Search Results for - Narrowed by: S&eacute;curit&eacute; informatique. - 2018 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092018$0025092018$0026ps$003d300? 2024-05-25T09:02:05Z Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessons ent://SD_ILS/0/SD_ILS:2321550 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security with AI and machine learning : using advanced tools to improve application security at the edge ent://SD_ILS/0/SD_ILS:2319058 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format:&#160;Electronic Resources<br/> Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats ent://SD_ILS/0/SD_ILS:2315528 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Tevault, Donald A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788620307/?ar">https://go.oreilly.com/library-access/library/view/-/9781788620307/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788620307/?ar">https://learning.oreilly.com/library/view/~/9781788620307/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788620307">https://learning.oreilly.com/library/view/~/9781788620307</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity attacks (Red Team activity) ent://SD_ILS/0/SD_ILS:2315986 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Nesterenko, Sergii, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781788478878/?ar">https://learning.oreilly.com/videos/~/9781788478878/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital resilience : is your company ready for the next cyber threat? ent://SD_ILS/0/SD_ILS:2314734 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Rothrock, Ray A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814439258">https://learning.oreilly.com/library/view/~/9780814439258</a> <a href="https://learning.oreilly.com/library/view/~/9780814439258/?ar">https://learning.oreilly.com/library/view/~/9780814439258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar">https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to malware analysis for incident responders ent://SD_ILS/0/SD_ILS:2316850 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530612/?ar">https://learning.oreilly.com/videos/~/9781789530612/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with z/OS data set encryption ent://SD_ILS/0/SD_ILS:2316937 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738456874/?ar">https://learning.oreilly.com/library/view/~/9780738456874/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security on IBM z/VSE ent://SD_ILS/0/SD_ILS:2316940 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Hellner, Helmut, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738456911/?ar">https://learning.oreilly.com/library/view/~/9780738456911/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738456911/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456911/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking for Dummies. ent://SD_ILS/0/SD_ILS:2316883 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119485476/?ar">https://go.oreilly.com/library-access/library/view/-/9781119485476/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119485476/?ar">https://learning.oreilly.com/library/view/~/9781119485476/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : endpoint defense ent://SD_ILS/0/SD_ILS:2316613 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Dewey, Gary, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788990981/?ar">https://learning.oreilly.com/videos/~/9781788990981/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn ethical hacking from scratch : your stepping stone to penetration testing ent://SD_ILS/0/SD_ILS:2317259 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Sabih, Zaid, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar">https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788622059">https://learning.oreilly.com/library/view/~/9781788622059</a> <a href="https://learning.oreilly.com/library/view/~/9781788622059/?ar">https://learning.oreilly.com/library/view/~/9781788622059/?ar</a><br/>Format:&#160;Electronic Resources<br/> An introduction to cyber modeling and simulation ent://SD_ILS/0/SD_ILS:2317081 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Couretas, Jerry M., 1966- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119420873">https://learning.oreilly.com/library/view/~/9781119420873</a> <a href="https://learning.oreilly.com/library/view/~/9781119420873/?ar">https://learning.oreilly.com/library/view/~/9781119420873/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119420873/?ar">https://go.oreilly.com/library-access/library/view/-/9781119420873/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux tutorial for beginners ent://SD_ILS/0/SD_ILS:2317579 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Naja, Tarek, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar">https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789615173/?ar">https://learning.oreilly.com/videos/~/9781789615173/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows security monitoring : scenarios and patterns ent://SD_ILS/0/SD_ILS:2315945 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Miroshnikov, Andrei, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar">https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119390640/?ar">https://learning.oreilly.com/library/view/~/9781119390640/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119390640">https://learning.oreilly.com/library/view/~/9781119390640</a><br/>Format:&#160;Electronic Resources<br/> Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus ent://SD_ILS/0/SD_ILS:2316700 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format:&#160;Electronic Resources<br/> Linux&reg; hardening in hostile networks : server security from TLS to TOR ent://SD_ILS/0/SD_ILS:2314177 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain ent://SD_ILS/0/SD_ILS:2317092 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Gupta, Rajneesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990189">https://learning.oreilly.com/library/view/~/9781788990189</a> <a href="https://learning.oreilly.com/library/view/~/9781788990189/?ar">https://learning.oreilly.com/library/view/~/9781788990189/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cracking codes with Python : an introduction to building and breaking ciphers ent://SD_ILS/0/SD_ILS:2314359 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Sweigart, Al, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067498">https://learning.oreilly.com/library/view/~/9781492067498</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492067498/?ar">https://learning.oreilly.com/library/view/~/9781492067498/?ar</a><br/>Format:&#160;Electronic Resources<br/> Machine learning and security : protecting systems with data and algorithms ent://SD_ILS/0/SD_ILS:2315881 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar">https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491979891/?ar">https://learning.oreilly.com/library/view/~/9781491979891/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Linux security cookbook : secure your Linux environment from modern-day attacks with practical recipes ent://SD_ILS/0/SD_ILS:2317509 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Kalsi, Tajinder, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789138399/?ar">https://learning.oreilly.com/library/view/~/9781789138399/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789138399/?ar">https://go.oreilly.com/library-access/library/view/-/9781789138399/?ar</a><br/>Format:&#160;Electronic Resources<br/> NIST cybersecurity framework : a pocket guide ent://SD_ILS/0/SD_ILS:2317535 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787780422/?ar">https://go.oreilly.com/library-access/library/view/-/9781787780422/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787780422/?ar">https://learning.oreilly.com/library/view/~/9781787780422/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787780422">https://learning.oreilly.com/library/view/~/9781787780422</a><br/>Format:&#160;Electronic Resources<br/> Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies ent://SD_ILS/0/SD_ILS:2317228 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Parker, Carey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484238523">https://learning.oreilly.com/library/view/~/9781484238523</a> <a href="https://learning.oreilly.com/library/view/~/9781484238523/?ar">https://learning.oreilly.com/library/view/~/9781484238523/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484238523/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238523/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis ent://SD_ILS/0/SD_ILS:2317231 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Bramwell, Phil, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295666">https://learning.oreilly.com/library/view/~/9781788295666</a> <a href="https://learning.oreilly.com/library/view/~/9781788295666/?ar">https://learning.oreilly.com/library/view/~/9781788295666/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on red team tactics : a practical guide to mastering red team operations ent://SD_ILS/0/SD_ILS:2317792 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Sharma, Himanshu, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995238">https://learning.oreilly.com/library/view/~/9781788995238</a> <a href="https://learning.oreilly.com/library/view/~/9781788995238/?ar">https://learning.oreilly.com/library/view/~/9781788995238/?ar</a><br/>Format:&#160;Electronic Resources<br/> What is cybersecurity? ent://SD_ILS/0/SD_ILS:2318722 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics ent://SD_ILS/0/SD_ILS:2315706 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing mit Metasploit : Praxiswissen f&uuml;r mehr IT-Sicherheit ent://SD_ILS/0/SD_ILS:2316255 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958455979/?ar">https://learning.oreilly.com/library/view/~/9783958455979/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958455979">https://learning.oreilly.com/library/view/~/9783958455979</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar">https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar</a><br/>Format:&#160;Electronic Resources<br/> Social engineering : the science of human hacking ent://SD_ILS/0/SD_ILS:2316838 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Hadnagy, Christopher, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119433385/?ar">https://go.oreilly.com/library-access/library/view/-/9781119433385/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119433385/?ar">https://learning.oreilly.com/library/view/~/9781119433385/?ar</a><br/>Format:&#160;Electronic Resources<br/> Risk management for cybersecurity and IT managers ent://SD_ILS/0/SD_ILS:2316845 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789531992/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531992/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789531992/?ar">https://learning.oreilly.com/videos/~/9781789531992/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated security technologies and solutions. Volume I, Cisco Security Solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content security ent://SD_ILS/0/SD_ILS:2316388 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Woland, Aaron T., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134807577/?ar">https://learning.oreilly.com/library/view/~/9780134807577/?ar</a><br/>Format:&#160;Electronic Resources<br/> WiFi hacking : wireless penetration testing for beginners ent://SD_ILS/0/SD_ILS:2316772 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530193/?ar">https://learning.oreilly.com/videos/~/9781789530193/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2316778 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit ent://SD_ILS/0/SD_ILS:2316790 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788990615/?ar">https://learning.oreilly.com/library/view/~/9781788990615/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn ethical hacking from scratch ent://SD_ILS/0/SD_ILS:2316923 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789340297/?ar">https://learning.oreilly.com/videos/~/9781789340297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware ent://SD_ILS/0/SD_ILS:2317050 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;K. A., Monnappa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar">https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788392501/?ar">https://learning.oreilly.com/library/view/~/9781788392501/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn website hacking : penetration testing from scratch ent://SD_ILS/0/SD_ILS:2316434 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789346145/?ar">https://learning.oreilly.com/videos/~/9781789346145/?ar</a><br/>Format:&#160;Electronic Resources<br/> Asset attack vectors : building effective vulnerability management strategies to protect organizations ent://SD_ILS/0/SD_ILS:2316720 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484236277/?ar">https://learning.oreilly.com/library/view/~/9781484236277/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484236277/?ar">https://go.oreilly.com/library-access/library/view/-/9781484236277/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484236277">https://learning.oreilly.com/library/view/~/9781484236277</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking masterclass ent://SD_ILS/0/SD_ILS:2317748 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789530018/?ar">https://learning.oreilly.com/videos/~/9781789530018/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threats ent://SD_ILS/0/SD_ILS:2316016 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Donaldson, Scott E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232583/?ar">https://learning.oreilly.com/library/view/~/9781484232583/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484232583">https://learning.oreilly.com/library/view/~/9781484232583</a><br/>Format:&#160;Electronic Resources<br/> Serious cryptography : a practical introduction to modern encryption ent://SD_ILS/0/SD_ILS:2316208 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Aumasson, Jean-Philippe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067511">https://learning.oreilly.com/library/view/~/9781492067511</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492067511/?ar">https://learning.oreilly.com/library/view/~/9781492067511/?ar</a><br/>Format:&#160;Electronic Resources<br/> Open source intelligence methods and tools : a practical guide to online intelligence ent://SD_ILS/0/SD_ILS:2316916 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232132">https://learning.oreilly.com/library/view/~/9781484232132</a> <a href="https://learning.oreilly.com/library/view/~/9781484232132/?ar">https://learning.oreilly.com/library/view/~/9781484232132/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on Spring Security 5 for Reactive applications : learn effective ways to secure your applications with Spring and Spring WebFlux ent://SD_ILS/0/SD_ILS:2317237 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;John, Tomcy, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788995979/?ar">https://learning.oreilly.com/library/view/~/9781788995979/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788995979/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995979/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware data science : attack detection and attribution ent://SD_ILS/0/SD_ILS:2317388 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Saxe, Joshua, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067672">https://learning.oreilly.com/library/view/~/9781492067672</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492067672/?ar">https://learning.oreilly.com/library/view/~/9781492067672/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics and cyber crime with Kali Linux fundamentals ent://SD_ILS/0/SD_ILS:2314043 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Muniz, Joseph, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar">https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780134693644/?ar">https://learning.oreilly.com/videos/~/9780134693644/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security penetration testing (The art of hacking series) ent://SD_ILS/0/SD_ILS:2314102 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar">https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780134833989/?ar">https://learning.oreilly.com/videos/~/9780134833989/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing open source libraries : managing vulnerabilities in open source code packages ent://SD_ILS/0/SD_ILS:2314890 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996980/?ar">https://learning.oreilly.com/library/view/~/9781491996980/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996980">https://learning.oreilly.com/library/view/~/9781491996980</a><br/>Format:&#160;Electronic Resources<br/> Network scanning cookbook : practical network security using Nmap and Nessus 7 ent://SD_ILS/0/SD_ILS:2317776 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Office 365 : masterminding MDM and compliance in the cloud ent://SD_ILS/0/SD_ILS:2318564 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Katzer, Matthew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484242308/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242308/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484242308/?ar">https://learning.oreilly.com/library/view/~/9781484242308/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484242308">https://learning.oreilly.com/library/view/~/9781484242308</a><br/>Format:&#160;Electronic Resources<br/> Solving Cyber Risk : Protecting Your Company and Society. ent://SD_ILS/0/SD_ILS:2318282 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Coburn, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781119490937">https://learning.oreilly.com/library/view/~/9781119490937</a> <a href="https://learning.oreilly.com/library/view/~/9781119490937/?ar">https://learning.oreilly.com/library/view/~/9781119490937/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar">https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : design a security framework for an Internet connected ecosystem ent://SD_ILS/0/SD_ILS:2318628 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625821/?ar">https://learning.oreilly.com/library/view/~/9781788625821/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing DevOps ent://SD_ILS/0/SD_ILS:2319465 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Vehent, Julien, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar">https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617294136">https://learning.oreilly.com/library/view/~/9781617294136</a> <a href="https://learning.oreilly.com/library/view/~/9781617294136/?ar">https://learning.oreilly.com/library/view/~/9781617294136/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:2316152 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format:&#160;Electronic Resources<br/> Apache Kafka series : Kafka security (SSL SASL Kerberos ACL) ent://SD_ILS/0/SD_ILS:2316736 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Maarek, St&eacute;phane, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar">https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789342420/?ar">https://learning.oreilly.com/videos/~/9781789342420/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced malware analysis ent://SD_ILS/0/SD_ILS:2317857 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Njenga, Munir, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788627146/?ar">https://learning.oreilly.com/videos/~/9781788627146/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat hunting : a guide to proactive network defense ent://SD_ILS/0/SD_ILS:2318444 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Collins, Michael (Michael Patrick), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028260/?ar">https://learning.oreilly.com/library/view/~/9781492028260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492028260">https://learning.oreilly.com/library/view/~/9781492028260</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar</a><br/>Format:&#160;Electronic Resources<br/> Distributed Denial of Service (DDoS) : practical detection and defense ent://SD_ILS/0/SD_ILS:2318176 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Chou, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar">https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492026181">https://learning.oreilly.com/library/view/~/9781492026181</a> <a href="https://learning.oreilly.com/library/view/~/9781492026181/?ar">https://learning.oreilly.com/library/view/~/9781492026181/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on machine learning for cybersecurity : safeguard your system by making your machines intelligent using the Python ecosystem ent://SD_ILS/0/SD_ILS:2318588 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Halder, Soma, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788992282/?ar">https://go.oreilly.com/library-access/library/view/-/9781788992282/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788992282/?ar">https://learning.oreilly.com/library/view/~/9781788992282/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788992282">https://learning.oreilly.com/library/view/~/9781788992282</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : orchestrating attacks ent://SD_ILS/0/SD_ILS:2318510 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781484243404/?ar">https://learning.oreilly.com/videos/~/9781484243404/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : networks and websites ent://SD_ILS/0/SD_ILS:2318511 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243411/?ar">https://learning.oreilly.com/videos/~/9781484243411/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : learning the basics ent://SD_ILS/0/SD_ILS:2318527 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243480/?ar">https://learning.oreilly.com/videos/~/9781484243480/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity essentials ent://SD_ILS/0/SD_ILS:2322482 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Brooks, Charles J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119362395/?ar">https://learning.oreilly.com/library/view/~/9781119362395/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar">https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hei ke wang luo ying yong : wang luo qin ru ying yong. ent://SD_ILS/0/SD_ILS:2332288 2024-05-25T09:02:05Z 2024-05-25T09:02:05Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a> <a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format:&#160;Video recording<br/>