreilly.com/library/view/~/9780124077492">https://learning.oreilly.com/library/view/~/9780124077492</a> <a href="https://learning.oreilly.com/library/view/~/9780124077492/?ar">https://learning.oreilly.com/library/view/~/9780124077492/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar">https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security breaches : avoidance treatment based on ISO27001 ent://SD_ILS/0/SD_ILS:2304041 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285841/?ar">https://learning.oreilly.com/library/view/~/9781849285841/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing information security ent://SD_ILS/0/SD_ILS:2300537 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Vacca, John R., editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166882/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166882/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124166882/?ar">https://learning.oreilly.com/library/view/~/9780124166882/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed : unified communications &amp; VoIP security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2301998 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Collier, Mark D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071798761">https://learning.oreilly.com/library/view/~/9780071798761</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071798761/?ar">https://go.oreilly.com/library-access/library/view/-/9780071798761/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071798761/?ar">https://learning.oreilly.com/library/view/~/9780071798761/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:2303294 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format:&#160;Electronic Resources<br/> Anti-hacker tool kit. ent://SD_ILS/0/SD_ILS:2303630 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Shema, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar">https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071800143/?ar">https://learning.oreilly.com/library/view/~/9780071800143/?ar</a><br/>Format:&#160;Electronic Resources<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:2302234 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Pathan, Al-Sakib Khan, editor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482203523">https://learning.oreilly.com/library/view/~/9781482203523</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar">https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482203523/?ar">https://learning.oreilly.com/library/view/~/9781482203523/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:2302626 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format:&#160;Electronic Resources<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:2303267 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Stapleton, Jeffrey James.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592155">https://learning.oreilly.com/library/view/~/9781466592155</a> <a href="https://learning.oreilly.com/library/view/~/9781466592155/?ar">https://learning.oreilly.com/library/view/~/9781466592155/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar</a><br/>Format:&#160;Electronic Resources<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:2303092 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Middleton, Bruce, 1953- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482206470">https://learning.oreilly.com/library/view/~/9781482206470</a> <a href="https://learning.oreilly.com/library/view/~/9781482206470/?ar">https://learning.oreilly.com/library/view/~/9781482206470/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar">https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar</a><br/>Format:&#160;Electronic Resources<br/> RESTful Java web services security : secure your RESTful applications against common vulnerabilities ent://SD_ILS/0/SD_ILS:2304094 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Enr&iacute;quez, Ren&eacute;.<br/><a href="https://learning.oreilly.com/library/view/~/9781783980109/?ar">https://learning.oreilly.com/library/view/~/9781783980109/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783980109/?ar">https://go.oreilly.com/library-access/library/view/-/9781783980109/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:2301150 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Cherry, Denny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000113/?ar">https://learning.oreilly.com/library/view/~/9780128000113/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000113">https://learning.oreilly.com/library/view/~/9780128000113</a><br/>Format:&#160;Electronic Resources<br/> The Browser Hacker's Handbook ent://SD_ILS/0/SD_ILS:2302347 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Alcorn, Wade.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118662090/?ar">https://go.oreilly.com/library-access/library/view/-/9781118662090/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118662090/?ar">https://learning.oreilly.com/library/view/~/9781118662090/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118662090">https://learning.oreilly.com/library/view/~/9781118662090</a><br/>Format:&#160;Electronic Resources<br/> Information security : principles and practices ent://SD_ILS/0/SD_ILS:2303412 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format:&#160;Electronic Resources<br/> Intrusion detection networks : a key to collaborative security ent://SD_ILS/0/SD_ILS:2301112 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Fung, Carol, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466564121/?ar">https://learning.oreilly.com/library/view/~/9781466564121/?ar</a><br/>Format:&#160;Electronic Resources<br/> 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy ent://SD_ILS/0/SD_ILS:2304861 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format:&#160;Electronic Resources<br/> Practical anonymity : hiding in plain sight online ent://SD_ILS/0/SD_ILS:2299515 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Loshin, Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar">https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124104044/?ar">https://learning.oreilly.com/library/view/~/9780124104044/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS : a pocket guide ent://SD_ILS/0/SD_ILS:2302895 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Calder, Alan, 1957-<br/><a href="https://learning.oreilly.com/library/view/~/9781849285551">https://learning.oreilly.com/library/view/~/9781849285551</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285551/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285551/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285551/?ar">https://learning.oreilly.com/library/view/~/9781849285551/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to computer networks and cybersecurity ent://SD_ILS/0/SD_ILS:2305578 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Wu, Chwan-Hwa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar">https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466572133/?ar">https://learning.oreilly.com/library/view/~/9781466572133/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security patterns in practice : designing secure architectures using software patterns ent://SD_ILS/0/SD_ILS:2300767 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Fernandez, Eduardo B., 1936-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar">https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119970484/?ar">https://learning.oreilly.com/library/view/~/9781119970484/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119970484">https://learning.oreilly.com/library/view/~/9781119970484</a><br/>Format:&#160;Electronic Resources<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:2297534 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Yang, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047020">https://learning.oreilly.com/library/view/~/9780124047020</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124047020/?ar">https://learning.oreilly.com/library/view/~/9780124047020/?ar</a><br/>Format:&#160;Electronic Resources<br/> Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day ent://SD_ILS/0/SD_ILS:2298053 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Yerrid, K. C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519960/?ar">https://learning.oreilly.com/library/view/~/9781849519960/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519960">https://learning.oreilly.com/library/view/~/9781849519960</a><br/>Format:&#160;Electronic Resources<br/> Web Application Defender's Cookbook : Battling Hackers and Protecting Users. ent://SD_ILS/0/SD_ILS:2298453 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Barnett, Ryan C.<br/><a href="https://learning.oreilly.com/library/view/~/9781118417058/?ar">https://learning.oreilly.com/library/view/~/9781118417058/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar">https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118417058">https://learning.oreilly.com/library/view/~/9781118417058</a><br/>Format:&#160;Electronic Resources<br/> Iris biometric model for secured network access ent://SD_ILS/0/SD_ILS:2298466 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;El Khoury, Franjieh.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502147/?ar">https://learning.oreilly.com/library/view/~/9781466502147/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466502147">https://learning.oreilly.com/library/view/~/9781466502147</a><br/>Format:&#160;Electronic Resources<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:2297537 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Radvanovsky, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502260/?ar">https://learning.oreilly.com/library/view/~/9781466502260/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466502260">https://learning.oreilly.com/library/view/~/9781466502260</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2298336 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar">https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118380956/?ar">https://learning.oreilly.com/library/view/~/9781118380956/?ar</a><br/>Format:&#160;Electronic Resources<br/> UTM security with Fortinet : Mastering FortiOS ent://SD_ILS/0/SD_ILS:2296617 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Tam, Kenneth.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497473/?ar">https://learning.oreilly.com/library/view/~/9781597497473/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497473">https://learning.oreilly.com/library/view/~/9781597497473</a><br/>Format:&#160;Electronic Resources<br/> Introduction to computer and network security : navigating shades of gray ent://SD_ILS/0/SD_ILS:2313482 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format:&#160;Electronic Resources<br/> The tangled Web : a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:2293949 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Zalewski, Michal.<br/><a href="https://learning.oreilly.com/library/view/~/9781593273880">https://learning.oreilly.com/library/view/~/9781593273880</a> <a href="https://learning.oreilly.com/library/view/~/9781593273880/?ar">https://learning.oreilly.com/library/view/~/9781593273880/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar</a><br/>Format:&#160;Electronic Resources<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:2293442 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Speed, Tyler Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar">https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439809839/?ar">https://learning.oreilly.com/library/view/~/9781439809839/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing : protecting networks and systems ent://SD_ILS/0/SD_ILS:2295898 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Henry, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283731">https://learning.oreilly.com/library/view/~/9781849283731</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849283731/?ar">https://learning.oreilly.com/library/view/~/9781849283731/?ar</a><br/>Format:&#160;Electronic Resources<br/> Once more unto the breach : managing information security in an uncertain world ent://SD_ILS/0/SD_ILS:2298022 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a> <a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:2296625 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Winterfeld, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047372/?ar">https://learning.oreilly.com/library/view/~/9780124047372/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124047372">https://learning.oreilly.com/library/view/~/9780124047372</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed : web applications : web application security secrets and solutions ent://SD_ILS/0/SD_ILS:2290273 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Scambray, Joel.<br/><a href="https://learning.oreilly.com/library/view/~/9780071740647/?ar">https://learning.oreilly.com/library/view/~/9780071740647/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar">https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:2291226 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Davis, Chris (Christopher Michael)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071742382/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742382/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071742382/?ar">https://learning.oreilly.com/library/view/~/9780071742382/?ar</a><br/>Format:&#160;Electronic Resources<br/> CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:2291661 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Canavan, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar">https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470916216/?ar">https://learning.oreilly.com/library/view/~/9780470916216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470916216">https://learning.oreilly.com/library/view/~/9780470916216</a><br/>Format:&#160;Electronic Resources<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:2290966 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Davies, Joshua A. (Joshua Aaron)<br/><a href="https://learning.oreilly.com/library/view/~/9780470920411/?ar">https://learning.oreilly.com/library/view/~/9780470920411/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar">https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470920411">https://learning.oreilly.com/library/view/~/9780470920411</a><br/>Format:&#160;Electronic Resources<br/> Web commerce security : design and development ent://SD_ILS/0/SD_ILS:2292686 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Nahari, Hadi.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar">https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470624463/?ar">https://learning.oreilly.com/library/view/~/9780470624463/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470624463">https://learning.oreilly.com/library/view/~/9780470624463</a><br/>Format:&#160;Electronic Resources<br/> Honeypot : a new paradigm to information security ent://SD_ILS/0/SD_ILS:2292506 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Joshi, R. C.<br/><a href="https://learning.oreilly.com/library/view/~/9781578087082">https://learning.oreilly.com/library/view/~/9781578087082</a> <a href="https://learning.oreilly.com/library/view/~/9781578087082/?ar">https://learning.oreilly.com/library/view/~/9781578087082/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar">https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS : a Practical Guide to implementing and Maintaining Compliance. ent://SD_ILS/0/SD_ILS:2291381 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Wright, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281881">https://learning.oreilly.com/library/view/~/9781849281881</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281881/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281881/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281881/?ar">https://learning.oreilly.com/library/view/~/9781849281881/?ar</a><br/>Format:&#160;Electronic Resources<br/> Preventing good people from doing bad things : implementing least privilege ent://SD_ILS/0/SD_ILS:2293278 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Unified Access Gateway 2010 ent://SD_ILS/0/SD_ILS:2290710 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Diogenes, Yuri.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735656758/?ar">https://learning.oreilly.com/library/view/~/9780735656758/?ar</a><br/>Format:&#160;Electronic Resources<br/> Designing an IAM framework with Oracle Identity and access management suite ent://SD_ILS/0/SD_ILS:2289729 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Scheidel, Jeff.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar">https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071741378/?ar">https://learning.oreilly.com/library/view/~/9780071741378/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071741378">https://learning.oreilly.com/library/view/~/9780071741378</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics : a pocket guide ent://SD_ILS/0/SD_ILS:2289616 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security risk management for ISO27001/ISO27002 ent://SD_ILS/0/SD_ILS:2291936 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281492/?ar">https://learning.oreilly.com/library/view/~/9781849281492/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281492">https://learning.oreilly.com/library/view/~/9781849281492</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Protection 2010 for Exchange Server ent://SD_ILS/0/SD_ILS:2290701 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656734/?ar">https://learning.oreilly.com/library/view/~/9780735656734/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Threat Management Gateway 2010 ent://SD_ILS/0/SD_ILS:2290730 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656741/?ar">https://learning.oreilly.com/library/view/~/9780735656741/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar</a><br/>Format:&#160;Electronic Resources<br/> Apache : receptury ent://SD_ILS/0/SD_ILS:2296868 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Bowen, Richard Cooper, 1971-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176425/?ar">https://learning.oreilly.com/library/view/~/9781457176425/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176425">https://learning.oreilly.com/library/view/~/9781457176425</a><br/>Format:&#160;Electronic Resources<br/> Digital identity ent://SD_ILS/0/SD_ILS:2293288 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Windley, Phillip J., 1958-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008783/?ar">https://go.oreilly.com/library-access/library/view/-/0596008783/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008783/?ar">https://learning.oreilly.com/library/view/~/0596008783/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008783">https://learning.oreilly.com/library/view/~/0596008783</a><br/>Format:&#160;Electronic Resources<br/> Managing security with Snort and IDS tools ent://SD_ILS/0/SD_ILS:2291450 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Cox, Kerry.<br/><a href="https://learning.oreilly.com/library/view/~/0596006616">https://learning.oreilly.com/library/view/~/0596006616</a> <a href="https://learning.oreilly.com/library/view/~/0596006616/?ar">https://learning.oreilly.com/library/view/~/0596006616/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596006616/?ar">https://go.oreilly.com/library-access/library/view/-/0596006616/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hardening Cisco routers ent://SD_ILS/0/SD_ILS:2293283 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Akin, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/0596001665/?ar">https://learning.oreilly.com/library/view/~/0596001665/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596001665">https://learning.oreilly.com/library/view/~/0596001665</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596001665/?ar">https://go.oreilly.com/library-access/library/view/-/0596001665/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building Internet Firewalls : Internet and Web security ent://SD_ILS/0/SD_ILS:2293287 2024-05-28T03:53:55Z 2024-05-28T03:53:55Z by&#160;Zwicky, Elizabeth D.<br/><a href="https://learning.oreilly.com/library/view/~/1565928717">https://learning.oreilly.com/library/view/~/1565928717</a> <a href="https://learning.oreilly.com/library/view/~/1565928717/?ar">https://learning.oreilly.com/library/view/~/1565928717/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1565928717/?ar">https://go.oreilly.com/library-access/library/view/-/1565928717/?ar</a><br/>Format:&#160;Electronic Resources<br/>