Search Results for COMPUTERS -- Networking -- Security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dCOMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$0026ps$003d300? 2024-09-27T04:55:44Z OFFICIAL ISC2 SSCP CBK REFERENCE ent://SD_ILS/0/SD_ILS:2322402 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;WILLS, MIKE.<br/><a href="https://learning.oreilly.com/library/view/~/9781119601944">https://learning.oreilly.com/library/view/~/9781119601944</a> <a href="https://learning.oreilly.com/library/view/~/9781119601944/?ar">https://learning.oreilly.com/library/view/~/9781119601944/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119601944/?ar">https://go.oreilly.com/library-access/library/view/-/9781119601944/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to define and build an effective cyber threat intelligence capability ent://SD_ILS/0/SD_ILS:2305447 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Dalziel, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027301/?ar">https://learning.oreilly.com/library/view/~/9780128027301/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128027301">https://learning.oreilly.com/library/view/~/9780128027301</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128027301/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027301/?ar</a><br/>Format:&#160;Electronic Resources<br/> Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:2288634 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Vladimirov, Andrew A.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280358">https://learning.oreilly.com/library/view/~/9781849280358</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280358/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280358/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849280358/?ar">https://learning.oreilly.com/library/view/~/9781849280358/?ar</a><br/>Format:&#160;Electronic Resources<br/> Optimizing IEEE 802.11i resource and security essentials : for mobile and stationary devices ent://SD_ILS/0/SD_ILS:2305446 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Naraei, Parisa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128022221/?ar">https://go.oreilly.com/library-access/library/view/-/9780128022221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128022221">https://learning.oreilly.com/library/view/~/9780128022221</a> <a href="https://learning.oreilly.com/library/view/~/9780128022221/?ar">https://learning.oreilly.com/library/view/~/9780128022221/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco Firepower Threat Defense (FTD) : configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP) ent://SD_ILS/0/SD_ILS:2314393 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Rajib, Nazmul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134679471">https://learning.oreilly.com/library/view/~/9780134679471</a> <a href="https://learning.oreilly.com/library/view/~/9780134679471/?ar">https://learning.oreilly.com/library/view/~/9780134679471/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar">https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar</a><br/>Format:&#160;Electronic Resources<br/> Zero trust networks : building secure systems in untrusted networks ent://SD_ILS/0/SD_ILS:2313595 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Gilman, Evan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491962183/?ar">https://learning.oreilly.com/library/view/~/9781491962183/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491962183">https://learning.oreilly.com/library/view/~/9781491962183</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491962183/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962183/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco next-generation security solutions : all-in-one Cisco ASA FirePOWER services, NGIPS, and AMP ent://SD_ILS/0/SD_ILS:2311054 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Santos, Omar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134213071/?ar">https://go.oreilly.com/library-access/library/view/-/9780134213071/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134213071/?ar">https://learning.oreilly.com/library/view/~/9780134213071/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134213071">https://learning.oreilly.com/library/view/~/9780134213071</a><br/>Format:&#160;Electronic Resources<br/> Getting started with FortiGate : simplify and protect your network using the FortiGate network security applicance ent://SD_ILS/0/SD_ILS:2300940 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Fabbri, Rosato.<br/><a href="https://learning.oreilly.com/library/view/~/9781782178200">https://learning.oreilly.com/library/view/~/9781782178200</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782178200/?ar">https://go.oreilly.com/library-access/library/view/-/9781782178200/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782178200/?ar">https://learning.oreilly.com/library/view/~/9781782178200/?ar</a><br/>Format:&#160;Electronic Resources<br/> This is jargon file ent://SD_ILS/0/SD_ILS:2105379 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Raymond, Eric S.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2009207">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2009207</a><br/>Format:&#160;Electronic Resources<br/> SELinux System Administration : ward off traditional security permissions and effectively secure your Linuxs systems with SELinux ent://SD_ILS/0/SD_ILS:2312410 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Vermeulen, Sven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787126954/?ar">https://go.oreilly.com/library-access/library/view/-/9781787126954/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787126954">https://learning.oreilly.com/library/view/~/9781787126954</a> <a href="https://learning.oreilly.com/library/view/~/9781787126954/?ar">https://learning.oreilly.com/library/view/~/9781787126954/?ar</a><br/>Format:&#160;Electronic Resources<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:2301151 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Sanders, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar">https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124172081/?ar">https://learning.oreilly.com/library/view/~/9780124172081/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124172081">https://learning.oreilly.com/library/view/~/9780124172081</a><br/>Format:&#160;Electronic Resources<br/> IT induction and information security awareness : a pocket guide ent://SD_ILS/0/SD_ILS:2292243 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Maddock, Valerie.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281195">https://learning.oreilly.com/library/view/~/9781849281195</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281195/?ar">https://learning.oreilly.com/library/view/~/9781849281195/?ar</a><br/>Format:&#160;Electronic Resources<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:2283639 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Taylor, Laura.<br/><a href="https://www.sciencedirect.com/science/book/9781597491167">https://www.sciencedirect.com/science/book/9781597491167</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491167/?ar">https://learning.oreilly.com/library/view/~/9781597491167/?ar</a><br/>Format:&#160;Electronic Resources<br/> Core software security : security at the source ent://SD_ILS/0/SD_ILS:2301641 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Ransome, James F., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466560963">https://learning.oreilly.com/library/view/~/9781466560963</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar">https://go.oreilly.com/library-access/library/view/-/9781466560963/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466560963/?ar">https://learning.oreilly.com/library/view/~/9781466560963/?ar</a><br/>Format:&#160;Electronic Resources<br/> Logging and log management : the authoritative guide to understanding the concepts surrounding logging and log management ent://SD_ILS/0/SD_ILS:2296851 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Chuvakin, Anton A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496353/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496353/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496353/?ar">https://learning.oreilly.com/library/view/~/9781597496353/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496353">https://learning.oreilly.com/library/view/~/9781597496353</a><br/>Format:&#160;Electronic Resources<br/> The best damn IT security management book period ent://SD_ILS/0/SD_ILS:2284698 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Susan Snedaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492270/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492270/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492270/?ar">https://learning.oreilly.com/library/view/~/9781597492270/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security ent://SD_ILS/0/SD_ILS:2315384 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Oriyano, Sean-Philip, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783554089/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554089/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783554089/?ar">https://learning.oreilly.com/library/view/~/9781783554089/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783554089">https://learning.oreilly.com/library/view/~/9781783554089</a><br/>Format:&#160;Electronic Resources<br/> The myths of security : what the computer security industry doesn't want you to know ent://SD_ILS/0/SD_ILS:2286938 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Viega, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar">https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596803957/?ar">https://learning.oreilly.com/library/view/~/9780596803957/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596803957">https://learning.oreilly.com/library/view/~/9780596803957</a><br/>Format:&#160;Electronic Resources<br/> Data privacy in the information age ent://SD_ILS/0/SD_ILS:265140 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Klosek, Jacqueline, 1972-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194</a><br/>Format:&#160;Electronic Resources<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:339975 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Baskin, Brian.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423</a><br/>Format:&#160;Electronic Resources<br/> Hack the stack using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:339985 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Gregg, Michael (Michael C.)<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832</a><br/>Format:&#160;Electronic Resources<br/> Infosec management fundamentals ent://SD_ILS/0/SD_ILS:2308039 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar">https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128041871/?ar">https://learning.oreilly.com/library/view/~/9780128041871/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128041871">https://learning.oreilly.com/library/view/~/9780128041871</a><br/>Format:&#160;Electronic Resources<br/> Abusing the Internet of things : blackouts, freakouts, and stakeouts ent://SD_ILS/0/SD_ILS:2308052 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Dhanjani, Nitesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491902899">https://learning.oreilly.com/library/view/~/9781491902899</a> <a href="https://learning.oreilly.com/library/view/~/9781491902899/?ar">https://learning.oreilly.com/library/view/~/9781491902899/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491902899/?ar">https://go.oreilly.com/library-access/library/view/-/9781491902899/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to defeat advanced malware : new tools for protection and forensics ent://SD_ILS/0/SD_ILS:2305937 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Dalziel, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027318/?ar">https://learning.oreilly.com/library/view/~/9780128027318/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128027318">https://learning.oreilly.com/library/view/~/9780128027318</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128027318/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027318/?ar</a><br/>Format:&#160;Electronic Resources<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:2282162 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Lathem, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/1597492507">https://learning.oreilly.com/library/view/~/1597492507</a> <a href="https://go.oreilly.com/library-access/library/view/-/1597492507/?ar">https://go.oreilly.com/library-access/library/view/-/1597492507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1597492507/?ar">https://learning.oreilly.com/library/view/~/1597492507/?ar</a><br/>Format:&#160;Electronic Resources<br/> Absolute beginner's guide to personal firewalls ent://SD_ILS/0/SD_ILS:2280912 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Ford, Jerry Lee.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780768683868/?ar">https://go.oreilly.com/library-access/library/view/-/9780768683868/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768683868/?ar">https://learning.oreilly.com/library/view/~/9780768683868/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768683868">https://learning.oreilly.com/library/view/~/9780768683868</a><br/>Format:&#160;Electronic Resources<br/> Troubleshooting OpenVPN : get the solutions you need to troubleshoot any issue you may face to keep your OpenVPN up and running ent://SD_ILS/0/SD_ILS:2313004 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Crist, Eric F., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786461964/?ar">https://go.oreilly.com/library-access/library/view/-/9781786461964/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786461964/?ar">https://learning.oreilly.com/library/view/~/9781786461964/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786461964">https://learning.oreilly.com/library/view/~/9781786461964</a><br/>Format:&#160;Electronic Resources<br/> Cisco security specialist's guide to PIX firewalls ent://SD_ILS/0/SD_ILS:2280786 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Osipav, Vitaly.<br/><a href="https://www.sciencedirect.com/science/book/9781931836630">https://www.sciencedirect.com/science/book/9781931836630</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836630/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836630/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781931836630/?ar">https://learning.oreilly.com/library/view/~/9781931836630/?ar</a><br/>Format:&#160;Electronic Resources<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:339979 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Henmi, Anne.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636</a><br/>Format:&#160;Electronic Resources<br/> Hack the stack : using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:2283562 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Gregg, Michael (Michael C.)<br/><a href="https://www.sciencedirect.com/science/book/9781597491099">https://www.sciencedirect.com/science/book/9781597491099</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491099/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491099/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491099/?ar">https://learning.oreilly.com/library/view/~/9781597491099/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491099">https://learning.oreilly.com/library/view/~/9781597491099</a><br/>Format:&#160;Electronic Resources<br/> Steal this computer book 4.0 : what they won't tell you about the Internet ent://SD_ILS/0/SD_ILS:2283706 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Wang, Wally.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593273422/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273422/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593273422/?ar">https://learning.oreilly.com/library/view/~/9781593273422/?ar</a><br/>Format:&#160;Electronic Resources<br/> Black Hat Go : Go programming for hackers and pentesters ent://SD_ILS/0/SD_ILS:2322469 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Steele, Tom (Security Consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098122645/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122645/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098122645">https://learning.oreilly.com/library/view/~/9781098122645</a> <a href="https://learning.oreilly.com/library/view/~/9781098122645/?ar">https://learning.oreilly.com/library/view/~/9781098122645/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:2310804 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Fowler, Kevvie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034507/?ar">https://learning.oreilly.com/library/view/~/9780128034507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128034507">https://learning.oreilly.com/library/view/~/9780128034507</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128034507/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034507/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat forecasting : leveraging big data for predictive analysis ent://SD_ILS/0/SD_ILS:2310629 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Pirc, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128004784/?ar">https://learning.oreilly.com/library/view/~/9780128004784/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar">https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128004784">https://learning.oreilly.com/library/view/~/9780128004784</a><br/>Format:&#160;Electronic Resources<br/> Intrusion detection in wireless ad-hoc networks ent://SD_ILS/0/SD_ILS:2301284 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Chaki, Nabendu, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466515673/?ar">https://go.oreilly.com/library-access/library/view/-/9781466515673/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466515673">https://learning.oreilly.com/library/view/~/9781466515673</a> <a href="https://learning.oreilly.com/library/view/~/9781466515673/?ar">https://learning.oreilly.com/library/view/~/9781466515673/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security risk management for ISO27001/ISO27002 ent://SD_ILS/0/SD_ILS:2291936 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281492/?ar">https://learning.oreilly.com/library/view/~/9781849281492/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281492">https://learning.oreilly.com/library/view/~/9781849281492</a><br/>Format:&#160;Electronic Resources<br/> Assessing network security ent://SD_ILS/0/SD_ILS:2281759 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Lam, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735620334/?ar">https://go.oreilly.com/library-access/library/view/-/0735620334/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735620334/?ar">https://learning.oreilly.com/library/view/~/0735620334/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735620334">https://learning.oreilly.com/library/view/~/0735620334</a><br/>Format:&#160;Electronic Resources<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:341700 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Taylor, Laura.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012</a><br/>Format:&#160;Electronic Resources<br/> Security log management : identifying patterns in the chaos ent://SD_ILS/0/SD_ILS:2282003 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Babbin, Jacob.<br/><a href="https://learning.oreilly.com/library/view/~/1597490423/?ar">https://learning.oreilly.com/library/view/~/1597490423/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1597490423/?ar">https://go.oreilly.com/library-access/library/view/-/1597490423/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1597490423">https://learning.oreilly.com/library/view/~/1597490423</a> <a href="https://www.sciencedirect.com/science/book/9781597490429">https://www.sciencedirect.com/science/book/9781597490429</a><br/>Format:&#160;Electronic Resources<br/> OS X exploits and defense ent://SD_ILS/0/SD_ILS:2285157 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Baccas, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492546/?ar">https://learning.oreilly.com/library/view/~/9781597492546/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy for Microsoft Office 2010 users. ent://SD_ILS/0/SD_ILS:2294210 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Tulloch, Mitch.<br/><a href="https://learning.oreilly.com/library/view/~/9780735668829">https://learning.oreilly.com/library/view/~/9780735668829</a> <a href="https://learning.oreilly.com/library/view/~/9780735668829/?ar">https://learning.oreilly.com/library/view/~/9780735668829/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar">https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security through data analysis : from data to action ent://SD_ILS/0/SD_ILS:2314146 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Collins, Michael (Michael Patrick), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491962831/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962831/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491962831/?ar">https://learning.oreilly.com/library/view/~/9781491962831/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491962831">https://learning.oreilly.com/library/view/~/9781491962831</a><br/>Format:&#160;Electronic Resources<br/> Official (ISC)2 guide to the CSSLP ent://SD_ILS/0/SD_ILS:2292921 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Paul, Mano.<br/><a href="https://learning.oreilly.com/library/view/~/9781439826058/?ar">https://learning.oreilly.com/library/view/~/9781439826058/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439826058/?ar">https://go.oreilly.com/library-access/library/view/-/9781439826058/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:2283057 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://learning.oreilly.com/library/view/~/9780471947837">https://learning.oreilly.com/library/view/~/9780471947837</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar">https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780471947837/?ar">https://learning.oreilly.com/library/view/~/9780471947837/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux - Assuring Security by Penetration Testing : Master the Art of Penetration Testing with Kali Linux ent://SD_ILS/0/SD_ILS:2303067 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Allen, Lee (Information security specialist)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519489/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519489/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519489/?ar">https://learning.oreilly.com/library/view/~/9781849519489/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519489">https://learning.oreilly.com/library/view/~/9781849519489</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL server : protecting your database from attackers ent://SD_ILS/0/SD_ILS:2305165 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Cherry, Denny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128012758/?ar">https://learning.oreilly.com/library/view/~/9780128012758/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128012758/?ar">https://go.oreilly.com/library-access/library/view/-/9780128012758/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:341554 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Rittinghouse, John W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316</a><br/>Format:&#160;Electronic Resources<br/> Applied incident response ent://SD_ILS/0/SD_ILS:2322826 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781119560265">https://learning.oreilly.com/library/view/~/9781119560265</a> <a href="https://learning.oreilly.com/library/view/~/9781119560265/?ar">https://learning.oreilly.com/library/view/~/9781119560265/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560265/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud Security and Governance : Who's on your cloud?. ent://SD_ILS/0/SD_ILS:2290671 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Blount, Sumner.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280983">https://learning.oreilly.com/library/view/~/9781849280983</a> <a href="https://learning.oreilly.com/library/view/~/9781849280983/?ar">https://learning.oreilly.com/library/view/~/9781849280983/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security : know it all ent://SD_ILS/0/SD_ILS:2285962 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Joshi, James B. D.<br/><a href="https://learning.oreilly.com/library/view/~/9780080560151">https://learning.oreilly.com/library/view/~/9780080560151</a> <a href="https://learning.oreilly.com/library/view/~/9780080560151/?ar">https://learning.oreilly.com/library/view/~/9780080560151/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080560151/?ar">https://go.oreilly.com/library-access/library/view/-/9780080560151/?ar</a><br/>Format:&#160;Electronic Resources<br/> Applied network security : master the art of detecting and averting advanced network security attacks and techniques ent://SD_ILS/0/SD_ILS:2313288 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Salmon, Arthur, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786466273/?ar">https://learning.oreilly.com/library/view/~/9781786466273/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar">https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786466273">https://learning.oreilly.com/library/view/~/9781786466273</a><br/>Format:&#160;Electronic Resources<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:2283974 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Winkler, Ira.<br/><a href="https://learning.oreilly.com/library/view/~/9780080554747">https://learning.oreilly.com/library/view/~/9780080554747</a> <a href="https://learning.oreilly.com/library/view/~/9780080554747/?ar">https://learning.oreilly.com/library/view/~/9780080554747/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080554747/?ar">https://go.oreilly.com/library-access/library/view/-/9780080554747/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format:&#160;Electronic Resources<br/> Zabbix : enterprise network montioring [sic] made easy : learn how to gather detailed statistics and data with this one-stop, comprehensive course along with hands-on recipes to get your infrasturcture up and running with Zabbix : a course in three modules. ent://SD_ILS/0/SD_ILS:2312746 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Olups, Rihards, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787129047">https://learning.oreilly.com/library/view/~/9781787129047</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787129047/?ar">https://go.oreilly.com/library-access/library/view/-/9781787129047/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787129047/?ar">https://learning.oreilly.com/library/view/~/9781787129047/?ar</a><br/>Format:&#160;Electronic Resources<br/> Coding for penetration testers : building better tools ent://SD_ILS/0/SD_ILS:2295451 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Andress, Jason.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497305/?ar">https://learning.oreilly.com/library/view/~/9781597497305/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597497305/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497305/?ar</a><br/>Format:&#160;Electronic Resources<br/> Syngress IT security project management handbook ent://SD_ILS/0/SD_ILS:339682 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Snedaker, Susan.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163063">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163063</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity - Attack and Defense Strategies - Second Edition ent://SD_ILS/0/SD_ILS:2323102 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar">https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838827793/?ar">https://learning.oreilly.com/library/view/~/9781838827793/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838827793">https://learning.oreilly.com/library/view/~/9781838827793</a><br/>Format:&#160;Electronic Resources<br/> Virtualization Security : Protecting Virtualized Environments ent://SD_ILS/0/SD_ILS:2296840 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Shackleford, Dave.<br/><a href="https://learning.oreilly.com/library/view/~/9781118331514/?ar">https://learning.oreilly.com/library/view/~/9781118331514/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118331514/?ar">https://go.oreilly.com/library-access/library/view/-/9781118331514/?ar</a><br/>Format:&#160;Electronic Resources<br/> No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing ent://SD_ILS/0/SD_ILS:2285143 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Long, Johnny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492157/?ar">https://learning.oreilly.com/library/view/~/9781597492157/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure edge computing : applications, techniques and challenges. ent://SD_ILS/0/SD_ILS:2329288 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Ahmed, Mohiuddin (Computer scientist), editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000427325/?ar">https://learning.oreilly.com/library/view/~/9781000427325/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781000427325">https://learning.oreilly.com/library/view/~/9781000427325</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar">https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar</a><br/>Format:&#160;Electronic Resources<br/> SolarWinds server &amp; application monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server &amp; Application Monitor with minimum hassle ent://SD_ILS/0/SD_ILS:2300919 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Brant, Justin M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783551019/?ar">https://go.oreilly.com/library-access/library/view/-/9781783551019/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783551019/?ar">https://learning.oreilly.com/library/view/~/9781783551019/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing : Assessing the Risks. ent://SD_ILS/0/SD_ILS:2295291 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Carstensen, Jared.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283618">https://learning.oreilly.com/library/view/~/9781849283618</a> <a href="https://learning.oreilly.com/library/view/~/9781849283618/?ar">https://learning.oreilly.com/library/view/~/9781849283618/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283618/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283618/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT Governance to Drive High Performance : Lessons from Accenture. ent://SD_ILS/0/SD_ILS:2288636 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Kress, Robert E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281188/?ar">https://learning.oreilly.com/library/view/~/9781849281188/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281188">https://learning.oreilly.com/library/view/~/9781849281188</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing : a hands-on introduction to hacking ent://SD_ILS/0/SD_ILS:2304411 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Weidman, Georgia, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457185342/?ar">https://learning.oreilly.com/library/view/~/9781457185342/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457185342/?ar">https://go.oreilly.com/library-access/library/view/-/9781457185342/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457185342">https://learning.oreilly.com/library/view/~/9781457185342</a><br/>Format:&#160;Electronic Resources<br/> The web application hacker's handbook : discovering and exploiting security flaws ent://SD_ILS/0/SD_ILS:2288534 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Stuttard, Dafydd, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470170779/?ar">https://learning.oreilly.com/library/view/~/9780470170779/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar">https://go.oreilly.com/library-access/library/view/-/9780470170779/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470170779">https://learning.oreilly.com/library/view/~/9780470170779</a><br/>Format:&#160;Electronic Resources<br/> Check Point NGX R65 security administration ent://SD_ILS/0/SD_ILS:2284519 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Bonnell, Ralph.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492454/?ar">https://learning.oreilly.com/library/view/~/9781597492454/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492454/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492454/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492454">https://learning.oreilly.com/library/view/~/9781597492454</a><br/>Format:&#160;Electronic Resources<br/> Perfect passwords : selection, protection, authentication ent://SD_ILS/0/SD_ILS:2281990 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Burnett, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490412">https://learning.oreilly.com/library/view/~/9781597490412</a> <a href="https://learning.oreilly.com/library/view/~/9781597490412/?ar">https://learning.oreilly.com/library/view/~/9781597490412/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490412/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490412/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781597490412">https://www.sciencedirect.com/science/book/9781597490412</a><br/>Format:&#160;Electronic Resources<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:2289816 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Merkow, Mark S.<br/><a href="https://learning.oreilly.com/library/view/~/9781439826973/?ar">https://learning.oreilly.com/library/view/~/9781439826973/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar">https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web application vulnerabilities : detect, exploit, prevent ent://SD_ILS/0/SD_ILS:2285642 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492096/?ar">https://learning.oreilly.com/library/view/~/9781597492096/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492096/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492096/?ar</a><br/>Format:&#160;Electronic Resources<br/> Java security ent://SD_ILS/0/SD_ILS:2286384 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Oaks, Scott.<br/><a href="https://learning.oreilly.com/library/view/~/0596001576/?ar">https://learning.oreilly.com/library/view/~/0596001576/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596001576">https://learning.oreilly.com/library/view/~/0596001576</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596001576/?ar">https://go.oreilly.com/library-access/library/view/-/0596001576/?ar</a><br/>Format:&#160;Electronic Resources<br/> The mobile application hacker's handbook ent://SD_ILS/0/SD_ILS:2306981 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Chell, Dominic, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118958513">https://learning.oreilly.com/library/view/~/9781118958513</a> <a href="https://learning.oreilly.com/library/view/~/9781118958513/?ar">https://learning.oreilly.com/library/view/~/9781118958513/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118958513/?ar">https://go.oreilly.com/library-access/library/view/-/9781118958513/?ar</a><br/>Format:&#160;Electronic Resources<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:2284222 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Harris, Shon.<br/><a href="https://learning.oreilly.com/library/view/~/9780071495684/?ar">https://learning.oreilly.com/library/view/~/9780071495684/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar">https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar</a><br/>Format:&#160;Electronic Resources<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:340202 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Maynor, David.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833</a><br/>Format:&#160;Electronic Resources<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:2297537 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Radvanovsky, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502260/?ar">https://learning.oreilly.com/library/view/~/9781466502260/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502260/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466502260">https://learning.oreilly.com/library/view/~/9781466502260</a><br/>Format:&#160;Electronic Resources<br/> The network security test lab : a step-by-step guide ent://SD_ILS/0/SD_ILS:2308043 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118987056/?ar">https://learning.oreilly.com/library/view/~/9781118987056/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar">https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118987056">https://learning.oreilly.com/library/view/~/9781118987056</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Mac security : MAC OS X Snow Leopard ent://SD_ILS/0/SD_ILS:2290421 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Edge, Charles S., Jr.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar">https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430227304/?ar">https://learning.oreilly.com/library/view/~/9781430227304/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430227304">https://learning.oreilly.com/library/view/~/9781430227304</a><br/>Format:&#160;Electronic Resources<br/> Internet forensics ent://SD_ILS/0/SD_ILS:2282055 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Jones, Robert, 1957 July 15-<br/><a href="https://learning.oreilly.com/library/view/~/059610006X">https://learning.oreilly.com/library/view/~/059610006X</a> <a href="https://learning.oreilly.com/library/view/~/059610006X/?ar">https://learning.oreilly.com/library/view/~/059610006X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/059610006X/?ar">https://go.oreilly.com/library-access/library/view/-/059610006X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building an information security awareness program ent://SD_ILS/0/SD_ILS:2281782 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Desman, Mark B.<br/><a href="https://learning.oreilly.com/library/view/~/9781420000054">https://learning.oreilly.com/library/view/~/9781420000054</a> <a href="https://learning.oreilly.com/library/view/~/9781420000054/?ar">https://learning.oreilly.com/library/view/~/9781420000054/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar">https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security policy, processes, and practices ent://SD_ILS/0/SD_ILS:293000 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Straub, Detmar W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513</a><br/>Format:&#160;Electronic Resources<br/> Mobile Security : a Pocket Guide. ent://SD_ILS/0/SD_ILS:2288625 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Furnell, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281225/?ar">https://learning.oreilly.com/library/view/~/9781849281225/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281225/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281225/?ar</a><br/>Format:&#160;Electronic Resources<br/> The web application hacker's handbook : finding and exploiting security flaws ent://SD_ILS/0/SD_ILS:2292844 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Stuttard, Dafydd, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9781118026472/?ar">https://learning.oreilly.com/library/view/~/9781118026472/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118026472/?ar">https://go.oreilly.com/library-access/library/view/-/9781118026472/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118026472">https://learning.oreilly.com/library/view/~/9781118026472</a><br/>Format:&#160;Electronic Resources<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:2287800 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Baskin, Brian.<br/><a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490641/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490641/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490641/?ar">https://learning.oreilly.com/library/view/~/9781597490641/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490641">https://learning.oreilly.com/library/view/~/9781597490641</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:2292368 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Faircloth, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496278/?ar">https://learning.oreilly.com/library/view/~/9781597496278/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496278/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496278/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity : Executive Order 13636 and the critical infrastructure framework ent://SD_ILS/0/SD_ILS:635024 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;D'Ambrosio, Anastacia, editor.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xww&site=ehost-live&AN=754881">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xww&site=ehost-live&AN=754881</a><br/>Format:&#160;Electronic Resources<br/> Information security for management ent://SD_ILS/0/SD_ILS:309255 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Iyengar, Venugopal.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux wireless penetration testing : master wireless testing techniques to survey and attack wireless networks with Kali Linux ent://SD_ILS/0/SD_ILS:2307036 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Ramachandran, Vivek, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783280414/?ar">https://go.oreilly.com/library-access/library/view/-/9781783280414/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783280414/?ar">https://learning.oreilly.com/library/view/~/9781783280414/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer incident response and forensics team management : conducting a successful incident response ent://SD_ILS/0/SD_ILS:2300670 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Johnson, Leighton, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499965/?ar">https://learning.oreilly.com/library/view/~/9781597499965/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499965">https://learning.oreilly.com/library/view/~/9781597499965</a><br/>Format:&#160;Electronic Resources<br/> Security risks in social media technologies : safe practices in public service applications ent://SD_ILS/0/SD_ILS:2301076 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Oxley, Alan.<br/><a href="https://learning.oreilly.com/library/view/~/9781843347149">https://learning.oreilly.com/library/view/~/9781843347149</a> <a href="https://learning.oreilly.com/library/view/~/9781843347149/?ar">https://learning.oreilly.com/library/view/~/9781843347149/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781843347149/?ar">https://go.oreilly.com/library-access/library/view/-/9781843347149/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ninja hacking : unconventional penetration testing tactics and techniques ent://SD_ILS/0/SD_ILS:2290304 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Wilhelm, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495899">https://learning.oreilly.com/library/view/~/9781597495899</a> <a href="https://learning.oreilly.com/library/view/~/9781597495899/?ar">https://learning.oreilly.com/library/view/~/9781597495899/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Mac hacker's handbook ent://SD_ILS/0/SD_ILS:2286341 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Miller, Charles, 1951-<br/><a href="https://learning.oreilly.com/library/view/~/9781118080337/?ar">https://learning.oreilly.com/library/view/~/9781118080337/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118080337/?ar">https://go.oreilly.com/library-access/library/view/-/9781118080337/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118080337">https://learning.oreilly.com/library/view/~/9781118080337</a><br/>Format:&#160;Electronic Resources<br/> The Oracle hacker's handbook : hacking and defending Oracle ent://SD_ILS/0/SD_ILS:2283176 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Litchfield, David, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780470080221/?ar">https://learning.oreilly.com/library/view/~/9780470080221/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470080221/?ar">https://go.oreilly.com/library-access/library/view/-/9780470080221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470080221">https://learning.oreilly.com/library/view/~/9780470080221</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux ent://SD_ILS/0/SD_ILS:2310036 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Sak, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785285561">https://learning.oreilly.com/library/view/~/9781785285561</a> <a href="https://learning.oreilly.com/library/view/~/9781785285561/?ar">https://learning.oreilly.com/library/view/~/9781785285561/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar">https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar</a><br/>Format:&#160;Electronic Resources<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:2290821 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Harper, Allen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071742559/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742559/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071742559/?ar">https://learning.oreilly.com/library/view/~/9780071742559/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Azure security : keeping your Microsoft Azure workloads safe ent://SD_ILS/0/SD_ILS:2332927 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Toroman, Mustafa, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803238555">https://learning.oreilly.com/library/view/~/9781803238555</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238555/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803238555/?ar">https://learning.oreilly.com/library/view/~/9781803238555/?ar</a><br/>Format:&#160;Electronic Resources<br/> Real-world bug hunting : a field guide to web hacking ent://SD_ILS/0/SD_ILS:2318428 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Yaworski, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098122508">https://learning.oreilly.com/library/view/~/9781098122508</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098122508/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122508/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098122508/?ar">https://learning.oreilly.com/library/view/~/9781098122508/?ar</a><br/>Format:&#160;Electronic Resources<br/> UTM security with Fortinet : Mastering FortiOS ent://SD_ILS/0/SD_ILS:2296617 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Tam, Kenneth.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497473/?ar">https://learning.oreilly.com/library/view/~/9781597497473/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497473">https://learning.oreilly.com/library/view/~/9781597497473</a><br/>Format:&#160;Electronic Resources<br/> The chief information security officer : insights, tools and survival skills ent://SD_ILS/0/SD_ILS:2291384 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Kouns, Barry.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281966">https://learning.oreilly.com/library/view/~/9781849281966</a> <a href="https://learning.oreilly.com/library/view/~/9781849281966/?ar">https://learning.oreilly.com/library/view/~/9781849281966/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security power tools ent://SD_ILS/0/SD_ILS:2283951 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Burns, Bryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780596009632">https://learning.oreilly.com/library/view/~/9780596009632</a> <a href="https://learning.oreilly.com/library/view/~/9780596009632/?ar">https://learning.oreilly.com/library/view/~/9780596009632/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar">https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning Kali Linux : security testing, penetration testing, and ethical hacking ent://SD_ILS/0/SD_ILS:2316978 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492028680/?ar">https://learning.oreilly.com/library/view/~/9781492028680/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492028680">https://learning.oreilly.com/library/view/~/9781492028680</a><br/>Format:&#160;Electronic Resources<br/> Security patterns in practice : designing secure architectures using software patterns ent://SD_ILS/0/SD_ILS:2300767 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Fernandez, Eduardo B., 1936-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar">https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119970484/?ar">https://learning.oreilly.com/library/view/~/9781119970484/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119970484">https://learning.oreilly.com/library/view/~/9781119970484</a><br/>Format:&#160;Electronic Resources<br/> Cloud security : a comprehensive guide to secure cloud computing ent://SD_ILS/0/SD_ILS:2289708 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Krutz, Ronald L., 1938-<br/><a href="https://learning.oreilly.com/library/view/~/9780470589878/?ar">https://learning.oreilly.com/library/view/~/9780470589878/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar">https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470589878">https://learning.oreilly.com/library/view/~/9780470589878</a><br/>Format:&#160;Electronic Resources<br/> XSS attacks : cross-site scripting exploits and defense ent://SD_ILS/0/SD_ILS:2283990 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Grossman, Jeremiah.<br/><a href="https://learning.oreilly.com/library/view/~/9780080553405/?ar">https://learning.oreilly.com/library/view/~/9780080553405/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080553405/?ar">https://go.oreilly.com/library-access/library/view/-/9780080553405/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781597491549">https://www.sciencedirect.com/science/book/9781597491549</a><br/>Format:&#160;Electronic Resources<br/> Programming .NET security ent://SD_ILS/0/SD_ILS:2281268 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Freeman, Adam.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596004427/?ar">https://go.oreilly.com/library-access/library/view/-/0596004427/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596004427/?ar">https://learning.oreilly.com/library/view/~/0596004427/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596004427">https://learning.oreilly.com/library/view/~/0596004427</a><br/>Format:&#160;Electronic Resources<br/> Mastering network security ent://SD_ILS/0/SD_ILS:2287799 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Brenton, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar">https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780782141429/?ar">https://learning.oreilly.com/library/view/~/9780782141429/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780782141429">https://learning.oreilly.com/library/view/~/9780782141429</a><br/>Format:&#160;Electronic Resources<br/> Nessus, Snort, &amp; Ethereal power tools : customizing open source security applications ent://SD_ILS/0/SD_ILS:2281994 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Archibald, Neil.<br/><a href="https://www.sciencedirect.com/science/book/9781597490207">https://www.sciencedirect.com/science/book/9781597490207</a> <a href="https://learning.oreilly.com/library/view/~/9781597490207">https://learning.oreilly.com/library/view/~/9781597490207</a> <a href="https://learning.oreilly.com/library/view/~/9781597490207/?ar">https://learning.oreilly.com/library/view/~/9781597490207/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering modern web penetration testing : master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does! ent://SD_ILS/0/SD_ILS:2311896 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Prasad, Prakhar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar">https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785284588">https://learning.oreilly.com/library/view/~/9781785284588</a> <a href="https://learning.oreilly.com/library/view/~/9781785284588/?ar">https://learning.oreilly.com/library/view/~/9781785284588/?ar</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:2288721 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Anderson, Brian (Brian James)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495547/?ar">https://learning.oreilly.com/library/view/~/9781597495547/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495547">https://learning.oreilly.com/library/view/~/9781597495547</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:2280760 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Ahmad, David R. Mirza.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994701">https://learning.oreilly.com/library/view/~/9781928994701</a> <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781928994701/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994701/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781928994701/?ar">https://learning.oreilly.com/library/view/~/9781928994701/?ar</a><br/>Format:&#160;Electronic Resources<br/> Everyday Cryptography Fundamental Principles and Applications ent://SD_ILS/0/SD_ILS:528109 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Martin, Keith M.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</a><br/>Format:&#160;Electronic Resources<br/> Essential cybersecurity science : build, test, and evaluate secure systems ent://SD_ILS/0/SD_ILS:2309193 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format:&#160;Electronic Resources<br/> Black hat Python : Python programming for hackers and pentesters ent://SD_ILS/0/SD_ILS:2305659 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Seitz, Justin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar">https://go.oreilly.com/library-access/library/view/-/9781457189807/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457189807/?ar">https://learning.oreilly.com/library/view/~/9781457189807/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457189807">https://learning.oreilly.com/library/view/~/9781457189807</a><br/>Format:&#160;Electronic Resources<br/> Network defense and countermeasures : principles and practices ent://SD_ILS/0/SD_ILS:2301435 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Easttom, Chuck, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780133384390">https://learning.oreilly.com/library/view/~/9780133384390</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133384390/?ar">https://go.oreilly.com/library-access/library/view/-/9780133384390/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133384390/?ar">https://learning.oreilly.com/library/view/~/9780133384390/?ar</a><br/>Format:&#160;Electronic Resources<br/> The security development lifecycle : SDL, a process for developing demonstrably more secure software ent://SD_ILS/0/SD_ILS:2282462 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/0735622140">https://learning.oreilly.com/library/view/~/0735622140</a> <a href="https://learning.oreilly.com/library/view/~/0735622140/?ar">https://learning.oreilly.com/library/view/~/0735622140/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0735622140/?ar">https://go.oreilly.com/library-access/library/view/-/0735622140/?ar</a><br/>Format:&#160;Electronic Resources<br/> Gray hat Python : Python programming for hackers and reverse engineers ent://SD_ILS/0/SD_ILS:2287862 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Seitz, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/9781593271923">https://learning.oreilly.com/library/view/~/9781593271923</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593271923/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271923/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593271923/?ar">https://learning.oreilly.com/library/view/~/9781593271923/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to survive a data breach : a pocket guide ent://SD_ILS/0/SD_ILS:2290079 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Mitchell, Stewart.<br/><a href="https://learning.oreilly.com/library/view/~/9781905356966">https://learning.oreilly.com/library/view/~/9781905356966</a> <a href="https://learning.oreilly.com/library/view/~/9781905356966/?ar">https://learning.oreilly.com/library/view/~/9781905356966/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Windows server 2008 : prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:2285141 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z <a href="https://learning.oreilly.com/library/view/~/9781597492805">https://learning.oreilly.com/library/view/~/9781597492805</a> <a href="https://learning.oreilly.com/library/view/~/9781597492805/?ar">https://learning.oreilly.com/library/view/~/9781597492805/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar</a><br/>Format:&#160;Electronic Resources<br/> Metasploit toolkit for penetration testing, exploit development, and vulnerability research ent://SD_ILS/0/SD_ILS:2284167 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Maynor, David.<br/><a href="https://www.sciencedirect.com/science/book/9781597490740">https://www.sciencedirect.com/science/book/9781597490740</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490740/?ar">https://learning.oreilly.com/library/view/~/9781597490740/?ar</a><br/>Format:&#160;Electronic Resources<br/> Handbook of information security. Volume 3, Threats, vulnerabilities, prevention, detection, and management ent://SD_ILS/0/SD_ILS:2285126 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Bidgoli, Hossein.<br/><a href="https://learning.oreilly.com/library/view/~/9780471648321">https://learning.oreilly.com/library/view/~/9780471648321</a> <a href="https://learning.oreilly.com/library/view/~/9780471648321/?ar">https://learning.oreilly.com/library/view/~/9780471648321/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780471648321/?ar">https://go.oreilly.com/library-access/library/view/-/9780471648321/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security+ fast pass ent://SD_ILS/0/SD_ILS:2281447 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Stewart, James Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9780782143591">https://learning.oreilly.com/library/view/~/9780782143591</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780782143591/?ar">https://go.oreilly.com/library-access/library/view/-/9780782143591/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780782143591/?ar">https://learning.oreilly.com/library/view/~/9780782143591/?ar</a><br/>Format:&#160;Electronic Resources<br/> Programming Windows Identity Foundation ent://SD_ILS/0/SD_ILS:2290015 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Bertocci, Vittorio.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735652040/?ar">https://go.oreilly.com/library-access/library/view/-/9780735652040/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735652040/?ar">https://learning.oreilly.com/library/view/~/9780735652040/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security management principles ent://SD_ILS/0/SD_ILS:2299451 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Alexander, David (Information security practitioner)<br/><a href="https://learning.oreilly.com/library/view/~/9781780171753/?ar">https://learning.oreilly.com/library/view/~/9781780171753/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar">https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780171753">https://learning.oreilly.com/library/view/~/9781780171753</a><br/>Format:&#160;Electronic Resources<br/> A bug hunter's diary : a guided tour through the wilds of software security ent://SD_ILS/0/SD_ILS:2293946 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593273859/?ar">https://learning.oreilly.com/library/view/~/9781593273859/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593273859">https://learning.oreilly.com/library/view/~/9781593273859</a><br/>Format:&#160;Electronic Resources<br/> BackTrack 4 : assuring security by penetration testing ent://SD_ILS/0/SD_ILS:2293871 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Ali, Shakeel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar">https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849513944/?ar">https://learning.oreilly.com/library/view/~/9781849513944/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849513944">https://learning.oreilly.com/library/view/~/9781849513944</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics for dummies ent://SD_ILS/0/SD_ILS:2285672 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Volonino, Linda.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470371916/?ar">https://learning.oreilly.com/library/view/~/9780470371916/?ar</a><br/>Format:&#160;Electronic Resources<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:2287814 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Henmi, Anne.<br/><a href="https://learning.oreilly.com/library/view/~/1597490881/?ar">https://learning.oreilly.com/library/view/~/1597490881/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1597490881/?ar">https://go.oreilly.com/library-access/library/view/-/1597490881/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1597490881">https://learning.oreilly.com/library/view/~/1597490881</a> <a href="https://www.sciencedirect.com/science/book/9781597490887">https://www.sciencedirect.com/science/book/9781597490887</a><br/>Format:&#160;Electronic Resources<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:2290966 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Davies, Joshua A. (Joshua Aaron)<br/><a href="https://learning.oreilly.com/library/view/~/9780470920411/?ar">https://learning.oreilly.com/library/view/~/9780470920411/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar">https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470920411">https://learning.oreilly.com/library/view/~/9780470920411</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:2284630 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Dubrawsky, Ido.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492317/?ar">https://learning.oreilly.com/library/view/~/9781597492317/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492317">https://learning.oreilly.com/library/view/~/9781597492317</a><br/>Format:&#160;Electronic Resources<br/> Silence on the wire : a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:2287377 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Zalewski, Michal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1593270461/?ar">https://go.oreilly.com/library-access/library/view/-/1593270461/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1593270461/?ar">https://learning.oreilly.com/library/view/~/1593270461/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1593270461">https://learning.oreilly.com/library/view/~/1593270461</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2309318 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar">https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119154686/?ar">https://learning.oreilly.com/library/view/~/9781119154686/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical anonymity : hiding in plain sight online ent://SD_ILS/0/SD_ILS:2299515 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Loshin, Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar">https://go.oreilly.com/library-access/library/view/-/9780124104044/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124104044/?ar">https://learning.oreilly.com/library/view/~/9780124104044/?ar</a><br/>Format:&#160;Electronic Resources<br/> Social engineering : the art of human hacking ent://SD_ILS/0/SD_ILS:2291334 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Hadnagy, Christopher.<br/><a href="https://learning.oreilly.com/library/view/~/9780470639535/?ar">https://learning.oreilly.com/library/view/~/9780470639535/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470639535/?ar">https://go.oreilly.com/library-access/library/view/-/9780470639535/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Threat Management Gateway 2010 ent://SD_ILS/0/SD_ILS:2290730 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656741/?ar">https://learning.oreilly.com/library/view/~/9780735656741/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Unified Access Gateway 2010 ent://SD_ILS/0/SD_ILS:2290710 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Diogenes, Yuri.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735656758/?ar">https://learning.oreilly.com/library/view/~/9780735656758/?ar</a><br/>Format:&#160;Electronic Resources<br/> Professional penetration testing : creating and operating a formal hacking lab ent://SD_ILS/0/SD_ILS:2287538 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Wilhelm, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494250/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494250/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494250/?ar">https://learning.oreilly.com/library/view/~/9781597494250/?ar</a><br/>Format:&#160;Electronic Resources<br/> Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW ent://SD_ILS/0/SD_ILS:2305163 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;El-Bawab, Abd El-Monem A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849517720">https://learning.oreilly.com/library/view/~/9781849517720</a> <a href="https://learning.oreilly.com/library/view/~/9781849517720/?ar">https://learning.oreilly.com/library/view/~/9781849517720/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849517720/?ar">https://go.oreilly.com/library-access/library/view/-/9781849517720/?ar</a><br/>Format:&#160;Electronic Resources<br/> ModSecurity 2.5 : securing your Apache installation and web applications : prevent web application hacking with this easy-to-use guide ent://SD_ILS/0/SD_ILS:2288845 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Mischel, Magnus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781847194749/?ar">https://go.oreilly.com/library-access/library/view/-/9781847194749/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781847194749">https://learning.oreilly.com/library/view/~/9781847194749</a> <a href="https://learning.oreilly.com/library/view/~/9781847194749/?ar">https://learning.oreilly.com/library/view/~/9781847194749/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2298336 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar">https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118380956/?ar">https://learning.oreilly.com/library/view/~/9781118380956/?ar</a><br/>Format:&#160;Electronic Resources<br/> CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits ent://SD_ILS/0/SD_ILS:2293366 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Tiller, James S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439880289/?ar">https://go.oreilly.com/library-access/library/view/-/9781439880289/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439880289/?ar">https://learning.oreilly.com/library/view/~/9781439880289/?ar</a><br/>Format:&#160;Electronic Resources<br/> E-mail Security : a Pocket Guide. ent://SD_ILS/0/SD_ILS:2290676 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Furnell, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280976">https://learning.oreilly.com/library/view/~/9781849280976</a> <a href="https://learning.oreilly.com/library/view/~/9781849280976/?ar">https://learning.oreilly.com/library/view/~/9781849280976/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security warrior ent://SD_ILS/0/SD_ILS:2283903 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Peikari, Cyrus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596005458/?ar">https://go.oreilly.com/library-access/library/view/-/0596005458/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596005458/?ar">https://learning.oreilly.com/library/view/~/0596005458/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596005458">https://learning.oreilly.com/library/view/~/0596005458</a><br/>Format:&#160;Electronic Resources<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:2310991 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking with Kali : practical penetration testing techniques ent://SD_ILS/0/SD_ILS:2301946 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Broad, James.<br/><a href="https://learning.oreilly.com/library/view/~/9780124077492">https://learning.oreilly.com/library/view/~/9780124077492</a> <a href="https://learning.oreilly.com/library/view/~/9780124077492/?ar">https://learning.oreilly.com/library/view/~/9780124077492/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar">https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar</a><br/>Format:&#160;Electronic Resources<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:2303092 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Middleton, Bruce, 1953- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482206470">https://learning.oreilly.com/library/view/~/9781482206470</a> <a href="https://learning.oreilly.com/library/view/~/9781482206470/?ar">https://learning.oreilly.com/library/view/~/9781482206470/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar">https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar</a><br/>Format:&#160;Electronic Resources<br/> Build your own security lab : a field guide for network testing ent://SD_ILS/0/SD_ILS:2289142 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Gregg, Michael (Michael C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470179864/?ar">https://go.oreilly.com/library-access/library/view/-/9780470179864/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470179864/?ar">https://learning.oreilly.com/library/view/~/9780470179864/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470179864">https://learning.oreilly.com/library/view/~/9780470179864</a><br/>Format:&#160;Electronic Resources<br/> Dictionary of information security ent://SD_ILS/0/SD_ILS:2282318 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Slade, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491150">https://learning.oreilly.com/library/view/~/9781597491150</a> <a href="https://learning.oreilly.com/library/view/~/9781597491150/?ar">https://learning.oreilly.com/library/view/~/9781597491150/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491150/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491150/?ar</a><br/>Format:&#160;Electronic Resources<br/> Essential PHP security ent://SD_ILS/0/SD_ILS:2282254 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Shiflett, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/059600656X/?ar">https://learning.oreilly.com/library/view/~/059600656X/?ar</a> <a href="https://learning.oreilly.com/library/view/~/059600656X">https://learning.oreilly.com/library/view/~/059600656X</a> <a href="https://go.oreilly.com/library-access/library/view/-/059600656X/?ar">https://go.oreilly.com/library-access/library/view/-/059600656X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Handbook of information security . Volume 1, Key concepts, infrastructure, standards, and protocols ent://SD_ILS/0/SD_ILS:2289169 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Bidgoli, Hossein.<br/><a href="https://learning.oreilly.com/library/view/~/9780471648307">https://learning.oreilly.com/library/view/~/9780471648307</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780471648307/?ar">https://go.oreilly.com/library-access/library/view/-/9780471648307/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780471648307/?ar">https://learning.oreilly.com/library/view/~/9780471648307/?ar</a><br/>Format:&#160;Electronic Resources<br/> The myths of security : what the computer security industry doesn't want you to know ent://SD_ILS/0/SD_ILS:2106561 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Viega, John.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics ent://SD_ILS/0/SD_ILS:2315706 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing a network vulnerability assessment ent://SD_ILS/0/SD_ILS:2284729 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Peltier, Thomas R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203503041/?ar">https://go.oreilly.com/library-access/library/view/-/9780203503041/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780203503041/?ar">https://learning.oreilly.com/library/view/~/9780203503041/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network and system security ent://SD_ILS/0/SD_ILS:2288837 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495356">https://learning.oreilly.com/library/view/~/9781597495356</a> <a href="https://learning.oreilly.com/library/view/~/9781597495356/?ar">https://learning.oreilly.com/library/view/~/9781597495356/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar</a><br/>Format:&#160;Electronic Resources<br/> CWSP : certified wireless security professional official study guide ent://SD_ILS/0/SD_ILS:2288340 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Coleman, David D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470438916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470438916/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470438916/?ar">https://learning.oreilly.com/library/view/~/9780470438916/?ar</a><br/>Format:&#160;Electronic Resources<br/> Screenos cookbook ent://SD_ILS/0/SD_ILS:2285572 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Brunner, Stefan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596510039/?ar">https://go.oreilly.com/library-access/library/view/-/9780596510039/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596510039">https://learning.oreilly.com/library/view/~/9780596510039</a> <a href="https://learning.oreilly.com/library/view/~/9780596510039/?ar">https://learning.oreilly.com/library/view/~/9780596510039/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hardening Cisco routers ent://SD_ILS/0/SD_ILS:2293283 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Akin, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/0596001665/?ar">https://learning.oreilly.com/library/view/~/0596001665/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596001665">https://learning.oreilly.com/library/view/~/0596001665</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596001665/?ar">https://go.oreilly.com/library-access/library/view/-/0596001665/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:2284090 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Contos, Brian T.<br/><a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a> <a href="https://learning.oreilly.com/library/view/~/9781597491297">https://learning.oreilly.com/library/view/~/9781597491297</a> <a href="https://learning.oreilly.com/library/view/~/9781597491297/?ar">https://learning.oreilly.com/library/view/~/9781597491297/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491297/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering the Nmap scripting engine : master the Nmap scripting engine and the art of developing NSE scripts ent://SD_ILS/0/SD_ILS:2306630 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Pale, Paulino Calderon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782168317/?ar">https://learning.oreilly.com/library/view/~/9781782168317/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782168317/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168317/?ar</a><br/>Format:&#160;Electronic Resources<br/> Applied Oracle security : developing secure database and middleware environments ent://SD_ILS/0/SD_ILS:2287303 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Knox, David (David C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar">https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071613705/?ar">https://learning.oreilly.com/library/view/~/9780071613705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071613705">https://learning.oreilly.com/library/view/~/9780071613705</a><br/>Format:&#160;Electronic Resources<br/> Application Security in the ISO27001 Environment. ent://SD_ILS/0/SD_ILS:2288619 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Vasudevan, Vinod.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781905356355/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356355/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781905356355/?ar">https://learning.oreilly.com/library/view/~/9781905356355/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781905356355">https://learning.oreilly.com/library/view/~/9781905356355</a><br/>Format:&#160;Electronic Resources<br/> Maximum wireless security ent://SD_ILS/0/SD_ILS:2281684 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Peikari, Cyrus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672324881/?ar">https://go.oreilly.com/library-access/library/view/-/0672324881/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672324881/?ar">https://learning.oreilly.com/library/view/~/0672324881/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672324881">https://learning.oreilly.com/library/view/~/0672324881</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2287972 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar">https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470550939/?ar">https://learning.oreilly.com/library/view/~/9780470550939/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation ent://SD_ILS/0/SD_ILS:2302625 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Dang, Bruce, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118787397/?ar">https://learning.oreilly.com/library/view/~/9781118787397/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar">https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118787397">https://learning.oreilly.com/library/view/~/9781118787397</a><br/>Format:&#160;Electronic Resources<br/> SAP security configuration and deployment : the IT administrator's guide to best practices ent://SD_ILS/0/SD_ILS:2285985 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Wun-Young, Leslie.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492843">https://learning.oreilly.com/library/view/~/9781597492843</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492843/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492843/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492843/?ar">https://learning.oreilly.com/library/view/~/9781597492843/?ar</a><br/>Format:&#160;Electronic Resources<br/> Beautiful security ent://SD_ILS/0/SD_ILS:2286888 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Oram, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780596801786/?ar">https://learning.oreilly.com/library/view/~/9780596801786/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596801786">https://learning.oreilly.com/library/view/~/9780596801786</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar">https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar</a><br/>Format:&#160;Electronic Resources<br/> Host integrity monitoring : using Osiris and Samhain ent://SD_ILS/0/SD_ILS:2282620 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Wotring, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490184">https://learning.oreilly.com/library/view/~/9781597490184</a> <a href="https://learning.oreilly.com/library/view/~/9781597490184/?ar">https://learning.oreilly.com/library/view/~/9781597490184/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781597490184">https://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Electronic Resources<br/> Managing Cisco network security ent://SD_ILS/0/SD_ILS:2280758 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Knipp, Eric.<br/><a href="https://www.sciencedirect.com/science/book/9781931836562">https://www.sciencedirect.com/science/book/9781931836562</a> <a href="https://learning.oreilly.com/library/view/~/9781931836562">https://learning.oreilly.com/library/view/~/9781931836562</a> <a href="https://learning.oreilly.com/library/view/~/9781931836562/?ar">https://learning.oreilly.com/library/view/~/9781931836562/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836562/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836562/?ar</a><br/>Format:&#160;Electronic Resources<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:2285140 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Hay, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492409">https://learning.oreilly.com/library/view/~/9781597492409</a> <a href="https://learning.oreilly.com/library/view/~/9781597492409/?ar">https://learning.oreilly.com/library/view/~/9781597492409/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar</a><br/>Format:&#160;Electronic Resources<br/> AAA and network security for mobile access : radius, diameter, EAP, PKI and IP mobility ent://SD_ILS/0/SD_ILS:2281904 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Nakhjiri, Madjid.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470011942/?ar">https://go.oreilly.com/library-access/library/view/-/9780470011942/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470011942/?ar">https://learning.oreilly.com/library/view/~/9780470011942/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470011942">https://learning.oreilly.com/library/view/~/9780470011942</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at managing information security ent://SD_ILS/0/SD_ILS:2282317 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Osborne, Mark.<br/><a href="https://www.sciencedirect.com/science/book/9781597491105">https://www.sciencedirect.com/science/book/9781597491105</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491105/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491105/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491105/?ar">https://learning.oreilly.com/library/view/~/9781597491105/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491105">https://learning.oreilly.com/library/view/~/9781597491105</a><br/>Format:&#160;Electronic Resources<br/> Security+ practice questions ent://SD_ILS/0/SD_ILS:2281682 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Sparbel, Hans.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0789731517/?ar">https://go.oreilly.com/library-access/library/view/-/0789731517/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0789731517/?ar">https://learning.oreilly.com/library/view/~/0789731517/?ar</a><br/>Format:&#160;Electronic Resources<br/> Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools ent://SD_ILS/0/SD_ILS:2311022 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Rehim, Rejah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar">https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785280696/?ar">https://learning.oreilly.com/library/view/~/9781785280696/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785280696">https://learning.oreilly.com/library/view/~/9781785280696</a><br/>Format:&#160;Electronic Resources<br/> Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management ent://SD_ILS/0/SD_ILS:2296031 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Nordstr&ouml;m, Kent.<br/><a href="https://learning.oreilly.com/library/view/~/9781849685368/?ar">https://learning.oreilly.com/library/view/~/9781849685368/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849685368/?ar">https://go.oreilly.com/library-access/library/view/-/9781849685368/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849685368">https://learning.oreilly.com/library/view/~/9781849685368</a><br/>Format:&#160;Electronic Resources<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:2282271 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Wyler, Neil R.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836203">https://learning.oreilly.com/library/view/~/9781931836203</a> <a href="https://learning.oreilly.com/library/view/~/9781931836203/?ar">https://learning.oreilly.com/library/view/~/9781931836203/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836203/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836203/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781931836203">https://www.sciencedirect.com/science/book/9781931836203</a><br/>Format:&#160;Electronic Resources<br/> Network Security Assessment ent://SD_ILS/0/SD_ILS:2281350 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;McNab, Chris (Chris R.), 1980-<br/><a href="https://learning.oreilly.com/library/view/~/059600611X">https://learning.oreilly.com/library/view/~/059600611X</a> <a href="https://learning.oreilly.com/library/view/~/059600611X/?ar">https://learning.oreilly.com/library/view/~/059600611X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/059600611X/?ar">https://go.oreilly.com/library-access/library/view/-/059600611X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web Application Defender's Cookbook : Battling Hackers and Protecting Users. ent://SD_ILS/0/SD_ILS:2298453 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Barnett, Ryan C.<br/><a href="https://learning.oreilly.com/library/view/~/9781118417058/?ar">https://learning.oreilly.com/library/view/~/9781118417058/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar">https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118417058">https://learning.oreilly.com/library/view/~/9781118417058</a><br/>Format:&#160;Electronic Resources<br/> Security for Microsoft Windows system administrators : introduction to key information security concepts ent://SD_ILS/0/SD_ILS:2290287 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Rountree, Derrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495943/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495943/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495943/?ar">https://learning.oreilly.com/library/view/~/9781597495943/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495943">https://learning.oreilly.com/library/view/~/9781597495943</a><br/>Format:&#160;Electronic Resources<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:2291226 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Davis, Chris (Christopher Michael)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071742382/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742382/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071742382/?ar">https://learning.oreilly.com/library/view/~/9780071742382/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:2284517 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Varsalone, Jesse.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492447">https://learning.oreilly.com/library/view/~/9781597492447</a> <a href="https://learning.oreilly.com/library/view/~/9781597492447/?ar">https://learning.oreilly.com/library/view/~/9781597492447/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital identity ent://SD_ILS/0/SD_ILS:2293288 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Windley, Phillip J., 1958-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008783/?ar">https://go.oreilly.com/library-access/library/view/-/0596008783/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008783/?ar">https://learning.oreilly.com/library/view/~/0596008783/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008783">https://learning.oreilly.com/library/view/~/0596008783</a><br/>Format:&#160;Electronic Resources<br/> Intrusion detection with Snort ent://SD_ILS/0/SD_ILS:2281704 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/157870281X">https://learning.oreilly.com/library/view/~/157870281X</a> <a href="https://learning.oreilly.com/library/view/~/157870281X/?ar">https://learning.oreilly.com/library/view/~/157870281X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/157870281X/?ar">https://go.oreilly.com/library-access/library/view/-/157870281X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nine steps to success : an ISO 27001:2013 implementation overview ent://SD_ILS/0/SD_ILS:2310541 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849288255/?ar">https://go.oreilly.com/library-access/library/view/-/9781849288255/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849288255/?ar">https://learning.oreilly.com/library/view/~/9781849288255/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security : the Human Factor. ent://SD_ILS/0/SD_ILS:2290675 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Kearney, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281843/?ar">https://learning.oreilly.com/library/view/~/9781849281843/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar</a><br/>Format:&#160;Electronic Resources<br/> Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutions ent://SD_ILS/0/SD_ILS:2318261 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Rohmeyer, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484241943">https://learning.oreilly.com/library/view/~/9781484241943</a> <a href="https://learning.oreilly.com/library/view/~/9781484241943/?ar">https://learning.oreilly.com/library/view/~/9781484241943/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484241943/?ar">https://go.oreilly.com/library-access/library/view/-/9781484241943/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices ent://SD_ILS/0/SD_ILS:2311174 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Steadman, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785283925/?ar">https://learning.oreilly.com/library/view/~/9781785283925/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785283925">https://learning.oreilly.com/library/view/~/9781785283925</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785283925/?ar">https://go.oreilly.com/library-access/library/view/-/9781785283925/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nmap 6 : network exploration and security auditing Cookbook ent://SD_ILS/0/SD_ILS:2297121 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Pale, Paulino Calderon.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849517485/?ar">https://go.oreilly.com/library-access/library/view/-/9781849517485/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849517485/?ar">https://learning.oreilly.com/library/view/~/9781849517485/?ar</a><br/>Format:&#160;Electronic Resources<br/> AVIEN malware defense guide for the Enterprise ent://SD_ILS/0/SD_ILS:2284510 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Harley, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491648">https://learning.oreilly.com/library/view/~/9781597491648</a> <a href="https://learning.oreilly.com/library/view/~/9781597491648/?ar">https://learning.oreilly.com/library/view/~/9781597491648/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of intrusion : the real stories behind the exploits of hackers, intruders &amp; deceivers ent://SD_ILS/0/SD_ILS:2281569 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Mitnick, Kevin D. (Kevin David), 1963-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar">https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470503829/?ar">https://learning.oreilly.com/library/view/~/9780470503829/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470503829">https://learning.oreilly.com/library/view/~/9780470503829</a><br/>Format:&#160;Electronic Resources<br/> Linux server security ent://SD_ILS/0/SD_ILS:2281596 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Bauer, Michael D.<br/><a href="https://learning.oreilly.com/library/view/~/0596006705">https://learning.oreilly.com/library/view/~/0596006705</a> <a href="https://learning.oreilly.com/library/view/~/0596006705/?ar">https://learning.oreilly.com/library/view/~/0596006705/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596006705/?ar">https://go.oreilly.com/library-access/library/view/-/0596006705/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privacy defended : protecting yourself online ent://SD_ILS/0/SD_ILS:2280776 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Bahadur, Gary.<br/><a href="https://learning.oreilly.com/library/view/~/078972605X">https://learning.oreilly.com/library/view/~/078972605X</a> <a href="https://learning.oreilly.com/library/view/~/078972605X/?ar">https://learning.oreilly.com/library/view/~/078972605X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/078972605X/?ar">https://go.oreilly.com/library-access/library/view/-/078972605X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Are your bits flipped? : overcoming tech misconceptions ent://SD_ILS/0/SD_ILS:2310599 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Kissell, Joe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar">https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492017172/?ar">https://learning.oreilly.com/library/view/~/9781492017172/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus ent://SD_ILS/0/SD_ILS:2316700 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing : protecting networks and systems ent://SD_ILS/0/SD_ILS:2295898 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Henry, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283731">https://learning.oreilly.com/library/view/~/9781849283731</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849283731/?ar">https://learning.oreilly.com/library/view/~/9781849283731/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco router and switch forensics : investigating and analyzing malicious network activity ent://SD_ILS/0/SD_ILS:2287180 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494182">https://learning.oreilly.com/library/view/~/9781597494182</a> <a href="https://learning.oreilly.com/library/view/~/9781597494182/?ar">https://learning.oreilly.com/library/view/~/9781597494182/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar</a><br/>Format:&#160;Electronic Resources<br/> The database hacker's handbook : defending database servers ent://SD_ILS/0/SD_ILS:2282264 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Litchfield, David, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780764578014/?ar">https://learning.oreilly.com/library/view/~/9780764578014/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar">https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780764578014">https://learning.oreilly.com/library/view/~/9780764578014</a><br/>Format:&#160;Electronic Resources<br/> Snort cookbook ent://SD_ILS/0/SD_ILS:2282585 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/0596007914">https://learning.oreilly.com/library/view/~/0596007914</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596007914/?ar">https://go.oreilly.com/library-access/library/view/-/0596007914/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007914/?ar">https://learning.oreilly.com/library/view/~/0596007914/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux Command Line and Shell Scripting Techniques Master Practical Aspects of the Linux Command Line and Then Use It As a Part of the Shell Scripting Process. ent://SD_ILS/0/SD_ILS:2332407 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Dakic, Vedran.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800205192/?ar">https://go.oreilly.com/library-access/library/view/-/9781800205192/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800205192">https://learning.oreilly.com/library/view/~/9781800205192</a> <a href="https://learning.oreilly.com/library/view/~/9781800205192/?ar">https://learning.oreilly.com/library/view/~/9781800205192/?ar</a><br/>Format:&#160;Electronic Resources<br/> Emerging trends in ICT security ent://SD_ILS/0/SD_ILS:2300882 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Akhgar, Babak, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780124114746">https://learning.oreilly.com/library/view/~/9780124114746</a> <a href="https://learning.oreilly.com/library/view/~/9780124114746/?ar">https://learning.oreilly.com/library/view/~/9780124114746/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124114746/?ar">https://go.oreilly.com/library-access/library/view/-/9780124114746/?ar</a><br/>Format:&#160;Electronic Resources<br/> The book of PF : a no-nonsense guide to the OpenBSD firewall ent://SD_ILS/0/SD_ILS:2290794 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Hansteen, Peter N. M.<br/><a href="https://learning.oreilly.com/library/view/~/9781593271657">https://learning.oreilly.com/library/view/~/9781593271657</a> <a href="https://learning.oreilly.com/library/view/~/9781593272746">https://learning.oreilly.com/library/view/~/9781593272746</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593272746/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272746/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593272746/?ar">https://learning.oreilly.com/library/view/~/9781593272746/?ar</a><br/>Format:&#160;Electronic Resources<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:2282873 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597490610">https://learning.oreilly.com/library/view/~/9781597490610</a> <a href="https://www.sciencedirect.com/science/book/9781597490610">https://www.sciencedirect.com/science/book/9781597490610</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490610/?ar">https://learning.oreilly.com/library/view/~/9781597490610/?ar</a><br/>Format:&#160;Electronic Resources<br/> Intrusion detection networks : a key to collaborative security ent://SD_ILS/0/SD_ILS:2301112 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Fung, Carol, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564121/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466564121/?ar">https://learning.oreilly.com/library/view/~/9781466564121/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed : web applications : web application security secrets and solutions ent://SD_ILS/0/SD_ILS:2290273 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Scambray, Joel.<br/><a href="https://learning.oreilly.com/library/view/~/9780071740647/?ar">https://learning.oreilly.com/library/view/~/9780071740647/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar">https://go.oreilly.com/library-access/library/view/-/9780071740647/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nmap in the enterprise : your guide to network scanning ent://SD_ILS/0/SD_ILS:2284518 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Orebaugh, Angela.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492416/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492416/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492416/?ar">https://learning.oreilly.com/library/view/~/9781597492416/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethereal : packet sniffing ent://SD_ILS/0/SD_ILS:2281331 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266825">https://learning.oreilly.com/library/view/~/9781932266825</a> <a href="https://www.sciencedirect.com/science/book/9781932266825">https://www.sciencedirect.com/science/book/9781932266825</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781932266825/?ar">https://learning.oreilly.com/library/view/~/9781932266825/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland ent://SD_ILS/0/SD_ILS:269853 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Cordesman, Anthony H.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=99141">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=99141</a><br/>Format:&#160;Electronic Resources<br/> Practical Windows forensics : leverage the power of digital forensics for Windows systems ent://SD_ILS/0/SD_ILS:2311021 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mac OS X, iPod, and iPhone forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:2287201 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Kubasiak, Ryan R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080949185/?ar">https://learning.oreilly.com/library/view/~/9780080949185/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080949185">https://learning.oreilly.com/library/view/~/9780080949185</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar">https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar</a><br/>Format:&#160;Electronic Resources<br/> The shellcoder's handbook : discovering and exploiting security holes ent://SD_ILS/0/SD_ILS:2283852 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Anley, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780470080238">https://learning.oreilly.com/library/view/~/9780470080238</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar">https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470080238/?ar">https://learning.oreilly.com/library/view/~/9780470080238/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco Intelligent WAN (IWAN) ent://SD_ILS/0/SD_ILS:2311998 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Edgeworth, Brad, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar">https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134423760/?ar">https://learning.oreilly.com/library/view/~/9780134423760/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134423760">https://learning.oreilly.com/library/view/~/9780134423760</a><br/>Format:&#160;Electronic Resources<br/> The ultimate Kali Linux book : perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire ent://SD_ILS/0/SD_ILS:2331878 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801818933">https://learning.oreilly.com/library/view/~/9781801818933</a> <a href="https://learning.oreilly.com/library/view/~/9781801818933/?ar">https://learning.oreilly.com/library/view/~/9781801818933/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801818933/?ar">https://go.oreilly.com/library-access/library/view/-/9781801818933/?ar</a><br/>Format:&#160;Electronic Resources<br/> JUNOS automation cookbook : automate network devices on Juniper's operating system ent://SD_ILS/0/SD_ILS:2314479 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Chappell, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788290999/?ar">https://go.oreilly.com/library-access/library/view/-/9781788290999/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788290999/?ar">https://learning.oreilly.com/library/view/~/9781788290999/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788290999">https://learning.oreilly.com/library/view/~/9781788290999</a><br/>Format:&#160;Electronic Resources<br/> Python passive network mapping : P2NMAP ent://SD_ILS/0/SD_ILS:2307523 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Hosmer, Chet, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027424">https://learning.oreilly.com/library/view/~/9780128027424</a> <a href="https://learning.oreilly.com/library/view/~/9780128027424/?ar">https://learning.oreilly.com/library/view/~/9780128027424/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128027424/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027424/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL server : protecting your database from attackers ent://SD_ILS/0/SD_ILS:2290991 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Cherry, Denny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496254">https://learning.oreilly.com/library/view/~/9781597496254</a> <a href="https://learning.oreilly.com/library/view/~/9781597496254/?ar">https://learning.oreilly.com/library/view/~/9781597496254/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496254/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496254/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information Security Breaches : Avoidance and Treatment based on ISO27001. ent://SD_ILS/0/SD_ILS:2288616 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280273">https://learning.oreilly.com/library/view/~/9781849280273</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280273/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280273/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849280273/?ar">https://learning.oreilly.com/library/view/~/9781849280273/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux security cookbook ent://SD_ILS/0/SD_ILS:2281262 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Barrett, Daniel J.<br/><a href="https://learning.oreilly.com/library/view/~/0596003919/?ar">https://learning.oreilly.com/library/view/~/0596003919/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596003919/?ar">https://go.oreilly.com/library-access/library/view/-/0596003919/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596003919">https://learning.oreilly.com/library/view/~/0596003919</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2286804 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a> <a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at securing a wireless network ent://SD_ILS/0/SD_ILS:2282513 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Hurley, Chris.<br/><a href="https://www.sciencedirect.com/science/book/9781597490870">https://www.sciencedirect.com/science/book/9781597490870</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490870/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490870/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490870/?ar">https://learning.oreilly.com/library/view/~/9781597490870/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490870">https://learning.oreilly.com/library/view/~/9781597490870</a><br/>Format:&#160;Electronic Resources<br/> The art of intrusion the real stories behind the exploits of hackers, intruders &amp; deceivers ent://SD_ILS/0/SD_ILS:334708 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Mitnick, Kevin D. (Kevin David), 1963-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892</a><br/>Format:&#160;Electronic Resources<br/> Apache : receptury ent://SD_ILS/0/SD_ILS:2296868 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Bowen, Richard Cooper, 1971-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176425/?ar">https://learning.oreilly.com/library/view/~/9781457176425/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176425">https://learning.oreilly.com/library/view/~/9781457176425</a><br/>Format:&#160;Electronic Resources<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:2284693 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Hoffman, Daniel (Daniel V.), 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470238387/?ar">https://learning.oreilly.com/library/view/~/9780470238387/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar">https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470238387">https://learning.oreilly.com/library/view/~/9780470238387</a><br/>Format:&#160;Electronic Resources<br/> Incident response &amp; computer forensics ent://SD_ILS/0/SD_ILS:2280958 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Prosise, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780072226966">https://learning.oreilly.com/library/view/~/9780072226966</a> <a href="https://learning.oreilly.com/library/view/~/9780072226966/?ar">https://learning.oreilly.com/library/view/~/9780072226966/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar">https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:2289552 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Shema, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495431/?ar">https://learning.oreilly.com/library/view/~/9781597495431/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2008 PKI and certificate security ent://SD_ILS/0/SD_ILS:2284892 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Komar, Brian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735625167/?ar">https://go.oreilly.com/library-access/library/view/-/9780735625167/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735625167">https://learning.oreilly.com/library/view/~/9780735625167</a> <a href="https://learning.oreilly.com/library/view/~/9780735625167/?ar">https://learning.oreilly.com/library/view/~/9780735625167/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:2301150 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Cherry, Denny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000113/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000113/?ar">https://learning.oreilly.com/library/view/~/9780128000113/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128000113">https://learning.oreilly.com/library/view/~/9780128000113</a><br/>Format:&#160;Electronic Resources<br/> The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:2296625 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Winterfeld, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047372/?ar">https://learning.oreilly.com/library/view/~/9780124047372/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124047372">https://learning.oreilly.com/library/view/~/9780124047372</a><br/>Format:&#160;Electronic Resources<br/> Blackjacking : security threats to Blackberry devices, PDAs, and cell phones in the enterprise ent://SD_ILS/0/SD_ILS:2283507 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Hoffman, Daniel (Daniel V.), 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470127544">https://learning.oreilly.com/library/view/~/9780470127544</a> <a href="https://learning.oreilly.com/library/view/~/9780470127544/?ar">https://learning.oreilly.com/library/view/~/9780470127544/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470127544/?ar">https://go.oreilly.com/library-access/library/view/-/9780470127544/?ar</a><br/>Format:&#160;Electronic Resources<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:2285986 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security analytics : finding security insights, patterns, and anomalies in big data ent://SD_ILS/0/SD_ILS:2305164 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Talabis, Mark Ryan M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128002070/?ar">https://go.oreilly.com/library-access/library/view/-/9780128002070/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128002070/?ar">https://learning.oreilly.com/library/view/~/9780128002070/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mobile application security ent://SD_ILS/0/SD_ILS:2288045 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Dwivedi, Himanshu.<br/><a href="https://learning.oreilly.com/library/view/~/9780071633567/?ar">https://learning.oreilly.com/library/view/~/9780071633567/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071633567/?ar">https://go.oreilly.com/library-access/library/view/-/9780071633567/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071633567">https://learning.oreilly.com/library/view/~/9780071633567</a><br/>Format:&#160;Electronic Resources<br/> Security in wireless ad hoc and sensor networks ent://SD_ILS/0/SD_ILS:2285854 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;&Ccedil;ayirci, E. (Erdal)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470027486/?ar">https://go.oreilly.com/library-access/library/view/-/9780470027486/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470027486/?ar">https://learning.oreilly.com/library/view/~/9780470027486/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470027486">https://learning.oreilly.com/library/view/~/9780470027486</a><br/>Format:&#160;Electronic Resources<br/> Improving your Penetration Testing Skills : strengthen your defense against web attacks with Kali Linux and Metasploit ent://SD_ILS/0/SD_ILS:2322241 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Najera-Gutierrez, Gilberto, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781838646073">https://learning.oreilly.com/library/view/~/9781838646073</a> <a href="https://learning.oreilly.com/library/view/~/9781838646073/?ar">https://learning.oreilly.com/library/view/~/9781838646073/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838646073/?ar">https://go.oreilly.com/library-access/library/view/-/9781838646073/?ar</a><br/>Format:&#160;Electronic Resources<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:2289130 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Beale, Jay.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490993/?ar">https://learning.oreilly.com/library/view/~/9781597490993/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format:&#160;Electronic Resources<br/> Wireless communications security : solutions for the internet of things ent://SD_ILS/0/SD_ILS:2311624 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Penttinen, Jyrki T. J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119084396/?ar">https://learning.oreilly.com/library/view/~/9781119084396/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar">https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar</a><br/>Format:&#160;Electronic Resources<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:2297534 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Yang, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047020">https://learning.oreilly.com/library/view/~/9780124047020</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047020/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124047020/?ar">https://learning.oreilly.com/library/view/~/9780124047020/?ar</a><br/>Format:&#160;Electronic Resources<br/> Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting ent://SD_ILS/0/SD_ILS:2286530 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Hoopes, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781597493055">https://learning.oreilly.com/library/view/~/9781597493055</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597493055/?ar">https://go.oreilly.com/library-access/library/view/-/9781597493055/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597493055/?ar">https://learning.oreilly.com/library/view/~/9781597493055/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to secure and audit Oracle 10g and 11g ent://SD_ILS/0/SD_ILS:2286324 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Ben-Natan, Ron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar">https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420084139/?ar">https://learning.oreilly.com/library/view/~/9781420084139/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420084139">https://learning.oreilly.com/library/view/~/9781420084139</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:2314683 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a> <a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking : the art of exploitation ent://SD_ILS/0/SD_ILS:2287983 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Erickson, Jon, 1977-<br/><a href="https://learning.oreilly.com/library/view/~/9781593271442">https://learning.oreilly.com/library/view/~/9781593271442</a> <a href="https://learning.oreilly.com/library/view/~/9781593271442/?ar">https://learning.oreilly.com/library/view/~/9781593271442/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of deception : controlling the human element of security ent://SD_ILS/0/SD_ILS:2280746 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780764542800/?ar">https://learning.oreilly.com/library/view/~/9780764542800/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780764542800/?ar">https://go.oreilly.com/library-access/library/view/-/9780764542800/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web application obfuscation : '-/WAFs.evasion.filters//alert (/obfuscation/)-' ent://SD_ILS/0/SD_ILS:2290508 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Heiderich, Mario.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496049/?ar">https://learning.oreilly.com/library/view/~/9781597496049/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496049/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496049/?ar</a><br/>Format:&#160;Electronic Resources<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:2281991 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490481">https://learning.oreilly.com/library/view/~/9781597490481</a> <a href="https://www.sciencedirect.com/science/book/9781597490481">https://www.sciencedirect.com/science/book/9781597490481</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490481/?ar">https://learning.oreilly.com/library/view/~/9781597490481/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCNA security study guide ent://SD_ILS/0/SD_ILS:2288728 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Boyles, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780470527672/?ar">https://learning.oreilly.com/library/view/~/9780470527672/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470527672/?ar">https://go.oreilly.com/library-access/library/view/-/9780470527672/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2282490 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Browser Hacker's Handbook ent://SD_ILS/0/SD_ILS:2302347 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Alcorn, Wade.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118662090/?ar">https://go.oreilly.com/library-access/library/view/-/9781118662090/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118662090/?ar">https://learning.oreilly.com/library/view/~/9781118662090/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118662090">https://learning.oreilly.com/library/view/~/9781118662090</a><br/>Format:&#160;Electronic Resources<br/> TICSA TruSecure ICSA certified security associate : exam TUO-001 : training guide ent://SD_ILS/0/SD_ILS:2281543 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Chapple, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/0789727838">https://learning.oreilly.com/library/view/~/0789727838</a> <a href="https://learning.oreilly.com/library/view/~/0789727838/?ar">https://learning.oreilly.com/library/view/~/0789727838/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0789727838/?ar">https://go.oreilly.com/library-access/library/view/-/0789727838/?ar</a><br/>Format:&#160;Electronic Resources<br/> Software test attacks to break mobile and embedded devices ent://SD_ILS/0/SD_ILS:2300719 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Hagar, Jon Duncan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466575318/?ar">https://go.oreilly.com/library-access/library/view/-/9781466575318/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466575318/?ar">https://learning.oreilly.com/library/view/~/9781466575318/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466575318">https://learning.oreilly.com/library/view/~/9781466575318</a><br/>Format:&#160;Electronic Resources<br/> E-discovery : creating and managing an enterprisewide program : a technical guide to digital investigation and litigation support ent://SD_ILS/0/SD_ILS:2286529 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Schuler, Karen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492966/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492966/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492966/?ar">https://learning.oreilly.com/library/view/~/9781597492966/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers ent://SD_ILS/0/SD_ILS:2316089 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed : mobile security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2301016 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Bergman, Neil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar">https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071817011/?ar">https://learning.oreilly.com/library/view/~/9780071817011/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071817011">https://learning.oreilly.com/library/view/~/9780071817011</a><br/>Format:&#160;Electronic Resources<br/> Wireless security ent://SD_ILS/0/SD_ILS:2294580 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Osterhage, Wolfgang.<br/><a href="https://learning.oreilly.com/library/view/~/9781578087686/?ar">https://learning.oreilly.com/library/view/~/9781578087686/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781578087686/?ar">https://go.oreilly.com/library-access/library/view/-/9781578087686/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781578087686">https://learning.oreilly.com/library/view/~/9781578087686</a><br/>Format:&#160;Electronic Resources<br/> Information security handbook : develop a threat model and incident response strategy to build a strong information security framework ent://SD_ILS/0/SD_ILS:2315319 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Death, Darren, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788478830">https://learning.oreilly.com/library/view/~/9781788478830</a> <a href="https://learning.oreilly.com/library/view/~/9781788478830/?ar">https://learning.oreilly.com/library/view/~/9781788478830/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788478830/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478830/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2313301 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128039298">https://learning.oreilly.com/library/view/~/9780128039298</a> <a href="https://learning.oreilly.com/library/view/~/9780128039298/?ar">https://learning.oreilly.com/library/view/~/9780128039298/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar">https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar</a><br/>Format:&#160;Electronic Resources<br/> Iris biometric model for secured network access ent://SD_ILS/0/SD_ILS:2298466 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;El Khoury, Franjieh.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502147/?ar">https://learning.oreilly.com/library/view/~/9781466502147/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466502147">https://learning.oreilly.com/library/view/~/9781466502147</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Protection 2010 for Exchange Server ent://SD_ILS/0/SD_ILS:2290701 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656734/?ar">https://learning.oreilly.com/library/view/~/9780735656734/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar</a><br/>Format:&#160;Electronic Resources<br/> Using the common criteria for IT security evaluation ent://SD_ILS/0/SD_ILS:2281784 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Herrmann, Debra S.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031423">https://learning.oreilly.com/library/view/~/9781420031423</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420031423/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031423/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420031423/?ar">https://learning.oreilly.com/library/view/~/9781420031423/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics : a pocket guide ent://SD_ILS/0/SD_ILS:2289616 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format:&#160;Electronic Resources<br/> Botnets the killer web app ent://SD_ILS/0/SD_ILS:340160 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Schiller, Craig A.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406</a><br/>Format:&#160;Electronic Resources<br/> WarDriving &amp; wireless penetration testing ent://SD_ILS/0/SD_ILS:2282518 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Hurley, Chris.<br/><a href="https://www.sciencedirect.com/science/book/9781597491112">https://www.sciencedirect.com/science/book/9781597491112</a> <a href="https://learning.oreilly.com/library/view/~/9781597491112">https://learning.oreilly.com/library/view/~/9781597491112</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491112/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491112/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491112/?ar">https://learning.oreilly.com/library/view/~/9781597491112/?ar</a><br/>Format:&#160;Electronic Resources<br/> Java security handbook ent://SD_ILS/0/SD_ILS:2281327 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Jaworski, Jamie.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672316021/?ar">https://go.oreilly.com/library-access/library/view/-/0672316021/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672316021">https://learning.oreilly.com/library/view/~/0672316021</a> <a href="https://learning.oreilly.com/library/view/~/0672316021/?ar">https://learning.oreilly.com/library/view/~/0672316021/?ar</a><br/>Format:&#160;Electronic Resources<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:343739 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Clark, Champ, III.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542</a><br/>Format:&#160;Electronic Resources<br/> Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption ent://SD_ILS/0/SD_ILS:2281670 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Rosenberg, Jonathan B., 1956-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672326515/?ar">https://go.oreilly.com/library-access/library/view/-/0672326515/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672326515/?ar">https://learning.oreilly.com/library/view/~/0672326515/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672326515">https://learning.oreilly.com/library/view/~/0672326515</a><br/>Format:&#160;Electronic Resources<br/> HP Nonstop server security : a practical handbook ent://SD_ILS/0/SD_ILS:2281922 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Hill, Terri.<br/><a href="https://learning.oreilly.com/library/view/~/9781555583149">https://learning.oreilly.com/library/view/~/9781555583149</a> <a href="https://learning.oreilly.com/library/view/~/9781555583149/?ar">https://learning.oreilly.com/library/view/~/9781555583149/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781555583149/?ar">https://go.oreilly.com/library-access/library/view/-/9781555583149/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781555583149">https://www.sciencedirect.com/science/book/9781555583149</a><br/>Format:&#160;Electronic Resources<br/> Metasploit : the penetration tester's guide ent://SD_ILS/0/SD_ILS:2292581 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Kennedy, David, 1982-<br/><a href="https://learning.oreilly.com/library/view/~/9781593272883">https://learning.oreilly.com/library/view/~/9781593272883</a> <a href="https://learning.oreilly.com/library/view/~/9781593272883/?ar">https://learning.oreilly.com/library/view/~/9781593272883/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593272883/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272883/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools ent://SD_ILS/0/SD_ILS:2303312 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Makan, Keith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar">https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849695107/?ar">https://learning.oreilly.com/library/view/~/9781849695107/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849695107">https://learning.oreilly.com/library/view/~/9781849695107</a><br/>Format:&#160;Electronic Resources<br/> Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day ent://SD_ILS/0/SD_ILS:2298053 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Yerrid, K. C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519960/?ar">https://learning.oreilly.com/library/view/~/9781849519960/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519960">https://learning.oreilly.com/library/view/~/9781849519960</a><br/>Format:&#160;Electronic Resources<br/> Auditing cloud computing : a security and privacy guide ent://SD_ILS/0/SD_ILS:2292255 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format:&#160;Electronic Resources<br/> 24 deadly sins of software security : programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:2287176 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780071626750/?ar">https://learning.oreilly.com/library/view/~/9780071626750/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar">https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071626750">https://learning.oreilly.com/library/view/~/9780071626750</a><br/>Format:&#160;Electronic Resources<br/> Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit ent://SD_ILS/0/SD_ILS:2316790 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788990615/?ar">https://learning.oreilly.com/library/view/~/9781788990615/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security Breaches : Studies from Real Life. ent://SD_ILS/0/SD_ILS:2290674 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web commerce security : design and development ent://SD_ILS/0/SD_ILS:2292686 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Nahari, Hadi.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar">https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470624463/?ar">https://learning.oreilly.com/library/view/~/9780470624463/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470624463">https://learning.oreilly.com/library/view/~/9780470624463</a><br/>Format:&#160;Electronic Resources<br/> Apache cookbook ent://SD_ILS/0/SD_ILS:2284338 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Coar, Ken A. L.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596529949/?ar">https://go.oreilly.com/library-access/library/view/-/9780596529949/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596529949">https://learning.oreilly.com/library/view/~/9780596529949</a> <a href="https://learning.oreilly.com/library/view/~/9780596529949/?ar">https://learning.oreilly.com/library/view/~/9780596529949/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering FreeBSD and OpenBSD security ent://SD_ILS/0/SD_ILS:2289327 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Korff, Yanek.<br/><a href="https://learning.oreilly.com/library/view/~/0596006268">https://learning.oreilly.com/library/view/~/0596006268</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596006268/?ar">https://go.oreilly.com/library-access/library/view/-/0596006268/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596006268/?ar">https://learning.oreilly.com/library/view/~/0596006268/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mobile device security for dummies ent://SD_ILS/0/SD_ILS:2293515 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Campagna, Rich R.<br/><a href="https://learning.oreilly.com/library/view/~/9781118093801/?ar">https://learning.oreilly.com/library/view/~/9781118093801/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar">https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks ent://SD_ILS/0/SD_ILS:2310121 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Datt, Samir, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar">https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782174905/?ar">https://learning.oreilly.com/library/view/~/9781782174905/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782174905">https://learning.oreilly.com/library/view/~/9781782174905</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your Web applications : the only way to stop a hacker is to think like one. ent://SD_ILS/0/SD_ILS:2280762 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z <a href="https://learning.oreilly.com/library/view/~/9781928994312/?ar">https://learning.oreilly.com/library/view/~/9781928994312/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781928994312/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994312/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781928994312">https://learning.oreilly.com/library/view/~/9781928994312</a><br/>Format:&#160;Electronic Resources<br/> Managed code rootkits : hooking into runtime environments ent://SD_ILS/0/SD_ILS:2290307 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Metula, Erez.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495752/?ar">https://learning.oreilly.com/library/view/~/9781597495752/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495752">https://learning.oreilly.com/library/view/~/9781597495752</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495752/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495752/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT security metrics : a practical framework for measuring security &amp; protecting data ent://SD_ILS/0/SD_ILS:2289448 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Hayden, Lance.<br/><a href="https://learning.oreilly.com/library/view/~/9780071713405">https://learning.oreilly.com/library/view/~/9780071713405</a> <a href="https://learning.oreilly.com/library/view/~/9780071713405/?ar">https://learning.oreilly.com/library/view/~/9780071713405/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071713405/?ar">https://go.oreilly.com/library-access/library/view/-/9780071713405/?ar</a><br/>Format:&#160;Electronic Resources<br/> Botnets : the killer web app ent://SD_ILS/0/SD_ILS:2283565 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Schiller, Craig A.<br/><a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491358/?ar">https://learning.oreilly.com/library/view/~/9781597491358/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed wireless : wireless security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2289376 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Cache, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9780071666619/?ar">https://learning.oreilly.com/library/view/~/9780071666619/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071666619/?ar">https://go.oreilly.com/library-access/library/view/-/9780071666619/?ar</a><br/>Format:&#160;Electronic Resources<br/> The secure online business handbook a practical guide to risk management and business continuity ent://SD_ILS/0/SD_ILS:280629 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Reuvid, Jonathan.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=165969">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=165969</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world ent://SD_ILS/0/SD_ILS:2311027 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785889639">https://learning.oreilly.com/library/view/~/9781785889639</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785889639/?ar">https://learning.oreilly.com/library/view/~/9781785889639/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical UNIX and Internet security ent://SD_ILS/0/SD_ILS:2281256 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596003234">https://learning.oreilly.com/library/view/~/0596003234</a> <a href="https://learning.oreilly.com/library/view/~/0596003234/?ar">https://learning.oreilly.com/library/view/~/0596003234/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596003234/?ar">https://go.oreilly.com/library-access/library/view/-/0596003234/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali LInux CTF blueprints : build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux ent://SD_ILS/0/SD_ILS:2303998 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Buchanan, Cameron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783985982/?ar">https://go.oreilly.com/library-access/library/view/-/9781783985982/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783985982/?ar">https://learning.oreilly.com/library/view/~/9781783985982/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security management handbook . Volume 7 ent://SD_ILS/0/SD_ILS:2300299 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;O'Hanley, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar">https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466567498">https://learning.oreilly.com/library/view/~/9781466567498</a> <a href="https://learning.oreilly.com/library/view/~/9781466567498/?ar">https://learning.oreilly.com/library/view/~/9781466567498/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security hacks ent://SD_ILS/0/SD_ILS:2282983 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596527632/?ar">https://go.oreilly.com/library-access/library/view/-/0596527632/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596527632">https://learning.oreilly.com/library/view/~/0596527632</a> <a href="https://learning.oreilly.com/library/view/~/0596527632/?ar">https://learning.oreilly.com/library/view/~/0596527632/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing ent://SD_ILS/0/SD_ILS:2319847 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format:&#160;Electronic Resources<br/> Python network programming : conquer all your networking challenges with the powerful Python language ent://SD_ILS/0/SD_ILS:2319083 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Ratan, Abhishek, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788835466/?ar">https://go.oreilly.com/library-access/library/view/-/9781788835466/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788835466/?ar">https://learning.oreilly.com/library/view/~/9781788835466/?ar</a><br/>Format:&#160;Electronic Resources<br/> Industrial cybersecurity : efficiently secure critical infrastructure systems ent://SD_ILS/0/SD_ILS:2314674 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788395151/?ar">https://learning.oreilly.com/library/view/~/9781788395151/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar">https://go.oreilly.com/library-access/library/view/-/9781788395151/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788395151">https://learning.oreilly.com/library/view/~/9781788395151</a><br/>Format:&#160;Electronic Resources<br/> Mac Security Bible. ent://SD_ILS/0/SD_ILS:2287722 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Kissell, Joe.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar">https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470474198/?ar">https://learning.oreilly.com/library/view/~/9780470474198/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470474198">https://learning.oreilly.com/library/view/~/9780470474198</a><br/>Format:&#160;Electronic Resources<br/> Integrating ISA Server 2006 with Microsoft Exchange 2007 ent://SD_ILS/0/SD_ILS:2285147 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Strachan, Fergus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492751/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492751/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492751/?ar">https://learning.oreilly.com/library/view/~/9781597492751/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security+ ent://SD_ILS/0/SD_ILS:2281559 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Hausman, Kalani Kirk.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0789729105/?ar">https://go.oreilly.com/library-access/library/view/-/0789729105/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0789729105/?ar">https://learning.oreilly.com/library/view/~/0789729105/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0789729105">https://learning.oreilly.com/library/view/~/0789729105</a><br/>Format:&#160;Electronic Resources<br/> Cryptography in C and C++ ent://SD_ILS/0/SD_ILS:2282126 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Welschenbach, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781590595022">https://learning.oreilly.com/library/view/~/9781590595022</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781590595022/?ar">https://go.oreilly.com/library-access/library/view/-/9781590595022/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781590595022/?ar">https://learning.oreilly.com/library/view/~/9781590595022/?ar</a><br/>Format:&#160;Electronic Resources<br/> Thor's Microsoft security bible : a collection of practical security techniques ent://SD_ILS/0/SD_ILS:2291971 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Mullen, Timothy M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495738/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495738/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495738/?ar">https://learning.oreilly.com/library/view/~/9781597495738/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495738">https://learning.oreilly.com/library/view/~/9781597495738</a><br/>Format:&#160;Electronic Resources<br/> Scene of the cybercrime. ent://SD_ILS/0/SD_ILS:2285149 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492768">https://learning.oreilly.com/library/view/~/9781597492768</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492768/?ar">https://learning.oreilly.com/library/view/~/9781597492768/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security for Microsoft Visual Basic .NET ent://SD_ILS/0/SD_ILS:2281971 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Robinson, Ed, 1967-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735619190/?ar">https://go.oreilly.com/library-access/library/view/-/0735619190/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735619190/?ar">https://learning.oreilly.com/library/view/~/0735619190/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735619190">https://learning.oreilly.com/library/view/~/0735619190</a><br/>Format:&#160;Electronic Resources<br/> Developing secure applications with Visual Basic ent://SD_ILS/0/SD_ILS:2282680 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Chapman, Davis Howard.<br/><a href="https://learning.oreilly.com/library/view/~/0672318369/?ar">https://learning.oreilly.com/library/view/~/0672318369/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672318369">https://learning.oreilly.com/library/view/~/0672318369</a> <a href="https://go.oreilly.com/library-access/library/view/-/0672318369/?ar">https://go.oreilly.com/library-access/library/view/-/0672318369/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:2302626 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format:&#160;Electronic Resources<br/> Web security : a whitehat perspective ent://SD_ILS/0/SD_ILS:2306712 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Wu, Hanqing, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592612/?ar">https://learning.oreilly.com/library/view/~/9781466592612/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466592612/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592612/?ar</a><br/>Format:&#160;Electronic Resources<br/> Configuring Check Point NGX VPN-1/FireWall-1 ent://SD_ILS/0/SD_ILS:2282000 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Stephens, Robert (Information security consultant)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490313/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490313/?ar">https://learning.oreilly.com/library/view/~/9781597490313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490313">https://learning.oreilly.com/library/view/~/9781597490313</a><br/>Format:&#160;Electronic Resources<br/> Information security governance simplified : from the boardroom to the keyboard ent://SD_ILS/0/SD_ILS:2293427 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Fitzgerald, Todd.<br/><a href="https://learning.oreilly.com/library/view/~/9781439811658">https://learning.oreilly.com/library/view/~/9781439811658</a> <a href="https://learning.oreilly.com/library/view/~/9781439811658/?ar">https://learning.oreilly.com/library/view/~/9781439811658/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439811658/?ar">https://go.oreilly.com/library-access/library/view/-/9781439811658/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privileged attack vectors : building effective cyber-defense strategies to protect organizations ent://SD_ILS/0/SD_ILS:2314870 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Haber, Morey J., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484230480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230480/?ar">https://learning.oreilly.com/library/view/~/9781484230480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484230480">https://learning.oreilly.com/library/view/~/9781484230480</a><br/>Format:&#160;Electronic Resources<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:2303267 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Stapleton, Jeffrey James.<br/><a href="https://learning.oreilly.com/library/view/~/9781466592155">https://learning.oreilly.com/library/view/~/9781466592155</a> <a href="https://learning.oreilly.com/library/view/~/9781466592155/?ar">https://learning.oreilly.com/library/view/~/9781466592155/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar">https://go.oreilly.com/library-access/library/view/-/9781466592155/?ar</a><br/>Format:&#160;Electronic Resources<br/> Honeypot : a new paradigm to information security ent://SD_ILS/0/SD_ILS:2292506 2024-09-27T04:55:44Z 2024-09-27T04:55:44Z by&#160;Joshi, R. C.<br/><a href="https://learning.oreilly.com/library/view/~/9781578087082">https://learning.oreilly.com/library/view/~/9781578087082</a> <a href="https://learning.oreilly.com/library/view/~/9781578087082/?ar">https://learning.oreilly.com/library/view/~/9781578087082/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar">https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar</a><br/>Format:&#160;Electronic Resources<br/>