Search Results for - Narrowed by: S&eacute;curit&eacute; informatique. - 2014 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026ps$003d300? 2024-05-30T18:21:23Z Platform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engine ent://SD_ILS/0/SD_ILS:2304275 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Ruan, Xiaoyu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265726/?ar">https://learning.oreilly.com/library/view/~/9781430265726/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430265726">https://learning.oreilly.com/library/view/~/9781430265726</a><br/>Format:&#160;Electronic Resources<br/> Securing cloud services ent://SD_ILS/0/SD_ILS:2306121 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Miller, David, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar">https://go.oreilly.com/library-access/library/view/-/9781771373340/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771373340/?ar">https://learning.oreilly.com/videos/~/9781771373340/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory ent://SD_ILS/0/SD_ILS:2306747 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9781118824993/?ar">https://learning.oreilly.com/library/view/~/9781118824993/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar">https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar</a><br/>Format:&#160;Electronic Resources<br/> Salt at scale : lessons from LinkedIn ent://SD_ILS/0/SD_ILS:2308216 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Sebenik, Craig, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491920893/?ar">https://learning.oreilly.com/videos/~/9781491920893/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar">https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar</a><br/>Format:&#160;Electronic Resources<br/> Official (ISC)2 guide to the CSSLP CBK ent://SD_ILS/0/SD_ILS:2300303 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Paul, Mano.<br/><a href="https://learning.oreilly.com/library/view/~/9781466571273">https://learning.oreilly.com/library/view/~/9781466571273</a> <a href="https://learning.oreilly.com/library/view/~/9781466571273/?ar">https://learning.oreilly.com/library/view/~/9781466571273/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar">https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar</a><br/>Format:&#160;Electronic Resources<br/> Core software security : security at the source ent://SD_ILS/0/SD_ILS:2301641 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Ransome, James F., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466560963">https://learning.oreilly.com/library/view/~/9781466560963</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar">https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466560963/?ar">https://learning.oreilly.com/library/view/~/9781466560963/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data-Driven Security : Analysis, Visualization and Dashboards. ent://SD_ILS/0/SD_ILS:2301556 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Jacobs, Jay (Data analyst)<br/><a href="https://learning.oreilly.com/library/view/~/9781118793824">https://learning.oreilly.com/library/view/~/9781118793824</a> <a href="https://learning.oreilly.com/library/view/~/9781118793824/?ar">https://learning.oreilly.com/library/view/~/9781118793824/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar">https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security management : a critical thinking approach ent://SD_ILS/0/SD_ILS:2301562 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Land, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781466561779">https://learning.oreilly.com/library/view/~/9781466561779</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466561779/?ar">https://go.oreilly.com/library-access/library/view/-/9781466561779/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466561779/?ar">https://learning.oreilly.com/library/view/~/9781466561779/?ar</a><br/>Format:&#160;Electronic Resources<br/> Anonymizing health data : case studies and methods to get you started ent://SD_ILS/0/SD_ILS:2301593 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;El Emam, Khaled.<br/><a href="https://learning.oreilly.com/library/view/~/9781449363062">https://learning.oreilly.com/library/view/~/9781449363062</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781449363062/?ar">https://go.oreilly.com/library-access/library/view/-/9781449363062/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781449363062/?ar">https://learning.oreilly.com/library/view/~/9781449363062/?ar</a><br/>Format:&#160;Electronic Resources<br/> Intrusion detection networks : a key to collaborative security ent://SD_ILS/0/SD_ILS:2301112 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Fung, Carol, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466564121/?ar">https://learning.oreilly.com/library/view/~/9781466564121/?ar</a><br/>Format:&#160;Electronic Resources<br/> Identity and access management : business performance through connected intelligence ent://SD_ILS/0/SD_ILS:2301931 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Osmanoglu, T. Ertem.<br/><a href="https://learning.oreilly.com/library/view/~/9780124081406/?ar">https://learning.oreilly.com/library/view/~/9780124081406/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124081406">https://learning.oreilly.com/library/view/~/9780124081406</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar">https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar</a><br/>Format:&#160;Electronic Resources<br/> VCP5-DVC official cert training : VMware certified professional : data center virtualization (Exam VCP 550) ent://SD_ILS/0/SD_ILS:2302574 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Ferguson, Bill.<br/><a href="https://learning.oreilly.com/videos/~/9780133838176/?ar">https://learning.oreilly.com/videos/~/9780133838176/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133838176/?ar">https://go.oreilly.com/library-access/library/view/-/9780133838176/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking point of sale : payment application secrets, threats, and solutions ent://SD_ILS/0/SD_ILS:2302623 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Gomzin, Slava, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118810071/?ar">https://learning.oreilly.com/library/view/~/9781118810071/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810071">https://learning.oreilly.com/library/view/~/9781118810071</a><br/>Format:&#160;Electronic Resources<br/> Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation ent://SD_ILS/0/SD_ILS:2302625 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Dang, Bruce, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118787397/?ar">https://learning.oreilly.com/library/view/~/9781118787397/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar">https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118787397">https://learning.oreilly.com/library/view/~/9781118787397</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:2302626 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format:&#160;Electronic Resources<br/> Black hat Python : Python programming for hackers and pentesters ent://SD_ILS/0/SD_ILS:2305659 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Seitz, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar">https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457189807/?ar">https://learning.oreilly.com/library/view/~/9781457189807/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457189807">https://learning.oreilly.com/library/view/~/9781457189807</a><br/>Format:&#160;Electronic Resources<br/> Building an information security awareness program : defending against social engineering and technical threats ent://SD_ILS/0/SD_ILS:2303952 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Gardner, Bill (Bill G.)<br/><a href="https://learning.oreilly.com/library/view/~/9780124199675">https://learning.oreilly.com/library/view/~/9780124199675</a> <a href="https://learning.oreilly.com/library/view/~/9780124199675/?ar">https://learning.oreilly.com/library/view/~/9780124199675/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124199675/?ar">https://go.oreilly.com/library-access/library/view/-/9780124199675/?ar</a><br/>Format:&#160;Electronic Resources<br/> VMware vSphere Security Cookbook : Over 75 practical recipes to help you successfully secure your vSphere environment ent://SD_ILS/0/SD_ILS:2305519 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Greer, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782170341/?ar">https://learning.oreilly.com/library/view/~/9781782170341/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782170341/?ar">https://go.oreilly.com/library-access/library/view/-/9781782170341/?ar</a><br/>Format:&#160;Electronic Resources<br/> The privacy engineer's manifesto : getting from policy to code to QA to value ent://SD_ILS/0/SD_ILS:2302296 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Dennedy, Michelle Finneran.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263555">https://learning.oreilly.com/library/view/~/9781430263555</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430263555/?ar">https://learning.oreilly.com/library/view/~/9781430263555/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows 8.1 administration pocket consultant : storage, security, &amp; Networking ent://SD_ILS/0/SD_ILS:2302302 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Stanek, William R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735685536/?ar">https://go.oreilly.com/library-access/library/view/-/9780735685536/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735685536/?ar">https://learning.oreilly.com/library/view/~/9780735685536/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enhanced networking on IBM z/VSE ent://SD_ILS/0/SD_ILS:2302413 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Schmidbauer, Joerg.<br/><a href="https://learning.oreilly.com/library/view/~/0738439088/?ar">https://learning.oreilly.com/library/view/~/0738439088/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738439088/?ar">https://go.oreilly.com/library-access/library/view/-/0738439088/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security for service oriented architectures ent://SD_ILS/0/SD_ILS:2303292 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Williams, Walter (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584044">https://learning.oreilly.com/library/view/~/9781466584044</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466584044/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584044/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466584044/?ar">https://learning.oreilly.com/library/view/~/9781466584044/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:2303294 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach ent://SD_ILS/0/SD_ILS:2303475 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar">https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782162223/?ar">https://learning.oreilly.com/library/view/~/9781782162223/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:2302592 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Carvey, Harlan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124171572/?ar">https://learning.oreilly.com/library/view/~/9780124171572/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools ent://SD_ILS/0/SD_ILS:2303312 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Makan, Keith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar">https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849695107/?ar">https://learning.oreilly.com/library/view/~/9781849695107/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849695107">https://learning.oreilly.com/library/view/~/9781849695107</a><br/>Format:&#160;Electronic Resources<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:2303448 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Ulsch, N. MacDonnell, 1951-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar">https://go.oreilly.com/library-access/library/view/-/9781118935958/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118935958/?ar">https://learning.oreilly.com/library/view/~/9781118935958/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118935958">https://learning.oreilly.com/library/view/~/9781118935958</a><br/>Format:&#160;Electronic Resources<br/> Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environment ent://SD_ILS/0/SD_ILS:2304039 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Mehan, Julie E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285728/?ar">https://learning.oreilly.com/library/view/~/9781849285728/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security breaches : avoidance treatment based on ISO27001 ent://SD_ILS/0/SD_ILS:2304041 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285841/?ar">https://learning.oreilly.com/library/view/~/9781849285841/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar</a><br/>Format:&#160;Electronic Resources<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:2302234 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Pathan, Al-Sakib Khan, editor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482203523">https://learning.oreilly.com/library/view/~/9781482203523</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar">https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482203523/?ar">https://learning.oreilly.com/library/view/~/9781482203523/?ar</a><br/>Format:&#160;Electronic Resources<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:2303105 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Messier, Ric.<br/><a href="https://learning.oreilly.com/library/view/~/9780124170407/?ar">https://learning.oreilly.com/library/view/~/9780124170407/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar">https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar</a><br/>Format:&#160;Electronic Resources<br/> CompTIA security+ (SYO-401) : complete video course ent://SD_ILS/0/SD_ILS:2304106 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Shannon, Michael J.<br/><a href="https://learning.oreilly.com/videos/~/9780133888706/?ar">https://learning.oreilly.com/videos/~/9780133888706/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133888706/?ar">https://go.oreilly.com/library-access/library/view/-/9780133888706/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced API security : securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE ent://SD_ILS/0/SD_ILS:2304276 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Siriwardena, Prabath, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430268178">https://learning.oreilly.com/library/view/~/9781430268178</a> <a href="https://learning.oreilly.com/library/view/~/9781430268178/?ar">https://learning.oreilly.com/library/view/~/9781430268178/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430268178/?ar">https://go.oreilly.com/library-access/library/view/-/9781430268178/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident response &amp; computer forensics ent://SD_ILS/0/SD_ILS:2304874 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Luttgens, Jason T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071798686/?ar">https://go.oreilly.com/library-access/library/view/-/9780071798686/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071798686/?ar">https://learning.oreilly.com/library/view/~/9780071798686/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071798686">https://learning.oreilly.com/library/view/~/9780071798686</a><br/>Format:&#160;Electronic Resources<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:2303267 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Stapleton, Jeffrey James.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592155">https://learning.oreilly.com/library/view/~/9781466592155</a> <a href="https://learning.oreilly.com/library/view/~/9781466592155/?ar">https://learning.oreilly.com/library/view/~/9781466592155/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud management and security ent://SD_ILS/0/SD_ILS:2303282 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Abbadi, Imad M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118817094/?ar">https://learning.oreilly.com/library/view/~/9781118817094/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118817094/?ar">https://go.oreilly.com/library-access/library/view/-/9781118817094/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118817094">https://learning.oreilly.com/library/view/~/9781118817094</a><br/>Format:&#160;Electronic Resources<br/> Information security : principles and practices ent://SD_ILS/0/SD_ILS:2303412 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format:&#160;Electronic Resources<br/> Online security for the business traveler ent://SD_ILS/0/SD_ILS:2304246 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Gonzalez, Deborah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000694">https://learning.oreilly.com/library/view/~/9780128000694</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128000694/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000694/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000694/?ar">https://learning.oreilly.com/library/view/~/9780128000694/?ar</a><br/>Format:&#160;Electronic Resources<br/> 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy ent://SD_ILS/0/SD_ILS:2304861 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Security+ ent://SD_ILS/0/SD_ILS:2304906 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Long, Mark.<br/><a href="https://learning.oreilly.com/videos/~/9781771372831/?ar">https://learning.oreilly.com/videos/~/9781771372831/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar">https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing information security breaches : studies from real life ent://SD_ILS/0/SD_ILS:2308836 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Krausz, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285964/?ar">https://learning.oreilly.com/library/view/~/9781849285964/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar</a><br/>Format:&#160;Electronic Resources<br/> Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:2308844 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Vladimirov, Andrew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849286008/?ar">https://go.oreilly.com/library-access/library/view/-/9781849286008/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849286008/?ar">https://learning.oreilly.com/library/view/~/9781849286008/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer incident response and forensics team management : conducting a successful incident response ent://SD_ILS/0/SD_ILS:2300670 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Johnson, Leighton, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499965/?ar">https://learning.oreilly.com/library/view/~/9781597499965/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499965">https://learning.oreilly.com/library/view/~/9781597499965</a><br/>Format:&#160;Electronic Resources<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:2301150 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Cherry, Denny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000113/?ar">https://learning.oreilly.com/library/view/~/9780128000113/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000113">https://learning.oreilly.com/library/view/~/9780128000113</a><br/>Format:&#160;Electronic Resources<br/> Mastering Windows Server 2012 R2 ent://SD_ILS/0/SD_ILS:2301152 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Minasi, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar">https://go.oreilly.com/library-access/library/view/-/9781118289426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118289426/?ar">https://learning.oreilly.com/library/view/~/9781118289426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118289426">https://learning.oreilly.com/library/view/~/9781118289426</a><br/>Format:&#160;Electronic Resources<br/> The basics of IT audit : Purposes, processes, and practical information. ent://SD_ILS/0/SD_ILS:2301501 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Gantz, Stephen D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124171596/?ar">https://learning.oreilly.com/library/view/~/9780124171596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124171596">https://learning.oreilly.com/library/view/~/9780124171596</a><br/>Format:&#160;Electronic Resources<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:2300180 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format:&#160;Electronic Resources<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:2301474 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;DeFranco, Joanna F.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466564527/?ar">https://learning.oreilly.com/library/view/~/9781466564527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466564527">https://learning.oreilly.com/library/view/~/9781466564527</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity : managing systems, conducting testing, and investigating intrusions ent://SD_ILS/0/SD_ILS:2301524 2024-05-30T18:21:23Z 2024-05-30T18:21:23Z by&#160;Mowbray, Thomas J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar">https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118697115/?ar">https://learning.oreilly.com/library/view/~/9781118697115/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118697115">https://learning.oreilly.com/library/view/~/9781118697115</a><br/>Format:&#160;Electronic Resources<br/>