Search Results for COMPUTERS -- Networking -- Security.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dCOMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$0026ps$003d300?
2024-09-27T04:55:44Z
OFFICIAL ISC2 SSCP CBK REFERENCE
ent://SD_ILS/0/SD_ILS:2322402
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by WILLS, MIKE.<br/><a href="https://learning.oreilly.com/library/view/~/9781119601944">https://learning.oreilly.com/library/view/~/9781119601944</a>
<a href="https://learning.oreilly.com/library/view/~/9781119601944/?ar">https://learning.oreilly.com/library/view/~/9781119601944/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119601944/?ar">https://go.oreilly.com/library-access/library/view/-/9781119601944/?ar</a><br/>Format: Electronic Resources<br/>
How to define and build an effective cyber threat intelligence capability
ent://SD_ILS/0/SD_ILS:2305447
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Dalziel, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027301/?ar">https://learning.oreilly.com/library/view/~/9780128027301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027301">https://learning.oreilly.com/library/view/~/9780128027301</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128027301/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027301/?ar</a><br/>Format: Electronic Resources<br/>
Assessing information security : strategies, tactics, logic and framework
ent://SD_ILS/0/SD_ILS:2288634
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Vladimirov, Andrew A.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280358">https://learning.oreilly.com/library/view/~/9781849280358</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280358/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280358/?ar">https://learning.oreilly.com/library/view/~/9781849280358/?ar</a><br/>Format: Electronic Resources<br/>
Optimizing IEEE 802.11i resource and security essentials : for mobile and stationary devices
ent://SD_ILS/0/SD_ILS:2305446
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Naraei, Parisa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128022221/?ar">https://go.oreilly.com/library-access/library/view/-/9780128022221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128022221">https://learning.oreilly.com/library/view/~/9780128022221</a>
<a href="https://learning.oreilly.com/library/view/~/9780128022221/?ar">https://learning.oreilly.com/library/view/~/9780128022221/?ar</a><br/>Format: Electronic Resources<br/>
Cisco Firepower Threat Defense (FTD) : configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP)
ent://SD_ILS/0/SD_ILS:2314393
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Rajib, Nazmul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134679471">https://learning.oreilly.com/library/view/~/9780134679471</a>
<a href="https://learning.oreilly.com/library/view/~/9780134679471/?ar">https://learning.oreilly.com/library/view/~/9780134679471/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar">https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar</a><br/>Format: Electronic Resources<br/>
Zero trust networks : building secure systems in untrusted networks
ent://SD_ILS/0/SD_ILS:2313595
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Gilman, Evan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491962183/?ar">https://learning.oreilly.com/library/view/~/9781491962183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491962183">https://learning.oreilly.com/library/view/~/9781491962183</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491962183/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962183/?ar</a><br/>Format: Electronic Resources<br/>
Cisco next-generation security solutions : all-in-one Cisco ASA FirePOWER services, NGIPS, and AMP
ent://SD_ILS/0/SD_ILS:2311054
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Santos, Omar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134213071/?ar">https://go.oreilly.com/library-access/library/view/-/9780134213071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134213071/?ar">https://learning.oreilly.com/library/view/~/9780134213071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134213071">https://learning.oreilly.com/library/view/~/9780134213071</a><br/>Format: Electronic Resources<br/>
Getting started with FortiGate : simplify and protect your network using the FortiGate network security applicance
ent://SD_ILS/0/SD_ILS:2300940
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Fabbri, Rosato.<br/><a href="https://learning.oreilly.com/library/view/~/9781782178200">https://learning.oreilly.com/library/view/~/9781782178200</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782178200/?ar">https://go.oreilly.com/library-access/library/view/-/9781782178200/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782178200/?ar">https://learning.oreilly.com/library/view/~/9781782178200/?ar</a><br/>Format: Electronic Resources<br/>
This is jargon file
ent://SD_ILS/0/SD_ILS:2105379
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Raymond, Eric S.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2009207">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2009207</a><br/>Format: Electronic Resources<br/>
SELinux System Administration : ward off traditional security permissions and effectively secure your Linuxs systems with SELinux
ent://SD_ILS/0/SD_ILS:2312410
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Vermeulen, Sven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787126954/?ar">https://go.oreilly.com/library-access/library/view/-/9781787126954/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787126954">https://learning.oreilly.com/library/view/~/9781787126954</a>
<a href="https://learning.oreilly.com/library/view/~/9781787126954/?ar">https://learning.oreilly.com/library/view/~/9781787126954/?ar</a><br/>Format: Electronic Resources<br/>
Applied network security monitoring : collection, detection, and analysis
ent://SD_ILS/0/SD_ILS:2301151
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Sanders, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar">https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124172081/?ar">https://learning.oreilly.com/library/view/~/9780124172081/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124172081">https://learning.oreilly.com/library/view/~/9780124172081</a><br/>Format: Electronic Resources<br/>
IT induction and information security awareness : a pocket guide
ent://SD_ILS/0/SD_ILS:2292243
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Maddock, Valerie.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281195">https://learning.oreilly.com/library/view/~/9781849281195</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281195/?ar">https://learning.oreilly.com/library/view/~/9781849281195/?ar</a><br/>Format: Electronic Resources<br/>
FISMA certification & accreditation handbook
ent://SD_ILS/0/SD_ILS:2283639
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Taylor, Laura.<br/><a href="https://www.sciencedirect.com/science/book/9781597491167">https://www.sciencedirect.com/science/book/9781597491167</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491167/?ar">https://learning.oreilly.com/library/view/~/9781597491167/?ar</a><br/>Format: Electronic Resources<br/>
Core software security : security at the source
ent://SD_ILS/0/SD_ILS:2301641
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Ransome, James F., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466560963">https://learning.oreilly.com/library/view/~/9781466560963</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar">https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466560963/?ar">https://learning.oreilly.com/library/view/~/9781466560963/?ar</a><br/>Format: Electronic Resources<br/>
Logging and log management : the authoritative guide to understanding the concepts surrounding logging and log management
ent://SD_ILS/0/SD_ILS:2296851
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Chuvakin, Anton A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496353/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496353/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496353/?ar">https://learning.oreilly.com/library/view/~/9781597496353/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496353">https://learning.oreilly.com/library/view/~/9781597496353</a><br/>Format: Electronic Resources<br/>
The best damn IT security management book period
ent://SD_ILS/0/SD_ILS:2284698
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Susan Snedaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492270/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492270/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492270/?ar">https://learning.oreilly.com/library/view/~/9781597492270/?ar</a><br/>Format: Electronic Resources<br/>
Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
ent://SD_ILS/0/SD_ILS:2315384
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Oriyano, Sean-Philip, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783554089/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554089/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783554089/?ar">https://learning.oreilly.com/library/view/~/9781783554089/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783554089">https://learning.oreilly.com/library/view/~/9781783554089</a><br/>Format: Electronic Resources<br/>
The myths of security : what the computer security industry doesn't want you to know
ent://SD_ILS/0/SD_ILS:2286938
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Viega, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar">https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596803957/?ar">https://learning.oreilly.com/library/view/~/9780596803957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596803957">https://learning.oreilly.com/library/view/~/9780596803957</a><br/>Format: Electronic Resources<br/>
Data privacy in the information age
ent://SD_ILS/0/SD_ILS:265140
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Klosek, Jacqueline, 1972-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194</a><br/>Format: Electronic Resources<br/>
Combating spyware in the enterprise
ent://SD_ILS/0/SD_ILS:339975
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Baskin, Brian.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423</a><br/>Format: Electronic Resources<br/>
Hack the stack using snort and ethereal to master the 8 layers of an insecure network
ent://SD_ILS/0/SD_ILS:339985
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Gregg, Michael (Michael C.)<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832</a><br/>Format: Electronic Resources<br/>
Infosec management fundamentals
ent://SD_ILS/0/SD_ILS:2308039
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar">https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128041871/?ar">https://learning.oreilly.com/library/view/~/9780128041871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128041871">https://learning.oreilly.com/library/view/~/9780128041871</a><br/>Format: Electronic Resources<br/>
Abusing the Internet of things : blackouts, freakouts, and stakeouts
ent://SD_ILS/0/SD_ILS:2308052
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Dhanjani, Nitesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491902899">https://learning.oreilly.com/library/view/~/9781491902899</a>
<a href="https://learning.oreilly.com/library/view/~/9781491902899/?ar">https://learning.oreilly.com/library/view/~/9781491902899/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491902899/?ar">https://go.oreilly.com/library-access/library/view/-/9781491902899/?ar</a><br/>Format: Electronic Resources<br/>
How to defeat advanced malware : new tools for protection and forensics
ent://SD_ILS/0/SD_ILS:2305937
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Dalziel, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027318/?ar">https://learning.oreilly.com/library/view/~/9780128027318/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027318">https://learning.oreilly.com/library/view/~/9780128027318</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128027318/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027318/?ar</a><br/>Format: Electronic Resources<br/>
Configuring SonicWALL firewalls
ent://SD_ILS/0/SD_ILS:2282162
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Lathem, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/1597492507">https://learning.oreilly.com/library/view/~/1597492507</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1597492507/?ar">https://go.oreilly.com/library-access/library/view/-/1597492507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1597492507/?ar">https://learning.oreilly.com/library/view/~/1597492507/?ar</a><br/>Format: Electronic Resources<br/>
Absolute beginner's guide to personal firewalls
ent://SD_ILS/0/SD_ILS:2280912
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Ford, Jerry Lee.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780768683868/?ar">https://go.oreilly.com/library-access/library/view/-/9780768683868/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768683868/?ar">https://learning.oreilly.com/library/view/~/9780768683868/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768683868">https://learning.oreilly.com/library/view/~/9780768683868</a><br/>Format: Electronic Resources<br/>
Troubleshooting OpenVPN : get the solutions you need to troubleshoot any issue you may face to keep your OpenVPN up and running
ent://SD_ILS/0/SD_ILS:2313004
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Crist, Eric F., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786461964/?ar">https://go.oreilly.com/library-access/library/view/-/9781786461964/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786461964/?ar">https://learning.oreilly.com/library/view/~/9781786461964/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786461964">https://learning.oreilly.com/library/view/~/9781786461964</a><br/>Format: Electronic Resources<br/>
Cisco security specialist's guide to PIX firewalls
ent://SD_ILS/0/SD_ILS:2280786
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Osipav, Vitaly.<br/><a href="https://www.sciencedirect.com/science/book/9781931836630">https://www.sciencedirect.com/science/book/9781931836630</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836630/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836630/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836630/?ar">https://learning.oreilly.com/library/view/~/9781931836630/?ar</a><br/>Format: Electronic Resources<br/>
Firewall policies and VPN configurations
ent://SD_ILS/0/SD_ILS:339979
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Henmi, Anne.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636</a><br/>Format: Electronic Resources<br/>
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network
ent://SD_ILS/0/SD_ILS:2283562
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Gregg, Michael (Michael C.)<br/><a href="https://www.sciencedirect.com/science/book/9781597491099">https://www.sciencedirect.com/science/book/9781597491099</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491099/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491099/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491099/?ar">https://learning.oreilly.com/library/view/~/9781597491099/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491099">https://learning.oreilly.com/library/view/~/9781597491099</a><br/>Format: Electronic Resources<br/>
Steal this computer book 4.0 : what they won't tell you about the Internet
ent://SD_ILS/0/SD_ILS:2283706
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Wang, Wally.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593273422/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273422/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273422/?ar">https://learning.oreilly.com/library/view/~/9781593273422/?ar</a><br/>Format: Electronic Resources<br/>
Black Hat Go : Go programming for hackers and pentesters
ent://SD_ILS/0/SD_ILS:2322469
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Steele, Tom (Security Consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098122645/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122645/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122645">https://learning.oreilly.com/library/view/~/9781098122645</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122645/?ar">https://learning.oreilly.com/library/view/~/9781098122645/?ar</a><br/>Format: Electronic Resources<br/>
Data breach preparation and response : breaches are certain, impact is not
ent://SD_ILS/0/SD_ILS:2310804
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Fowler, Kevvie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034507/?ar">https://learning.oreilly.com/library/view/~/9780128034507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128034507">https://learning.oreilly.com/library/view/~/9780128034507</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128034507/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034507/?ar</a><br/>Format: Electronic Resources<br/>
Threat forecasting : leveraging big data for predictive analysis
ent://SD_ILS/0/SD_ILS:2310629
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Pirc, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128004784/?ar">https://learning.oreilly.com/library/view/~/9780128004784/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar">https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128004784">https://learning.oreilly.com/library/view/~/9780128004784</a><br/>Format: Electronic Resources<br/>
Intrusion detection in wireless ad-hoc networks
ent://SD_ILS/0/SD_ILS:2301284
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Chaki, Nabendu, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466515673/?ar">https://go.oreilly.com/library-access/library/view/-/9781466515673/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466515673">https://learning.oreilly.com/library/view/~/9781466515673</a>
<a href="https://learning.oreilly.com/library/view/~/9781466515673/?ar">https://learning.oreilly.com/library/view/~/9781466515673/?ar</a><br/>Format: Electronic Resources<br/>
Information security risk management for ISO27001/ISO27002
ent://SD_ILS/0/SD_ILS:2291936
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281492/?ar">https://learning.oreilly.com/library/view/~/9781849281492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281492">https://learning.oreilly.com/library/view/~/9781849281492</a><br/>Format: Electronic Resources<br/>
Assessing network security
ent://SD_ILS/0/SD_ILS:2281759
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Lam, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735620334/?ar">https://go.oreilly.com/library-access/library/view/-/0735620334/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735620334/?ar">https://learning.oreilly.com/library/view/~/0735620334/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735620334">https://learning.oreilly.com/library/view/~/0735620334</a><br/>Format: Electronic Resources<br/>
FISMA certification & accreditation handbook
ent://SD_ILS/0/SD_ILS:341700
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Taylor, Laura.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012</a><br/>Format: Electronic Resources<br/>
Security log management : identifying patterns in the chaos
ent://SD_ILS/0/SD_ILS:2282003
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Babbin, Jacob.<br/><a href="https://learning.oreilly.com/library/view/~/1597490423/?ar">https://learning.oreilly.com/library/view/~/1597490423/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1597490423/?ar">https://go.oreilly.com/library-access/library/view/-/1597490423/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1597490423">https://learning.oreilly.com/library/view/~/1597490423</a>
<a href="https://www.sciencedirect.com/science/book/9781597490429">https://www.sciencedirect.com/science/book/9781597490429</a><br/>Format: Electronic Resources<br/>
OS X exploits and defense
ent://SD_ILS/0/SD_ILS:2285157
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Baccas, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492546/?ar">https://learning.oreilly.com/library/view/~/9781597492546/?ar</a><br/>Format: Electronic Resources<br/>
Security and privacy for Microsoft Office 2010 users.
ent://SD_ILS/0/SD_ILS:2294210
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Tulloch, Mitch.<br/><a href="https://learning.oreilly.com/library/view/~/9780735668829">https://learning.oreilly.com/library/view/~/9780735668829</a>
<a href="https://learning.oreilly.com/library/view/~/9780735668829/?ar">https://learning.oreilly.com/library/view/~/9780735668829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar">https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar</a><br/>Format: Electronic Resources<br/>
Network security through data analysis : from data to action
ent://SD_ILS/0/SD_ILS:2314146
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Collins, Michael (Michael Patrick), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491962831/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962831/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491962831/?ar">https://learning.oreilly.com/library/view/~/9781491962831/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491962831">https://learning.oreilly.com/library/view/~/9781491962831</a><br/>Format: Electronic Resources<br/>
Official (ISC)2 guide to the CSSLP
ent://SD_ILS/0/SD_ILS:2292921
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Paul, Mano.<br/><a href="https://learning.oreilly.com/library/view/~/9781439826058/?ar">https://learning.oreilly.com/library/view/~/9781439826058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439826058/?ar">https://go.oreilly.com/library-access/library/view/-/9781439826058/?ar</a><br/>Format: Electronic Resources<br/>
Computer security and cryptography
ent://SD_ILS/0/SD_ILS:2283057
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Konheim, Alan G., 1934-<br/><a href="https://learning.oreilly.com/library/view/~/9780471947837">https://learning.oreilly.com/library/view/~/9780471947837</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar">https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780471947837/?ar">https://learning.oreilly.com/library/view/~/9780471947837/?ar</a><br/>Format: Electronic Resources<br/>
Kali Linux - Assuring Security by Penetration Testing : Master the Art of Penetration Testing with Kali Linux
ent://SD_ILS/0/SD_ILS:2303067
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Allen, Lee (Information security specialist)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519489/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519489/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519489/?ar">https://learning.oreilly.com/library/view/~/9781849519489/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519489">https://learning.oreilly.com/library/view/~/9781849519489</a><br/>Format: Electronic Resources<br/>
Securing SQL server : protecting your database from attackers
ent://SD_ILS/0/SD_ILS:2305165
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Cherry, Denny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128012758/?ar">https://learning.oreilly.com/library/view/~/9780128012758/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128012758/?ar">https://go.oreilly.com/library-access/library/view/-/9780128012758/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity operations handbook
ent://SD_ILS/0/SD_ILS:341554
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Rittinghouse, John W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316</a><br/>Format: Electronic Resources<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:2322826
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781119560265">https://learning.oreilly.com/library/view/~/9781119560265</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560265/?ar">https://learning.oreilly.com/library/view/~/9781119560265/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar</a><br/>Format: Electronic Resources<br/>
Cloud Security and Governance : Who's on your cloud?.
ent://SD_ILS/0/SD_ILS:2290671
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Blount, Sumner.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280983">https://learning.oreilly.com/library/view/~/9781849280983</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280983/?ar">https://learning.oreilly.com/library/view/~/9781849280983/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar</a><br/>Format: Electronic Resources<br/>
Network security : know it all
ent://SD_ILS/0/SD_ILS:2285962
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Joshi, James B. D.<br/><a href="https://learning.oreilly.com/library/view/~/9780080560151">https://learning.oreilly.com/library/view/~/9780080560151</a>
<a href="https://learning.oreilly.com/library/view/~/9780080560151/?ar">https://learning.oreilly.com/library/view/~/9780080560151/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080560151/?ar">https://go.oreilly.com/library-access/library/view/-/9780080560151/?ar</a><br/>Format: Electronic Resources<br/>
Applied network security : master the art of detecting and averting advanced network security attacks and techniques
ent://SD_ILS/0/SD_ILS:2313288
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Salmon, Arthur, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786466273/?ar">https://learning.oreilly.com/library/view/~/9781786466273/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar">https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786466273">https://learning.oreilly.com/library/view/~/9781786466273</a><br/>Format: Electronic Resources<br/>
Zen and the art of information security
ent://SD_ILS/0/SD_ILS:2283974
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Winkler, Ira.<br/><a href="https://learning.oreilly.com/library/view/~/9780080554747">https://learning.oreilly.com/library/view/~/9780080554747</a>
<a href="https://learning.oreilly.com/library/view/~/9780080554747/?ar">https://learning.oreilly.com/library/view/~/9780080554747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080554747/?ar">https://go.oreilly.com/library-access/library/view/-/9780080554747/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>
Zabbix : enterprise network montioring [sic] made easy : learn how to gather detailed statistics and data with this one-stop, comprehensive course along with hands-on recipes to get your infrasturcture up and running with Zabbix : a course in three modules.
ent://SD_ILS/0/SD_ILS:2312746
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Olups, Rihards, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787129047">https://learning.oreilly.com/library/view/~/9781787129047</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787129047/?ar">https://go.oreilly.com/library-access/library/view/-/9781787129047/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787129047/?ar">https://learning.oreilly.com/library/view/~/9781787129047/?ar</a><br/>Format: Electronic Resources<br/>
Coding for penetration testers : building better tools
ent://SD_ILS/0/SD_ILS:2295451
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Andress, Jason.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497305/?ar">https://learning.oreilly.com/library/view/~/9781597497305/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597497305/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497305/?ar</a><br/>Format: Electronic Resources<br/>
Syngress IT security project management handbook
ent://SD_ILS/0/SD_ILS:339682
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Snedaker, Susan.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163063">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163063</a><br/>Format: Electronic Resources<br/>
Cybersecurity - Attack and Defense Strategies - Second Edition
ent://SD_ILS/0/SD_ILS:2323102
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar">https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838827793/?ar">https://learning.oreilly.com/library/view/~/9781838827793/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838827793">https://learning.oreilly.com/library/view/~/9781838827793</a><br/>Format: Electronic Resources<br/>
Virtualization Security : Protecting Virtualized Environments
ent://SD_ILS/0/SD_ILS:2296840
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Shackleford, Dave.<br/><a href="https://learning.oreilly.com/library/view/~/9781118331514/?ar">https://learning.oreilly.com/library/view/~/9781118331514/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118331514/?ar">https://go.oreilly.com/library-access/library/view/-/9781118331514/?ar</a><br/>Format: Electronic Resources<br/>
No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing
ent://SD_ILS/0/SD_ILS:2285143
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Long, Johnny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492157/?ar">https://learning.oreilly.com/library/view/~/9781597492157/?ar</a><br/>Format: Electronic Resources<br/>
Secure edge computing : applications, techniques and challenges.
ent://SD_ILS/0/SD_ILS:2329288
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Ahmed, Mohiuddin (Computer scientist), editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000427325/?ar">https://learning.oreilly.com/library/view/~/9781000427325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000427325">https://learning.oreilly.com/library/view/~/9781000427325</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar">https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar</a><br/>Format: Electronic Resources<br/>
SolarWinds server & application monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server & Application Monitor with minimum hassle
ent://SD_ILS/0/SD_ILS:2300919
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Brant, Justin M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783551019/?ar">https://go.oreilly.com/library-access/library/view/-/9781783551019/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783551019/?ar">https://learning.oreilly.com/library/view/~/9781783551019/?ar</a><br/>Format: Electronic Resources<br/>
Cloud Computing : Assessing the Risks.
ent://SD_ILS/0/SD_ILS:2295291
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Carstensen, Jared.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283618">https://learning.oreilly.com/library/view/~/9781849283618</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283618/?ar">https://learning.oreilly.com/library/view/~/9781849283618/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283618/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283618/?ar</a><br/>Format: Electronic Resources<br/>
IT Governance to Drive High Performance : Lessons from Accenture.
ent://SD_ILS/0/SD_ILS:2288636
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Kress, Robert E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281188/?ar">https://learning.oreilly.com/library/view/~/9781849281188/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281188">https://learning.oreilly.com/library/view/~/9781849281188</a><br/>Format: Electronic Resources<br/>
Penetration testing : a hands-on introduction to hacking
ent://SD_ILS/0/SD_ILS:2304411
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Weidman, Georgia, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457185342/?ar">https://learning.oreilly.com/library/view/~/9781457185342/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457185342/?ar">https://go.oreilly.com/library-access/library/view/-/9781457185342/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457185342">https://learning.oreilly.com/library/view/~/9781457185342</a><br/>Format: Electronic Resources<br/>
The web application hacker's handbook : discovering and exploiting security flaws
ent://SD_ILS/0/SD_ILS:2288534
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Stuttard, Dafydd, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470170779/?ar">https://learning.oreilly.com/library/view/~/9780470170779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar">https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470170779">https://learning.oreilly.com/library/view/~/9780470170779</a><br/>Format: Electronic Resources<br/>
Check Point NGX R65 security administration
ent://SD_ILS/0/SD_ILS:2284519
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Bonnell, Ralph.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492454/?ar">https://learning.oreilly.com/library/view/~/9781597492454/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492454/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492454/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492454">https://learning.oreilly.com/library/view/~/9781597492454</a><br/>Format: Electronic Resources<br/>
Perfect passwords : selection, protection, authentication
ent://SD_ILS/0/SD_ILS:2281990
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Burnett, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490412">https://learning.oreilly.com/library/view/~/9781597490412</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490412/?ar">https://learning.oreilly.com/library/view/~/9781597490412/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490412/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490412/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597490412">https://www.sciencedirect.com/science/book/9781597490412</a><br/>Format: Electronic Resources<br/>
Secure and resilient software development
ent://SD_ILS/0/SD_ILS:2289816
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Merkow, Mark S.<br/><a href="https://learning.oreilly.com/library/view/~/9781439826973/?ar">https://learning.oreilly.com/library/view/~/9781439826973/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar">https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar</a><br/>Format: Electronic Resources<br/>
Web application vulnerabilities : detect, exploit, prevent
ent://SD_ILS/0/SD_ILS:2285642
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492096/?ar">https://learning.oreilly.com/library/view/~/9781597492096/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492096/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492096/?ar</a><br/>Format: Electronic Resources<br/>
Java security
ent://SD_ILS/0/SD_ILS:2286384
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Oaks, Scott.<br/><a href="https://learning.oreilly.com/library/view/~/0596001576/?ar">https://learning.oreilly.com/library/view/~/0596001576/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596001576">https://learning.oreilly.com/library/view/~/0596001576</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596001576/?ar">https://go.oreilly.com/library-access/library/view/-/0596001576/?ar</a><br/>Format: Electronic Resources<br/>
The mobile application hacker's handbook
ent://SD_ILS/0/SD_ILS:2306981
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Chell, Dominic, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118958513">https://learning.oreilly.com/library/view/~/9781118958513</a>
<a href="https://learning.oreilly.com/library/view/~/9781118958513/?ar">https://learning.oreilly.com/library/view/~/9781118958513/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118958513/?ar">https://go.oreilly.com/library-access/library/view/-/9781118958513/?ar</a><br/>Format: Electronic Resources<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:2284222
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Harris, Shon.<br/><a href="https://learning.oreilly.com/library/view/~/9780071495684/?ar">https://learning.oreilly.com/library/view/~/9780071495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar">https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar</a><br/>Format: Electronic Resources<br/>
Syngress force emerging threat analysis from mischief to malicious
ent://SD_ILS/0/SD_ILS:340202
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Maynor, David.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833</a><br/>Format: Electronic Resources<br/>
Handbook of SCADA/control systems security
ent://SD_ILS/0/SD_ILS:2297537
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Radvanovsky, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502260/?ar">https://learning.oreilly.com/library/view/~/9781466502260/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466502260">https://learning.oreilly.com/library/view/~/9781466502260</a><br/>Format: Electronic Resources<br/>
The network security test lab : a step-by-step guide
ent://SD_ILS/0/SD_ILS:2308043
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118987056/?ar">https://learning.oreilly.com/library/view/~/9781118987056/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar">https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118987056">https://learning.oreilly.com/library/view/~/9781118987056</a><br/>Format: Electronic Resources<br/>
Enterprise Mac security : MAC OS X Snow Leopard
ent://SD_ILS/0/SD_ILS:2290421
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Edge, Charles S., Jr.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar">https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430227304/?ar">https://learning.oreilly.com/library/view/~/9781430227304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430227304">https://learning.oreilly.com/library/view/~/9781430227304</a><br/>Format: Electronic Resources<br/>
Internet forensics
ent://SD_ILS/0/SD_ILS:2282055
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Jones, Robert, 1957 July 15-<br/><a href="https://learning.oreilly.com/library/view/~/059610006X">https://learning.oreilly.com/library/view/~/059610006X</a>
<a href="https://learning.oreilly.com/library/view/~/059610006X/?ar">https://learning.oreilly.com/library/view/~/059610006X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/059610006X/?ar">https://go.oreilly.com/library-access/library/view/-/059610006X/?ar</a><br/>Format: Electronic Resources<br/>
Building an information security awareness program
ent://SD_ILS/0/SD_ILS:2281782
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Desman, Mark B.<br/><a href="https://learning.oreilly.com/library/view/~/9781420000054">https://learning.oreilly.com/library/view/~/9781420000054</a>
<a href="https://learning.oreilly.com/library/view/~/9781420000054/?ar">https://learning.oreilly.com/library/view/~/9781420000054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar">https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar</a><br/>Format: Electronic Resources<br/>
Information security policy, processes, and practices
ent://SD_ILS/0/SD_ILS:293000
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Straub, Detmar W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513</a><br/>Format: Electronic Resources<br/>
Mobile Security : a Pocket Guide.
ent://SD_ILS/0/SD_ILS:2288625
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Furnell, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281225/?ar">https://learning.oreilly.com/library/view/~/9781849281225/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281225/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281225/?ar</a><br/>Format: Electronic Resources<br/>
The web application hacker's handbook : finding and exploiting security flaws
ent://SD_ILS/0/SD_ILS:2292844
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Stuttard, Dafydd, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9781118026472/?ar">https://learning.oreilly.com/library/view/~/9781118026472/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118026472/?ar">https://go.oreilly.com/library-access/library/view/-/9781118026472/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118026472">https://learning.oreilly.com/library/view/~/9781118026472</a><br/>Format: Electronic Resources<br/>
Combating spyware in the enterprise
ent://SD_ILS/0/SD_ILS:2287800
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Baskin, Brian.<br/><a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490641/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490641/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490641/?ar">https://learning.oreilly.com/library/view/~/9781597490641/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490641">https://learning.oreilly.com/library/view/~/9781597490641</a><br/>Format: Electronic Resources<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:2292368
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Faircloth, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496278/?ar">https://learning.oreilly.com/library/view/~/9781597496278/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496278/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496278/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity : Executive Order 13636 and the critical infrastructure framework
ent://SD_ILS/0/SD_ILS:635024
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by D'Ambrosio, Anastacia, editor.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xww&site=ehost-live&AN=754881">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xww&site=ehost-live&AN=754881</a><br/>Format: Electronic Resources<br/>
Information security for management
ent://SD_ILS/0/SD_ILS:309255
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Iyengar, Venugopal.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178</a><br/>Format: Electronic Resources<br/>
Kali Linux wireless penetration testing : master wireless testing techniques to survey and attack wireless networks with Kali Linux
ent://SD_ILS/0/SD_ILS:2307036
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Ramachandran, Vivek, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783280414/?ar">https://go.oreilly.com/library-access/library/view/-/9781783280414/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783280414/?ar">https://learning.oreilly.com/library/view/~/9781783280414/?ar</a><br/>Format: Electronic Resources<br/>
Computer incident response and forensics team management : conducting a successful incident response
ent://SD_ILS/0/SD_ILS:2300670
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Johnson, Leighton, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499965/?ar">https://learning.oreilly.com/library/view/~/9781597499965/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499965">https://learning.oreilly.com/library/view/~/9781597499965</a><br/>Format: Electronic Resources<br/>
Security risks in social media technologies : safe practices in public service applications
ent://SD_ILS/0/SD_ILS:2301076
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Oxley, Alan.<br/><a href="https://learning.oreilly.com/library/view/~/9781843347149">https://learning.oreilly.com/library/view/~/9781843347149</a>
<a href="https://learning.oreilly.com/library/view/~/9781843347149/?ar">https://learning.oreilly.com/library/view/~/9781843347149/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781843347149/?ar">https://go.oreilly.com/library-access/library/view/-/9781843347149/?ar</a><br/>Format: Electronic Resources<br/>
Ninja hacking : unconventional penetration testing tactics and techniques
ent://SD_ILS/0/SD_ILS:2290304
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Wilhelm, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495899">https://learning.oreilly.com/library/view/~/9781597495899</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495899/?ar">https://learning.oreilly.com/library/view/~/9781597495899/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar</a><br/>Format: Electronic Resources<br/>
The Mac hacker's handbook
ent://SD_ILS/0/SD_ILS:2286341
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Miller, Charles, 1951-<br/><a href="https://learning.oreilly.com/library/view/~/9781118080337/?ar">https://learning.oreilly.com/library/view/~/9781118080337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118080337/?ar">https://go.oreilly.com/library-access/library/view/-/9781118080337/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118080337">https://learning.oreilly.com/library/view/~/9781118080337</a><br/>Format: Electronic Resources<br/>
The Oracle hacker's handbook : hacking and defending Oracle
ent://SD_ILS/0/SD_ILS:2283176
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Litchfield, David, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780470080221/?ar">https://learning.oreilly.com/library/view/~/9780470080221/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470080221/?ar">https://go.oreilly.com/library-access/library/view/-/9780470080221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470080221">https://learning.oreilly.com/library/view/~/9780470080221</a><br/>Format: Electronic Resources<br/>
Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux
ent://SD_ILS/0/SD_ILS:2310036
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Sak, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785285561">https://learning.oreilly.com/library/view/~/9781785285561</a>
<a href="https://learning.oreilly.com/library/view/~/9781785285561/?ar">https://learning.oreilly.com/library/view/~/9781785285561/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar">https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar</a><br/>Format: Electronic Resources<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:2290821
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Harper, Allen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071742559/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742559/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071742559/?ar">https://learning.oreilly.com/library/view/~/9780071742559/?ar</a><br/>Format: Electronic Resources<br/>
Mastering Azure security : keeping your Microsoft Azure workloads safe
ent://SD_ILS/0/SD_ILS:2332927
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Toroman, Mustafa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803238555">https://learning.oreilly.com/library/view/~/9781803238555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803238555/?ar">https://learning.oreilly.com/library/view/~/9781803238555/?ar</a><br/>Format: Electronic Resources<br/>
Real-world bug hunting : a field guide to web hacking
ent://SD_ILS/0/SD_ILS:2318428
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Yaworski, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098122508">https://learning.oreilly.com/library/view/~/9781098122508</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098122508/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122508/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122508/?ar">https://learning.oreilly.com/library/view/~/9781098122508/?ar</a><br/>Format: Electronic Resources<br/>
UTM security with Fortinet : Mastering FortiOS
ent://SD_ILS/0/SD_ILS:2296617
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Tam, Kenneth.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497473/?ar">https://learning.oreilly.com/library/view/~/9781597497473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497473">https://learning.oreilly.com/library/view/~/9781597497473</a><br/>Format: Electronic Resources<br/>
The chief information security officer : insights, tools and survival skills
ent://SD_ILS/0/SD_ILS:2291384
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Kouns, Barry.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281966">https://learning.oreilly.com/library/view/~/9781849281966</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281966/?ar">https://learning.oreilly.com/library/view/~/9781849281966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar</a><br/>Format: Electronic Resources<br/>
Security power tools
ent://SD_ILS/0/SD_ILS:2283951
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Burns, Bryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780596009632">https://learning.oreilly.com/library/view/~/9780596009632</a>
<a href="https://learning.oreilly.com/library/view/~/9780596009632/?ar">https://learning.oreilly.com/library/view/~/9780596009632/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar">https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar</a><br/>Format: Electronic Resources<br/>
Learning Kali Linux : security testing, penetration testing, and ethical hacking
ent://SD_ILS/0/SD_ILS:2316978
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028680/?ar">https://learning.oreilly.com/library/view/~/9781492028680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028680">https://learning.oreilly.com/library/view/~/9781492028680</a><br/>Format: Electronic Resources<br/>
Security patterns in practice : designing secure architectures using software patterns
ent://SD_ILS/0/SD_ILS:2300767
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Fernandez, Eduardo B., 1936-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar">https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119970484/?ar">https://learning.oreilly.com/library/view/~/9781119970484/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119970484">https://learning.oreilly.com/library/view/~/9781119970484</a><br/>Format: Electronic Resources<br/>
Cloud security : a comprehensive guide to secure cloud computing
ent://SD_ILS/0/SD_ILS:2289708
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Krutz, Ronald L., 1938-<br/><a href="https://learning.oreilly.com/library/view/~/9780470589878/?ar">https://learning.oreilly.com/library/view/~/9780470589878/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar">https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470589878">https://learning.oreilly.com/library/view/~/9780470589878</a><br/>Format: Electronic Resources<br/>
XSS attacks : cross-site scripting exploits and defense
ent://SD_ILS/0/SD_ILS:2283990
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Grossman, Jeremiah.<br/><a href="https://learning.oreilly.com/library/view/~/9780080553405/?ar">https://learning.oreilly.com/library/view/~/9780080553405/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080553405/?ar">https://go.oreilly.com/library-access/library/view/-/9780080553405/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597491549">https://www.sciencedirect.com/science/book/9781597491549</a><br/>Format: Electronic Resources<br/>
Programming .NET security
ent://SD_ILS/0/SD_ILS:2281268
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Freeman, Adam.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596004427/?ar">https://go.oreilly.com/library-access/library/view/-/0596004427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596004427/?ar">https://learning.oreilly.com/library/view/~/0596004427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596004427">https://learning.oreilly.com/library/view/~/0596004427</a><br/>Format: Electronic Resources<br/>
Mastering network security
ent://SD_ILS/0/SD_ILS:2287799
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Brenton, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar">https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780782141429/?ar">https://learning.oreilly.com/library/view/~/9780782141429/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780782141429">https://learning.oreilly.com/library/view/~/9780782141429</a><br/>Format: Electronic Resources<br/>
Nessus, Snort, & Ethereal power tools : customizing open source security applications
ent://SD_ILS/0/SD_ILS:2281994
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Archibald, Neil.<br/><a href="https://www.sciencedirect.com/science/book/9781597490207">https://www.sciencedirect.com/science/book/9781597490207</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490207">https://learning.oreilly.com/library/view/~/9781597490207</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490207/?ar">https://learning.oreilly.com/library/view/~/9781597490207/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar</a><br/>Format: Electronic Resources<br/>
Mastering modern web penetration testing : master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!
ent://SD_ILS/0/SD_ILS:2311896
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Prasad, Prakhar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar">https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785284588">https://learning.oreilly.com/library/view/~/9781785284588</a>
<a href="https://learning.oreilly.com/library/view/~/9781785284588/?ar">https://learning.oreilly.com/library/view/~/9781785284588/?ar</a><br/>Format: Electronic Resources<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:2288721
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Anderson, Brian (Brian James)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547/?ar">https://learning.oreilly.com/library/view/~/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547">https://learning.oreilly.com/library/view/~/9781597495547</a><br/>Format: Electronic Resources<br/>
Hack proofing your network
ent://SD_ILS/0/SD_ILS:2280760
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Ahmad, David R. Mirza.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994701">https://learning.oreilly.com/library/view/~/9781928994701</a>
<a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994701/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994701/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781928994701/?ar">https://learning.oreilly.com/library/view/~/9781928994701/?ar</a><br/>Format: Electronic Resources<br/>
Everyday Cryptography Fundamental Principles and Applications
ent://SD_ILS/0/SD_ILS:528109
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Martin, Keith M.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</a><br/>Format: Electronic Resources<br/>
Essential cybersecurity science : build, test, and evaluate secure systems
ent://SD_ILS/0/SD_ILS:2309193
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format: Electronic Resources<br/>
Black hat Python : Python programming for hackers and pentesters
ent://SD_ILS/0/SD_ILS:2305659
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Seitz, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar">https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457189807/?ar">https://learning.oreilly.com/library/view/~/9781457189807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457189807">https://learning.oreilly.com/library/view/~/9781457189807</a><br/>Format: Electronic Resources<br/>
Network defense and countermeasures : principles and practices
ent://SD_ILS/0/SD_ILS:2301435
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Easttom, Chuck, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780133384390">https://learning.oreilly.com/library/view/~/9780133384390</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133384390/?ar">https://go.oreilly.com/library-access/library/view/-/9780133384390/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133384390/?ar">https://learning.oreilly.com/library/view/~/9780133384390/?ar</a><br/>Format: Electronic Resources<br/>
The security development lifecycle : SDL, a process for developing demonstrably more secure software
ent://SD_ILS/0/SD_ILS:2282462
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/0735622140">https://learning.oreilly.com/library/view/~/0735622140</a>
<a href="https://learning.oreilly.com/library/view/~/0735622140/?ar">https://learning.oreilly.com/library/view/~/0735622140/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0735622140/?ar">https://go.oreilly.com/library-access/library/view/-/0735622140/?ar</a><br/>Format: Electronic Resources<br/>
Gray hat Python : Python programming for hackers and reverse engineers
ent://SD_ILS/0/SD_ILS:2287862
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Seitz, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/9781593271923">https://learning.oreilly.com/library/view/~/9781593271923</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593271923/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271923/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593271923/?ar">https://learning.oreilly.com/library/view/~/9781593271923/?ar</a><br/>Format: Electronic Resources<br/>
How to survive a data breach : a pocket guide
ent://SD_ILS/0/SD_ILS:2290079
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Mitchell, Stewart.<br/><a href="https://learning.oreilly.com/library/view/~/9781905356966">https://learning.oreilly.com/library/view/~/9781905356966</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356966/?ar">https://learning.oreilly.com/library/view/~/9781905356966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar</a><br/>Format: Electronic Resources<br/>
Securing Windows server 2008 : prevent attacks from outside and inside your organization.
ent://SD_ILS/0/SD_ILS:2285141
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
<a href="https://learning.oreilly.com/library/view/~/9781597492805">https://learning.oreilly.com/library/view/~/9781597492805</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492805/?ar">https://learning.oreilly.com/library/view/~/9781597492805/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar</a><br/>Format: Electronic Resources<br/>
Metasploit toolkit for penetration testing, exploit development, and vulnerability research
ent://SD_ILS/0/SD_ILS:2284167
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Maynor, David.<br/><a href="https://www.sciencedirect.com/science/book/9781597490740">https://www.sciencedirect.com/science/book/9781597490740</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490740/?ar">https://learning.oreilly.com/library/view/~/9781597490740/?ar</a><br/>Format: Electronic Resources<br/>
Handbook of information security. Volume 3, Threats, vulnerabilities, prevention, detection, and management
ent://SD_ILS/0/SD_ILS:2285126
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Bidgoli, Hossein.<br/><a href="https://learning.oreilly.com/library/view/~/9780471648321">https://learning.oreilly.com/library/view/~/9780471648321</a>
<a href="https://learning.oreilly.com/library/view/~/9780471648321/?ar">https://learning.oreilly.com/library/view/~/9780471648321/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780471648321/?ar">https://go.oreilly.com/library-access/library/view/-/9780471648321/?ar</a><br/>Format: Electronic Resources<br/>
Security+ fast pass
ent://SD_ILS/0/SD_ILS:2281447
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Stewart, James Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9780782143591">https://learning.oreilly.com/library/view/~/9780782143591</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780782143591/?ar">https://go.oreilly.com/library-access/library/view/-/9780782143591/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780782143591/?ar">https://learning.oreilly.com/library/view/~/9780782143591/?ar</a><br/>Format: Electronic Resources<br/>
Programming Windows Identity Foundation
ent://SD_ILS/0/SD_ILS:2290015
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Bertocci, Vittorio.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735652040/?ar">https://go.oreilly.com/library-access/library/view/-/9780735652040/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735652040/?ar">https://learning.oreilly.com/library/view/~/9780735652040/?ar</a><br/>Format: Electronic Resources<br/>
Information security management principles
ent://SD_ILS/0/SD_ILS:2299451
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Alexander, David (Information security practitioner)<br/><a href="https://learning.oreilly.com/library/view/~/9781780171753/?ar">https://learning.oreilly.com/library/view/~/9781780171753/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar">https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780171753">https://learning.oreilly.com/library/view/~/9781780171753</a><br/>Format: Electronic Resources<br/>
A bug hunter's diary : a guided tour through the wilds of software security
ent://SD_ILS/0/SD_ILS:2293946
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273859/?ar">https://learning.oreilly.com/library/view/~/9781593273859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273859">https://learning.oreilly.com/library/view/~/9781593273859</a><br/>Format: Electronic Resources<br/>
BackTrack 4 : assuring security by penetration testing
ent://SD_ILS/0/SD_ILS:2293871
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Ali, Shakeel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar">https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849513944/?ar">https://learning.oreilly.com/library/view/~/9781849513944/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849513944">https://learning.oreilly.com/library/view/~/9781849513944</a><br/>Format: Electronic Resources<br/>
Computer forensics for dummies
ent://SD_ILS/0/SD_ILS:2285672
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Volonino, Linda.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470371916/?ar">https://learning.oreilly.com/library/view/~/9780470371916/?ar</a><br/>Format: Electronic Resources<br/>
Firewall policies and VPN configurations
ent://SD_ILS/0/SD_ILS:2287814
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Henmi, Anne.<br/><a href="https://learning.oreilly.com/library/view/~/1597490881/?ar">https://learning.oreilly.com/library/view/~/1597490881/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1597490881/?ar">https://go.oreilly.com/library-access/library/view/-/1597490881/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1597490881">https://learning.oreilly.com/library/view/~/1597490881</a>
<a href="https://www.sciencedirect.com/science/book/9781597490887">https://www.sciencedirect.com/science/book/9781597490887</a><br/>Format: Electronic Resources<br/>
Implementing SSL/TLS using cryptography and PKI
ent://SD_ILS/0/SD_ILS:2290966
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Davies, Joshua A. (Joshua Aaron)<br/><a href="https://learning.oreilly.com/library/view/~/9780470920411/?ar">https://learning.oreilly.com/library/view/~/9780470920411/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar">https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470920411">https://learning.oreilly.com/library/view/~/9780470920411</a><br/>Format: Electronic Resources<br/>
How to cheat at securing your network
ent://SD_ILS/0/SD_ILS:2284630
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Dubrawsky, Ido.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317/?ar">https://learning.oreilly.com/library/view/~/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317">https://learning.oreilly.com/library/view/~/9781597492317</a><br/>Format: Electronic Resources<br/>
Silence on the wire : a field guide to passive reconnaissance and indirect attacks
ent://SD_ILS/0/SD_ILS:2287377
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Zalewski, Michal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1593270461/?ar">https://go.oreilly.com/library-access/library/view/-/1593270461/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1593270461/?ar">https://learning.oreilly.com/library/view/~/1593270461/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1593270461">https://learning.oreilly.com/library/view/~/1593270461</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2309318
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar">https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119154686/?ar">https://learning.oreilly.com/library/view/~/9781119154686/?ar</a><br/>Format: Electronic Resources<br/>
Practical anonymity : hiding in plain sight online
ent://SD_ILS/0/SD_ILS:2299515
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Loshin, Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar">https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124104044/?ar">https://learning.oreilly.com/library/view/~/9780124104044/?ar</a><br/>Format: Electronic Resources<br/>
Social engineering : the art of human hacking
ent://SD_ILS/0/SD_ILS:2291334
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Hadnagy, Christopher.<br/><a href="https://learning.oreilly.com/library/view/~/9780470639535/?ar">https://learning.oreilly.com/library/view/~/9780470639535/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470639535/?ar">https://go.oreilly.com/library-access/library/view/-/9780470639535/?ar</a><br/>Format: Electronic Resources<br/>
Deploying Microsoft Forefront Threat Management Gateway 2010
ent://SD_ILS/0/SD_ILS:2290730
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656741/?ar">https://learning.oreilly.com/library/view/~/9780735656741/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar</a><br/>Format: Electronic Resources<br/>
Deploying Microsoft Forefront Unified Access Gateway 2010
ent://SD_ILS/0/SD_ILS:2290710
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Diogenes, Yuri.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735656758/?ar">https://learning.oreilly.com/library/view/~/9780735656758/?ar</a><br/>Format: Electronic Resources<br/>
Professional penetration testing : creating and operating a formal hacking lab
ent://SD_ILS/0/SD_ILS:2287538
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Wilhelm, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494250/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494250/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494250/?ar">https://learning.oreilly.com/library/view/~/9781597494250/?ar</a><br/>Format: Electronic Resources<br/>
Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
ent://SD_ILS/0/SD_ILS:2305163
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by El-Bawab, Abd El-Monem A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849517720">https://learning.oreilly.com/library/view/~/9781849517720</a>
<a href="https://learning.oreilly.com/library/view/~/9781849517720/?ar">https://learning.oreilly.com/library/view/~/9781849517720/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849517720/?ar">https://go.oreilly.com/library-access/library/view/-/9781849517720/?ar</a><br/>Format: Electronic Resources<br/>
ModSecurity 2.5 : securing your Apache installation and web applications : prevent web application hacking with this easy-to-use guide
ent://SD_ILS/0/SD_ILS:2288845
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Mischel, Magnus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781847194749/?ar">https://go.oreilly.com/library-access/library/view/-/9781847194749/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781847194749">https://learning.oreilly.com/library/view/~/9781847194749</a>
<a href="https://learning.oreilly.com/library/view/~/9781847194749/?ar">https://learning.oreilly.com/library/view/~/9781847194749/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2298336
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar">https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118380956/?ar">https://learning.oreilly.com/library/view/~/9781118380956/?ar</a><br/>Format: Electronic Resources<br/>
CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits
ent://SD_ILS/0/SD_ILS:2293366
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Tiller, James S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439880289/?ar">https://go.oreilly.com/library-access/library/view/-/9781439880289/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439880289/?ar">https://learning.oreilly.com/library/view/~/9781439880289/?ar</a><br/>Format: Electronic Resources<br/>
E-mail Security : a Pocket Guide.
ent://SD_ILS/0/SD_ILS:2290676
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Furnell, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280976">https://learning.oreilly.com/library/view/~/9781849280976</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280976/?ar">https://learning.oreilly.com/library/view/~/9781849280976/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar</a><br/>Format: Electronic Resources<br/>
Security warrior
ent://SD_ILS/0/SD_ILS:2283903
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Peikari, Cyrus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596005458/?ar">https://go.oreilly.com/library-access/library/view/-/0596005458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596005458/?ar">https://learning.oreilly.com/library/view/~/0596005458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596005458">https://learning.oreilly.com/library/view/~/0596005458</a><br/>Format: Electronic Resources<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:2310991
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format: Electronic Resources<br/>
Hacking with Kali : practical penetration testing techniques
ent://SD_ILS/0/SD_ILS:2301946
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Broad, James.<br/><a href="https://learning.oreilly.com/library/view/~/9780124077492">https://learning.oreilly.com/library/view/~/9780124077492</a>
<a href="https://learning.oreilly.com/library/view/~/9780124077492/?ar">https://learning.oreilly.com/library/view/~/9780124077492/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar">https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar</a><br/>Format: Electronic Resources<br/>
Conducting network penetration and espionage in a global environment
ent://SD_ILS/0/SD_ILS:2303092
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Middleton, Bruce, 1953- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482206470">https://learning.oreilly.com/library/view/~/9781482206470</a>
<a href="https://learning.oreilly.com/library/view/~/9781482206470/?ar">https://learning.oreilly.com/library/view/~/9781482206470/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar">https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar</a><br/>Format: Electronic Resources<br/>
Build your own security lab : a field guide for network testing
ent://SD_ILS/0/SD_ILS:2289142
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Gregg, Michael (Michael C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470179864/?ar">https://go.oreilly.com/library-access/library/view/-/9780470179864/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470179864/?ar">https://learning.oreilly.com/library/view/~/9780470179864/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470179864">https://learning.oreilly.com/library/view/~/9780470179864</a><br/>Format: Electronic Resources<br/>
Dictionary of information security
ent://SD_ILS/0/SD_ILS:2282318
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Slade, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491150">https://learning.oreilly.com/library/view/~/9781597491150</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491150/?ar">https://learning.oreilly.com/library/view/~/9781597491150/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491150/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491150/?ar</a><br/>Format: Electronic Resources<br/>
Essential PHP security
ent://SD_ILS/0/SD_ILS:2282254
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Shiflett, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/059600656X/?ar">https://learning.oreilly.com/library/view/~/059600656X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/059600656X">https://learning.oreilly.com/library/view/~/059600656X</a>
<a href="https://go.oreilly.com/library-access/library/view/-/059600656X/?ar">https://go.oreilly.com/library-access/library/view/-/059600656X/?ar</a><br/>Format: Electronic Resources<br/>
Handbook of information security . Volume 1, Key concepts, infrastructure, standards, and protocols
ent://SD_ILS/0/SD_ILS:2289169
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Bidgoli, Hossein.<br/><a href="https://learning.oreilly.com/library/view/~/9780471648307">https://learning.oreilly.com/library/view/~/9780471648307</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780471648307/?ar">https://go.oreilly.com/library-access/library/view/-/9780471648307/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780471648307/?ar">https://learning.oreilly.com/library/view/~/9780471648307/?ar</a><br/>Format: Electronic Resources<br/>
The myths of security : what the computer security industry doesn't want you to know
ent://SD_ILS/0/SD_ILS:2106561
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Viega, John.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821</a><br/>Format: Electronic Resources<br/>
Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics
ent://SD_ILS/0/SD_ILS:2315706
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format: Electronic Resources<br/>
Managing a network vulnerability assessment
ent://SD_ILS/0/SD_ILS:2284729
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Peltier, Thomas R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203503041/?ar">https://go.oreilly.com/library-access/library/view/-/9780203503041/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203503041/?ar">https://learning.oreilly.com/library/view/~/9780203503041/?ar</a><br/>Format: Electronic Resources<br/>
Network and system security
ent://SD_ILS/0/SD_ILS:2288837
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495356">https://learning.oreilly.com/library/view/~/9781597495356</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495356/?ar">https://learning.oreilly.com/library/view/~/9781597495356/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar</a><br/>Format: Electronic Resources<br/>
CWSP : certified wireless security professional official study guide
ent://SD_ILS/0/SD_ILS:2288340
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Coleman, David D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470438916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470438916/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470438916/?ar">https://learning.oreilly.com/library/view/~/9780470438916/?ar</a><br/>Format: Electronic Resources<br/>
Screenos cookbook
ent://SD_ILS/0/SD_ILS:2285572
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Brunner, Stefan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596510039/?ar">https://go.oreilly.com/library-access/library/view/-/9780596510039/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596510039">https://learning.oreilly.com/library/view/~/9780596510039</a>
<a href="https://learning.oreilly.com/library/view/~/9780596510039/?ar">https://learning.oreilly.com/library/view/~/9780596510039/?ar</a><br/>Format: Electronic Resources<br/>
Hardening Cisco routers
ent://SD_ILS/0/SD_ILS:2293283
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Akin, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/0596001665/?ar">https://learning.oreilly.com/library/view/~/0596001665/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596001665">https://learning.oreilly.com/library/view/~/0596001665</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596001665/?ar">https://go.oreilly.com/library-access/library/view/-/0596001665/?ar</a><br/>Format: Electronic Resources<br/>
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
ent://SD_ILS/0/SD_ILS:2284090
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Contos, Brian T.<br/><a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491297">https://learning.oreilly.com/library/view/~/9781597491297</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491297/?ar">https://learning.oreilly.com/library/view/~/9781597491297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491297/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491297/?ar</a><br/>Format: Electronic Resources<br/>
Mastering the Nmap scripting engine : master the Nmap scripting engine and the art of developing NSE scripts
ent://SD_ILS/0/SD_ILS:2306630
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Pale, Paulino Calderon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782168317/?ar">https://learning.oreilly.com/library/view/~/9781782168317/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782168317/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168317/?ar</a><br/>Format: Electronic Resources<br/>
Applied Oracle security : developing secure database and middleware environments
ent://SD_ILS/0/SD_ILS:2287303
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Knox, David (David C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar">https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071613705/?ar">https://learning.oreilly.com/library/view/~/9780071613705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071613705">https://learning.oreilly.com/library/view/~/9780071613705</a><br/>Format: Electronic Resources<br/>
Application Security in the ISO27001 Environment.
ent://SD_ILS/0/SD_ILS:2288619
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Vasudevan, Vinod.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781905356355/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356355/?ar">https://learning.oreilly.com/library/view/~/9781905356355/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356355">https://learning.oreilly.com/library/view/~/9781905356355</a><br/>Format: Electronic Resources<br/>
Maximum wireless security
ent://SD_ILS/0/SD_ILS:2281684
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Peikari, Cyrus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672324881/?ar">https://go.oreilly.com/library-access/library/view/-/0672324881/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672324881/?ar">https://learning.oreilly.com/library/view/~/0672324881/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672324881">https://learning.oreilly.com/library/view/~/0672324881</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2287972
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar">https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470550939/?ar">https://learning.oreilly.com/library/view/~/9780470550939/?ar</a><br/>Format: Electronic Resources<br/>
Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation
ent://SD_ILS/0/SD_ILS:2302625
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Dang, Bruce, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118787397/?ar">https://learning.oreilly.com/library/view/~/9781118787397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar">https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118787397">https://learning.oreilly.com/library/view/~/9781118787397</a><br/>Format: Electronic Resources<br/>
SAP security configuration and deployment : the IT administrator's guide to best practices
ent://SD_ILS/0/SD_ILS:2285985
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Wun-Young, Leslie.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492843">https://learning.oreilly.com/library/view/~/9781597492843</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492843/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492843/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492843/?ar">https://learning.oreilly.com/library/view/~/9781597492843/?ar</a><br/>Format: Electronic Resources<br/>
Beautiful security
ent://SD_ILS/0/SD_ILS:2286888
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Oram, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780596801786/?ar">https://learning.oreilly.com/library/view/~/9780596801786/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596801786">https://learning.oreilly.com/library/view/~/9780596801786</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar">https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar</a><br/>Format: Electronic Resources<br/>
Host integrity monitoring : using Osiris and Samhain
ent://SD_ILS/0/SD_ILS:2282620
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Wotring, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490184">https://learning.oreilly.com/library/view/~/9781597490184</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490184/?ar">https://learning.oreilly.com/library/view/~/9781597490184/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597490184">https://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Electronic Resources<br/>
Managing Cisco network security
ent://SD_ILS/0/SD_ILS:2280758
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Knipp, Eric.<br/><a href="https://www.sciencedirect.com/science/book/9781931836562">https://www.sciencedirect.com/science/book/9781931836562</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836562">https://learning.oreilly.com/library/view/~/9781931836562</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836562/?ar">https://learning.oreilly.com/library/view/~/9781931836562/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836562/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836562/?ar</a><br/>Format: Electronic Resources<br/>
OSSEC host-based intrusion detection guide
ent://SD_ILS/0/SD_ILS:2285140
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Hay, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492409">https://learning.oreilly.com/library/view/~/9781597492409</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492409/?ar">https://learning.oreilly.com/library/view/~/9781597492409/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar</a><br/>Format: Electronic Resources<br/>
AAA and network security for mobile access : radius, diameter, EAP, PKI and IP mobility
ent://SD_ILS/0/SD_ILS:2281904
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Nakhjiri, Madjid.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470011942/?ar">https://go.oreilly.com/library-access/library/view/-/9780470011942/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470011942/?ar">https://learning.oreilly.com/library/view/~/9780470011942/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470011942">https://learning.oreilly.com/library/view/~/9780470011942</a><br/>Format: Electronic Resources<br/>
How to cheat at managing information security
ent://SD_ILS/0/SD_ILS:2282317
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Osborne, Mark.<br/><a href="https://www.sciencedirect.com/science/book/9781597491105">https://www.sciencedirect.com/science/book/9781597491105</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491105/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491105/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491105/?ar">https://learning.oreilly.com/library/view/~/9781597491105/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491105">https://learning.oreilly.com/library/view/~/9781597491105</a><br/>Format: Electronic Resources<br/>
Security+ practice questions
ent://SD_ILS/0/SD_ILS:2281682
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Sparbel, Hans.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0789731517/?ar">https://go.oreilly.com/library-access/library/view/-/0789731517/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0789731517/?ar">https://learning.oreilly.com/library/view/~/0789731517/?ar</a><br/>Format: Electronic Resources<br/>
Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
ent://SD_ILS/0/SD_ILS:2311022
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Rehim, Rejah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar">https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785280696/?ar">https://learning.oreilly.com/library/view/~/9781785280696/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785280696">https://learning.oreilly.com/library/view/~/9781785280696</a><br/>Format: Electronic Resources<br/>
Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management
ent://SD_ILS/0/SD_ILS:2296031
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Nordström, Kent.<br/><a href="https://learning.oreilly.com/library/view/~/9781849685368/?ar">https://learning.oreilly.com/library/view/~/9781849685368/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849685368/?ar">https://go.oreilly.com/library-access/library/view/-/9781849685368/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849685368">https://learning.oreilly.com/library/view/~/9781849685368</a><br/>Format: Electronic Resources<br/>
Aggressive network self-defense
ent://SD_ILS/0/SD_ILS:2282271
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Wyler, Neil R.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836203">https://learning.oreilly.com/library/view/~/9781931836203</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836203/?ar">https://learning.oreilly.com/library/view/~/9781931836203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836203/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836203/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781931836203">https://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Electronic Resources<br/>
Network Security Assessment
ent://SD_ILS/0/SD_ILS:2281350
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by McNab, Chris (Chris R.), 1980-<br/><a href="https://learning.oreilly.com/library/view/~/059600611X">https://learning.oreilly.com/library/view/~/059600611X</a>
<a href="https://learning.oreilly.com/library/view/~/059600611X/?ar">https://learning.oreilly.com/library/view/~/059600611X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/059600611X/?ar">https://go.oreilly.com/library-access/library/view/-/059600611X/?ar</a><br/>Format: Electronic Resources<br/>
Web Application Defender's Cookbook : Battling Hackers and Protecting Users.
ent://SD_ILS/0/SD_ILS:2298453
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Barnett, Ryan C.<br/><a href="https://learning.oreilly.com/library/view/~/9781118417058/?ar">https://learning.oreilly.com/library/view/~/9781118417058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar">https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118417058">https://learning.oreilly.com/library/view/~/9781118417058</a><br/>Format: Electronic Resources<br/>
Security for Microsoft Windows system administrators : introduction to key information security concepts
ent://SD_ILS/0/SD_ILS:2290287
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Rountree, Derrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495943/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495943/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495943/?ar">https://learning.oreilly.com/library/view/~/9781597495943/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495943">https://learning.oreilly.com/library/view/~/9781597495943</a><br/>Format: Electronic Resources<br/>
IT auditing : using controls to protect information assets
ent://SD_ILS/0/SD_ILS:2291226
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Davis, Chris (Christopher Michael)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071742382/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071742382/?ar">https://learning.oreilly.com/library/view/~/9780071742382/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft forefront security administration guide
ent://SD_ILS/0/SD_ILS:2284517
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Varsalone, Jesse.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492447">https://learning.oreilly.com/library/view/~/9781597492447</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492447/?ar">https://learning.oreilly.com/library/view/~/9781597492447/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar</a><br/>Format: Electronic Resources<br/>
Digital identity
ent://SD_ILS/0/SD_ILS:2293288
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Windley, Phillip J., 1958-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008783/?ar">https://go.oreilly.com/library-access/library/view/-/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783/?ar">https://learning.oreilly.com/library/view/~/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783">https://learning.oreilly.com/library/view/~/0596008783</a><br/>Format: Electronic Resources<br/>
Intrusion detection with Snort
ent://SD_ILS/0/SD_ILS:2281704
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/157870281X">https://learning.oreilly.com/library/view/~/157870281X</a>
<a href="https://learning.oreilly.com/library/view/~/157870281X/?ar">https://learning.oreilly.com/library/view/~/157870281X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/157870281X/?ar">https://go.oreilly.com/library-access/library/view/-/157870281X/?ar</a><br/>Format: Electronic Resources<br/>
Nine steps to success : an ISO 27001:2013 implementation overview
ent://SD_ILS/0/SD_ILS:2310541
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849288255/?ar">https://go.oreilly.com/library-access/library/view/-/9781849288255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849288255/?ar">https://learning.oreilly.com/library/view/~/9781849288255/?ar</a><br/>Format: Electronic Resources<br/>
Security : the Human Factor.
ent://SD_ILS/0/SD_ILS:2290675
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Kearney, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281843/?ar">https://learning.oreilly.com/library/view/~/9781849281843/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar</a><br/>Format: Electronic Resources<br/>
Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutions
ent://SD_ILS/0/SD_ILS:2318261
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Rohmeyer, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484241943">https://learning.oreilly.com/library/view/~/9781484241943</a>
<a href="https://learning.oreilly.com/library/view/~/9781484241943/?ar">https://learning.oreilly.com/library/view/~/9781484241943/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484241943/?ar">https://go.oreilly.com/library-access/library/view/-/9781484241943/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices
ent://SD_ILS/0/SD_ILS:2311174
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Steadman, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785283925/?ar">https://learning.oreilly.com/library/view/~/9781785283925/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785283925">https://learning.oreilly.com/library/view/~/9781785283925</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785283925/?ar">https://go.oreilly.com/library-access/library/view/-/9781785283925/?ar</a><br/>Format: Electronic Resources<br/>
Nmap 6 : network exploration and security auditing Cookbook
ent://SD_ILS/0/SD_ILS:2297121
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Pale, Paulino Calderon.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849517485/?ar">https://go.oreilly.com/library-access/library/view/-/9781849517485/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849517485/?ar">https://learning.oreilly.com/library/view/~/9781849517485/?ar</a><br/>Format: Electronic Resources<br/>
AVIEN malware defense guide for the Enterprise
ent://SD_ILS/0/SD_ILS:2284510
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Harley, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491648">https://learning.oreilly.com/library/view/~/9781597491648</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491648/?ar">https://learning.oreilly.com/library/view/~/9781597491648/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar</a><br/>Format: Electronic Resources<br/>
The art of intrusion : the real stories behind the exploits of hackers, intruders & deceivers
ent://SD_ILS/0/SD_ILS:2281569
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Mitnick, Kevin D. (Kevin David), 1963-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar">https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470503829/?ar">https://learning.oreilly.com/library/view/~/9780470503829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470503829">https://learning.oreilly.com/library/view/~/9780470503829</a><br/>Format: Electronic Resources<br/>
Linux server security
ent://SD_ILS/0/SD_ILS:2281596
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Bauer, Michael D.<br/><a href="https://learning.oreilly.com/library/view/~/0596006705">https://learning.oreilly.com/library/view/~/0596006705</a>
<a href="https://learning.oreilly.com/library/view/~/0596006705/?ar">https://learning.oreilly.com/library/view/~/0596006705/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006705/?ar">https://go.oreilly.com/library-access/library/view/-/0596006705/?ar</a><br/>Format: Electronic Resources<br/>
Privacy defended : protecting yourself online
ent://SD_ILS/0/SD_ILS:2280776
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Bahadur, Gary.<br/><a href="https://learning.oreilly.com/library/view/~/078972605X">https://learning.oreilly.com/library/view/~/078972605X</a>
<a href="https://learning.oreilly.com/library/view/~/078972605X/?ar">https://learning.oreilly.com/library/view/~/078972605X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/078972605X/?ar">https://go.oreilly.com/library-access/library/view/-/078972605X/?ar</a><br/>Format: Electronic Resources<br/>
Are your bits flipped? : overcoming tech misconceptions
ent://SD_ILS/0/SD_ILS:2310599
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Kissell, Joe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar">https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492017172/?ar">https://learning.oreilly.com/library/view/~/9781492017172/?ar</a><br/>Format: Electronic Resources<br/>
Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus
ent://SD_ILS/0/SD_ILS:2316700
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format: Electronic Resources<br/>
Penetration testing : protecting networks and systems
ent://SD_ILS/0/SD_ILS:2295898
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Henry, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283731">https://learning.oreilly.com/library/view/~/9781849283731</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283731/?ar">https://learning.oreilly.com/library/view/~/9781849283731/?ar</a><br/>Format: Electronic Resources<br/>
Cisco router and switch forensics : investigating and analyzing malicious network activity
ent://SD_ILS/0/SD_ILS:2287180
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494182">https://learning.oreilly.com/library/view/~/9781597494182</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494182/?ar">https://learning.oreilly.com/library/view/~/9781597494182/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar</a><br/>Format: Electronic Resources<br/>
The database hacker's handbook : defending database servers
ent://SD_ILS/0/SD_ILS:2282264
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Litchfield, David, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780764578014/?ar">https://learning.oreilly.com/library/view/~/9780764578014/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar">https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764578014">https://learning.oreilly.com/library/view/~/9780764578014</a><br/>Format: Electronic Resources<br/>
Snort cookbook
ent://SD_ILS/0/SD_ILS:2282585
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/0596007914">https://learning.oreilly.com/library/view/~/0596007914</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596007914/?ar">https://go.oreilly.com/library-access/library/view/-/0596007914/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007914/?ar">https://learning.oreilly.com/library/view/~/0596007914/?ar</a><br/>Format: Electronic Resources<br/>
Linux Command Line and Shell Scripting Techniques Master Practical Aspects of the Linux Command Line and Then Use It As a Part of the Shell Scripting Process.
ent://SD_ILS/0/SD_ILS:2332407
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Dakic, Vedran.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800205192/?ar">https://go.oreilly.com/library-access/library/view/-/9781800205192/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800205192">https://learning.oreilly.com/library/view/~/9781800205192</a>
<a href="https://learning.oreilly.com/library/view/~/9781800205192/?ar">https://learning.oreilly.com/library/view/~/9781800205192/?ar</a><br/>Format: Electronic Resources<br/>
Emerging trends in ICT security
ent://SD_ILS/0/SD_ILS:2300882
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Akhgar, Babak, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780124114746">https://learning.oreilly.com/library/view/~/9780124114746</a>
<a href="https://learning.oreilly.com/library/view/~/9780124114746/?ar">https://learning.oreilly.com/library/view/~/9780124114746/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124114746/?ar">https://go.oreilly.com/library-access/library/view/-/9780124114746/?ar</a><br/>Format: Electronic Resources<br/>
The book of PF : a no-nonsense guide to the OpenBSD firewall
ent://SD_ILS/0/SD_ILS:2290794
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Hansteen, Peter N. M.<br/><a href="https://learning.oreilly.com/library/view/~/9781593271657">https://learning.oreilly.com/library/view/~/9781593271657</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272746">https://learning.oreilly.com/library/view/~/9781593272746</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593272746/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272746/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272746/?ar">https://learning.oreilly.com/library/view/~/9781593272746/?ar</a><br/>Format: Electronic Resources<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:2282873
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597490610">https://learning.oreilly.com/library/view/~/9781597490610</a>
<a href="https://www.sciencedirect.com/science/book/9781597490610">https://www.sciencedirect.com/science/book/9781597490610</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490610/?ar">https://learning.oreilly.com/library/view/~/9781597490610/?ar</a><br/>Format: Electronic Resources<br/>
Intrusion detection networks : a key to collaborative security
ent://SD_ILS/0/SD_ILS:2301112
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Fung, Carol, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564121/?ar">https://learning.oreilly.com/library/view/~/9781466564121/?ar</a><br/>Format: Electronic Resources<br/>
Hacking exposed : web applications : web application security secrets and solutions
ent://SD_ILS/0/SD_ILS:2290273
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Scambray, Joel.<br/><a href="https://learning.oreilly.com/library/view/~/9780071740647/?ar">https://learning.oreilly.com/library/view/~/9780071740647/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar">https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar</a><br/>Format: Electronic Resources<br/>
Nmap in the enterprise : your guide to network scanning
ent://SD_ILS/0/SD_ILS:2284518
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Orebaugh, Angela.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492416/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492416/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492416/?ar">https://learning.oreilly.com/library/view/~/9781597492416/?ar</a><br/>Format: Electronic Resources<br/>
Ethereal : packet sniffing
ent://SD_ILS/0/SD_ILS:2281331
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266825">https://learning.oreilly.com/library/view/~/9781932266825</a>
<a href="https://www.sciencedirect.com/science/book/9781932266825">https://www.sciencedirect.com/science/book/9781932266825</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266825/?ar">https://learning.oreilly.com/library/view/~/9781932266825/?ar</a><br/>Format: Electronic Resources<br/>
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland
ent://SD_ILS/0/SD_ILS:269853
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Cordesman, Anthony H.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=99141">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=99141</a><br/>Format: Electronic Resources<br/>
Practical Windows forensics : leverage the power of digital forensics for Windows systems
ent://SD_ILS/0/SD_ILS:2311021
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format: Electronic Resources<br/>
Mac OS X, iPod, and iPhone forensic analysis DVD toolkit
ent://SD_ILS/0/SD_ILS:2287201
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Kubasiak, Ryan R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080949185/?ar">https://learning.oreilly.com/library/view/~/9780080949185/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080949185">https://learning.oreilly.com/library/view/~/9780080949185</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar">https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar</a><br/>Format: Electronic Resources<br/>
The shellcoder's handbook : discovering and exploiting security holes
ent://SD_ILS/0/SD_ILS:2283852
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Anley, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780470080238">https://learning.oreilly.com/library/view/~/9780470080238</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar">https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470080238/?ar">https://learning.oreilly.com/library/view/~/9780470080238/?ar</a><br/>Format: Electronic Resources<br/>
Cisco Intelligent WAN (IWAN)
ent://SD_ILS/0/SD_ILS:2311998
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Edgeworth, Brad, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar">https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134423760/?ar">https://learning.oreilly.com/library/view/~/9780134423760/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134423760">https://learning.oreilly.com/library/view/~/9780134423760</a><br/>Format: Electronic Resources<br/>
The ultimate Kali Linux book : perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
ent://SD_ILS/0/SD_ILS:2331878
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801818933">https://learning.oreilly.com/library/view/~/9781801818933</a>
<a href="https://learning.oreilly.com/library/view/~/9781801818933/?ar">https://learning.oreilly.com/library/view/~/9781801818933/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801818933/?ar">https://go.oreilly.com/library-access/library/view/-/9781801818933/?ar</a><br/>Format: Electronic Resources<br/>
JUNOS automation cookbook : automate network devices on Juniper's operating system
ent://SD_ILS/0/SD_ILS:2314479
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Chappell, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788290999/?ar">https://go.oreilly.com/library-access/library/view/-/9781788290999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788290999/?ar">https://learning.oreilly.com/library/view/~/9781788290999/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788290999">https://learning.oreilly.com/library/view/~/9781788290999</a><br/>Format: Electronic Resources<br/>
Python passive network mapping : P2NMAP
ent://SD_ILS/0/SD_ILS:2307523
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Hosmer, Chet, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027424">https://learning.oreilly.com/library/view/~/9780128027424</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027424/?ar">https://learning.oreilly.com/library/view/~/9780128027424/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128027424/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027424/?ar</a><br/>Format: Electronic Resources<br/>
Securing SQL server : protecting your database from attackers
ent://SD_ILS/0/SD_ILS:2290991
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Cherry, Denny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496254">https://learning.oreilly.com/library/view/~/9781597496254</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496254/?ar">https://learning.oreilly.com/library/view/~/9781597496254/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496254/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496254/?ar</a><br/>Format: Electronic Resources<br/>
Information Security Breaches : Avoidance and Treatment based on ISO27001.
ent://SD_ILS/0/SD_ILS:2288616
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280273">https://learning.oreilly.com/library/view/~/9781849280273</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280273/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280273/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280273/?ar">https://learning.oreilly.com/library/view/~/9781849280273/?ar</a><br/>Format: Electronic Resources<br/>
Linux security cookbook
ent://SD_ILS/0/SD_ILS:2281262
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Barrett, Daniel J.<br/><a href="https://learning.oreilly.com/library/view/~/0596003919/?ar">https://learning.oreilly.com/library/view/~/0596003919/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596003919/?ar">https://go.oreilly.com/library-access/library/view/-/0596003919/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596003919">https://learning.oreilly.com/library/view/~/0596003919</a><br/>Format: Electronic Resources<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:2286804
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a>
<a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format: Electronic Resources<br/>
How to cheat at securing a wireless network
ent://SD_ILS/0/SD_ILS:2282513
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Hurley, Chris.<br/><a href="https://www.sciencedirect.com/science/book/9781597490870">https://www.sciencedirect.com/science/book/9781597490870</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490870/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490870/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490870/?ar">https://learning.oreilly.com/library/view/~/9781597490870/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490870">https://learning.oreilly.com/library/view/~/9781597490870</a><br/>Format: Electronic Resources<br/>
The art of intrusion the real stories behind the exploits of hackers, intruders & deceivers
ent://SD_ILS/0/SD_ILS:334708
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Mitnick, Kevin D. (Kevin David), 1963-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892</a><br/>Format: Electronic Resources<br/>
Apache : receptury
ent://SD_ILS/0/SD_ILS:2296868
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Bowen, Richard Cooper, 1971-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176425/?ar">https://learning.oreilly.com/library/view/~/9781457176425/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176425">https://learning.oreilly.com/library/view/~/9781457176425</a><br/>Format: Electronic Resources<br/>
Implementing NAP and NAC security technologies : the complete guide to network access control
ent://SD_ILS/0/SD_ILS:2284693
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Hoffman, Daniel (Daniel V.), 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470238387/?ar">https://learning.oreilly.com/library/view/~/9780470238387/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar">https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470238387">https://learning.oreilly.com/library/view/~/9780470238387</a><br/>Format: Electronic Resources<br/>
Incident response & computer forensics
ent://SD_ILS/0/SD_ILS:2280958
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Prosise, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780072226966">https://learning.oreilly.com/library/view/~/9780072226966</a>
<a href="https://learning.oreilly.com/library/view/~/9780072226966/?ar">https://learning.oreilly.com/library/view/~/9780072226966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar">https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar</a><br/>Format: Electronic Resources<br/>
Seven deadliest web application attacks
ent://SD_ILS/0/SD_ILS:2289552
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Shema, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495431/?ar">https://learning.oreilly.com/library/view/~/9781597495431/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar</a><br/>Format: Electronic Resources<br/>
Windows Server 2008 PKI and certificate security
ent://SD_ILS/0/SD_ILS:2284892
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Komar, Brian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735625167/?ar">https://go.oreilly.com/library-access/library/view/-/9780735625167/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735625167">https://learning.oreilly.com/library/view/~/9780735625167</a>
<a href="https://learning.oreilly.com/library/view/~/9780735625167/?ar">https://learning.oreilly.com/library/view/~/9780735625167/?ar</a><br/>Format: Electronic Resources<br/>
The basics of digital privacy : simple tools to protect your personal information and your identity online
ent://SD_ILS/0/SD_ILS:2301150
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Cherry, Denny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113/?ar">https://learning.oreilly.com/library/view/~/9780128000113/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000113">https://learning.oreilly.com/library/view/~/9780128000113</a><br/>Format: Electronic Resources<br/>
The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
ent://SD_ILS/0/SD_ILS:2296625
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Winterfeld, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047372/?ar">https://learning.oreilly.com/library/view/~/9780124047372/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124047372">https://learning.oreilly.com/library/view/~/9780124047372</a><br/>Format: Electronic Resources<br/>
Blackjacking : security threats to Blackberry devices, PDAs, and cell phones in the enterprise
ent://SD_ILS/0/SD_ILS:2283507
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Hoffman, Daniel (Daniel V.), 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470127544">https://learning.oreilly.com/library/view/~/9780470127544</a>
<a href="https://learning.oreilly.com/library/view/~/9780470127544/?ar">https://learning.oreilly.com/library/view/~/9780470127544/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470127544/?ar">https://go.oreilly.com/library-access/library/view/-/9780470127544/?ar</a><br/>Format: Electronic Resources<br/>
Next generation SSH2 implementation : securing data in motion
ent://SD_ILS/0/SD_ILS:2285986
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format: Electronic Resources<br/>
Information security analytics : finding security insights, patterns, and anomalies in big data
ent://SD_ILS/0/SD_ILS:2305164
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Talabis, Mark Ryan M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128002070/?ar">https://go.oreilly.com/library-access/library/view/-/9780128002070/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128002070/?ar">https://learning.oreilly.com/library/view/~/9780128002070/?ar</a><br/>Format: Electronic Resources<br/>
Mobile application security
ent://SD_ILS/0/SD_ILS:2288045
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Dwivedi, Himanshu.<br/><a href="https://learning.oreilly.com/library/view/~/9780071633567/?ar">https://learning.oreilly.com/library/view/~/9780071633567/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071633567/?ar">https://go.oreilly.com/library-access/library/view/-/9780071633567/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071633567">https://learning.oreilly.com/library/view/~/9780071633567</a><br/>Format: Electronic Resources<br/>
Security in wireless ad hoc and sensor networks
ent://SD_ILS/0/SD_ILS:2285854
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Çayirci, E. (Erdal)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470027486/?ar">https://go.oreilly.com/library-access/library/view/-/9780470027486/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470027486/?ar">https://learning.oreilly.com/library/view/~/9780470027486/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470027486">https://learning.oreilly.com/library/view/~/9780470027486</a><br/>Format: Electronic Resources<br/>
Improving your Penetration Testing Skills : strengthen your defense against web attacks with Kali Linux and Metasploit
ent://SD_ILS/0/SD_ILS:2322241
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Najera-Gutierrez, Gilberto, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781838646073">https://learning.oreilly.com/library/view/~/9781838646073</a>
<a href="https://learning.oreilly.com/library/view/~/9781838646073/?ar">https://learning.oreilly.com/library/view/~/9781838646073/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838646073/?ar">https://go.oreilly.com/library-access/library/view/-/9781838646073/?ar</a><br/>Format: Electronic Resources<br/>
Snort : IDS and IPS toolkit
ent://SD_ILS/0/SD_ILS:2289130
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Beale, Jay.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490993/?ar">https://learning.oreilly.com/library/view/~/9781597490993/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Electronic Resources<br/>
Wireless communications security : solutions for the internet of things
ent://SD_ILS/0/SD_ILS:2311624
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Penttinen, Jyrki T. J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119084396/?ar">https://learning.oreilly.com/library/view/~/9781119084396/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar">https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar</a><br/>Format: Electronic Resources<br/>
Intelligent systems for security informatics
ent://SD_ILS/0/SD_ILS:2297534
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Yang, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047020">https://learning.oreilly.com/library/view/~/9780124047020</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124047020/?ar">https://learning.oreilly.com/library/view/~/9780124047020/?ar</a><br/>Format: Electronic Resources<br/>
Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting
ent://SD_ILS/0/SD_ILS:2286530
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Hoopes, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781597493055">https://learning.oreilly.com/library/view/~/9781597493055</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597493055/?ar">https://go.oreilly.com/library-access/library/view/-/9781597493055/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597493055/?ar">https://learning.oreilly.com/library/view/~/9781597493055/?ar</a><br/>Format: Electronic Resources<br/>
How to secure and audit Oracle 10g and 11g
ent://SD_ILS/0/SD_ILS:2286324
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Ben-Natan, Ron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar">https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139/?ar">https://learning.oreilly.com/library/view/~/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139">https://learning.oreilly.com/library/view/~/9781420084139</a><br/>Format: Electronic Resources<br/>
Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions
ent://SD_ILS/0/SD_ILS:2314683
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a>
<a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format: Electronic Resources<br/>
Hacking : the art of exploitation
ent://SD_ILS/0/SD_ILS:2287983
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Erickson, Jon, 1977-<br/><a href="https://learning.oreilly.com/library/view/~/9781593271442">https://learning.oreilly.com/library/view/~/9781593271442</a>
<a href="https://learning.oreilly.com/library/view/~/9781593271442/?ar">https://learning.oreilly.com/library/view/~/9781593271442/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar</a><br/>Format: Electronic Resources<br/>
The art of deception : controlling the human element of security
ent://SD_ILS/0/SD_ILS:2280746
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780764542800/?ar">https://learning.oreilly.com/library/view/~/9780764542800/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780764542800/?ar">https://go.oreilly.com/library-access/library/view/-/9780764542800/?ar</a><br/>Format: Electronic Resources<br/>
Web application obfuscation : '-/WAFs.evasion.filters//alert (/obfuscation/)-'
ent://SD_ILS/0/SD_ILS:2290508
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Heiderich, Mario.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496049/?ar">https://learning.oreilly.com/library/view/~/9781597496049/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496049/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496049/?ar</a><br/>Format: Electronic Resources<br/>
Insider threat : protecting the enterprise from sabotage, spying, and theft
ent://SD_ILS/0/SD_ILS:2281991
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490481">https://learning.oreilly.com/library/view/~/9781597490481</a>
<a href="https://www.sciencedirect.com/science/book/9781597490481">https://www.sciencedirect.com/science/book/9781597490481</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490481/?ar">https://learning.oreilly.com/library/view/~/9781597490481/?ar</a><br/>Format: Electronic Resources<br/>
CCNA security study guide
ent://SD_ILS/0/SD_ILS:2288728
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Boyles, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780470527672/?ar">https://learning.oreilly.com/library/view/~/9780470527672/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470527672/?ar">https://go.oreilly.com/library-access/library/view/-/9780470527672/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2282490
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format: Electronic Resources<br/>
The Browser Hacker's Handbook
ent://SD_ILS/0/SD_ILS:2302347
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Alcorn, Wade.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118662090/?ar">https://go.oreilly.com/library-access/library/view/-/9781118662090/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118662090/?ar">https://learning.oreilly.com/library/view/~/9781118662090/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118662090">https://learning.oreilly.com/library/view/~/9781118662090</a><br/>Format: Electronic Resources<br/>
TICSA TruSecure ICSA certified security associate : exam TUO-001 : training guide
ent://SD_ILS/0/SD_ILS:2281543
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Chapple, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/0789727838">https://learning.oreilly.com/library/view/~/0789727838</a>
<a href="https://learning.oreilly.com/library/view/~/0789727838/?ar">https://learning.oreilly.com/library/view/~/0789727838/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0789727838/?ar">https://go.oreilly.com/library-access/library/view/-/0789727838/?ar</a><br/>Format: Electronic Resources<br/>
Software test attacks to break mobile and embedded devices
ent://SD_ILS/0/SD_ILS:2300719
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Hagar, Jon Duncan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466575318/?ar">https://go.oreilly.com/library-access/library/view/-/9781466575318/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466575318/?ar">https://learning.oreilly.com/library/view/~/9781466575318/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466575318">https://learning.oreilly.com/library/view/~/9781466575318</a><br/>Format: Electronic Resources<br/>
E-discovery : creating and managing an enterprisewide program : a technical guide to digital investigation and litigation support
ent://SD_ILS/0/SD_ILS:2286529
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Schuler, Karen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492966/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492966/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492966/?ar">https://learning.oreilly.com/library/view/~/9781597492966/?ar</a><br/>Format: Electronic Resources<br/>
Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers
ent://SD_ILS/0/SD_ILS:2316089
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format: Electronic Resources<br/>
Hacking exposed : mobile security secrets & solutions
ent://SD_ILS/0/SD_ILS:2301016
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Bergman, Neil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar">https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071817011/?ar">https://learning.oreilly.com/library/view/~/9780071817011/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071817011">https://learning.oreilly.com/library/view/~/9780071817011</a><br/>Format: Electronic Resources<br/>
Wireless security
ent://SD_ILS/0/SD_ILS:2294580
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Osterhage, Wolfgang.<br/><a href="https://learning.oreilly.com/library/view/~/9781578087686/?ar">https://learning.oreilly.com/library/view/~/9781578087686/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781578087686/?ar">https://go.oreilly.com/library-access/library/view/-/9781578087686/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781578087686">https://learning.oreilly.com/library/view/~/9781578087686</a><br/>Format: Electronic Resources<br/>
Information security handbook : develop a threat model and incident response strategy to build a strong information security framework
ent://SD_ILS/0/SD_ILS:2315319
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Death, Darren, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788478830">https://learning.oreilly.com/library/view/~/9781788478830</a>
<a href="https://learning.oreilly.com/library/view/~/9781788478830/?ar">https://learning.oreilly.com/library/view/~/9781788478830/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788478830/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478830/?ar</a><br/>Format: Electronic Resources<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:2313301
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128039298">https://learning.oreilly.com/library/view/~/9780128039298</a>
<a href="https://learning.oreilly.com/library/view/~/9780128039298/?ar">https://learning.oreilly.com/library/view/~/9780128039298/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar">https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar</a><br/>Format: Electronic Resources<br/>
Iris biometric model for secured network access
ent://SD_ILS/0/SD_ILS:2298466
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by El Khoury, Franjieh.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502147/?ar">https://learning.oreilly.com/library/view/~/9781466502147/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466502147">https://learning.oreilly.com/library/view/~/9781466502147</a><br/>Format: Electronic Resources<br/>
Deploying Microsoft Forefront Protection 2010 for Exchange Server
ent://SD_ILS/0/SD_ILS:2290701
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656734/?ar">https://learning.oreilly.com/library/view/~/9780735656734/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar</a><br/>Format: Electronic Resources<br/>
Using the common criteria for IT security evaluation
ent://SD_ILS/0/SD_ILS:2281784
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Herrmann, Debra S.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031423">https://learning.oreilly.com/library/view/~/9781420031423</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420031423/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031423/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420031423/?ar">https://learning.oreilly.com/library/view/~/9781420031423/?ar</a><br/>Format: Electronic Resources<br/>
Computer forensics : a pocket guide
ent://SD_ILS/0/SD_ILS:2289616
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format: Electronic Resources<br/>
Botnets the killer web app
ent://SD_ILS/0/SD_ILS:340160
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Schiller, Craig A.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406</a><br/>Format: Electronic Resources<br/>
WarDriving & wireless penetration testing
ent://SD_ILS/0/SD_ILS:2282518
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Hurley, Chris.<br/><a href="https://www.sciencedirect.com/science/book/9781597491112">https://www.sciencedirect.com/science/book/9781597491112</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491112">https://learning.oreilly.com/library/view/~/9781597491112</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491112/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491112/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491112/?ar">https://learning.oreilly.com/library/view/~/9781597491112/?ar</a><br/>Format: Electronic Resources<br/>
Java security handbook
ent://SD_ILS/0/SD_ILS:2281327
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Jaworski, Jamie.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672316021/?ar">https://go.oreilly.com/library-access/library/view/-/0672316021/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672316021">https://learning.oreilly.com/library/view/~/0672316021</a>
<a href="https://learning.oreilly.com/library/view/~/0672316021/?ar">https://learning.oreilly.com/library/view/~/0672316021/?ar</a><br/>Format: Electronic Resources<br/>
Infosecurity 2008 threat analysis
ent://SD_ILS/0/SD_ILS:343739
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Clark, Champ, III.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542</a><br/>Format: Electronic Resources<br/>
Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ent://SD_ILS/0/SD_ILS:2281670
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Rosenberg, Jonathan B., 1956-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672326515/?ar">https://go.oreilly.com/library-access/library/view/-/0672326515/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672326515/?ar">https://learning.oreilly.com/library/view/~/0672326515/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672326515">https://learning.oreilly.com/library/view/~/0672326515</a><br/>Format: Electronic Resources<br/>
HP Nonstop server security : a practical handbook
ent://SD_ILS/0/SD_ILS:2281922
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Hill, Terri.<br/><a href="https://learning.oreilly.com/library/view/~/9781555583149">https://learning.oreilly.com/library/view/~/9781555583149</a>
<a href="https://learning.oreilly.com/library/view/~/9781555583149/?ar">https://learning.oreilly.com/library/view/~/9781555583149/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781555583149/?ar">https://go.oreilly.com/library-access/library/view/-/9781555583149/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781555583149">https://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Electronic Resources<br/>
Metasploit : the penetration tester's guide
ent://SD_ILS/0/SD_ILS:2292581
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Kennedy, David, 1982-<br/><a href="https://learning.oreilly.com/library/view/~/9781593272883">https://learning.oreilly.com/library/view/~/9781593272883</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272883/?ar">https://learning.oreilly.com/library/view/~/9781593272883/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593272883/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272883/?ar</a><br/>Format: Electronic Resources<br/>
Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools
ent://SD_ILS/0/SD_ILS:2303312
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Makan, Keith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar">https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849695107/?ar">https://learning.oreilly.com/library/view/~/9781849695107/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849695107">https://learning.oreilly.com/library/view/~/9781849695107</a><br/>Format: Electronic Resources<br/>
Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day
ent://SD_ILS/0/SD_ILS:2298053
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Yerrid, K. C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960/?ar">https://learning.oreilly.com/library/view/~/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960">https://learning.oreilly.com/library/view/~/9781849519960</a><br/>Format: Electronic Resources<br/>
Auditing cloud computing : a security and privacy guide
ent://SD_ILS/0/SD_ILS:2292255
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format: Electronic Resources<br/>
24 deadly sins of software security : programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:2287176
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780071626750/?ar">https://learning.oreilly.com/library/view/~/9780071626750/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar">https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071626750">https://learning.oreilly.com/library/view/~/9780071626750</a><br/>Format: Electronic Resources<br/>
Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
ent://SD_ILS/0/SD_ILS:2316790
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788990615/?ar">https://learning.oreilly.com/library/view/~/9781788990615/?ar</a><br/>Format: Electronic Resources<br/>
Managing Information Security Breaches : Studies from Real Life.
ent://SD_ILS/0/SD_ILS:2290674
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format: Electronic Resources<br/>
Web commerce security : design and development
ent://SD_ILS/0/SD_ILS:2292686
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Nahari, Hadi.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar">https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470624463/?ar">https://learning.oreilly.com/library/view/~/9780470624463/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470624463">https://learning.oreilly.com/library/view/~/9780470624463</a><br/>Format: Electronic Resources<br/>
Apache cookbook
ent://SD_ILS/0/SD_ILS:2284338
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Coar, Ken A. L.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596529949/?ar">https://go.oreilly.com/library-access/library/view/-/9780596529949/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596529949">https://learning.oreilly.com/library/view/~/9780596529949</a>
<a href="https://learning.oreilly.com/library/view/~/9780596529949/?ar">https://learning.oreilly.com/library/view/~/9780596529949/?ar</a><br/>Format: Electronic Resources<br/>
Mastering FreeBSD and OpenBSD security
ent://SD_ILS/0/SD_ILS:2289327
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Korff, Yanek.<br/><a href="https://learning.oreilly.com/library/view/~/0596006268">https://learning.oreilly.com/library/view/~/0596006268</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006268/?ar">https://go.oreilly.com/library-access/library/view/-/0596006268/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006268/?ar">https://learning.oreilly.com/library/view/~/0596006268/?ar</a><br/>Format: Electronic Resources<br/>
Mobile device security for dummies
ent://SD_ILS/0/SD_ILS:2293515
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Campagna, Rich R.<br/><a href="https://learning.oreilly.com/library/view/~/9781118093801/?ar">https://learning.oreilly.com/library/view/~/9781118093801/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar">https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar</a><br/>Format: Electronic Resources<br/>
Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks
ent://SD_ILS/0/SD_ILS:2310121
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Datt, Samir, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar">https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905/?ar">https://learning.oreilly.com/library/view/~/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905">https://learning.oreilly.com/library/view/~/9781782174905</a><br/>Format: Electronic Resources<br/>
Hack proofing your Web applications : the only way to stop a hacker is to think like one.
ent://SD_ILS/0/SD_ILS:2280762
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
<a href="https://learning.oreilly.com/library/view/~/9781928994312/?ar">https://learning.oreilly.com/library/view/~/9781928994312/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994312/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994312/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781928994312">https://learning.oreilly.com/library/view/~/9781928994312</a><br/>Format: Electronic Resources<br/>
Managed code rootkits : hooking into runtime environments
ent://SD_ILS/0/SD_ILS:2290307
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Metula, Erez.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495752/?ar">https://learning.oreilly.com/library/view/~/9781597495752/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495752">https://learning.oreilly.com/library/view/~/9781597495752</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495752/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495752/?ar</a><br/>Format: Electronic Resources<br/>
IT security metrics : a practical framework for measuring security & protecting data
ent://SD_ILS/0/SD_ILS:2289448
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Hayden, Lance.<br/><a href="https://learning.oreilly.com/library/view/~/9780071713405">https://learning.oreilly.com/library/view/~/9780071713405</a>
<a href="https://learning.oreilly.com/library/view/~/9780071713405/?ar">https://learning.oreilly.com/library/view/~/9780071713405/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071713405/?ar">https://go.oreilly.com/library-access/library/view/-/9780071713405/?ar</a><br/>Format: Electronic Resources<br/>
Botnets : the killer web app
ent://SD_ILS/0/SD_ILS:2283565
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Schiller, Craig A.<br/><a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491358/?ar">https://learning.oreilly.com/library/view/~/9781597491358/?ar</a><br/>Format: Electronic Resources<br/>
Hacking exposed wireless : wireless security secrets & solutions
ent://SD_ILS/0/SD_ILS:2289376
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Cache, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9780071666619/?ar">https://learning.oreilly.com/library/view/~/9780071666619/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071666619/?ar">https://go.oreilly.com/library-access/library/view/-/9780071666619/?ar</a><br/>Format: Electronic Resources<br/>
The secure online business handbook a practical guide to risk management and business continuity
ent://SD_ILS/0/SD_ILS:280629
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Reuvid, Jonathan.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=165969">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=165969</a><br/>Format: Electronic Resources<br/>
Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world
ent://SD_ILS/0/SD_ILS:2311027
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785889639">https://learning.oreilly.com/library/view/~/9781785889639</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889639/?ar">https://learning.oreilly.com/library/view/~/9781785889639/?ar</a><br/>Format: Electronic Resources<br/>
Practical UNIX and Internet security
ent://SD_ILS/0/SD_ILS:2281256
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596003234">https://learning.oreilly.com/library/view/~/0596003234</a>
<a href="https://learning.oreilly.com/library/view/~/0596003234/?ar">https://learning.oreilly.com/library/view/~/0596003234/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596003234/?ar">https://go.oreilly.com/library-access/library/view/-/0596003234/?ar</a><br/>Format: Electronic Resources<br/>
Kali LInux CTF blueprints : build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux
ent://SD_ILS/0/SD_ILS:2303998
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Buchanan, Cameron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783985982/?ar">https://go.oreilly.com/library-access/library/view/-/9781783985982/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783985982/?ar">https://learning.oreilly.com/library/view/~/9781783985982/?ar</a><br/>Format: Electronic Resources<br/>
Information security management handbook . Volume 7
ent://SD_ILS/0/SD_ILS:2300299
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by O'Hanley, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar">https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466567498">https://learning.oreilly.com/library/view/~/9781466567498</a>
<a href="https://learning.oreilly.com/library/view/~/9781466567498/?ar">https://learning.oreilly.com/library/view/~/9781466567498/?ar</a><br/>Format: Electronic Resources<br/>
Network security hacks
ent://SD_ILS/0/SD_ILS:2282983
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596527632/?ar">https://go.oreilly.com/library-access/library/view/-/0596527632/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596527632">https://learning.oreilly.com/library/view/~/0596527632</a>
<a href="https://learning.oreilly.com/library/view/~/0596527632/?ar">https://learning.oreilly.com/library/view/~/0596527632/?ar</a><br/>Format: Electronic Resources<br/>
Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing
ent://SD_ILS/0/SD_ILS:2319847
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format: Electronic Resources<br/>
Python network programming : conquer all your networking challenges with the powerful Python language
ent://SD_ILS/0/SD_ILS:2319083
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Ratan, Abhishek, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788835466/?ar">https://go.oreilly.com/library-access/library/view/-/9781788835466/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788835466/?ar">https://learning.oreilly.com/library/view/~/9781788835466/?ar</a><br/>Format: Electronic Resources<br/>
Industrial cybersecurity : efficiently secure critical infrastructure systems
ent://SD_ILS/0/SD_ILS:2314674
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788395151/?ar">https://learning.oreilly.com/library/view/~/9781788395151/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar">https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788395151">https://learning.oreilly.com/library/view/~/9781788395151</a><br/>Format: Electronic Resources<br/>
Mac Security Bible.
ent://SD_ILS/0/SD_ILS:2287722
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Kissell, Joe.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar">https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198/?ar">https://learning.oreilly.com/library/view/~/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198">https://learning.oreilly.com/library/view/~/9780470474198</a><br/>Format: Electronic Resources<br/>
Integrating ISA Server 2006 with Microsoft Exchange 2007
ent://SD_ILS/0/SD_ILS:2285147
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Strachan, Fergus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492751/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492751/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492751/?ar">https://learning.oreilly.com/library/view/~/9781597492751/?ar</a><br/>Format: Electronic Resources<br/>
Security+
ent://SD_ILS/0/SD_ILS:2281559
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Hausman, Kalani Kirk.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0789729105/?ar">https://go.oreilly.com/library-access/library/view/-/0789729105/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0789729105/?ar">https://learning.oreilly.com/library/view/~/0789729105/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0789729105">https://learning.oreilly.com/library/view/~/0789729105</a><br/>Format: Electronic Resources<br/>
Cryptography in C and C++
ent://SD_ILS/0/SD_ILS:2282126
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Welschenbach, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781590595022">https://learning.oreilly.com/library/view/~/9781590595022</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781590595022/?ar">https://go.oreilly.com/library-access/library/view/-/9781590595022/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781590595022/?ar">https://learning.oreilly.com/library/view/~/9781590595022/?ar</a><br/>Format: Electronic Resources<br/>
Thor's Microsoft security bible : a collection of practical security techniques
ent://SD_ILS/0/SD_ILS:2291971
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Mullen, Timothy M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495738/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495738/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495738/?ar">https://learning.oreilly.com/library/view/~/9781597495738/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495738">https://learning.oreilly.com/library/view/~/9781597495738</a><br/>Format: Electronic Resources<br/>
Scene of the cybercrime.
ent://SD_ILS/0/SD_ILS:2285149
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492768">https://learning.oreilly.com/library/view/~/9781597492768</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492768/?ar">https://learning.oreilly.com/library/view/~/9781597492768/?ar</a><br/>Format: Electronic Resources<br/>
Security for Microsoft Visual Basic .NET
ent://SD_ILS/0/SD_ILS:2281971
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Robinson, Ed, 1967-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735619190/?ar">https://go.oreilly.com/library-access/library/view/-/0735619190/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735619190/?ar">https://learning.oreilly.com/library/view/~/0735619190/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735619190">https://learning.oreilly.com/library/view/~/0735619190</a><br/>Format: Electronic Resources<br/>
Developing secure applications with Visual Basic
ent://SD_ILS/0/SD_ILS:2282680
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Chapman, Davis Howard.<br/><a href="https://learning.oreilly.com/library/view/~/0672318369/?ar">https://learning.oreilly.com/library/view/~/0672318369/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672318369">https://learning.oreilly.com/library/view/~/0672318369</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672318369/?ar">https://go.oreilly.com/library-access/library/view/-/0672318369/?ar</a><br/>Format: Electronic Resources<br/>
Threat modeling : designing for security
ent://SD_ILS/0/SD_ILS:2302626
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format: Electronic Resources<br/>
Web security : a whitehat perspective
ent://SD_ILS/0/SD_ILS:2306712
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Wu, Hanqing, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592612/?ar">https://learning.oreilly.com/library/view/~/9781466592612/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466592612/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592612/?ar</a><br/>Format: Electronic Resources<br/>
Configuring Check Point NGX VPN-1/FireWall-1
ent://SD_ILS/0/SD_ILS:2282000
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Stephens, Robert (Information security consultant)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490313/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490313/?ar">https://learning.oreilly.com/library/view/~/9781597490313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490313">https://learning.oreilly.com/library/view/~/9781597490313</a><br/>Format: Electronic Resources<br/>
Information security governance simplified : from the boardroom to the keyboard
ent://SD_ILS/0/SD_ILS:2293427
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Fitzgerald, Todd.<br/><a href="https://learning.oreilly.com/library/view/~/9781439811658">https://learning.oreilly.com/library/view/~/9781439811658</a>
<a href="https://learning.oreilly.com/library/view/~/9781439811658/?ar">https://learning.oreilly.com/library/view/~/9781439811658/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439811658/?ar">https://go.oreilly.com/library-access/library/view/-/9781439811658/?ar</a><br/>Format: Electronic Resources<br/>
Privileged attack vectors : building effective cyber-defense strategies to protect organizations
ent://SD_ILS/0/SD_ILS:2314870
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format: Electronic Resources<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:2303267
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Stapleton, Jeffrey James.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592155">https://learning.oreilly.com/library/view/~/9781466592155</a>
<a href="https://learning.oreilly.com/library/view/~/9781466592155/?ar">https://learning.oreilly.com/library/view/~/9781466592155/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar</a><br/>Format: Electronic Resources<br/>
Honeypot : a new paradigm to information security
ent://SD_ILS/0/SD_ILS:2292506
2024-09-27T04:55:44Z
2024-09-27T04:55:44Z
by Joshi, R. C.<br/><a href="https://learning.oreilly.com/library/view/~/9781578087082">https://learning.oreilly.com/library/view/~/9781578087082</a>
<a href="https://learning.oreilly.com/library/view/~/9781578087082/?ar">https://learning.oreilly.com/library/view/~/9781578087082/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar">https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar</a><br/>Format: Electronic Resources<br/>