Search Results for - Narrowed by: Sécurité informatique. - 2014SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026ps$003d300?2024-05-30T18:21:23ZPlatform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engineent://SD_ILS/0/SD_ILS:23042752024-05-30T18:21:23Z2024-05-30T18:21:23Zby Ruan, Xiaoyu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265726/?ar">https://learning.oreilly.com/library/view/~/9781430265726/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430265726">https://learning.oreilly.com/library/view/~/9781430265726</a><br/>Format: Electronic Resources<br/>Securing cloud servicesent://SD_ILS/0/SD_ILS:23061212024-05-30T18:21:23Z2024-05-30T18:21:23Zby Miller, David, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar">https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771373340/?ar">https://learning.oreilly.com/videos/~/9781771373340/?ar</a><br/>Format: Electronic Resources<br/>The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memoryent://SD_ILS/0/SD_ILS:23067472024-05-30T18:21:23Z2024-05-30T18:21:23Zby Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9781118824993/?ar">https://learning.oreilly.com/library/view/~/9781118824993/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar">https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar</a><br/>Format: Electronic Resources<br/>Salt at scale : lessons from LinkedInent://SD_ILS/0/SD_ILS:23082162024-05-30T18:21:23Z2024-05-30T18:21:23Zby Sebenik, Craig, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491920893/?ar">https://learning.oreilly.com/videos/~/9781491920893/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar">https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar</a><br/>Format: Electronic Resources<br/>Official (ISC)2 guide to the CSSLP CBKent://SD_ILS/0/SD_ILS:23003032024-05-30T18:21:23Z2024-05-30T18:21:23Zby Paul, Mano.<br/><a href="https://learning.oreilly.com/library/view/~/9781466571273">https://learning.oreilly.com/library/view/~/9781466571273</a>
<a href="https://learning.oreilly.com/library/view/~/9781466571273/?ar">https://learning.oreilly.com/library/view/~/9781466571273/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar">https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar</a><br/>Format: Electronic Resources<br/>Core software security : security at the sourceent://SD_ILS/0/SD_ILS:23016412024-05-30T18:21:23Z2024-05-30T18:21:23Zby Ransome, James F., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466560963">https://learning.oreilly.com/library/view/~/9781466560963</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar">https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466560963/?ar">https://learning.oreilly.com/library/view/~/9781466560963/?ar</a><br/>Format: Electronic Resources<br/>Data-Driven Security : Analysis, Visualization and Dashboards.ent://SD_ILS/0/SD_ILS:23015562024-05-30T18:21:23Z2024-05-30T18:21:23Zby Jacobs, Jay (Data analyst)<br/><a href="https://learning.oreilly.com/library/view/~/9781118793824">https://learning.oreilly.com/library/view/~/9781118793824</a>
<a href="https://learning.oreilly.com/library/view/~/9781118793824/?ar">https://learning.oreilly.com/library/view/~/9781118793824/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar">https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar</a><br/>Format: Electronic Resources<br/>Security management : a critical thinking approachent://SD_ILS/0/SD_ILS:23015622024-05-30T18:21:23Z2024-05-30T18:21:23Zby Land, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781466561779">https://learning.oreilly.com/library/view/~/9781466561779</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466561779/?ar">https://go.oreilly.com/library-access/library/view/-/9781466561779/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466561779/?ar">https://learning.oreilly.com/library/view/~/9781466561779/?ar</a><br/>Format: Electronic Resources<br/>Anonymizing health data : case studies and methods to get you startedent://SD_ILS/0/SD_ILS:23015932024-05-30T18:21:23Z2024-05-30T18:21:23Zby El Emam, Khaled.<br/><a href="https://learning.oreilly.com/library/view/~/9781449363062">https://learning.oreilly.com/library/view/~/9781449363062</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781449363062/?ar">https://go.oreilly.com/library-access/library/view/-/9781449363062/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449363062/?ar">https://learning.oreilly.com/library/view/~/9781449363062/?ar</a><br/>Format: Electronic Resources<br/>Intrusion detection networks : a key to collaborative securityent://SD_ILS/0/SD_ILS:23011122024-05-30T18:21:23Z2024-05-30T18:21:23Zby Fung, Carol, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564121/?ar">https://learning.oreilly.com/library/view/~/9781466564121/?ar</a><br/>Format: Electronic Resources<br/>Identity and access management : business performance through connected intelligenceent://SD_ILS/0/SD_ILS:23019312024-05-30T18:21:23Z2024-05-30T18:21:23Zby Osmanoglu, T. Ertem.<br/><a href="https://learning.oreilly.com/library/view/~/9780124081406/?ar">https://learning.oreilly.com/library/view/~/9780124081406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124081406">https://learning.oreilly.com/library/view/~/9780124081406</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar">https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar</a><br/>Format: Electronic Resources<br/>VCP5-DVC official cert training : VMware certified professional : data center virtualization (Exam VCP 550)ent://SD_ILS/0/SD_ILS:23025742024-05-30T18:21:23Z2024-05-30T18:21:23Zby Ferguson, Bill.<br/><a href="https://learning.oreilly.com/videos/~/9780133838176/?ar">https://learning.oreilly.com/videos/~/9780133838176/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133838176/?ar">https://go.oreilly.com/library-access/library/view/-/9780133838176/?ar</a><br/>Format: Electronic Resources<br/>Hacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:23026232024-05-30T18:21:23Z2024-05-30T18:21:23Zby Gomzin, Slava, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118810071/?ar">https://learning.oreilly.com/library/view/~/9781118810071/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810071">https://learning.oreilly.com/library/view/~/9781118810071</a><br/>Format: Electronic Resources<br/>Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscationent://SD_ILS/0/SD_ILS:23026252024-05-30T18:21:23Z2024-05-30T18:21:23Zby Dang, Bruce, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118787397/?ar">https://learning.oreilly.com/library/view/~/9781118787397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar">https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118787397">https://learning.oreilly.com/library/view/~/9781118787397</a><br/>Format: Electronic Resources<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:23026262024-05-30T18:21:23Z2024-05-30T18:21:23Zby Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format: Electronic Resources<br/>Black hat Python : Python programming for hackers and pentestersent://SD_ILS/0/SD_ILS:23056592024-05-30T18:21:23Z2024-05-30T18:21:23Zby Seitz, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar">https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457189807/?ar">https://learning.oreilly.com/library/view/~/9781457189807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457189807">https://learning.oreilly.com/library/view/~/9781457189807</a><br/>Format: Electronic Resources<br/>Building an information security awareness program : defending against social engineering and technical threatsent://SD_ILS/0/SD_ILS:23039522024-05-30T18:21:23Z2024-05-30T18:21:23Zby Gardner, Bill (Bill G.)<br/><a href="https://learning.oreilly.com/library/view/~/9780124199675">https://learning.oreilly.com/library/view/~/9780124199675</a>
<a href="https://learning.oreilly.com/library/view/~/9780124199675/?ar">https://learning.oreilly.com/library/view/~/9780124199675/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124199675/?ar">https://go.oreilly.com/library-access/library/view/-/9780124199675/?ar</a><br/>Format: Electronic Resources<br/>VMware vSphere Security Cookbook : Over 75 practical recipes to help you successfully secure your vSphere environmentent://SD_ILS/0/SD_ILS:23055192024-05-30T18:21:23Z2024-05-30T18:21:23Zby Greer, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782170341/?ar">https://learning.oreilly.com/library/view/~/9781782170341/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782170341/?ar">https://go.oreilly.com/library-access/library/view/-/9781782170341/?ar</a><br/>Format: Electronic Resources<br/>The privacy engineer's manifesto : getting from policy to code to QA to valueent://SD_ILS/0/SD_ILS:23022962024-05-30T18:21:23Z2024-05-30T18:21:23Zby Dennedy, Michelle Finneran.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263555">https://learning.oreilly.com/library/view/~/9781430263555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430263555/?ar">https://learning.oreilly.com/library/view/~/9781430263555/?ar</a><br/>Format: Electronic Resources<br/>Windows 8.1 administration pocket consultant : storage, security, & Networkingent://SD_ILS/0/SD_ILS:23023022024-05-30T18:21:23Z2024-05-30T18:21:23Zby Stanek, William R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735685536/?ar">https://go.oreilly.com/library-access/library/view/-/9780735685536/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735685536/?ar">https://learning.oreilly.com/library/view/~/9780735685536/?ar</a><br/>Format: Electronic Resources<br/>Enhanced networking on IBM z/VSEent://SD_ILS/0/SD_ILS:23024132024-05-30T18:21:23Z2024-05-30T18:21:23Zby Schmidbauer, Joerg.<br/><a href="https://learning.oreilly.com/library/view/~/0738439088/?ar">https://learning.oreilly.com/library/view/~/0738439088/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738439088/?ar">https://go.oreilly.com/library-access/library/view/-/0738439088/?ar</a><br/>Format: Electronic Resources<br/>Security for service oriented architecturesent://SD_ILS/0/SD_ILS:23032922024-05-30T18:21:23Z2024-05-30T18:21:23Zby Williams, Walter (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584044">https://learning.oreilly.com/library/view/~/9781466584044</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466584044/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466584044/?ar">https://learning.oreilly.com/library/view/~/9781466584044/?ar</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:23032942024-05-30T18:21:23Z2024-05-30T18:21:23Zby Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approachent://SD_ILS/0/SD_ILS:23034752024-05-30T18:21:23Z2024-05-30T18:21:23Zby Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar">https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782162223/?ar">https://learning.oreilly.com/library/view/~/9781782162223/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:23025922024-05-30T18:21:23Z2024-05-30T18:21:23Zby Carvey, Harlan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124171572/?ar">https://learning.oreilly.com/library/view/~/9780124171572/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment toolsent://SD_ILS/0/SD_ILS:23033122024-05-30T18:21:23Z2024-05-30T18:21:23Zby Makan, Keith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar">https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849695107/?ar">https://learning.oreilly.com/library/view/~/9781849695107/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849695107">https://learning.oreilly.com/library/view/~/9781849695107</a><br/>Format: Electronic Resources<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:23034482024-05-30T18:21:23Z2024-05-30T18:21:23Zby Ulsch, N. MacDonnell, 1951-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar">https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118935958/?ar">https://learning.oreilly.com/library/view/~/9781118935958/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118935958">https://learning.oreilly.com/library/view/~/9781118935958</a><br/>Format: Electronic Resources<br/>Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environmentent://SD_ILS/0/SD_ILS:23040392024-05-30T18:21:23Z2024-05-30T18:21:23Zby Mehan, Julie E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285728/?ar">https://learning.oreilly.com/library/view/~/9781849285728/?ar</a><br/>Format: Electronic Resources<br/>Information security breaches : avoidance treatment based on ISO27001ent://SD_ILS/0/SD_ILS:23040412024-05-30T18:21:23Z2024-05-30T18:21:23Zby Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285841/?ar">https://learning.oreilly.com/library/view/~/9781849285841/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar</a><br/>Format: Electronic Resources<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:23022342024-05-30T18:21:23Z2024-05-30T18:21:23Zby Pathan, Al-Sakib Khan, editor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482203523">https://learning.oreilly.com/library/view/~/9781482203523</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar">https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482203523/?ar">https://learning.oreilly.com/library/view/~/9781482203523/?ar</a><br/>Format: Electronic Resources<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:23031052024-05-30T18:21:23Z2024-05-30T18:21:23Zby Messier, Ric.<br/><a href="https://learning.oreilly.com/library/view/~/9780124170407/?ar">https://learning.oreilly.com/library/view/~/9780124170407/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar">https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar</a><br/>Format: Electronic Resources<br/>CompTIA security+ (SYO-401) : complete video courseent://SD_ILS/0/SD_ILS:23041062024-05-30T18:21:23Z2024-05-30T18:21:23Zby Shannon, Michael J.<br/><a href="https://learning.oreilly.com/videos/~/9780133888706/?ar">https://learning.oreilly.com/videos/~/9780133888706/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133888706/?ar">https://go.oreilly.com/library-access/library/view/-/9780133888706/?ar</a><br/>Format: Electronic Resources<br/>Advanced API security : securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWEent://SD_ILS/0/SD_ILS:23042762024-05-30T18:21:23Z2024-05-30T18:21:23Zby Siriwardena, Prabath, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430268178">https://learning.oreilly.com/library/view/~/9781430268178</a>
<a href="https://learning.oreilly.com/library/view/~/9781430268178/?ar">https://learning.oreilly.com/library/view/~/9781430268178/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430268178/?ar">https://go.oreilly.com/library-access/library/view/-/9781430268178/?ar</a><br/>Format: Electronic Resources<br/>Incident response & computer forensicsent://SD_ILS/0/SD_ILS:23048742024-05-30T18:21:23Z2024-05-30T18:21:23Zby Luttgens, Jason T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071798686/?ar">https://go.oreilly.com/library-access/library/view/-/9780071798686/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071798686/?ar">https://learning.oreilly.com/library/view/~/9780071798686/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071798686">https://learning.oreilly.com/library/view/~/9780071798686</a><br/>Format: Electronic Resources<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:23032672024-05-30T18:21:23Z2024-05-30T18:21:23Zby Stapleton, Jeffrey James.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592155">https://learning.oreilly.com/library/view/~/9781466592155</a>
<a href="https://learning.oreilly.com/library/view/~/9781466592155/?ar">https://learning.oreilly.com/library/view/~/9781466592155/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar</a><br/>Format: Electronic Resources<br/>Cloud management and securityent://SD_ILS/0/SD_ILS:23032822024-05-30T18:21:23Z2024-05-30T18:21:23Zby Abbadi, Imad M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118817094/?ar">https://learning.oreilly.com/library/view/~/9781118817094/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118817094/?ar">https://go.oreilly.com/library-access/library/view/-/9781118817094/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118817094">https://learning.oreilly.com/library/view/~/9781118817094</a><br/>Format: Electronic Resources<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:23034122024-05-30T18:21:23Z2024-05-30T18:21:23Zby Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format: Electronic Resources<br/>Online security for the business travelerent://SD_ILS/0/SD_ILS:23042462024-05-30T18:21:23Z2024-05-30T18:21:23Zby Gonzalez, Deborah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000694">https://learning.oreilly.com/library/view/~/9780128000694</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128000694/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000694/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000694/?ar">https://learning.oreilly.com/library/view/~/9780128000694/?ar</a><br/>Format: Electronic Resources<br/>10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacyent://SD_ILS/0/SD_ILS:23048612024-05-30T18:21:23Z2024-05-30T18:21:23Zby Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format: Electronic Resources<br/>CompTIA Security+ent://SD_ILS/0/SD_ILS:23049062024-05-30T18:21:23Z2024-05-30T18:21:23Zby Long, Mark.<br/><a href="https://learning.oreilly.com/videos/~/9781771372831/?ar">https://learning.oreilly.com/videos/~/9781771372831/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar">https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar</a><br/>Format: Electronic Resources<br/>Managing information security breaches : studies from real lifeent://SD_ILS/0/SD_ILS:23088362024-05-30T18:21:23Z2024-05-30T18:21:23Zby Krausz, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285964/?ar">https://learning.oreilly.com/library/view/~/9781849285964/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar</a><br/>Format: Electronic Resources<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:23088442024-05-30T18:21:23Z2024-05-30T18:21:23Zby Vladimirov, Andrew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849286008/?ar">https://go.oreilly.com/library-access/library/view/-/9781849286008/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849286008/?ar">https://learning.oreilly.com/library/view/~/9781849286008/?ar</a><br/>Format: Electronic Resources<br/>Computer incident response and forensics team management : conducting a successful incident responseent://SD_ILS/0/SD_ILS:23006702024-05-30T18:21:23Z2024-05-30T18:21:23Zby Johnson, Leighton, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499965/?ar">https://learning.oreilly.com/library/view/~/9781597499965/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499965">https://learning.oreilly.com/library/view/~/9781597499965</a><br/>Format: Electronic Resources<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:23011502024-05-30T18:21:23Z2024-05-30T18:21:23Zby Cherry, Denny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113/?ar">https://learning.oreilly.com/library/view/~/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113">https://learning.oreilly.com/library/view/~/9780128000113</a><br/>Format: Electronic Resources<br/>Mastering Windows Server 2012 R2ent://SD_ILS/0/SD_ILS:23011522024-05-30T18:21:23Z2024-05-30T18:21:23Zby Minasi, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar">https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118289426/?ar">https://learning.oreilly.com/library/view/~/9781118289426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118289426">https://learning.oreilly.com/library/view/~/9781118289426</a><br/>Format: Electronic Resources<br/>The basics of IT audit : Purposes, processes, and practical information.ent://SD_ILS/0/SD_ILS:23015012024-05-30T18:21:23Z2024-05-30T18:21:23Zby Gantz, Stephen D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596/?ar">https://learning.oreilly.com/library/view/~/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596">https://learning.oreilly.com/library/view/~/9780124171596</a><br/>Format: Electronic Resources<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:23001802024-05-30T18:21:23Z2024-05-30T18:21:23Zby Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format: Electronic Resources<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:23014742024-05-30T18:21:23Z2024-05-30T18:21:23Zby DeFranco, Joanna F.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564527/?ar">https://learning.oreilly.com/library/view/~/9781466564527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564527">https://learning.oreilly.com/library/view/~/9781466564527</a><br/>Format: Electronic Resources<br/>Cybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:23015242024-05-30T18:21:23Z2024-05-30T18:21:23Zby Mowbray, Thomas J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar">https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115/?ar">https://learning.oreilly.com/library/view/~/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115">https://learning.oreilly.com/library/view/~/9781118697115</a><br/>Format: Electronic Resources<br/>