Search Results for - Narrowed by: Réseaux d'ordinateurs -- Sécurité -- Mesures. - COMPUTERS -- Security -- General.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$0026ps$003d300?2024-05-28T03:53:55ZKali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testingent://SD_ILS/0/SD_ILS:23198472024-05-28T03:53:55Z2024-05-28T03:53:55Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format: Electronic Resources<br/>Linux® hardening in hostile networks : server security from TLS to TORent://SD_ILS/0/SD_ILS:23141772024-05-28T03:53:55Z2024-05-28T03:53:55Zby Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format: Electronic Resources<br/>Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchainent://SD_ILS/0/SD_ILS:23170922024-05-28T03:53:55Z2024-05-28T03:53:55Zby Gupta, Rajneesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990189">https://learning.oreilly.com/library/view/~/9781788990189</a>
<a href="https://learning.oreilly.com/library/view/~/9781788990189/?ar">https://learning.oreilly.com/library/view/~/9781788990189/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar</a><br/>Format: Electronic Resources<br/>Practical cyber intelligence : how action-based intelligence can be an effective response to incidentsent://SD_ILS/0/SD_ILS:23163482024-05-28T03:53:55Z2024-05-28T03:53:55Zby Bautista, Wilson, Jr., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788625562">https://learning.oreilly.com/library/view/~/9781788625562</a>
<a href="https://learning.oreilly.com/library/view/~/9781788625562/?ar">https://learning.oreilly.com/library/view/~/9781788625562/?ar</a><br/>Format: Electronic Resources<br/>Learn social engineering : learn the art of human hacking with an internationally renowned expertent://SD_ILS/0/SD_ILS:23165462024-05-28T03:53:55Z2024-05-28T03:53:55Zby Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar">https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788837927/?ar">https://learning.oreilly.com/library/view/~/9781788837927/?ar</a><br/>Format: Electronic Resources<br/>Network security with pfSense : architect, deploy, and operate enterprise-grade firewallsent://SD_ILS/0/SD_ILS:23172952024-05-28T03:53:55Z2024-05-28T03:53:55Zby Aggarwal, Manuj, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789532975">https://learning.oreilly.com/library/view/~/9781789532975</a>
<a href="https://learning.oreilly.com/library/view/~/9781789532975/?ar">https://learning.oreilly.com/library/view/~/9781789532975/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789532975/?ar">https://go.oreilly.com/library-access/library/view/-/9781789532975/?ar</a><br/>Format: Electronic Resources<br/>Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOpsent://SD_ILS/0/SD_ILS:23172982024-05-28T03:53:55Z2024-05-28T03:53:55Zby Hsu, Tony, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788995504/?ar">https://learning.oreilly.com/library/view/~/9781788995504/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995504">https://learning.oreilly.com/library/view/~/9781788995504</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995504/?ar</a><br/>Format: Electronic Resources<br/>Open source intelligence methods and tools : a practical guide to online intelligenceent://SD_ILS/0/SD_ILS:23169162024-05-28T03:53:55Z2024-05-28T03:53:55Zby Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232132">https://learning.oreilly.com/library/view/~/9781484232132</a>
<a href="https://learning.oreilly.com/library/view/~/9781484232132/?ar">https://learning.oreilly.com/library/view/~/9781484232132/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar</a><br/>Format: Electronic Resources<br/>Industrial cybersecurity : efficiently secure critical infrastructure systemsent://SD_ILS/0/SD_ILS:23146742024-05-28T03:53:55Z2024-05-28T03:53:55Zby Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788395151/?ar">https://learning.oreilly.com/library/view/~/9781788395151/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar">https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788395151">https://learning.oreilly.com/library/view/~/9781788395151</a><br/>Format: Electronic Resources<br/>Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systemsent://SD_ILS/0/SD_ILS:23116092024-05-28T03:53:55Z2024-05-28T03:53:55Zby Griffor, Edward R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128038383/?ar">https://learning.oreilly.com/library/view/~/9780128038383/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar">https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128038383">https://learning.oreilly.com/library/view/~/9780128038383</a><br/>Format: Electronic Resources<br/>Cloud computing security : foundations and challengesent://SD_ILS/0/SD_ILS:23115242024-05-28T03:53:55Z2024-05-28T03:53:55Zby Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format: Electronic Resources<br/>Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategiesent://SD_ILS/0/SD_ILS:23118332024-05-28T03:53:55Z2024-05-28T03:53:55Zby Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128093658/?ar">https://learning.oreilly.com/library/view/~/9780128093658/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar">https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128093658">https://learning.oreilly.com/library/view/~/9780128093658</a><br/>Format: Electronic Resources<br/>Network forensicsent://SD_ILS/0/SD_ILS:23137392024-05-28T03:53:55Z2024-05-28T03:53:55Zby Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119328285">https://learning.oreilly.com/library/view/~/9781119328285</a>
<a href="https://learning.oreilly.com/library/view/~/9781119328285/?ar">https://learning.oreilly.com/library/view/~/9781119328285/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119328285/?ar">https://go.oreilly.com/library-access/library/view/-/9781119328285/?ar</a><br/>Format: Electronic Resources<br/>IoT penetration testing cookbook : identify vulnerabilities and secure your smart devicesent://SD_ILS/0/SD_ILS:23150992024-05-28T03:53:55Z2024-05-28T03:53:55Zby Guzman, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787280571/?ar">https://learning.oreilly.com/library/view/~/9781787280571/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787280571">https://learning.oreilly.com/library/view/~/9781787280571</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar">https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar</a><br/>Format: Electronic Resources<br/>Advanced persistent training : take your security awareness program to the next levelent://SD_ILS/0/SD_ILS:23134522024-05-28T03:53:55Z2024-05-28T03:53:55Zby Schroeder, Jordan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228357/?ar">https://learning.oreilly.com/library/view/~/9781484228357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228357">https://learning.oreilly.com/library/view/~/9781484228357</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux, the ultimate hackers' arsenalent://SD_ILS/0/SD_ILS:23138032024-05-28T03:53:55Z2024-05-28T03:53:55Zby Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787120235/?ar">https://learning.oreilly.com/library/view/~/9781787120235/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar">https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar</a><br/>Format: Electronic Resources<br/>Cyber security on Azure : an IT professionals guide to Microsoft Azure security centerent://SD_ILS/0/SD_ILS:23137882024-05-28T03:53:55Z2024-05-28T03:53:55Zby Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484227404/?ar">https://learning.oreilly.com/library/view/~/9781484227404/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484227404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484227404/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484227404">https://learning.oreilly.com/library/view/~/9781484227404</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:23133012024-05-28T03:53:55Z2024-05-28T03:53:55Zby Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128039298">https://learning.oreilly.com/library/view/~/9780128039298</a>
<a href="https://learning.oreilly.com/library/view/~/9780128039298/?ar">https://learning.oreilly.com/library/view/~/9780128039298/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar">https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar</a><br/>Format: Electronic Resources<br/>Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldent://SD_ILS/0/SD_ILS:23110272024-05-28T03:53:55Z2024-05-28T03:53:55Zby Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785889639">https://learning.oreilly.com/library/view/~/9781785889639</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889639/?ar">https://learning.oreilly.com/library/view/~/9781785889639/?ar</a><br/>Format: Electronic Resources<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:23109912024-05-28T03:53:55Z2024-05-28T03:53:55Zby Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format: Electronic Resources<br/>Wireless communications security : solutions for the internet of thingsent://SD_ILS/0/SD_ILS:23116242024-05-28T03:53:55Z2024-05-28T03:53:55Zby Penttinen, Jyrki T. J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119084396/?ar">https://learning.oreilly.com/library/view/~/9781119084396/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar">https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar</a><br/>Format: Electronic Resources<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:23093182024-05-28T03:53:55Z2024-05-28T03:53:55Zby Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar">https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119154686/?ar">https://learning.oreilly.com/library/view/~/9781119154686/?ar</a><br/>Format: Electronic Resources<br/>Essential cybersecurity science : build, test, and evaluate secure systemsent://SD_ILS/0/SD_ILS:23091932024-05-28T03:53:55Z2024-05-28T03:53:55Zby Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking and penetration testing guideent://SD_ILS/0/SD_ILS:23146732024-05-28T03:53:55Z2024-05-28T03:53:55Zby Baloch, Rafay, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781351381345/?ar">https://learning.oreilly.com/library/view/~/9781351381345/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar">https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar</a><br/>Format: Electronic Resources<br/>Securing systems : applied security architecture and threat modelsent://SD_ILS/0/SD_ILS:23074642024-05-28T03:53:55Z2024-05-28T03:53:55Zby Schoenfield, Brook S. E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482233988/?ar">https://go.oreilly.com/library-access/library/view/-/9781482233988/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482233988/?ar">https://learning.oreilly.com/library/view/~/9781482233988/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482233988">https://learning.oreilly.com/library/view/~/9781482233988</a><br/>Format: Electronic Resources<br/>Getting started with Windows Server Security : develop and implement a secure Microsoft infrastructure platform using native and built-in toolsent://SD_ILS/0/SD_ILS:23066812024-05-28T03:53:55Z2024-05-28T03:53:55Zby Sivarajan, Santhosh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784398729/?ar">https://learning.oreilly.com/library/view/~/9781784398729/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781784398729/?ar">https://go.oreilly.com/library-access/library/view/-/9781784398729/?ar</a><br/>Format: Electronic Resources<br/>Learning penetration testing with Python : utilize Python scripting to execute effective and efficient penetration testsent://SD_ILS/0/SD_ILS:23086402024-05-28T03:53:55Z2024-05-28T03:53:55Zby Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785282324/?ar">https://learning.oreilly.com/library/view/~/9781785282324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785282324">https://learning.oreilly.com/library/view/~/9781785282324</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar">https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar</a><br/>Format: Electronic Resources<br/>Cyber operations : building, defending, and attacking modern computer networksent://SD_ILS/0/SD_ILS:23086782024-05-28T03:53:55Z2024-05-28T03:53:55Zby O'Leary, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484204573">https://learning.oreilly.com/library/view/~/9781484204573</a>
<a href="https://learning.oreilly.com/library/view/~/9781484204573/?ar">https://learning.oreilly.com/library/view/~/9781484204573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar">https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar</a><br/>Format: Electronic Resources<br/>The network security test lab : a step-by-step guideent://SD_ILS/0/SD_ILS:23080432024-05-28T03:53:55Z2024-05-28T03:53:55Zby Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118987056/?ar">https://learning.oreilly.com/library/view/~/9781118987056/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar">https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118987056">https://learning.oreilly.com/library/view/~/9781118987056</a><br/>Format: Electronic Resources<br/>The security consultant's handbookent://SD_ILS/0/SD_ILS:23090722024-05-28T03:53:55Z2024-05-28T03:53:55Zby Bingley, Richard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287500">https://learning.oreilly.com/library/view/~/9781849287500</a>
<a href="https://learning.oreilly.com/library/view/~/9781849287500/?ar">https://learning.oreilly.com/library/view/~/9781849287500/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287500/?ar</a><br/>Format: Electronic Resources<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:23014742024-05-28T03:53:55Z2024-05-28T03:53:55Zby DeFranco, Joanna F.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564527/?ar">https://learning.oreilly.com/library/view/~/9781466564527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564527">https://learning.oreilly.com/library/view/~/9781466564527</a><br/>Format: Electronic Resources<br/>Hacking with Kali : practical penetration testing techniquesent://SD_ILS/0/SD_ILS:23019462024-05-28T03:53:55Z2024-05-28T03:53:55Zby Broad, James.<br/><a href="https://learning.oreilly.com/library/view/~/9780124077492">https://learning.oreilly.com/library/view/~/9780124077492</a>
<a href="https://learning.oreilly.com/library/view/~/9780124077492/?ar">https://learning.oreilly.com/library/view/~/9780124077492/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar">https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar</a><br/>Format: Electronic Resources<br/>Information security breaches : avoidance treatment based on ISO27001ent://SD_ILS/0/SD_ILS:23040412024-05-28T03:53:55Z2024-05-28T03:53:55Zby Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285841/?ar">https://learning.oreilly.com/library/view/~/9781849285841/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar</a><br/>Format: Electronic Resources<br/>Managing information securityent://SD_ILS/0/SD_ILS:23005372024-05-28T03:53:55Z2024-05-28T03:53:55Zby Vacca, John R., editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166882/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166882/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124166882/?ar">https://learning.oreilly.com/library/view/~/9780124166882/?ar</a><br/>Format: Electronic Resources<br/>Hacking exposed : unified communications & VoIP security secrets & solutionsent://SD_ILS/0/SD_ILS:23019982024-05-28T03:53:55Z2024-05-28T03:53:55Zby Collier, Mark D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071798761">https://learning.oreilly.com/library/view/~/9780071798761</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071798761/?ar">https://go.oreilly.com/library-access/library/view/-/9780071798761/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071798761/?ar">https://learning.oreilly.com/library/view/~/9780071798761/?ar</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:23032942024-05-28T03:53:55Z2024-05-28T03:53:55Zby Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format: Electronic Resources<br/>Anti-hacker tool kit.ent://SD_ILS/0/SD_ILS:23036302024-05-28T03:53:55Z2024-05-28T03:53:55Zby Shema, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar">https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071800143/?ar">https://learning.oreilly.com/library/view/~/9780071800143/?ar</a><br/>Format: Electronic Resources<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:23022342024-05-28T03:53:55Z2024-05-28T03:53:55Zby Pathan, Al-Sakib Khan, editor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482203523">https://learning.oreilly.com/library/view/~/9781482203523</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar">https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482203523/?ar">https://learning.oreilly.com/library/view/~/9781482203523/?ar</a><br/>Format: Electronic Resources<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:23026262024-05-28T03:53:55Z2024-05-28T03:53:55Zby Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format: Electronic Resources<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:23032672024-05-28T03:53:55Z2024-05-28T03:53:55Zby Stapleton, Jeffrey James.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592155">https://learning.oreilly.com/library/view/~/9781466592155</a>
<a href="https://learning.oreilly.com/library/view/~/9781466592155/?ar">https://learning.oreilly.com/library/view/~/9781466592155/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar</a><br/>Format: Electronic Resources<br/>Conducting network penetration and espionage in a global environmentent://SD_ILS/0/SD_ILS:23030922024-05-28T03:53:55Z2024-05-28T03:53:55Zby Middleton, Bruce, 1953- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482206470">https://learning.oreilly.com/library/view/~/9781482206470</a>
<a href="https://learning.oreilly.com/library/view/~/9781482206470/?ar">https://learning.oreilly.com/library/view/~/9781482206470/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar">https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar</a><br/>Format: Electronic Resources<br/>RESTful Java web services security : secure your RESTful applications against common vulnerabilitiesent://SD_ILS/0/SD_ILS:23040942024-05-28T03:53:55Z2024-05-28T03:53:55Zby Enríquez, René.<br/><a href="https://learning.oreilly.com/library/view/~/9781783980109/?ar">https://learning.oreilly.com/library/view/~/9781783980109/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783980109/?ar">https://go.oreilly.com/library-access/library/view/-/9781783980109/?ar</a><br/>Format: Electronic Resources<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:23011502024-05-28T03:53:55Z2024-05-28T03:53:55Zby Cherry, Denny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113/?ar">https://learning.oreilly.com/library/view/~/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113">https://learning.oreilly.com/library/view/~/9780128000113</a><br/>Format: Electronic Resources<br/>The Browser Hacker's Handbookent://SD_ILS/0/SD_ILS:23023472024-05-28T03:53:55Z2024-05-28T03:53:55Zby Alcorn, Wade.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118662090/?ar">https://go.oreilly.com/library-access/library/view/-/9781118662090/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118662090/?ar">https://learning.oreilly.com/library/view/~/9781118662090/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118662090">https://learning.oreilly.com/library/view/~/9781118662090</a><br/>Format: Electronic Resources<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:23034122024-05-28T03:53:55Z2024-05-28T03:53:55Zby Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format: Electronic Resources<br/>Intrusion detection networks : a key to collaborative securityent://SD_ILS/0/SD_ILS:23011122024-05-28T03:53:55Z2024-05-28T03:53:55Zby Fung, Carol, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564121/?ar">https://learning.oreilly.com/library/view/~/9781466564121/?ar</a><br/>Format: Electronic Resources<br/>10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacyent://SD_ILS/0/SD_ILS:23048612024-05-28T03:53:55Z2024-05-28T03:53:55Zby Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format: Electronic Resources<br/>Practical anonymity : hiding in plain sight onlineent://SD_ILS/0/SD_ILS:22995152024-05-28T03:53:55Z2024-05-28T03:53:55Zby Loshin, Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar">https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124104044/?ar">https://learning.oreilly.com/library/view/~/9780124104044/?ar</a><br/>Format: Electronic Resources<br/>PCI DSS : a pocket guideent://SD_ILS/0/SD_ILS:23028952024-05-28T03:53:55Z2024-05-28T03:53:55Zby Calder, Alan, 1957-<br/><a href="https://learning.oreilly.com/library/view/~/9781849285551">https://learning.oreilly.com/library/view/~/9781849285551</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285551/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285551/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285551/?ar">https://learning.oreilly.com/library/view/~/9781849285551/?ar</a><br/>Format: Electronic Resources<br/>Introduction to computer networks and cybersecurityent://SD_ILS/0/SD_ILS:23055782024-05-28T03:53:55Z2024-05-28T03:53:55Zby Wu, Chwan-Hwa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar">https://go.oreilly.com/library-access/library/view/-/9781466572133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466572133/?ar">https://learning.oreilly.com/library/view/~/9781466572133/?ar</a><br/>Format: Electronic Resources<br/>Security patterns in practice : designing secure architectures using software patternsent://SD_ILS/0/SD_ILS:23007672024-05-28T03:53:55Z2024-05-28T03:53:55Zby Fernandez, Eduardo B., 1936-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar">https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119970484/?ar">https://learning.oreilly.com/library/view/~/9781119970484/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119970484">https://learning.oreilly.com/library/view/~/9781119970484</a><br/>Format: Electronic Resources<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:22975342024-05-28T03:53:55Z2024-05-28T03:53:55Zby Yang, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047020">https://learning.oreilly.com/library/view/~/9780124047020</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124047020/?ar">https://learning.oreilly.com/library/view/~/9780124047020/?ar</a><br/>Format: Electronic Resources<br/>Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this dayent://SD_ILS/0/SD_ILS:22980532024-05-28T03:53:55Z2024-05-28T03:53:55Zby Yerrid, K. C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960/?ar">https://learning.oreilly.com/library/view/~/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960">https://learning.oreilly.com/library/view/~/9781849519960</a><br/>Format: Electronic Resources<br/>Web Application Defender's Cookbook : Battling Hackers and Protecting Users.ent://SD_ILS/0/SD_ILS:22984532024-05-28T03:53:55Z2024-05-28T03:53:55Zby Barnett, Ryan C.<br/><a href="https://learning.oreilly.com/library/view/~/9781118417058/?ar">https://learning.oreilly.com/library/view/~/9781118417058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar">https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118417058">https://learning.oreilly.com/library/view/~/9781118417058</a><br/>Format: Electronic Resources<br/>Iris biometric model for secured network accessent://SD_ILS/0/SD_ILS:22984662024-05-28T03:53:55Z2024-05-28T03:53:55Zby El Khoury, Franjieh.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502147/?ar">https://learning.oreilly.com/library/view/~/9781466502147/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466502147">https://learning.oreilly.com/library/view/~/9781466502147</a><br/>Format: Electronic Resources<br/>Handbook of SCADA/control systems securityent://SD_ILS/0/SD_ILS:22975372024-05-28T03:53:55Z2024-05-28T03:53:55Zby Radvanovsky, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502260/?ar">https://learning.oreilly.com/library/view/~/9781466502260/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466502260">https://learning.oreilly.com/library/view/~/9781466502260</a><br/>Format: Electronic Resources<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:22983362024-05-28T03:53:55Z2024-05-28T03:53:55Zby Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar">https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118380956/?ar">https://learning.oreilly.com/library/view/~/9781118380956/?ar</a><br/>Format: Electronic Resources<br/>UTM security with Fortinet : Mastering FortiOSent://SD_ILS/0/SD_ILS:22966172024-05-28T03:53:55Z2024-05-28T03:53:55Zby Tam, Kenneth.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497473/?ar">https://learning.oreilly.com/library/view/~/9781597497473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497473">https://learning.oreilly.com/library/view/~/9781597497473</a><br/>Format: Electronic Resources<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:23134822024-05-28T03:53:55Z2024-05-28T03:53:55Zby Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format: Electronic Resources<br/>The tangled Web : a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:22939492024-05-28T03:53:55Z2024-05-28T03:53:55Zby Zalewski, Michal.<br/><a href="https://learning.oreilly.com/library/view/~/9781593273880">https://learning.oreilly.com/library/view/~/9781593273880</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273880/?ar">https://learning.oreilly.com/library/view/~/9781593273880/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar</a><br/>Format: Electronic Resources<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:22934422024-05-28T03:53:55Z2024-05-28T03:53:55Zby Speed, Tyler Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar">https://go.oreilly.com/library-access/library/view/-/9781439809839/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439809839/?ar">https://learning.oreilly.com/library/view/~/9781439809839/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing : protecting networks and systemsent://SD_ILS/0/SD_ILS:22958982024-05-28T03:53:55Z2024-05-28T03:53:55Zby Henry, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283731">https://learning.oreilly.com/library/view/~/9781849283731</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283731/?ar">https://learning.oreilly.com/library/view/~/9781849283731/?ar</a><br/>Format: Electronic Resources<br/>Once more unto the breach : managing information security in an uncertain worldent://SD_ILS/0/SD_ILS:22980222024-05-28T03:53:55Z2024-05-28T03:53:55Zby Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format: Electronic Resources<br/>The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practiceent://SD_ILS/0/SD_ILS:22966252024-05-28T03:53:55Z2024-05-28T03:53:55Zby Winterfeld, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047372/?ar">https://learning.oreilly.com/library/view/~/9780124047372/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124047372">https://learning.oreilly.com/library/view/~/9780124047372</a><br/>Format: Electronic Resources<br/>Hacking exposed : web applications : web application security secrets and solutionsent://SD_ILS/0/SD_ILS:22902732024-05-28T03:53:55Z2024-05-28T03:53:55Zby Scambray, Joel.<br/><a href="https://learning.oreilly.com/library/view/~/9780071740647/?ar">https://learning.oreilly.com/library/view/~/9780071740647/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar">https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar</a><br/>Format: Electronic Resources<br/>IT auditing : using controls to protect information assetsent://SD_ILS/0/SD_ILS:22912262024-05-28T03:53:55Z2024-05-28T03:53:55Zby Davis, Chris (Christopher Michael)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071742382/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071742382/?ar">https://learning.oreilly.com/library/view/~/9780071742382/?ar</a><br/>Format: Electronic Resources<br/>CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:22916612024-05-28T03:53:55Z2024-05-28T03:53:55Zby Canavan, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar">https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216/?ar">https://learning.oreilly.com/library/view/~/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216">https://learning.oreilly.com/library/view/~/9780470916216</a><br/>Format: Electronic Resources<br/>Implementing SSL/TLS using cryptography and PKIent://SD_ILS/0/SD_ILS:22909662024-05-28T03:53:55Z2024-05-28T03:53:55Zby Davies, Joshua A. (Joshua Aaron)<br/><a href="https://learning.oreilly.com/library/view/~/9780470920411/?ar">https://learning.oreilly.com/library/view/~/9780470920411/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar">https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470920411">https://learning.oreilly.com/library/view/~/9780470920411</a><br/>Format: Electronic Resources<br/>Web commerce security : design and developmentent://SD_ILS/0/SD_ILS:22926862024-05-28T03:53:55Z2024-05-28T03:53:55Zby Nahari, Hadi.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar">https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470624463/?ar">https://learning.oreilly.com/library/view/~/9780470624463/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470624463">https://learning.oreilly.com/library/view/~/9780470624463</a><br/>Format: Electronic Resources<br/>Honeypot : a new paradigm to information securityent://SD_ILS/0/SD_ILS:22925062024-05-28T03:53:55Z2024-05-28T03:53:55Zby Joshi, R. C.<br/><a href="https://learning.oreilly.com/library/view/~/9781578087082">https://learning.oreilly.com/library/view/~/9781578087082</a>
<a href="https://learning.oreilly.com/library/view/~/9781578087082/?ar">https://learning.oreilly.com/library/view/~/9781578087082/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar">https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar</a><br/>Format: Electronic Resources<br/>PCI DSS : a Practical Guide to implementing and Maintaining Compliance.ent://SD_ILS/0/SD_ILS:22913812024-05-28T03:53:55Z2024-05-28T03:53:55Zby Wright, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281881">https://learning.oreilly.com/library/view/~/9781849281881</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281881/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281881/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281881/?ar">https://learning.oreilly.com/library/view/~/9781849281881/?ar</a><br/>Format: Electronic Resources<br/>Preventing good people from doing bad things : implementing least privilegeent://SD_ILS/0/SD_ILS:22932782024-05-28T03:53:55Z2024-05-28T03:53:55Zby Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format: Electronic Resources<br/>Deploying Microsoft Forefront Unified Access Gateway 2010ent://SD_ILS/0/SD_ILS:22907102024-05-28T03:53:55Z2024-05-28T03:53:55Zby Diogenes, Yuri.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735656758/?ar">https://learning.oreilly.com/library/view/~/9780735656758/?ar</a><br/>Format: Electronic Resources<br/>Designing an IAM framework with Oracle Identity and access management suiteent://SD_ILS/0/SD_ILS:22897292024-05-28T03:53:55Z2024-05-28T03:53:55Zby Scheidel, Jeff.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar">https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071741378/?ar">https://learning.oreilly.com/library/view/~/9780071741378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071741378">https://learning.oreilly.com/library/view/~/9780071741378</a><br/>Format: Electronic Resources<br/>Computer forensics : a pocket guideent://SD_ILS/0/SD_ILS:22896162024-05-28T03:53:55Z2024-05-28T03:53:55Zby Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format: Electronic Resources<br/>Information security risk management for ISO27001/ISO27002ent://SD_ILS/0/SD_ILS:22919362024-05-28T03:53:55Z2024-05-28T03:53:55Zby Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281492/?ar">https://learning.oreilly.com/library/view/~/9781849281492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281492">https://learning.oreilly.com/library/view/~/9781849281492</a><br/>Format: Electronic Resources<br/>Deploying Microsoft Forefront Protection 2010 for Exchange Serverent://SD_ILS/0/SD_ILS:22907012024-05-28T03:53:55Z2024-05-28T03:53:55Zby Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656734/?ar">https://learning.oreilly.com/library/view/~/9780735656734/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar</a><br/>Format: Electronic Resources<br/>Deploying Microsoft Forefront Threat Management Gateway 2010ent://SD_ILS/0/SD_ILS:22907302024-05-28T03:53:55Z2024-05-28T03:53:55Zby Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656741/?ar">https://learning.oreilly.com/library/view/~/9780735656741/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar</a><br/>Format: Electronic Resources<br/>Apache : recepturyent://SD_ILS/0/SD_ILS:22968682024-05-28T03:53:55Z2024-05-28T03:53:55Zby Bowen, Richard Cooper, 1971-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176425/?ar">https://learning.oreilly.com/library/view/~/9781457176425/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176425">https://learning.oreilly.com/library/view/~/9781457176425</a><br/>Format: Electronic Resources<br/>Digital identityent://SD_ILS/0/SD_ILS:22932882024-05-28T03:53:55Z2024-05-28T03:53:55Zby Windley, Phillip J., 1958-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008783/?ar">https://go.oreilly.com/library-access/library/view/-/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783/?ar">https://learning.oreilly.com/library/view/~/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783">https://learning.oreilly.com/library/view/~/0596008783</a><br/>Format: Electronic Resources<br/>Managing security with Snort and IDS toolsent://SD_ILS/0/SD_ILS:22914502024-05-28T03:53:55Z2024-05-28T03:53:55Zby Cox, Kerry.<br/><a href="https://learning.oreilly.com/library/view/~/0596006616">https://learning.oreilly.com/library/view/~/0596006616</a>
<a href="https://learning.oreilly.com/library/view/~/0596006616/?ar">https://learning.oreilly.com/library/view/~/0596006616/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006616/?ar">https://go.oreilly.com/library-access/library/view/-/0596006616/?ar</a><br/>Format: Electronic Resources<br/>Hardening Cisco routersent://SD_ILS/0/SD_ILS:22932832024-05-28T03:53:55Z2024-05-28T03:53:55Zby Akin, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/0596001665/?ar">https://learning.oreilly.com/library/view/~/0596001665/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596001665">https://learning.oreilly.com/library/view/~/0596001665</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596001665/?ar">https://go.oreilly.com/library-access/library/view/-/0596001665/?ar</a><br/>Format: Electronic Resources<br/>Building Internet Firewalls : Internet and Web securityent://SD_ILS/0/SD_ILS:22932872024-05-28T03:53:55Z2024-05-28T03:53:55Zby Zwicky, Elizabeth D.<br/><a href="https://learning.oreilly.com/library/view/~/1565928717">https://learning.oreilly.com/library/view/~/1565928717</a>
<a href="https://learning.oreilly.com/library/view/~/1565928717/?ar">https://learning.oreilly.com/library/view/~/1565928717/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1565928717/?ar">https://go.oreilly.com/library-access/library/view/-/1565928717/?ar</a><br/>Format: Electronic Resources<br/>