Search Results for - Narrowed by: S&eacute;curit&eacute; informatique. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300? 2024-05-23T19:31:42Z Learn man in the middle attacks from scratch. ent://SD_ILS/0/SD_ILS:2332269 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar">https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803243245/?ar">https://learning.oreilly.com/videos/~/9781803243245/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803243245">https://learning.oreilly.com/videos/~/9781803243245</a><br/>Format:&#160;Video recording<br/> The security culture playbook : an executive guide to reducing risk and developing your human defense layer ent://SD_ILS/0/SD_ILS:2332410 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119875239/?ar">https://learning.oreilly.com/library/view/~/9781119875239/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119875239">https://learning.oreilly.com/library/view/~/9781119875239</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar">https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling with Owasp Threat Dragon &amp; risk rating a vulnerability. ent://SD_ILS/0/SD_ILS:2332599 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Fisher, Derek, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202248/?ar">https://learning.oreilly.com/videos/~/10000MNHV202248/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202248">https://learning.oreilly.com/videos/~/10000MNHV202248</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar</a><br/>Format:&#160;Video recording<br/> Designing secure software : a guide for developers ent://SD_ILS/0/SD_ILS:2329594 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Kohnfelder, Loren, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129804/?ar">https://learning.oreilly.com/library/view/~/9781098129804/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129804">https://learning.oreilly.com/library/view/~/9781098129804</a><br/>Format:&#160;Electronic Resources<br/> Mastering Defensive Security : Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure. ent://SD_ILS/0/SD_ILS:2330841 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Bravo, Cesar.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar">https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800208162/?ar">https://learning.oreilly.com/library/view/~/9781800208162/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800208162">https://learning.oreilly.com/library/view/~/9781800208162</a><br/>Format:&#160;Electronic Resources<br/> Trust in computer systems and the cloud ent://SD_ILS/0/SD_ILS:2330850 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Bursell, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119692324/?ar">https://learning.oreilly.com/library/view/~/9781119692324/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar">https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119692324">https://learning.oreilly.com/library/view/~/9781119692324</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity leadership demystified : a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO ent://SD_ILS/0/SD_ILS:2331468 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801819282/?ar">https://go.oreilly.com/library-access/library/view/-/9781801819282/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801819282/?ar">https://learning.oreilly.com/library/view/~/9781801819282/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801819282">https://learning.oreilly.com/library/view/~/9781801819282</a><br/>Format:&#160;Electronic Resources<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:2331694 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Harper, Allen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar">https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781264268955/?ar">https://learning.oreilly.com/library/view/~/9781264268955/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781264268955">https://learning.oreilly.com/library/view/~/9781264268955</a><br/>Format:&#160;Electronic Resources<br/> WIRELESS SECURITY ARCHITECTURE designing and maintaining secure wireless for enterprise. ent://SD_ILS/0/SD_ILS:2331905 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;MINELLA, JENNIFER.<br/><a href="https://learning.oreilly.com/library/view/~/9781119883050">https://learning.oreilly.com/library/view/~/9781119883050</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119883050/?ar">https://go.oreilly.com/library-access/library/view/-/9781119883050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119883050/?ar">https://learning.oreilly.com/library/view/~/9781119883050/?ar</a><br/>Format:&#160;Electronic Resources<br/> Snowflake access control : mastering the features for data privacy and regulatory compliance ent://SD_ILS/0/SD_ILS:2331907 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Larson, Jessica Megan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484280386">https://learning.oreilly.com/library/view/~/9781484280386</a> <a href="https://learning.oreilly.com/library/view/~/9781484280386/?ar">https://learning.oreilly.com/library/view/~/9781484280386/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar">https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linux ent://SD_ILS/0/SD_ILS:2332265 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar">https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803239750/?ar">https://learning.oreilly.com/videos/~/9781803239750/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803239750">https://learning.oreilly.com/videos/~/9781803239750</a><br/>Format:&#160;Video recording<br/> IBM Spectrum Virtualize, IBM FlashSystem, and IBM SAN volume controller security feature checklist ent://SD_ILS/0/SD_ILS:2332372 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Scales, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460437">https://learning.oreilly.com/library/view/~/9780738460437</a> <a href="https://learning.oreilly.com/library/view/~/9780738460437/?ar">https://learning.oreilly.com/library/view/~/9780738460437/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460437/?ar</a><br/>Format:&#160;Electronic Resources<br/> Container storage and data protection for applications on Kubernetes ent://SD_ILS/0/SD_ILS:2332574 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127022/?ar">https://learning.oreilly.com/library/view/~/9781098127022/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098127022">https://learning.oreilly.com/library/view/~/9781098127022</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar</a><br/>Format:&#160;Electronic Resources<br/> Shifting left for application security : bridging the divide between DevOps and security with the right security tools ent://SD_ILS/0/SD_ILS:2332575 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127350">https://learning.oreilly.com/library/view/~/9781098127350</a> <a href="https://learning.oreilly.com/library/view/~/9781098127350/?ar">https://learning.oreilly.com/library/view/~/9781098127350/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127350/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security Observability with eBPF ent://SD_ILS/0/SD_ILS:2332576 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Salazar, Jed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492096719">https://learning.oreilly.com/library/view/~/9781492096719</a> <a href="https://learning.oreilly.com/library/view/~/9781492096719/?ar">https://learning.oreilly.com/library/view/~/9781492096719/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar">https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ransomware ent://SD_ILS/0/SD_ILS:2332705 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Messdaghi, Chlo&eacute;, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar">https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920702641/?ar">https://learning.oreilly.com/videos/~/0636920702641/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920702641">https://learning.oreilly.com/videos/~/0636920702641</a><br/>Format:&#160;Video recording<br/> A hybrid cloud cyber security solution using IBM Spectrum Virtualize for public cloud on Azure and IBM Spectrum Virtualize safeguarded copy. ent://SD_ILS/0/SD_ILS:2331705 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z <a href="https://learning.oreilly.com/library/view/~/9780738460345/?ar">https://learning.oreilly.com/library/view/~/9780738460345/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460345">https://learning.oreilly.com/library/view/~/9780738460345</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460345/?ar</a><br/>Format:&#160;Electronic Resources<br/> Offensive shellcode from scratch : get to grips with shellcode countermeasures and discover how to bypass them ent://SD_ILS/0/SD_ILS:2332537 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Pillay, Rishalin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar">https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803247427">https://learning.oreilly.com/library/view/~/9781803247427</a> <a href="https://learning.oreilly.com/library/view/~/9781803247427/?ar">https://learning.oreilly.com/library/view/~/9781803247427/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:2332538 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Pramanik, Sabyasachi, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119812494">https://learning.oreilly.com/library/view/~/9781119812494</a> <a href="https://learning.oreilly.com/library/view/~/9781119812494/?ar">https://learning.oreilly.com/library/view/~/9781119812494/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar">https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them ent://SD_ILS/0/SD_ILS:2332411 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format:&#160;Electronic Resources<br/> IT security controls : a guide to corporate standards and frameworks ent://SD_ILS/0/SD_ILS:2332412 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Viegas, Virgilio, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484277997/?ar">https://learning.oreilly.com/library/view/~/9781484277997/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484277997">https://learning.oreilly.com/library/view/~/9781484277997</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar</a><br/>Format:&#160;Electronic Resources<br/> The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more ent://SD_ILS/0/SD_ILS:2332630 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format:&#160;Electronic Resources<br/> What is eBPF? ent://SD_ILS/0/SD_ILS:2332631 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Rice, Liz (Open Source engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492097266/?ar">https://learning.oreilly.com/library/view/~/9781492097266/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492097266">https://learning.oreilly.com/library/view/~/9781492097266</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar">https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ransomware protection playbook ent://SD_ILS/0/SD_ILS:2330090 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Grimes, Roger A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119849124">https://learning.oreilly.com/library/view/~/9781119849124</a> <a href="https://learning.oreilly.com/library/view/~/9781119849124/?ar">https://learning.oreilly.com/library/view/~/9781119849124/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar">https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar</a><br/>Format:&#160;Electronic Resources<br/> Snowflake security : securing your Snowflake data cloud ent://SD_ILS/0/SD_ILS:2330261 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Herzberg, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484273890">https://learning.oreilly.com/library/view/~/9781484273890</a> <a href="https://learning.oreilly.com/library/view/~/9781484273890/?ar">https://learning.oreilly.com/library/view/~/9781484273890/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar">https://go.oreilly.com/library-access/library/view/-/9781484273890/?ar</a><br/>Format:&#160;Electronic Resources<br/> Navigating the cybersecurity career path ent://SD_ILS/0/SD_ILS:2330836 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Patton, Helen E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119833420">https://learning.oreilly.com/library/view/~/9781119833420</a> <a href="https://learning.oreilly.com/library/view/~/9781119833420/?ar">https://learning.oreilly.com/library/view/~/9781119833420/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar">https://go.oreilly.com/library-access/library/view/-/9781119833420/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security for dummies ent://SD_ILS/0/SD_ILS:2332497 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a> <a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptions ent://SD_ILS/0/SD_ILS:2329799 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format:&#160;Electronic Resources<br/> Python for cybersecurity : using Python for cyber offense and defense ent://SD_ILS/0/SD_ILS:2331574 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Poston, Howard E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar">https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119850649/?ar">https://learning.oreilly.com/library/view/~/9781119850649/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119850649">https://learning.oreilly.com/library/view/~/9781119850649</a><br/>Format:&#160;Electronic Resources<br/> System and privacy data protection. ent://SD_ILS/0/SD_ILS:2331777 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894574">https://learning.oreilly.com/videos/~/9780137894574</a> <a href="https://learning.oreilly.com/videos/~/9780137894574/?ar">https://learning.oreilly.com/videos/~/9780137894574/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894574/?ar</a><br/>Format:&#160;Video recording<br/> Threat Intelligence and threat hunting ent://SD_ILS/0/SD_ILS:2331779 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137896301/?ar">https://learning.oreilly.com/videos/~/9780137896301/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar">https://go.oreilly.com/library-access/library/view/-/9780137896301/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137896301">https://learning.oreilly.com/videos/~/9780137896301</a><br/>Format:&#160;Video recording<br/> Making sense of application security. ent://SD_ILS/0/SD_ILS:2332363 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Saikali, Adib, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202229">https://learning.oreilly.com/videos/~/10000MNHV202229</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202229/?ar">https://learning.oreilly.com/videos/~/10000MNHV202229/?ar</a><br/>Format:&#160;Video recording<br/> Case study : how Tools &amp; Solutions survived a ransomware attack. ent://SD_ILS/0/SD_ILS:2332364 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Majumdar, Partha, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar">https://go.oreilly.com/library-access/library/view/-/0636920673859/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0636920673859">https://learning.oreilly.com/library/view/~/0636920673859</a> <a href="https://learning.oreilly.com/library/view/~/0636920673859/?ar">https://learning.oreilly.com/library/view/~/0636920673859/?ar</a><br/>Format:&#160;Video recording<br/> Hacking : der umfassende Praxis-Guide : inkl. Pr&uuml;fungsvorbereitung zum CEHv11 ent://SD_ILS/0/SD_ILS:2331683 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Amberg, Eric, author<br/><a href="https://learning.oreilly.com/library/view/~/9783747504840">https://learning.oreilly.com/library/view/~/9783747504840</a> <a href="https://learning.oreilly.com/library/view/~/9783747504840/?ar">https://learning.oreilly.com/library/view/~/9783747504840/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar">https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security handbook : find out how to effectively secure cloud environments using AWS, Azure, and GCP ent://SD_ILS/0/SD_ILS:2332481 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Estrin, Eyal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800569195">https://learning.oreilly.com/library/view/~/9781800569195</a> <a href="https://learning.oreilly.com/library/view/~/9781800569195/?ar">https://learning.oreilly.com/library/view/~/9781800569195/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar">https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar</a><br/>Format:&#160;Electronic Resources<br/> The cybersecurity playbook for modern enterprises ent://SD_ILS/0/SD_ILS:2332323 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Wittkop, Jeremy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803248639/?ar">https://learning.oreilly.com/library/view/~/9781803248639/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803248639">https://learning.oreilly.com/library/view/~/9781803248639</a><br/>Format:&#160;Electronic Resources<br/> Finding your cyber security path. ent://SD_ILS/0/SD_ILS:2332701 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Miller, Alyssa, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202258">https://learning.oreilly.com/videos/~/10000MNHV202258</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202258/?ar">https://learning.oreilly.com/videos/~/10000MNHV202258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar</a><br/>Format:&#160;Video recording<br/> Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 ent://SD_ILS/0/SD_ILS:2332617 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Nita, Stefania Loredana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484281055/?ar">https://learning.oreilly.com/library/view/~/9781484281055/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar">https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484281055">https://learning.oreilly.com/library/view/~/9781484281055</a><br/>Format:&#160;Electronic Resources<br/> Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response. ent://SD_ILS/0/SD_ILS:2331491 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Hettema, Hinne.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801815512/?ar">https://learning.oreilly.com/library/view/~/9781801815512/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801815512">https://learning.oreilly.com/library/view/~/9781801815512</a><br/>Format:&#160;Electronic Resources<br/> Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory. ent://SD_ILS/0/SD_ILS:2331787 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Ostrovskaya, Svetlana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070331">https://learning.oreilly.com/library/view/~/9781801070331</a> <a href="https://learning.oreilly.com/library/view/~/9781801070331/?ar">https://learning.oreilly.com/library/view/~/9781801070331/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar</a><br/>Format:&#160;Electronic Resources<br/> Fight fire with fire : proactive cybersecurity strategies for today's leaders ent://SD_ILS/0/SD_ILS:2330914 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Tarun, Renee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119854265/?ar">https://learning.oreilly.com/library/view/~/9781119854265/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119854265">https://learning.oreilly.com/library/view/~/9781119854265</a><br/>Format:&#160;Electronic Resources<br/> Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadar ent://SD_ILS/0/SD_ILS:2332057 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;IBM Storage Team, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460260/?ar">https://learning.oreilly.com/library/view/~/9780738460260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460260">https://learning.oreilly.com/library/view/~/9780738460260</a><br/>Format:&#160;Electronic Resources<br/> CEH Certified Ethical Hacker Cert guide ent://SD_ILS/0/SD_ILS:2331621 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format:&#160;Electronic Resources<br/> Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacks ent://SD_ILS/0/SD_ILS:2329941 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Peiris, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119804062/?ar">https://learning.oreilly.com/library/view/~/9781119804062/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar">https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119804062">https://learning.oreilly.com/library/view/~/9781119804062</a><br/>Format:&#160;Electronic Resources<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:2330102 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sharp, Matthew K., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar">https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119782483/?ar">https://learning.oreilly.com/library/view/~/9781119782483/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119782483">https://learning.oreilly.com/library/view/~/9781119782483</a><br/>Format:&#160;Electronic Resources<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:2332857 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sharp, Matthew K., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663718556/?ar">https://go.oreilly.com/library-access/library/view/-/9781663718556/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781663718556">https://learning.oreilly.com/library/view/~/9781663718556</a> <a href="https://learning.oreilly.com/library/view/~/9781663718556/?ar">https://learning.oreilly.com/library/view/~/9781663718556/?ar</a><br/>Format:&#160;Sound recording<br/> Phishing and communication channels a guide to identifying and mitigating phishing attacks ent://SD_ILS/0/SD_ILS:2331058 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sonowal, Gunikhan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484277447/?ar">https://learning.oreilly.com/library/view/~/9781484277447/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484277447">https://learning.oreilly.com/library/view/~/9781484277447</a><br/>Format:&#160;Electronic Resources<br/> Getting started with IBM Hyper Protect Data Controller ent://SD_ILS/0/SD_ILS:2331451 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460031/?ar">https://learning.oreilly.com/library/view/~/9780738460031/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460031">https://learning.oreilly.com/library/view/~/9780738460031</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460031/?ar</a><br/>Format:&#160;Electronic Resources<br/> Alice and Bob learn application security. ent://SD_ILS/0/SD_ILS:2325958 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Janca, Tanya.<br/><a href="https://learning.oreilly.com/library/view/~/9781119687351">https://learning.oreilly.com/library/view/~/9781119687351</a> <a href="https://learning.oreilly.com/library/view/~/9781119687351/?ar">https://learning.oreilly.com/library/view/~/9781119687351/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar">https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar</a><br/>Format:&#160;Electronic Resources<br/> Artificial Intelligence, Cybersecurity and Cyber Defence ent://SD_ILS/0/SD_ILS:2328358 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a> <a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format:&#160;Electronic Resources<br/> How cybersecurity really works : a hands-on guide for total beginners ent://SD_ILS/0/SD_ILS:2328036 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Grubb, Sam (Cyber security consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128999/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098128999/?ar">https://learning.oreilly.com/library/view/~/9781098128999/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098128999">https://learning.oreilly.com/library/view/~/9781098128999</a><br/>Format:&#160;Electronic Resources<br/> Start-up secure : baking cybersecurity into your company from founding to exit ent://SD_ILS/0/SD_ILS:2327524 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Castaldo, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119700739">https://learning.oreilly.com/library/view/~/9781119700739</a> <a href="https://learning.oreilly.com/library/view/~/9781119700739/?ar">https://learning.oreilly.com/library/view/~/9781119700739/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar">https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing AI. ent://SD_ILS/0/SD_ILS:2332134 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Manjengwa, Shingai, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar">https://go.oreilly.com/library-access/library/view/-/0636920672319/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920672319/?ar">https://learning.oreilly.com/videos/~/0636920672319/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920672319">https://learning.oreilly.com/videos/~/0636920672319</a><br/>Format:&#160;Video recording<br/> Intro to secure application deployment with Istio on Kubernetes. ent://SD_ILS/0/SD_ILS:2332181 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Poddar, Neeraj, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202219">https://learning.oreilly.com/videos/~/10000MNHV202219</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202219/?ar">https://learning.oreilly.com/videos/~/10000MNHV202219/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar</a><br/>Format:&#160;Video recording<br/> Protective security : creating military-grade defenses for your digital business ent://SD_ILS/0/SD_ILS:2328579 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Seaman, Jim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484269084">https://learning.oreilly.com/library/view/~/9781484269084</a> <a href="https://learning.oreilly.com/library/view/~/9781484269084/?ar">https://learning.oreilly.com/library/view/~/9781484269084/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security on Azure : an it professional's guide to Microsoft Azure security ent://SD_ILS/0/SD_ILS:2327167 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484265314/?ar">https://learning.oreilly.com/library/view/~/9781484265314/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265314/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484265314">https://learning.oreilly.com/library/view/~/9781484265314</a><br/>Format:&#160;Electronic Resources<br/> Red Hat and IT security : with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditing ent://SD_ILS/0/SD_ILS:2326514 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Chatterjee, Rithik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484264348">https://learning.oreilly.com/library/view/~/9781484264348</a> <a href="https://learning.oreilly.com/library/view/~/9781484264348/?ar">https://learning.oreilly.com/library/view/~/9781484264348/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar">https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar</a><br/>Format:&#160;Electronic Resources<br/> COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION EXAM GUIDE (EXAM CS0-002) ent://SD_ILS/0/SD_ILS:2326516 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Chapman, Brent.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar">https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781260464313">https://learning.oreilly.com/library/view/~/9781260464313</a> <a href="https://learning.oreilly.com/library/view/~/9781260464313/?ar">https://learning.oreilly.com/library/view/~/9781260464313/?ar</a><br/>Format:&#160;Electronic Resources<br/> Authentication and access control : practical cryptography methods and tools ent://SD_ILS/0/SD_ILS:2327123 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Boonkrong, Sirapat, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484265703">https://learning.oreilly.com/library/view/~/9781484265703</a> <a href="https://learning.oreilly.com/library/view/~/9781484265703/?ar">https://learning.oreilly.com/library/view/~/9781484265703/?ar</a><br/>Format:&#160;Electronic Resources<br/> Android software internals quick reference : a field manual and security reference guide to Java-based Android components ent://SD_ILS/0/SD_ILS:2328407 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Stevenson, James, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484269145/?ar">https://learning.oreilly.com/library/view/~/9781484269145/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484269145">https://learning.oreilly.com/library/view/~/9781484269145</a><br/>Format:&#160;Electronic Resources<br/> You can stop stupid : stopping losses from accidental and malicious actions ent://SD_ILS/0/SD_ILS:2328968 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469078045">https://learning.oreilly.com/library/view/~/9781469078045</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781469078045/?ar">https://go.oreilly.com/library-access/library/view/-/9781469078045/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781469078045/?ar">https://learning.oreilly.com/library/view/~/9781469078045/?ar</a><br/>Format:&#160;Sound recording<br/> Choose your InfoSec path : an interactive cybersecurity adventure for beginners ent://SD_ILS/0/SD_ILS:2328990 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Roxon, Alexander J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484270363">https://learning.oreilly.com/library/view/~/9781484270363</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484270363/?ar">https://learning.oreilly.com/library/view/~/9781484270363/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise DevOps for Architects ent://SD_ILS/0/SD_ILS:2330978 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Mulder, Jeroen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801812153">https://learning.oreilly.com/library/view/~/9781801812153</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812153/?ar">https://learning.oreilly.com/library/view/~/9781801812153/?ar</a><br/>Format:&#160;Electronic Resources<br/> Certified ethical hacker (CEH) complete video course ent://SD_ILS/0/SD_ILS:2332146 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar">https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137446797/?ar">https://learning.oreilly.com/videos/~/9780137446797/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137446797">https://learning.oreilly.com/videos/~/9780137446797</a><br/>Format:&#160;Video recording<br/> Real-world cryptography ent://SD_ILS/0/SD_ILS:2332808 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Wong, David (Cryptography engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617296710AU">https://learning.oreilly.com/library/view/~/9781617296710AU</a> <a href="https://learning.oreilly.com/library/view/~/9781617296710AU/?ar">https://learning.oreilly.com/library/view/~/9781617296710AU/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar</a><br/>Format:&#160;Sound recording<br/> Malware Analysis Techniques : Tricks for the Triage of Adversarial Software. ent://SD_ILS/0/SD_ILS:2329154 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Barker, Dylan.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212277">https://learning.oreilly.com/library/view/~/9781839212277</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839212277/?ar">https://learning.oreilly.com/library/view/~/9781839212277/?ar</a><br/>Format:&#160;Electronic Resources<br/> Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict ent://SD_ILS/0/SD_ILS:2329079 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Borges, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781801076203/?ar">https://learning.oreilly.com/library/view/~/9781801076203/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801076203">https://learning.oreilly.com/library/view/~/9781801076203</a><br/>Format:&#160;Electronic Resources<br/> Cyber threat intelligence : the no-nonsense guide for CISOs and Security Managers ent://SD_ILS/0/SD_ILS:2329637 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Roberts, Aaron.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272206">https://learning.oreilly.com/library/view/~/9781484272206</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484272206/?ar">https://learning.oreilly.com/library/view/~/9781484272206/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and Third-Party Risk : Third Party Threat Hunting ent://SD_ILS/0/SD_ILS:2329000 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Rasner, Gregory C.<br/><a href="https://learning.oreilly.com/library/view/~/9781119809555">https://learning.oreilly.com/library/view/~/9781119809555</a> <a href="https://learning.oreilly.com/library/view/~/9781119809555/?ar">https://learning.oreilly.com/library/view/~/9781119809555/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar">https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar</a><br/>Format:&#160;Electronic Resources<br/> Real-world cryptography ent://SD_ILS/0/SD_ILS:2330383 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Wong, David (Cryptography engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296710">https://learning.oreilly.com/library/view/~/9781617296710</a> <a href="https://learning.oreilly.com/library/view/~/9781617296710/?ar">https://learning.oreilly.com/library/view/~/9781617296710/?ar</a><br/>Format:&#160;Electronic Resources<br/> Self-sovereign identity : decentralized digital identity and verifiable credentials ent://SD_ILS/0/SD_ILS:2330270 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format:&#160;Electronic Resources<br/> 8 steps to better security : a simple cyber resilience guide for business ent://SD_ILS/0/SD_ILS:2330835 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Crawley, Kim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119811237/?ar">https://learning.oreilly.com/library/view/~/9781119811237/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119811237">https://learning.oreilly.com/library/view/~/9781119811237</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar">https://go.oreilly.com/library-access/library/view/-/9781119811237/?ar</a><br/>Format:&#160;Electronic Resources<br/> Azure security handbook : a comprehensive guide for defending your enterprise environment ent://SD_ILS/0/SD_ILS:2329802 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Ots, Karl.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272923">https://learning.oreilly.com/library/view/~/9781484272923</a> <a href="https://learning.oreilly.com/library/view/~/9781484272923/?ar">https://learning.oreilly.com/library/view/~/9781484272923/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar</a><br/>Format:&#160;Electronic Resources<br/> Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environment ent://SD_ILS/0/SD_ILS:2330315 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800202092/?ar">https://learning.oreilly.com/library/view/~/9781800202092/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800202092">https://learning.oreilly.com/library/view/~/9781800202092</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with z/OS Data Set Encryption ent://SD_ILS/0/SD_ILS:2331252 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a> <a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling a practical guide for developing teams ent://SD_ILS/0/SD_ILS:2331156 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Tarandach, Izar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056546/?ar">https://learning.oreilly.com/library/view/~/9781492056546/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056546/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492056546">https://learning.oreilly.com/library/view/~/9781492056546</a><br/>Format:&#160;Electronic Resources<br/> Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browser ent://SD_ILS/0/SD_ILS:2331570 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Segala, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar">https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801075336/?ar">https://learning.oreilly.com/library/view/~/9781801075336/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801075336">https://learning.oreilly.com/library/view/~/9781801075336</a><br/>Format:&#160;Electronic Resources<br/> Cyber Crisis ent://SD_ILS/0/SD_ILS:2331316 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Cole, Eric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666125313">https://learning.oreilly.com/library/view/~/9781666125313</a> <a href="https://learning.oreilly.com/library/view/~/9781666125313/?ar">https://learning.oreilly.com/library/view/~/9781666125313/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar">https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar</a><br/>Format:&#160;Electronic Resources<br/> Crypto ent://SD_ILS/0/SD_ILS:2331323 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Levy, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar">https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781666117615">https://learning.oreilly.com/library/view/~/9781666117615</a> <a href="https://learning.oreilly.com/library/view/~/9781666117615/?ar">https://learning.oreilly.com/library/view/~/9781666117615/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyberjutsu : cybersecurity for the modern ninja ent://SD_ILS/0/SD_ILS:2326541 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a> <a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format:&#160;Electronic Resources<br/> Strategy, leadership, and AI in the cyber ecosystem : the role of digital societies in information governance and decision making ent://SD_ILS/0/SD_ILS:2326455 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Jahankhani, Hamid.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128214596/?ar">https://go.oreilly.com/library-access/library/view/-/9780128214596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128214596/?ar">https://learning.oreilly.com/library/view/~/9780128214596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128214596">https://learning.oreilly.com/library/view/~/9780128214596</a><br/>Format:&#160;Electronic Resources<br/> A complete guide to Burp Suite : learn to detect application vulnerabilities ent://SD_ILS/0/SD_ILS:2326430 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484264027/?ar">https://learning.oreilly.com/library/view/~/9781484264027/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484264027/?ar">https://go.oreilly.com/library-access/library/view/-/9781484264027/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484264027">https://learning.oreilly.com/library/view/~/9781484264027</a><br/>Format:&#160;Electronic Resources<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:2327053 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Moschovitis, Christos J. P., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119658740">https://learning.oreilly.com/library/view/~/9781119658740</a> <a href="https://learning.oreilly.com/library/view/~/9781119658740/?ar">https://learning.oreilly.com/library/view/~/9781119658740/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar">https://go.oreilly.com/library-access/library/view/-/9781119658740/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Manager's Guide ent://SD_ILS/0/SD_ILS:2327020 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Barnum, Todd.<br/><a href="https://learning.oreilly.com/library/view/~/9781492076209">https://learning.oreilly.com/library/view/~/9781492076209</a> <a href="https://learning.oreilly.com/library/view/~/9781492076209/?ar">https://learning.oreilly.com/library/view/~/9781492076209/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar">https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat hunting with elastic stack : solve complex security challenges with integrated prevention, detection, and response ent://SD_ILS/0/SD_ILS:2329469 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Pease, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801073783/?ar">https://go.oreilly.com/library-access/library/view/-/9781801073783/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801073783">https://learning.oreilly.com/library/view/~/9781801073783</a> <a href="https://learning.oreilly.com/library/view/~/9781801073783/?ar">https://learning.oreilly.com/library/view/~/9781801073783/?ar</a><br/>Format:&#160;Electronic Resources<br/> CYBER SECURITY AND DIGITAL FORENSICS ent://SD_ILS/0/SD_ILS:2331441 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z <a href="https://learning.oreilly.com/library/view/~/9781119795636">https://learning.oreilly.com/library/view/~/9781119795636</a> <a href="https://learning.oreilly.com/library/view/~/9781119795636/?ar">https://learning.oreilly.com/library/view/~/9781119795636/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar">https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar</a><br/>Format:&#160;Electronic Resources<br/> Real-world cryptography ent://SD_ILS/0/SD_ILS:2332150 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Wong, David, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781617296710VE">https://learning.oreilly.com/videos/~/9781617296710VE</a> <a href="https://learning.oreilly.com/videos/~/9781617296710VE/?ar">https://learning.oreilly.com/videos/~/9781617296710VE/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar</a><br/>Format:&#160;Video recording<br/> Cybersecurity in the COVID-19 pandemic ent://SD_ILS/0/SD_ILS:2327730 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Okereafor, Kenneth, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781000357653/?ar">https://learning.oreilly.com/library/view/~/9781000357653/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar">https://go.oreilly.com/library-access/library/view/-/9781000357653/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781000357653">https://learning.oreilly.com/library/view/~/9781000357653</a><br/>Format:&#160;Electronic Resources<br/> Secure edge computing : applications, techniques and challenges. ent://SD_ILS/0/SD_ILS:2329288 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Ahmed, Mohiuddin (Computer scientist), editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000427325/?ar">https://learning.oreilly.com/library/view/~/9781000427325/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781000427325">https://learning.oreilly.com/library/view/~/9781000427325</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar">https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar</a><br/>Format:&#160;Electronic Resources<br/> Art of attack : attacker mindset for security professionals. ent://SD_ILS/0/SD_ILS:2329433 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Reynolds, Maxie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119805465/?ar">https://learning.oreilly.com/library/view/~/9781119805465/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119805465">https://learning.oreilly.com/library/view/~/9781119805465</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar">https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar</a><br/>Format:&#160;Electronic Resources<br/> Implementing identity management on AWS : a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments ent://SD_ILS/0/SD_ILS:2330023 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Lehtinen, Jon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800562288">https://learning.oreilly.com/library/view/~/9781800562288</a> <a href="https://learning.oreilly.com/library/view/~/9781800562288/?ar">https://learning.oreilly.com/library/view/~/9781800562288/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar">https://go.oreilly.com/library-access/library/view/-/9781800562288/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Windows security and hardening : secure and protect your Windows environment from intruders, malware attacks, and other cyber threats. ent://SD_ILS/0/SD_ILS:2325966 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Dunkerley, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216411">https://learning.oreilly.com/library/view/~/9781839216411</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839216411/?ar">https://learning.oreilly.com/library/view/~/9781839216411/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building secure firmware : armoring the foundation of the platform ent://SD_ILS/0/SD_ILS:2326020 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Yao, Jiewen.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261064">https://learning.oreilly.com/library/view/~/9781484261064</a> <a href="https://learning.oreilly.com/library/view/~/9781484261064/?ar">https://learning.oreilly.com/library/view/~/9781484261064/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261064/?ar</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Security+ SY0-601 Certification Guide - Second Edition ent://SD_ILS/0/SD_ILS:2327971 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Neil, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781800564244">https://learning.oreilly.com/library/view/~/9781800564244</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar">https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800564244/?ar">https://learning.oreilly.com/library/view/~/9781800564244/?ar</a><br/>Format:&#160;Electronic Resources<br/> SECURING CLOUD SERVICES;A PRAGMATIC APPROACH, SECOND EDITION. ent://SD_ILS/0/SD_ILS:2328081 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;LEE NEWCOMBE.<br/><a href="https://learning.oreilly.com/library/view/~/9781787782075">https://learning.oreilly.com/library/view/~/9781787782075</a> <a href="https://learning.oreilly.com/library/view/~/9781787782075/?ar">https://learning.oreilly.com/library/view/~/9781787782075/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar">https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:2323589 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for space : protecting the final frontier ent://SD_ILS/0/SD_ILS:2323781 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Oakley, Jacob G.<br/><a href="https://learning.oreilly.com/library/view/~/9781484257326/?ar">https://learning.oreilly.com/library/view/~/9781484257326/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484257326/?ar">https://go.oreilly.com/library-access/library/view/-/9781484257326/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484257326">https://learning.oreilly.com/library/view/~/9781484257326</a><br/>Format:&#160;Electronic Resources<br/> Security engineering 101 : when good design and security work together ent://SD_ILS/0/SD_ILS:2324433 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Everette, Wendy Knox, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920342960/?ar">https://go.oreilly.com/library-access/library/view/-/0636920342960/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920342960/?ar">https://learning.oreilly.com/videos/~/0636920342960/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920342960">https://learning.oreilly.com/videos/~/0636920342960</a><br/>Format:&#160;Electronic Resources<br/> Hacking : der umfassende Praxis-Guide: inkl. Pr&uuml;fungsvorbereitung zum CEHv10 ent://SD_ILS/0/SD_ILS:2325946 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Amberg, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958452206/?ar">https://learning.oreilly.com/library/view/~/9783958452206/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958452206">https://learning.oreilly.com/library/view/~/9783958452206</a><br/>Format:&#160;Electronic Resources<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:2322126 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Kegerreis, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260453232/?ar">https://learning.oreilly.com/library/view/~/9781260453232/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar">https://go.oreilly.com/library-access/library/view/-/9781260453232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Linux Security and Hardening - Second Edition ent://SD_ILS/0/SD_ILS:2324167 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Tevault, Donald A.<br/><a href="https://learning.oreilly.com/library/view/~/9781838981778/?ar">https://learning.oreilly.com/library/view/~/9781838981778/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar">https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838981778">https://learning.oreilly.com/library/view/~/9781838981778</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS : an integrated data security standard guide ent://SD_ILS/0/SD_ILS:2324386 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Seaman, Jim.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258088">https://learning.oreilly.com/library/view/~/9781484258088</a> <a href="https://learning.oreilly.com/library/view/~/9781484258088/?ar">https://learning.oreilly.com/library/view/~/9781484258088/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM Security Key Lifecycle Manager ent://SD_ILS/0/SD_ILS:2323982 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Chen, An, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458786/?ar">https://learning.oreilly.com/library/view/~/9780738458786/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458786/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458786">https://learning.oreilly.com/library/view/~/9780738458786</a><br/>Format:&#160;Electronic Resources<br/> Cyber Warfare - Truth, Tactics, and Strategies ent://SD_ILS/0/SD_ILS:2323667 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Cunningham, Chase, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216992/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839216992">https://learning.oreilly.com/library/view/~/9781839216992</a> <a href="https://learning.oreilly.com/library/view/~/9781839216992/?ar">https://learning.oreilly.com/library/view/~/9781839216992/?ar</a><br/>Format:&#160;Electronic Resources<br/> Generative malware outbreak detection ent://SD_ILS/0/SD_ILS:2325158 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Park, Sean, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar">https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920373452/?ar">https://learning.oreilly.com/videos/~/0636920373452/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920373452">https://learning.oreilly.com/videos/~/0636920373452</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity threats, malware trends, and strategies : mitigate exploits, malware, phishing, and other social engineering attacks ent://SD_ILS/0/SD_ILS:2324609 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Rains, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800206014/?ar">https://learning.oreilly.com/library/view/~/9781800206014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800206014">https://learning.oreilly.com/library/view/~/9781800206014</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar">https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity ent://SD_ILS/0/SD_ILS:2325451 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Carey, Marcus J. (Cybersecurity professional)<br/><a href="https://learning.oreilly.com/library/view/~/9781119643418">https://learning.oreilly.com/library/view/~/9781119643418</a> <a href="https://learning.oreilly.com/library/view/~/9781119643418/?ar">https://learning.oreilly.com/library/view/~/9781119643418/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:2325452 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a> <a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format:&#160;Electronic Resources<br/> Rational cybersecurity for business : the security leaders' guide to business alignment ent://SD_ILS/0/SD_ILS:2325488 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Blum, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781484259528">https://learning.oreilly.com/library/view/~/9781484259528</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar">https://go.oreilly.com/library-access/library/view/-/9781484259528/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484259528/?ar">https://learning.oreilly.com/library/view/~/9781484259528/?ar</a><br/>Format:&#160;Electronic Resources<br/> Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu ent://SD_ILS/0/SD_ILS:2332657 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format:&#160;Electronic Resources<br/> JSON web tokens and alternatives. ent://SD_ILS/0/SD_ILS:2332693 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Madden, Neil, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202163/?ar">https://learning.oreilly.com/videos/~/10000MNLV202163/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202163">https://learning.oreilly.com/videos/~/10000MNLV202163</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202163/?ar</a><br/>Format:&#160;Video recording<br/> Applied incident response ent://SD_ILS/0/SD_ILS:2322826 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781119560265">https://learning.oreilly.com/library/view/~/9781119560265</a> <a href="https://learning.oreilly.com/library/view/~/9781119560265/?ar">https://learning.oreilly.com/library/view/~/9781119560265/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar</a><br/>Format:&#160;Electronic Resources<br/> Build Your Own Cybersecurity Testing Lab : Low-cost Solutions for Testing in Virtual and Cloud-based Environments ent://SD_ILS/0/SD_ILS:2323438 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260458329">https://learning.oreilly.com/library/view/~/9781260458329</a> <a href="https://learning.oreilly.com/library/view/~/9781260458329/?ar">https://learning.oreilly.com/library/view/~/9781260458329/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar">https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar</a><br/>Format:&#160;Electronic Resources<br/> Exposed : how revealing your data and eliminating privacy increases trust and liberates humanity ent://SD_ILS/0/SD_ILS:2326413 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Malisow, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119741633">https://learning.oreilly.com/library/view/~/9781119741633</a> <a href="https://learning.oreilly.com/library/view/~/9781119741633/?ar">https://learning.oreilly.com/library/view/~/9781119741633/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar">https://go.oreilly.com/library-access/library/view/-/9781119741633/?ar</a><br/>Format:&#160;Electronic Resources<br/> PoC GTFO. Volume III ent://SD_ILS/0/SD_ILS:2327149 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Laphroaig, Manul.<br/><a href="https://learning.oreilly.com/library/view/~/9781098125691/?ar">https://learning.oreilly.com/library/view/~/9781098125691/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098125691">https://learning.oreilly.com/library/view/~/9781098125691</a><br/>Format:&#160;Electronic Resources<br/> Protecting Data Privacy Beyond the Trusted System of Record ent://SD_ILS/0/SD_ILS:2323918 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;White, Bill, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458748">https://learning.oreilly.com/library/view/~/9780738458748</a> <a href="https://learning.oreilly.com/library/view/~/9780738458748/?ar">https://learning.oreilly.com/library/view/~/9780738458748/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458748/?ar</a><br/>Format:&#160;Electronic Resources<br/> Demystifying Internet of Things security : successful IoT device/edge and platform security deployment ent://SD_ILS/0/SD_ILS:2321696 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Cheruvu, Sunil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484228968/?ar">https://learning.oreilly.com/library/view/~/9781484228968/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484228968">https://learning.oreilly.com/library/view/~/9781484228968</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484228968/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228968/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data breaches : crisis and opportunity ent://SD_ILS/0/SD_ILS:2322222 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format:&#160;Electronic Resources<br/> Temenos on IBM LinuxONE Best Practices Guide ent://SD_ILS/0/SD_ILS:2323440 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Coble, Deana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458458">https://learning.oreilly.com/library/view/~/9780738458458</a> <a href="https://learning.oreilly.com/library/view/~/9780738458458/?ar">https://learning.oreilly.com/library/view/~/9780738458458/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458458/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident response primer : how to keep from getting pwned too hard ent://SD_ILS/0/SD_ILS:2323316 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format:&#160;Electronic Resources<br/> Designing a HIPAA-compliant security operations center : a guide to detecting and responding to healthcare breaches and events ent://SD_ILS/0/SD_ILS:2323333 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Thompson, Eric C.<br/><a href="https://learning.oreilly.com/library/view/~/9781484256084">https://learning.oreilly.com/library/view/~/9781484256084</a> <a href="https://learning.oreilly.com/library/view/~/9781484256084/?ar">https://learning.oreilly.com/library/view/~/9781484256084/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484256084/?ar</a><br/>Format:&#160;Electronic Resources<br/> DevSecOps for .NET core : securing modern software applications ent://SD_ILS/0/SD_ILS:2324612 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Zeeshan, Afzaal Ahmad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258507/?ar">https://learning.oreilly.com/library/view/~/9781484258507/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484258507">https://learning.oreilly.com/library/view/~/9781484258507</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2322053 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format:&#160;Electronic Resources<br/> Identity attack vectors : implementing an effective identity and access management solution ent://SD_ILS/0/SD_ILS:2322737 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484251652/?ar">https://learning.oreilly.com/library/view/~/9781484251652/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484251652">https://learning.oreilly.com/library/view/~/9781484251652</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for dummies ent://SD_ILS/0/SD_ILS:2322839 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119560326/?ar">https://learning.oreilly.com/library/view/~/9781119560326/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe ent://SD_ILS/0/SD_ILS:2324802 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Rubinoff, Shira, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807004/?ar">https://learning.oreilly.com/library/view/~/9781789807004/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789807004">https://learning.oreilly.com/library/view/~/9781789807004</a><br/>Format:&#160;Electronic Resources<br/> Mastering VMware NSX for vSphere ent://SD_ILS/0/SD_ILS:2327302 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119513544">https://learning.oreilly.com/library/view/~/9781119513544</a> <a href="https://learning.oreilly.com/library/view/~/9781119513544/?ar">https://learning.oreilly.com/library/view/~/9781119513544/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar">https://go.oreilly.com/library-access/library/view/-/9781119513544/?ar</a><br/>Format:&#160;Electronic Resources<br/> Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies ent://SD_ILS/0/SD_ILS:2325773 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Parker, Carey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261897">https://learning.oreilly.com/library/view/~/9781484261897</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484261897/?ar">https://learning.oreilly.com/library/view/~/9781484261897/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Security, 2nd Edition ent://SD_ILS/0/SD_ILS:2331101 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a> <a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware ent://SD_ILS/0/SD_ILS:2325847 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Mohanta, Abhijit.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261934">https://learning.oreilly.com/library/view/~/9781484261934</a> <a href="https://learning.oreilly.com/library/view/~/9781484261934/?ar">https://learning.oreilly.com/library/view/~/9781484261934/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn Kubernetes security : securely orchestrate, scale, and manage your microservices in Kubernetes deployments ent://SD_ILS/0/SD_ILS:2325970 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Huang, Kaizhe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216503">https://learning.oreilly.com/library/view/~/9781839216503</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839216503/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216503/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839216503/?ar">https://learning.oreilly.com/library/view/~/9781839216503/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:2319220 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Tanner, Nadean H., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar">https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119552932/?ar">https://learning.oreilly.com/library/view/~/9781119552932/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119552932">https://learning.oreilly.com/library/view/~/9781119552932</a><br/>Format:&#160;Electronic Resources<br/> Digital asset valuation and cyber risk measurement : principles of cybernomics ent://SD_ILS/0/SD_ILS:2320462 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Ruan, Keyun, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128123287">https://learning.oreilly.com/library/view/~/9780128123287</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128123287/?ar">https://go.oreilly.com/library-access/library/view/-/9780128123287/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128123287/?ar">https://learning.oreilly.com/library/view/~/9780128123287/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics basics : a practical guide using Windows OS ent://SD_ILS/0/SD_ILS:2319813 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Hassan, Nihad A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238387/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484238387/?ar">https://learning.oreilly.com/library/view/~/9781484238387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484238387">https://learning.oreilly.com/library/view/~/9781484238387</a><br/>Format:&#160;Electronic Resources<br/> Investigating Cryptocurrencies : Understanding, Extracting, and Analyzing Blockchain Evidence ent://SD_ILS/0/SD_ILS:2325578 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Furneaux, Nick.<br/><a href="https://learning.oreilly.com/library/view/~/9781469076607/?ar">https://learning.oreilly.com/library/view/~/9781469076607/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781469076607/?ar">https://go.oreilly.com/library-access/library/view/-/9781469076607/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781469076607">https://learning.oreilly.com/library/view/~/9781469076607</a><br/>Format:&#160;Sound recording<br/> Exam ref MS-101 Microsoft 365 Mobility and Security ent://SD_ILS/0/SD_ILS:2321271 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Svidergol, Brian, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135574843/?ar">https://go.oreilly.com/library-access/library/view/-/9780135574843/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135574843/?ar">https://learning.oreilly.com/library/view/~/9780135574843/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber resiliency solution for IBM Spectrum Scale ent://SD_ILS/0/SD_ILS:2322145 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;IBM Storage Team, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457963/?ar">https://learning.oreilly.com/library/view/~/9780738457963/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies ent://SD_ILS/0/SD_ILS:2321510 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Parisi, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789804027/?ar">https://go.oreilly.com/library-access/library/view/-/9781789804027/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789804027">https://learning.oreilly.com/library/view/~/9781789804027</a> <a href="https://learning.oreilly.com/library/view/~/9781789804027/?ar">https://learning.oreilly.com/library/view/~/9781789804027/?ar</a><br/>Format:&#160;Electronic Resources<br/> Beginning security with Microsoft technologies : protecting Office 365, devices, and data ent://SD_ILS/0/SD_ILS:2322123 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Lakshmi, Vasantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484248539/?ar">https://learning.oreilly.com/library/view/~/9781484248539/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar">https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar</a><br/>Format:&#160;Electronic Resources<br/> Qi ye shen tou ce shi he chi xu jian kong. ent://SD_ILS/0/SD_ILS:2332289 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a> <a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a> <a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format:&#160;Video recording<br/> Linux essentials for cybersecurity lab manual ent://SD_ILS/0/SD_ILS:2317558 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data analytics for IT networks : developing innovative use cases ent://SD_ILS/0/SD_ILS:2317559 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization ent://SD_ILS/0/SD_ILS:2318938 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134807614/?ar">https://learning.oreilly.com/library/view/~/9780134807614/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134807614">https://learning.oreilly.com/library/view/~/9780134807614</a><br/>Format:&#160;Electronic Resources<br/> Cyber smart : five habits to protect your family, money, and identity from cyber criminals ent://SD_ILS/0/SD_ILS:2318868 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;McDonough, Bart R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781469071503/?ar">https://learning.oreilly.com/library/view/~/9781469071503/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar">https://go.oreilly.com/library-access/library/view/-/9781469071503/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781469071503">https://learning.oreilly.com/library/view/~/9781469071503</a><br/>Format:&#160;Sound recording<br/> Microsoft Enterprise Mobility and Security training ent://SD_ILS/0/SD_ILS:2319556 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Kehal, Bally, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838648374/?ar">https://learning.oreilly.com/videos/~/9781838648374/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar">https://go.oreilly.com/library-access/library/view/-/9781838648374/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security : art and science ent://SD_ILS/0/SD_ILS:2318452 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux basics for hackers : getting started with networking, scripting, and security in Kali ent://SD_ILS/0/SD_ILS:2318554 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;OccupyTheWeb, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492069485/?ar">https://learning.oreilly.com/library/view/~/9781492069485/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492069485">https://learning.oreilly.com/library/view/~/9781492069485</a><br/>Format:&#160;Electronic Resources<br/> Dynamic SQL : applications, performance, and security in Microsoft SQL server ent://SD_ILS/0/SD_ILS:2318295 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Pollack, Edward, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243183/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243183/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243183/?ar">https://learning.oreilly.com/library/view/~/9781484243183/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243183">https://learning.oreilly.com/library/view/~/9781484243183</a><br/>Format:&#160;Electronic Resources<br/> Professional Red teaming : conducting successful cybersecurity engagements ent://SD_ILS/0/SD_ILS:2318977 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Oakley, Jacob G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243091/?ar">https://learning.oreilly.com/library/view/~/9781484243091/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243091">https://learning.oreilly.com/library/view/~/9781484243091</a><br/>Format:&#160;Electronic Resources<br/> Cyber operations : building, defending, and attacking modern computer networks ent://SD_ILS/0/SD_ILS:2318914 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;O'Leary, Mike, 1968- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242940">https://learning.oreilly.com/library/view/~/9781484242940</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484242940/?ar">https://learning.oreilly.com/library/view/~/9781484242940/?ar</a><br/>Format:&#160;Electronic Resources<br/> The cybersecurity playbook : how every leader and employee can contribute to a culture of security ent://SD_ILS/0/SD_ILS:2321568 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Cerra, Allison, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar">https://go.oreilly.com/library-access/library/view/-/9781119442196/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119442196/?ar">https://learning.oreilly.com/library/view/~/9781119442196/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119442196">https://learning.oreilly.com/library/view/~/9781119442196</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing ent://SD_ILS/0/SD_ILS:2319847 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical security : simple practices for defending your systems ent://SD_ILS/0/SD_ILS:2319402 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Zabicki, Roman, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar">https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781680506679">https://learning.oreilly.com/library/view/~/9781680506679</a> <a href="https://learning.oreilly.com/library/view/~/9781680506679/?ar">https://learning.oreilly.com/library/view/~/9781680506679/?ar</a><br/>Format:&#160;Electronic Resources<br/> Rootkits and bootkits : reversing modern malware and next generation threats ent://SD_ILS/0/SD_ILS:2314357 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Matrosov, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492071259/?ar">https://learning.oreilly.com/library/view/~/9781492071259/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar">https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492071259">https://learning.oreilly.com/library/view/~/9781492071259</a><br/>Format:&#160;Electronic Resources<br/> Threat and vulnerability assessment for enterprises ent://SD_ILS/0/SD_ILS:2319277 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781838559205/?ar">https://learning.oreilly.com/videos/~/9781838559205/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar">https://go.oreilly.com/library-access/library/view/-/9781838559205/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on Spring security 5.1.1 ent://SD_ILS/0/SD_ILS:2319110 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Lelek, Tomasz, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789802931/?ar">https://learning.oreilly.com/videos/~/9781789802931/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789802931/?ar">https://go.oreilly.com/library-access/library/view/-/9781789802931/?ar</a><br/>Format:&#160;Electronic Resources<br/> We have root : even more advice from Schneier on security ent://SD_ILS/0/SD_ILS:2321573 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643012">https://learning.oreilly.com/library/view/~/9781119643012</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643012/?ar">https://learning.oreilly.com/library/view/~/9781119643012/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:2321574 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Quade, Phil.<br/><a href="https://learning.oreilly.com/library/view/~/9781119617365">https://learning.oreilly.com/library/view/~/9781119617365</a> <a href="https://learning.oreilly.com/library/view/~/9781119617365/?ar">https://learning.oreilly.com/library/view/~/9781119617365/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar">https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing your cloud : IBM security for LinuxONE ent://SD_ILS/0/SD_ILS:2321597 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Alves, Edi Lopes, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457949/?ar">https://learning.oreilly.com/library/view/~/9780738457949/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security with AI and machine learning : using advanced tools to improve application security at the edge ent://SD_ILS/0/SD_ILS:2319058 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Ops with bash : attack, defend, and analyze from the command line ent://SD_ILS/0/SD_ILS:2319252 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a> <a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessons ent://SD_ILS/0/SD_ILS:2321550 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format:&#160;Electronic Resources<br/> My online privacy for seniors ent://SD_ILS/0/SD_ILS:2319412 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Rich, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135381281/?ar">https://learning.oreilly.com/library/view/~/9780135381281/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar">https://go.oreilly.com/library-access/library/view/-/9780135381281/?ar</a><br/>Format:&#160;Electronic Resources<br/> Zabbix 4 network monitoring : monitor the performance of your network devices and applications using the all-new Zabbix 4.0 ent://SD_ILS/0/SD_ILS:2319010 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Uytterhoeven, Patrik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340266/?ar">https://learning.oreilly.com/library/view/~/9781789340266/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340266/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on cryptography with Java ent://SD_ILS/0/SD_ILS:2319124 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Costlow, Erik, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar">https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781838554972/?ar">https://learning.oreilly.com/videos/~/9781838554972/?ar</a><br/>Format:&#160;Electronic Resources<br/> Becoming the hacker : the playbook for getting inside the mind of an attacker ent://SD_ILS/0/SD_ILS:2319129 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format:&#160;Electronic Resources<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:2319534 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a> <a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web hacking : become a professional web pentester ent://SD_ILS/0/SD_ILS:2319831 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of hacking (video collection) ent://SD_ILS/0/SD_ILS:2319884 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar">https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780135767849/?ar">https://learning.oreilly.com/videos/~/9780135767849/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacks ent://SD_ILS/0/SD_ILS:2322400 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242551/?ar">https://learning.oreilly.com/library/view/~/9781484242551/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484242551">https://learning.oreilly.com/library/view/~/9781484242551</a><br/>Format:&#160;Electronic Resources<br/> Solving identity management in modern applications : demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 ent://SD_ILS/0/SD_ILS:2322723 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Wilson, Yvonne.<br/><a href="https://learning.oreilly.com/library/view/~/9781484250952/?ar">https://learning.oreilly.com/library/view/~/9781484250952/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484250952">https://learning.oreilly.com/library/view/~/9781484250952</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with Ghidra ent://SD_ILS/0/SD_ILS:2322605 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar">https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098115265/?ar">https://learning.oreilly.com/library/view/~/9781098115265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098115265">https://learning.oreilly.com/library/view/~/9781098115265</a><br/>Format:&#160;Electronic Resources<br/> Fraud detection without feature engineering ent://SD_ILS/0/SD_ILS:2322434 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Vagata, Pamela, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339540/?ar">https://learning.oreilly.com/videos/~/0636920339540/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339540">https://learning.oreilly.com/videos/~/0636920339540</a><br/>Format:&#160;Electronic Resources<br/> How to build privacy and security into deep learning models ent://SD_ILS/0/SD_ILS:2322791 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format:&#160;Electronic Resources<br/> The complete Metasploit guide : explore effective penetration testing techniques with Metasploit ent://SD_ILS/0/SD_ILS:2327077 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838822477">https://learning.oreilly.com/library/view/~/9781838822477</a> <a href="https://learning.oreilly.com/library/view/~/9781838822477/?ar">https://learning.oreilly.com/library/view/~/9781838822477/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing mit mimikatz : Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchf&uuml;hren ent://SD_ILS/0/SD_ILS:2321348 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958459700">https://learning.oreilly.com/library/view/~/9783958459700</a> <a href="https://learning.oreilly.com/library/view/~/9783958459700/?ar">https://learning.oreilly.com/library/view/~/9783958459700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar">https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity ent://SD_ILS/0/SD_ILS:2321448 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643326">https://learning.oreilly.com/library/view/~/9781119643326</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643326/?ar">https://learning.oreilly.com/library/view/~/9781119643326/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical cyber forensics : an incident-based approach to forensic investigations ent://SD_ILS/0/SD_ILS:2321521 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux troubleshooting course with real life examples ent://SD_ILS/0/SD_ILS:2323238 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Afzal, Imran, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar">https://go.oreilly.com/library-access/library/view/-/9781838982263/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781838982263/?ar">https://learning.oreilly.com/videos/~/9781838982263/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Malware Analysis : the Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks. ent://SD_ILS/0/SD_ILS:2320922 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Kleymenov, Alexey.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar">https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789610789">https://learning.oreilly.com/library/view/~/9781789610789</a> <a href="https://learning.oreilly.com/library/view/~/9781789610789/?ar">https://learning.oreilly.com/library/view/~/9781789610789/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with Linux on Z Encryption for data at-rest ent://SD_ILS/0/SD_ILS:2321973 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738457468/?ar">https://learning.oreilly.com/library/view/~/9780738457468/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security principles for the working architect ent://SD_ILS/0/SD_ILS:2322691 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Woods, Eoin, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920338215/?ar">https://learning.oreilly.com/videos/~/0636920338215/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920338215">https://learning.oreilly.com/videos/~/0636920338215</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar">https://go.oreilly.com/library-access/library/view/-/0636920338215/?ar</a><br/>Format:&#160;Electronic Resources<br/> Foundations of information security : a straightforward introduction ent://SD_ILS/0/SD_ILS:2322313 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098122546/?ar">https://learning.oreilly.com/library/view/~/9781098122546/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098122546">https://learning.oreilly.com/library/view/~/9781098122546</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122546/?ar</a><br/>Format:&#160;Electronic Resources<br/> Oracle cloud user security : providing for separation of duties and appropriate access by job function. ent://SD_ILS/0/SD_ILS:2322966 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Malcher, Michelle, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar">https://go.oreilly.com/library-access/library/view/-/9781484255643/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781484255643/?ar">https://learning.oreilly.com/videos/~/9781484255643/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781484255643">https://learning.oreilly.com/videos/~/9781484255643</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:2321452 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643371/?ar">https://learning.oreilly.com/library/view/~/9781119643371/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643371">https://learning.oreilly.com/library/view/~/9781119643371</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643371/?ar</a><br/>Format:&#160;Electronic Resources<br/> Machine Learning et s&eacute;curit&eacute; ent://SD_ILS/0/SD_ILS:2326075 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar">https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9782412043561">https://learning.oreilly.com/library/view/~/9782412043561</a> <a href="https://learning.oreilly.com/library/view/~/9782412043561/?ar">https://learning.oreilly.com/library/view/~/9782412043561/?ar</a><br/>Format:&#160;Electronic Resources<br/> Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments ent://SD_ILS/0/SD_ILS:2322055 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Quintero, Dino, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457970/?ar">https://learning.oreilly.com/library/view/~/9780738457970/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457970/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your data ent://SD_ILS/0/SD_ILS:2322204 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Chakrabarty, Boudhayan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458014/?ar">https://learning.oreilly.com/library/view/~/9780738458014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458014">https://learning.oreilly.com/library/view/~/9780738458014</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Complete Ethical Hacking Course ent://SD_ILS/0/SD_ILS:2323185 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Serverless security : protect functions using the CLAD security model ent://SD_ILS/0/SD_ILS:2323066 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar">https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492082538/?ar">https://learning.oreilly.com/library/view/~/9781492082538/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492082538">https://learning.oreilly.com/library/view/~/9781492082538</a><br/>Format:&#160;Electronic Resources<br/> Cyber-Vigilance and Digital Trust ent://SD_ILS/0/SD_ILS:2324869 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Tounsi, Wiem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786304483">https://learning.oreilly.com/library/view/~/9781786304483</a> <a href="https://learning.oreilly.com/library/view/~/9781786304483/?ar">https://learning.oreilly.com/library/view/~/9781786304483/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304483/?ar</a><br/>Format:&#160;Electronic Resources<br/> Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud ent://SD_ILS/0/SD_ILS:2321488 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Berkouwer, Sander, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789806984">https://learning.oreilly.com/library/view/~/9781789806984</a> <a href="https://learning.oreilly.com/library/view/~/9781789806984/?ar">https://learning.oreilly.com/library/view/~/9781789806984/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar">https://go.oreilly.com/library-access/library/view/-/9781789806984/?ar</a><br/>Format:&#160;Electronic Resources<br/> Informationssicherheit und Datenschutz : Handbuch f&uuml;r Praktiker und Begleitbuch zum T.I.S.P. ent://SD_ILS/0/SD_ILS:2322189 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Domnick, Andr&eacute;, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar">https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098123659/?ar">https://learning.oreilly.com/library/view/~/9781098123659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098123659">https://learning.oreilly.com/library/view/~/9781098123659</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for dummies ent://SD_ILS/0/SD_ILS:2322747 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781494542450">https://learning.oreilly.com/library/view/~/9781494542450</a> <a href="https://learning.oreilly.com/library/view/~/9781494542450/?ar">https://learning.oreilly.com/library/view/~/9781494542450/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar">https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar</a><br/>Format:&#160;Electronic Resources<br/> System administration ethics : ten commandments for security and compliance in a modern cyber world ent://SD_ILS/0/SD_ILS:2322866 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Ljubuncic, Igor, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249888/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249888/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484249888/?ar">https://learning.oreilly.com/library/view/~/9781484249888/?ar</a><br/>Format:&#160;Electronic Resources<br/> How cyber security can protect your business : a guide for all stakeholders ent://SD_ILS/0/SD_ILS:2323060 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Wright, Christopher, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781979/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781979/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787781979/?ar">https://learning.oreilly.com/library/view/~/9781787781979/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity - Attack and Defense Strategies - Second Edition ent://SD_ILS/0/SD_ILS:2323102 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar">https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838827793/?ar">https://learning.oreilly.com/library/view/~/9781838827793/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838827793">https://learning.oreilly.com/library/view/~/9781838827793</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : design a security framework for an Internet connected ecosystem ent://SD_ILS/0/SD_ILS:2318628 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625821/?ar">https://learning.oreilly.com/library/view/~/9781788625821/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hei ke wang luo ying yong : wang luo qin ru ying yong. ent://SD_ILS/0/SD_ILS:2332288 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a> <a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format:&#160;Video recording<br/> Threat hunting : a guide to proactive network defense ent://SD_ILS/0/SD_ILS:2318444 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Collins, Michael (Michael Patrick), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028260/?ar">https://learning.oreilly.com/library/view/~/9781492028260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492028260">https://learning.oreilly.com/library/view/~/9781492028260</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing mit Metasploit : Praxiswissen f&uuml;r mehr IT-Sicherheit ent://SD_ILS/0/SD_ILS:2316255 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958455979/?ar">https://learning.oreilly.com/library/view/~/9783958455979/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958455979">https://learning.oreilly.com/library/view/~/9783958455979</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar">https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats ent://SD_ILS/0/SD_ILS:2315528 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Tevault, Donald A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788620307/?ar">https://go.oreilly.com/library-access/library/view/-/9781788620307/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788620307/?ar">https://learning.oreilly.com/library/view/~/9781788620307/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788620307">https://learning.oreilly.com/library/view/~/9781788620307</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : orchestrating attacks ent://SD_ILS/0/SD_ILS:2318510 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781484243404/?ar">https://learning.oreilly.com/videos/~/9781484243404/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : networks and websites ent://SD_ILS/0/SD_ILS:2318511 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243411/?ar">https://learning.oreilly.com/videos/~/9781484243411/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar</a><br/>Format:&#160;Electronic Resources<br/> Apache Kafka series : Kafka security (SSL SASL Kerberos ACL) ent://SD_ILS/0/SD_ILS:2316736 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Maarek, St&eacute;phane, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar">https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789342420/?ar">https://learning.oreilly.com/videos/~/9781789342420/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network scanning cookbook : practical network security using Nmap and Nessus 7 ent://SD_ILS/0/SD_ILS:2317776 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus ent://SD_ILS/0/SD_ILS:2316700 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics ent://SD_ILS/0/SD_ILS:2315706 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Social engineering : the science of human hacking ent://SD_ILS/0/SD_ILS:2316838 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Hadnagy, Christopher, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119433385/?ar">https://go.oreilly.com/library-access/library/view/-/9781119433385/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119433385/?ar">https://learning.oreilly.com/library/view/~/9781119433385/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity attacks (Red Team activity) ent://SD_ILS/0/SD_ILS:2315986 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Nesterenko, Sergii, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781788478878/?ar">https://learning.oreilly.com/videos/~/9781788478878/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : endpoint defense ent://SD_ILS/0/SD_ILS:2316613 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Dewey, Gary, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788990981/?ar">https://learning.oreilly.com/videos/~/9781788990981/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit ent://SD_ILS/0/SD_ILS:2316790 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788990615/?ar">https://learning.oreilly.com/library/view/~/9781788990615/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware data science : attack detection and attribution ent://SD_ILS/0/SD_ILS:2317388 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Saxe, Joshua, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067672">https://learning.oreilly.com/library/view/~/9781492067672</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492067672/?ar">https://learning.oreilly.com/library/view/~/9781492067672/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on red team tactics : a practical guide to mastering red team operations ent://SD_ILS/0/SD_ILS:2317792 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sharma, Himanshu, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995238">https://learning.oreilly.com/library/view/~/9781788995238</a> <a href="https://learning.oreilly.com/library/view/~/9781788995238/?ar">https://learning.oreilly.com/library/view/~/9781788995238/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cracking codes with Python : an introduction to building and breaking ciphers ent://SD_ILS/0/SD_ILS:2314359 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sweigart, Al, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067498">https://learning.oreilly.com/library/view/~/9781492067498</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492067498/?ar">https://learning.oreilly.com/library/view/~/9781492067498/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:2316152 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux&reg; hardening in hostile networks : server security from TLS to TOR ent://SD_ILS/0/SD_ILS:2314177 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing open source libraries : managing vulnerabilities in open source code packages ent://SD_ILS/0/SD_ILS:2314890 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996980/?ar">https://learning.oreilly.com/library/view/~/9781491996980/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996980">https://learning.oreilly.com/library/view/~/9781491996980</a><br/>Format:&#160;Electronic Resources<br/> Integrated security technologies and solutions. Volume I, Cisco Security Solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content security ent://SD_ILS/0/SD_ILS:2316388 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Woland, Aaron T., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134807577/?ar">https://learning.oreilly.com/library/view/~/9780134807577/?ar</a><br/>Format:&#160;Electronic Resources<br/> Machine learning and security : protecting systems with data and algorithms ent://SD_ILS/0/SD_ILS:2315881 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar">https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491979891/?ar">https://learning.oreilly.com/library/view/~/9781491979891/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn website hacking : penetration testing from scratch ent://SD_ILS/0/SD_ILS:2316434 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789346145/?ar">https://learning.oreilly.com/videos/~/9781789346145/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : learning the basics ent://SD_ILS/0/SD_ILS:2318527 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243480/?ar">https://learning.oreilly.com/videos/~/9781484243480/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threats ent://SD_ILS/0/SD_ILS:2316016 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Donaldson, Scott E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232583/?ar">https://learning.oreilly.com/library/view/~/9781484232583/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484232583">https://learning.oreilly.com/library/view/~/9781484232583</a><br/>Format:&#160;Electronic Resources<br/> Hands-on Spring Security 5 for Reactive applications : learn effective ways to secure your applications with Spring and Spring WebFlux ent://SD_ILS/0/SD_ILS:2317237 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;John, Tomcy, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788995979/?ar">https://learning.oreilly.com/library/view/~/9781788995979/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788995979/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995979/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware ent://SD_ILS/0/SD_ILS:2317050 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;K. A., Monnappa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar">https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788392501/?ar">https://learning.oreilly.com/library/view/~/9781788392501/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2316778 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking for Dummies. ent://SD_ILS/0/SD_ILS:2316883 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119485476/?ar">https://go.oreilly.com/library-access/library/view/-/9781119485476/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119485476/?ar">https://learning.oreilly.com/library/view/~/9781119485476/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows security monitoring : scenarios and patterns ent://SD_ILS/0/SD_ILS:2315945 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Miroshnikov, Andrei, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar">https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119390640/?ar">https://learning.oreilly.com/library/view/~/9781119390640/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119390640">https://learning.oreilly.com/library/view/~/9781119390640</a><br/>Format:&#160;Electronic Resources<br/> Learn ethical hacking from scratch : your stepping stone to penetration testing ent://SD_ILS/0/SD_ILS:2317259 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sabih, Zaid, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar">https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788622059">https://learning.oreilly.com/library/view/~/9781788622059</a> <a href="https://learning.oreilly.com/library/view/~/9781788622059/?ar">https://learning.oreilly.com/library/view/~/9781788622059/?ar</a><br/>Format:&#160;Electronic Resources<br/> Open source intelligence methods and tools : a practical guide to online intelligence ent://SD_ILS/0/SD_ILS:2316916 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232132">https://learning.oreilly.com/library/view/~/9781484232132</a> <a href="https://learning.oreilly.com/library/view/~/9781484232132/?ar">https://learning.oreilly.com/library/view/~/9781484232132/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232132/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn ethical hacking from scratch ent://SD_ILS/0/SD_ILS:2316923 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789340297/?ar">https://learning.oreilly.com/videos/~/9781789340297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis ent://SD_ILS/0/SD_ILS:2317231 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Bramwell, Phil, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295666">https://learning.oreilly.com/library/view/~/9781788295666</a> <a href="https://learning.oreilly.com/library/view/~/9781788295666/?ar">https://learning.oreilly.com/library/view/~/9781788295666/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced malware analysis ent://SD_ILS/0/SD_ILS:2317857 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Njenga, Munir, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788627146/?ar">https://learning.oreilly.com/videos/~/9781788627146/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar</a><br/>Format:&#160;Electronic Resources<br/> Distributed Denial of Service (DDoS) : practical detection and defense ent://SD_ILS/0/SD_ILS:2318176 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Chou, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar">https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492026181">https://learning.oreilly.com/library/view/~/9781492026181</a> <a href="https://learning.oreilly.com/library/view/~/9781492026181/?ar">https://learning.oreilly.com/library/view/~/9781492026181/?ar</a><br/>Format:&#160;Electronic Resources<br/> Solving Cyber Risk : Protecting Your Company and Society. ent://SD_ILS/0/SD_ILS:2318282 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Coburn, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781119490937">https://learning.oreilly.com/library/view/~/9781119490937</a> <a href="https://learning.oreilly.com/library/view/~/9781119490937/?ar">https://learning.oreilly.com/library/view/~/9781119490937/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar">https://go.oreilly.com/library-access/library/view/-/9781119490937/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Office 365 : masterminding MDM and compliance in the cloud ent://SD_ILS/0/SD_ILS:2318564 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Katzer, Matthew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484242308/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242308/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484242308/?ar">https://learning.oreilly.com/library/view/~/9781484242308/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484242308">https://learning.oreilly.com/library/view/~/9781484242308</a><br/>Format:&#160;Electronic Resources<br/> Securing DevOps ent://SD_ILS/0/SD_ILS:2319465 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Vehent, Julien, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar">https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617294136">https://learning.oreilly.com/library/view/~/9781617294136</a> <a href="https://learning.oreilly.com/library/view/~/9781617294136/?ar">https://learning.oreilly.com/library/view/~/9781617294136/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics and cyber crime with Kali Linux fundamentals ent://SD_ILS/0/SD_ILS:2314043 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Muniz, Joseph, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar">https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780134693644/?ar">https://learning.oreilly.com/videos/~/9780134693644/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital resilience : is your company ready for the next cyber threat? ent://SD_ILS/0/SD_ILS:2314734 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Rothrock, Ray A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814439258">https://learning.oreilly.com/library/view/~/9780814439258</a> <a href="https://learning.oreilly.com/library/view/~/9780814439258/?ar">https://learning.oreilly.com/library/view/~/9780814439258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar">https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar</a><br/>Format:&#160;Electronic Resources<br/> Risk management for cybersecurity and IT managers ent://SD_ILS/0/SD_ILS:2316845 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789531992/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531992/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789531992/?ar">https://learning.oreilly.com/videos/~/9781789531992/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to malware analysis for incident responders ent://SD_ILS/0/SD_ILS:2316850 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530612/?ar">https://learning.oreilly.com/videos/~/9781789530612/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with z/OS data set encryption ent://SD_ILS/0/SD_ILS:2316937 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738456874/?ar">https://learning.oreilly.com/library/view/~/9780738456874/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security on IBM z/VSE ent://SD_ILS/0/SD_ILS:2316940 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Hellner, Helmut, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738456911/?ar">https://learning.oreilly.com/library/view/~/9780738456911/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738456911/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456911/?ar</a><br/>Format:&#160;Electronic Resources<br/> WiFi hacking : wireless penetration testing for beginners ent://SD_ILS/0/SD_ILS:2316772 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530193/?ar">https://learning.oreilly.com/videos/~/9781789530193/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar</a><br/>Format:&#160;Electronic Resources<br/> An introduction to cyber modeling and simulation ent://SD_ILS/0/SD_ILS:2317081 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Couretas, Jerry M., 1966- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119420873">https://learning.oreilly.com/library/view/~/9781119420873</a> <a href="https://learning.oreilly.com/library/view/~/9781119420873/?ar">https://learning.oreilly.com/library/view/~/9781119420873/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119420873/?ar">https://go.oreilly.com/library-access/library/view/-/9781119420873/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain ent://SD_ILS/0/SD_ILS:2317092 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Gupta, Rajneesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990189">https://learning.oreilly.com/library/view/~/9781788990189</a> <a href="https://learning.oreilly.com/library/view/~/9781788990189/?ar">https://learning.oreilly.com/library/view/~/9781788990189/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux tutorial for beginners ent://SD_ILS/0/SD_ILS:2317579 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Naja, Tarek, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar">https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789615173/?ar">https://learning.oreilly.com/videos/~/9781789615173/?ar</a><br/>Format:&#160;Electronic Resources<br/> NIST cybersecurity framework : a pocket guide ent://SD_ILS/0/SD_ILS:2317535 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787780422/?ar">https://go.oreilly.com/library-access/library/view/-/9781787780422/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787780422/?ar">https://learning.oreilly.com/library/view/~/9781787780422/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787780422">https://learning.oreilly.com/library/view/~/9781787780422</a><br/>Format:&#160;Electronic Resources<br/> Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies ent://SD_ILS/0/SD_ILS:2317228 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Parker, Carey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484238523">https://learning.oreilly.com/library/view/~/9781484238523</a> <a href="https://learning.oreilly.com/library/view/~/9781484238523/?ar">https://learning.oreilly.com/library/view/~/9781484238523/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484238523/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238523/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking masterclass ent://SD_ILS/0/SD_ILS:2317748 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789530018/?ar">https://learning.oreilly.com/videos/~/9781789530018/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Linux security cookbook : secure your Linux environment from modern-day attacks with practical recipes ent://SD_ILS/0/SD_ILS:2317509 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Kalsi, Tajinder, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789138399/?ar">https://learning.oreilly.com/library/view/~/9781789138399/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789138399/?ar">https://go.oreilly.com/library-access/library/view/-/9781789138399/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on machine learning for cybersecurity : safeguard your system by making your machines intelligent using the Python ecosystem ent://SD_ILS/0/SD_ILS:2318588 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Halder, Soma, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788992282/?ar">https://go.oreilly.com/library-access/library/view/-/9781788992282/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788992282/?ar">https://learning.oreilly.com/library/view/~/9781788992282/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788992282">https://learning.oreilly.com/library/view/~/9781788992282</a><br/>Format:&#160;Electronic Resources<br/> What is cybersecurity? ent://SD_ILS/0/SD_ILS:2318722 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format:&#160;Electronic Resources<br/> Asset attack vectors : building effective vulnerability management strategies to protect organizations ent://SD_ILS/0/SD_ILS:2316720 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484236277/?ar">https://learning.oreilly.com/library/view/~/9781484236277/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484236277/?ar">https://go.oreilly.com/library-access/library/view/-/9781484236277/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484236277">https://learning.oreilly.com/library/view/~/9781484236277</a><br/>Format:&#160;Electronic Resources<br/> Serious cryptography : a practical introduction to modern encryption ent://SD_ILS/0/SD_ILS:2316208 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Aumasson, Jean-Philippe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067511">https://learning.oreilly.com/library/view/~/9781492067511</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492067511/?ar">https://learning.oreilly.com/library/view/~/9781492067511/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security penetration testing (The art of hacking series) ent://SD_ILS/0/SD_ILS:2314102 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar">https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780134833989/?ar">https://learning.oreilly.com/videos/~/9780134833989/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity essentials ent://SD_ILS/0/SD_ILS:2322482 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Brooks, Charles J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119362395/?ar">https://learning.oreilly.com/library/view/~/9781119362395/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar">https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar</a><br/>Format:&#160;Electronic Resources<br/> An quan shen tou ce shi. ent://SD_ILS/0/SD_ILS:2332437 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882021010401/?ar">https://learning.oreilly.com/videos/~/8882021010401/?ar</a> <a href="https://learning.oreilly.com/videos/~/8882021010401">https://learning.oreilly.com/videos/~/8882021010401</a> <a href="https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar</a><br/>Format:&#160;Video recording<br/> Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules. ent://SD_ILS/0/SD_ILS:2315320 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788624596/?ar">https://learning.oreilly.com/library/view/~/9781788624596/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack ent://SD_ILS/0/SD_ILS:2315529 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Buchanan, Cameron, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788831925/?ar">https://go.oreilly.com/library-access/library/view/-/9781788831925/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788831925/?ar">https://learning.oreilly.com/library/view/~/9781788831925/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud computing security : foundations and challenges ent://SD_ILS/0/SD_ILS:2311524 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : a practitioner's guide ent://SD_ILS/0/SD_ILS:2313763 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format:&#160;Electronic Resources<br/> Post-incident reviews : learning from failure for improved incident response ent://SD_ILS/0/SD_ILS:2318499 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Hand, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar">https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491986998">https://learning.oreilly.com/library/view/~/9781491986998</a> <a href="https://learning.oreilly.com/library/view/~/9781491986998/?ar">https://learning.oreilly.com/library/view/~/9781491986998/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of cyber safety : computer and mobile device safety made easy ent://SD_ILS/0/SD_ILS:2311432 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sammons, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166394/?ar">https://learning.oreilly.com/library/view/~/9780124166394/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124166394/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166394/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:2313104 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Grimes, Roger A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119396215/?ar">https://go.oreilly.com/library-access/library/view/-/9781119396215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119396215/?ar">https://learning.oreilly.com/library/view/~/9781119396215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119396215">https://learning.oreilly.com/library/view/~/9781119396215</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux cookbook : effective penetration testing solutions ent://SD_ILS/0/SD_ILS:2314270 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Schultz, Corey P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390303/?ar">https://learning.oreilly.com/library/view/~/9781784390303/?ar</a><br/>Format:&#160;Electronic Resources<br/> Agile application security : enabling security in a continuous delivery pipeline ent://SD_ILS/0/SD_ILS:2312360 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Bell, Laura, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491938836">https://learning.oreilly.com/library/view/~/9781491938836</a> <a href="https://learning.oreilly.com/library/view/~/9781491938836/?ar">https://learning.oreilly.com/library/view/~/9781491938836/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491938836/?ar">https://go.oreilly.com/library-access/library/view/-/9781491938836/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed : malware and rootkits : security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2312362 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Davis, Michael, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071825757">https://learning.oreilly.com/library/view/~/9780071825757</a> <a href="https://learning.oreilly.com/library/view/~/9780071825757/?ar">https://learning.oreilly.com/library/view/~/9780071825757/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar">https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar</a><br/>Format:&#160;Electronic Resources<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:2311609 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Griffor, Edward R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128038383/?ar">https://learning.oreilly.com/library/view/~/9780128038383/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar">https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128038383">https://learning.oreilly.com/library/view/~/9780128038383</a><br/>Format:&#160;Electronic Resources<br/> Digital privacy and security using windows : a practical guide ent://SD_ILS/0/SD_ILS:2313658 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484227985/?ar">https://learning.oreilly.com/library/view/~/9781484227985/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484227985/?ar">https://go.oreilly.com/library-access/library/view/-/9781484227985/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484227985">https://learning.oreilly.com/library/view/~/9781484227985</a><br/>Format:&#160;Electronic Resources<br/> Fluent conference 2017, San Jose, CA. ent://SD_ILS/0/SD_ILS:2313669 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Fluent (2017 : San Jose, California)<br/><a href="https://learning.oreilly.com/videos/~/9781491985298/?ar">https://learning.oreilly.com/videos/~/9781491985298/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491985298/?ar">https://go.oreilly.com/library-access/library/view/-/9781491985298/?ar</a><br/>Format:&#160;Electronic Resources<br/> Industrial cybersecurity : efficiently secure critical infrastructure systems ent://SD_ILS/0/SD_ILS:2314674 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788395151/?ar">https://learning.oreilly.com/library/view/~/9781788395151/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar">https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788395151">https://learning.oreilly.com/library/view/~/9781788395151</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:2314683 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a> <a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format:&#160;Electronic Resources<br/> Spring Security : secure your web applications, RESTful services, and microservice architectures ent://SD_ILS/0/SD_ILS:2315067 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Knutson, Mick, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787129511/?ar">https://go.oreilly.com/library-access/library/view/-/9781787129511/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787129511/?ar">https://learning.oreilly.com/library/view/~/9781787129511/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privacy and the Internet of Things ent://SD_ILS/0/SD_ILS:2316648 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Rosner, Gilad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042822">https://learning.oreilly.com/library/view/~/9781492042822</a> <a href="https://learning.oreilly.com/library/view/~/9781492042822/?ar">https://learning.oreilly.com/library/view/~/9781492042822/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042822/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042822/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building a HIPAA-compliant cybersecurity program : using NIST 800-30 and CSF to secure protected health information ent://SD_ILS/0/SD_ILS:2318128 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Thompson, Eric C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230602/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230602/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230602/?ar">https://learning.oreilly.com/library/view/~/9781484230602/?ar</a><br/>Format:&#160;Electronic Resources<br/> Die Kunst der Anonymit&auml;t im Internet : so sch&uuml;tzen Sie Ihre Identit&auml;t und Ihre Daten ent://SD_ILS/0/SD_ILS:2315011 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar">https://go.oreilly.com/library-access/library/view/-/9783958456372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958456372/?ar">https://learning.oreilly.com/library/view/~/9783958456372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958456372">https://learning.oreilly.com/library/view/~/9783958456372</a><br/>Format:&#160;Electronic Resources<br/> VCP6-NV official cert guide : (exam #2VO-641) ent://SD_ILS/0/SD_ILS:2311292 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sena Sosa, Elver, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134133713">https://learning.oreilly.com/library/view/~/9780134133713</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar">https://go.oreilly.com/library-access/library/view/-/9780134133713/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134133713/?ar">https://learning.oreilly.com/library/view/~/9780134133713/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ransomware : defending against digital extortion ent://SD_ILS/0/SD_ILS:2311973 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Liska, Allan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491967874/?ar">https://learning.oreilly.com/library/view/~/9781491967874/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491967874">https://learning.oreilly.com/library/view/~/9781491967874</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar">https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:2312348 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Li, Shancang, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045053">https://learning.oreilly.com/library/view/~/9780128045053</a> <a href="https://learning.oreilly.com/library/view/~/9780128045053/?ar">https://learning.oreilly.com/library/view/~/9780128045053/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045053/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security engineering : a practical approach for systems and software assurance ent://SD_ILS/0/SD_ILS:2311996 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Mead, Nancy R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar">https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134189857/?ar">https://learning.oreilly.com/library/view/~/9780134189857/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed industrial control systems : ICS and SCADA security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2311403 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Bodungen, Clint E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781259589720/?ar">https://go.oreilly.com/library-access/library/view/-/9781259589720/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781259589720/?ar">https://learning.oreilly.com/library/view/~/9781259589720/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident management for operations ent://SD_ILS/0/SD_ILS:2313545 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Schnepp, Rob, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491917619/?ar">https://learning.oreilly.com/library/view/~/9781491917619/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar">https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491917619">https://learning.oreilly.com/library/view/~/9781491917619</a><br/>Format:&#160;Electronic Resources<br/> Metasploit for beginners : create a threat-free environment with the best-in-class tool ent://SD_ILS/0/SD_ILS:2313840 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295970/?ar">https://learning.oreilly.com/library/view/~/9781788295970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295970">https://learning.oreilly.com/library/view/~/9781788295970</a><br/>Format:&#160;Electronic Resources<br/> Spring Security LDAP integration and SAML extension ent://SD_ILS/0/SD_ILS:2313943 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Mishra, Ankit, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781787285538/?ar">https://learning.oreilly.com/videos/~/9781787285538/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar">https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux network scanning cookbook : take your penetration-testing skills to the next level ent://SD_ILS/0/SD_ILS:2313499 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format:&#160;Electronic Resources<br/> To improve cybersecurity, think like a hacker ent://SD_ILS/0/SD_ILS:2313125 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Esteves, Jos&eacute;, 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT58314">https://learning.oreilly.com/library/view/~/53863MIT58314</a> <a href="https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT58314/?ar">https://learning.oreilly.com/library/view/~/53863MIT58314/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing essentials. ent://SD_ILS/0/SD_ILS:2311955 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Oriyano, Sean-Philip.<br/><a href="https://learning.oreilly.com/library/view/~/9781119235309">https://learning.oreilly.com/library/view/~/9781119235309</a> <a href="https://learning.oreilly.com/library/view/~/9781119235309/?ar">https://learning.oreilly.com/library/view/~/9781119235309/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar">https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows virus and malware troubleshooting ent://SD_ILS/0/SD_ILS:2312937 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security from first principles : a practical guide to the information security practice principles ent://SD_ILS/0/SD_ILS:2314425 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Jackson, Craig, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996911/?ar">https://learning.oreilly.com/library/view/~/9781491996911/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996911">https://learning.oreilly.com/library/view/~/9781491996911</a><br/>Format:&#160;Electronic Resources<br/> Gray hat C# : a hacker's guide to creating and automating security tools ent://SD_ILS/0/SD_ILS:2312569 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Perry, Brandon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492023449">https://learning.oreilly.com/library/view/~/9781492023449</a> <a href="https://learning.oreilly.com/library/view/~/9781492023449/?ar">https://learning.oreilly.com/library/view/~/9781492023449/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492023449/?ar">https://go.oreilly.com/library-access/library/view/-/9781492023449/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent training : take your security awareness program to the next level ent://SD_ILS/0/SD_ILS:2313452 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Schroeder, Jordan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484228357/?ar">https://learning.oreilly.com/library/view/~/9781484228357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484228357">https://learning.oreilly.com/library/view/~/9781484228357</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments ent://SD_ILS/0/SD_ILS:2313287 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Shah, Dhruv, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar">https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783982165/?ar">https://learning.oreilly.com/library/view/~/9781783982165/?ar</a><br/>Format:&#160;Electronic Resources<br/> Red Hat Certificate of Expertise in server hardening - exam EX413 training : prepare to take the Red Hat EX413 exam and work towards your RHCA datacenter certification ent://SD_ILS/0/SD_ILS:2312826 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Rothwell, William, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491974483/?ar">https://go.oreilly.com/library-access/library/view/-/9781491974483/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491974483/?ar">https://learning.oreilly.com/videos/~/9781491974483/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:2311833 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128093658/?ar">https://learning.oreilly.com/library/view/~/9780128093658/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar">https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128093658">https://learning.oreilly.com/library/view/~/9780128093658</a><br/>Format:&#160;Electronic Resources<br/> Cyber security on Azure : an IT professionals guide to Microsoft Azure security center ent://SD_ILS/0/SD_ILS:2313788 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Copeland, Marshall.<br/><a href="https://learning.oreilly.com/library/view/~/9781484227404/?ar">https://learning.oreilly.com/library/view/~/9781484227404/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484227404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484227404/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484227404">https://learning.oreilly.com/library/view/~/9781484227404</a><br/>Format:&#160;Electronic Resources<br/> Windows forensics cookbook : 61 recipes to help you analyze Windows systems ent://SD_ILS/0/SD_ILS:2313990 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Sulkin, Oleg, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390495/?ar">https://learning.oreilly.com/library/view/~/9781784390495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390495">https://learning.oreilly.com/library/view/~/9781784390495</a><br/>Format:&#160;Electronic Resources<br/> The CISO Handbook ent://SD_ILS/0/SD_ILS:2323677 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Gentile, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031379">https://learning.oreilly.com/library/view/~/9781420031379</a> <a href="https://learning.oreilly.com/library/view/~/9781420031379/?ar">https://learning.oreilly.com/library/view/~/9781420031379/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackers ent://SD_ILS/0/SD_ILS:2311006 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Halton, Wolf, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782168492/?ar">https://learning.oreilly.com/library/view/~/9781782168492/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782168492">https://learning.oreilly.com/library/view/~/9781782168492</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition ent://SD_ILS/0/SD_ILS:2311655 2024-05-23T19:31:42Z 2024-05-23T19:31:42Z by&#160;Johansen, Gerard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785888427/?ar">https://learning.oreilly.com/library/view/~/9781785888427/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar">https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar</a><br/>Format:&#160;Electronic Resources<br/>