Search Results for Computer securitySirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity$0026ps$003d300?dt=list2026-01-13T13:02:50ZComputer securityent://SD_ILS/0/SD_ILS:114392026-01-13T13:02:50Z2026-01-13T13:02:50Zby Gollmann, Dieter<br/>ISBN 0471978442<br/>Format: Books<br/>Computer security basicsent://SD_ILS/0/SD_ILS:22823772026-01-13T13:02:50Z2026-01-13T13:02:50Zby Lehtinen, Rick.<br/>ISBN 0596006691 9780596006693 9781449317423 1449317421<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596006691/?ar">https://go.oreilly.com/library-access/library/view/-/0596006691/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006691">https://learning.oreilly.com/library/view/~/0596006691</a>
<a href="https://learning.oreilly.com/library/view/~/0596006691/?ar">https://learning.oreilly.com/library/view/~/0596006691/?ar</a><br/>Format: Electronic Resources<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:22946552026-01-13T13:02:50Z2026-01-13T13:02:50Zby Easttom, Chuck.<br/>ISBN 0132828286 9780132828284<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar">https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132828284/?ar">https://learning.oreilly.com/library/view/~/9780132828284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132828284">https://learning.oreilly.com/library/view/~/9780132828284</a><br/>Format: Electronic Resources<br/>Computer security handbookent://SD_ILS/0/SD_ILS:114602026-01-13T13:02:50Z2026-01-13T13:02:50Zby Bosworth, Seymour.<br/>ISBN 0471412589<br/>Format: Books<br/>Computer security handbook.ent://SD_ILS/0/SD_ILS:22870292026-01-13T13:02:50Z2026-01-13T13:02:50Zby Bosworth, Seymour.<br/>ISBN 9780470413746 0470413743 0471716529 9780471716525 9781119706724<br/><a href="https://learning.oreilly.com/library/view/~/9780471716525/?ar">https://learning.oreilly.com/library/view/~/9780471716525/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780471716525/?ar">https://go.oreilly.com/library-access/library/view/-/9780471716525/?ar</a><br/>Format: Electronic Resources<br/>Computer Security Literacyent://SD_ILS/0/SD_ILS:23234262026-01-13T13:02:50Z2026-01-13T13:02:50Zby Jacobson, Douglas, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856192/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856192/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856192/?ar">https://learning.oreilly.com/library/view/~/9781439856192/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856192">https://learning.oreilly.com/library/view/~/9781439856192</a><br/>Format: Electronic Resources<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:23109912026-01-13T13:02:50Z2026-01-13T13:02:50Zby Easttom, Chuck, author.<br/>ISBN 9780134470573 0134470575<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format: Electronic Resources<br/>Computer network securityent://SD_ILS/0/SD_ILS:22742112026-01-13T13:02:50Z2026-01-13T13:02:50Zby Sadiqui, Ali, author.<br/>ISBN 9781119706748 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6123268">Click to View</a><br/>Format: Electronic Resources<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:23236272026-01-13T13:02:50Z2026-01-13T13:02:50Zby Sadiqui, Ali, author.<br/>ISBN 9781119706748 1119706742 9781119706762 1119706769 9781119706724<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar">https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786305275">https://learning.oreilly.com/library/view/~/9781786305275</a>
<a href="https://learning.oreilly.com/library/view/~/9781786305275/?ar">https://learning.oreilly.com/library/view/~/9781786305275/?ar</a><br/>Format: Electronic Resources<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:5043732026-01-13T13:02:50Z2026-01-13T13:02:50Zby Kizza, Joseph Migga. author.<br/>ISBN 9780387252285<br/><a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format: Electronic Resources<br/>Introduction to Computer Security.ent://SD_ILS/0/SD_ILS:23179802026-01-13T13:02:50Z2026-01-13T13:02:50Zby Bishop, Matt (Matthew A.), author.<br/>ISBN 0321247442 9780321247445<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321247442/?ar">https://go.oreilly.com/library-access/library/view/-/0321247442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321247442/?ar">https://learning.oreilly.com/library/view/~/0321247442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321247442">https://learning.oreilly.com/library/view/~/0321247442</a><br/>Format: Electronic Resources<br/>Computer Security : Art and Science.ent://SD_ILS/0/SD_ILS:23180122026-01-13T13:02:50Z2026-01-13T13:02:50Zby Bishop, Matthew A. (Matthew A.) author.<br/>ISBN 0201440997 9780201440997<br/><a href="https://learning.oreilly.com/library/view/~/0201440997">https://learning.oreilly.com/library/view/~/0201440997</a>
<a href="https://learning.oreilly.com/library/view/~/0201440997/?ar">https://learning.oreilly.com/library/view/~/0201440997/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0201440997/?ar">https://go.oreilly.com/library-access/library/view/-/0201440997/?ar</a><br/>Format: Electronic Resources<br/>Computer Security Handbook, Set.ent://SD_ILS/0/SD_ILS:12693372026-01-13T13:02:50Z2026-01-13T13:02:50Zby Bosworth, Seymour.<br/>ISBN 9781118851791<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1652940">Click to View</a><br/>Format: Electronic Resources<br/>Foundations of Computer Securityent://SD_ILS/0/SD_ILS:5085252026-01-13T13:02:50Z2026-01-13T13:02:50Zby Salomon, David. author.<br/>ISBN 9781846283413<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Electronic Resources<br/>Computer security and cryptographyent://SD_ILS/0/SD_ILS:22830572026-01-13T13:02:50Z2026-01-13T13:02:50Zby Konheim, Alan G., 1934-<br/>ISBN 9780470083970 0470083972 9780470083987 0470083980<br/><a href="https://learning.oreilly.com/library/view/~/9780471947837">https://learning.oreilly.com/library/view/~/9780471947837</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar">https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780471947837/?ar">https://learning.oreilly.com/library/view/~/9780471947837/?ar</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:20483782026-01-13T13:02:50Z2026-01-13T13:02:50Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=453166">Click to View</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:22868042026-01-13T13:02:50Z2026-01-13T13:02:50Zby Vacca, John R.<br/>ISBN 9780080921945 0080921949 0123743540 9780123743541<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a>
<a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format: Electronic Resources<br/>Computer security: art and scienceent://SD_ILS/0/SD_ILS:113982026-01-13T13:02:50Z2026-01-13T13:02:50Zby Bishop, Matt.<br/>ISBN 0201440997<br/>Format: Books<br/>Computer Security : QuickStudy Reference Guide.ent://SD_ILS/0/SD_ILS:20963302026-01-13T13:02:50Z2026-01-13T13:02:50Zby BarCharts, Inc.<br/>ISBN 9781423223573<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4876967">Click to View</a><br/>Format: Electronic Resources<br/>Computer and Information Security Handbook.ent://SD_ILS/0/SD_ILS:12586122026-01-13T13:02:50Z2026-01-13T13:02:50Zby Vacca, John R.<br/>ISBN 9780123946126<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1195617">Click to View</a><br/>Format: Electronic Resources<br/>Information Assurance and Computer Security.ent://SD_ILS/0/SD_ILS:11907422026-01-13T13:02:50Z2026-01-13T13:02:50Zby Thomas, J.P.<br/>ISBN 9781607502098<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=287000">Click to View</a><br/>Format: Electronic Resources<br/>Computer and Network Security Essentialsent://SD_ILS/0/SD_ILS:20882952026-01-13T13:02:50Z2026-01-13T13:02:50Zby Daimi, Kevin. editor.<br/>ISBN 9783319584249<br/><a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format: Electronic Resources<br/>Computer and network security essentialsent://SD_ILS/0/SD_ILS:23465442026-01-13T13:02:50Z2026-01-13T13:02:50Zby Daimi, Kevin, editor.<br/>ISBN 9783319584249 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4947026">Click to View</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:23430152026-01-13T13:02:50Z2026-01-13T13:02:50Zby Vacca, John R., editor.<br/>ISBN 9780123943972<br/>Format: Books<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:23133012026-01-13T13:02:50Z2026-01-13T13:02:50Zby Vacca, John R., editor.<br/>ISBN 9780128039298 0128039299<br/><a href="https://learning.oreilly.com/library/view/~/9780128039298">https://learning.oreilly.com/library/view/~/9780128039298</a>
<a href="https://learning.oreilly.com/library/view/~/9780128039298/?ar">https://learning.oreilly.com/library/view/~/9780128039298/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar">https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:22123012026-01-13T13:02:50Z2026-01-13T13:02:50Zby Vacca, John R., editor.<br/>ISBN 9780128039298 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4858374">Click to View</a><br/>Format: Electronic Resources<br/>Computer security : art and scienceent://SD_ILS/0/SD_ILS:23184522026-01-13T13:02:50Z2026-01-13T13:02:50Zby Bishop, Matt (Matthew A.), author.<br/>ISBN 9780134097145 0134097149<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format: Electronic Resources<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:22612152026-01-13T13:02:50Z2026-01-13T13:02:50Zby Seigneur, Jean-Marc.<br/>ISBN 9781605664156 (ebook) 1605664154<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format: Electronic Resources<br/>Computer incident response and product securityent://SD_ILS/0/SD_ILS:22917152026-01-13T13:02:50Z2026-01-13T13:02:50Zby Rajnovic, Damir, 1965-<br/>ISBN 0132491516 9780132491518 1587052644 9781587052644<br/><a href="https://learning.oreilly.com/library/view/~/9780132491518">https://learning.oreilly.com/library/view/~/9780132491518</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132491518/?ar">https://go.oreilly.com/library-access/library/view/-/9780132491518/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132491518/?ar">https://learning.oreilly.com/library/view/~/9780132491518/?ar</a><br/>Format: Electronic Resources<br/>Computer security and encryption : an introductionent://SD_ILS/0/SD_ILS:22376602026-01-13T13:02:50Z2026-01-13T13:02:50Zby Chauhan, S. R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6404902">Click to View</a><br/>Format: Electronic Resources<br/>Computer science security : concepts and toolsent://SD_ILS/0/SD_ILS:23340352026-01-13T13:02:50Z2026-01-13T13:02:50Zby Zaidoun, Ameur Salem, author.<br/>ISBN 9781394163823 1394163827 9781394163847 1394163843<br/><a href="https://learning.oreilly.com/library/view/~/9781786307552/?ar">https://learning.oreilly.com/library/view/~/9781786307552/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar">https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786307552">https://learning.oreilly.com/library/view/~/9781786307552</a><br/>Format: Electronic Resources<br/>The Essential Guide to Home Computer Security.ent://SD_ILS/0/SD_ILS:12356562026-01-13T13:02:50Z2026-01-13T13:02:50Zby R. Rowlingson, Robert.<br/>ISBN 9781780171081<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=811317">Click to View</a><br/>Format: Electronic Resources<br/>Computer and information security handbook, second editionent://SD_ILS/0/SD_ILS:23001972026-01-13T13:02:50Z2026-01-13T13:02:50Zby Vacca, John R.<br/>ISBN 9780123946126 0123946123 0123943973 9780123943972<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar">https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123943972/?ar">https://learning.oreilly.com/library/view/~/9780123943972/?ar</a><br/>Format: Electronic Resources<br/>Computer Security in the 21st Centuryent://SD_ILS/0/SD_ILS:5042522026-01-13T13:02:50Z2026-01-13T13:02:50Zby Lee, D. T. editor.<br/>ISBN 9780387240060<br/><a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Electronic Resources<br/>Conducting computer security assessments at nuclear facilities.ent://SD_ILS/0/SD_ILS:20996742026-01-13T13:02:50Z2026-01-13T13:02:50Z<a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4853352">Click to View</a><br/>Format: Electronic Resources<br/>Information assurance handbook : effective computer security and risk management strategiesent://SD_ILS/0/SD_ILS:23048752026-01-13T13:02:50Z2026-01-13T13:02:50Zby Schou, Corey.<br/>ISBN 9780071826310 0071826319<br/><a href="https://learning.oreilly.com/library/view/~/9780071821650">https://learning.oreilly.com/library/view/~/9780071821650</a>
<a href="https://learning.oreilly.com/library/view/~/9780071821650/?ar">https://learning.oreilly.com/library/view/~/9780071821650/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar">https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar</a><br/>Format: Electronic Resources<br/>Computer communications security :principles, standard protocols and techniquesent://SD_ILS/0/SD_ILS:48832026-01-13T13:02:50Z2026-01-13T13:02:50Zby Ford, Warwick.<br/>ISBN 0137994532<br/>Format: Books<br/>Network Security JumpStart : Computer and Network Security Basics.ent://SD_ILS/0/SD_ILS:11883262026-01-13T13:02:50Z2026-01-13T13:02:50Zby Strebe, Matthew.<br/>ISBN 9780782152098<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=272216">Click to View</a><br/>Format: Electronic Resources<br/>Biometrics, Computer Security Systems and Artificial Intelligence Applicationsent://SD_ILS/0/SD_ILS:5054262026-01-13T13:02:50Z2026-01-13T13:02:50Zby Saeed, Khalid. editor.<br/>ISBN 9780387365039<br/><a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format: Electronic Resources<br/>Analyzing computer security : a threat/vulnerability/countermeasure approachent://SD_ILS/0/SD_ILS:22918062026-01-13T13:02:50Z2026-01-13T13:02:50Zby Pfleeger, Charles P., 1948-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar">https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132789493/?ar">https://learning.oreilly.com/library/view/~/9780132789493/?ar</a><br/>Format: Electronic Resources<br/>Using computer science in high-tech security careersent://SD_ILS/0/SD_ILS:23407512026-01-13T13:02:50Z2026-01-13T13:02:50Zby Mooney, Carla, 1970- author.<br/>ISBN 9781508187141 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5794501">Click to View</a><br/>Format: Electronic Resources<br/>Computer security incident response planning at nuclear facilitiesent://SD_ILS/0/SD_ILS:21328162026-01-13T13:02:50Z2026-01-13T13:02:50Zby International Atomic Energy Agency.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4853353">Click to View</a><br/>Format: Electronic Resources<br/>Principles of computer security : CompTIA Security+ and beyondent://SD_ILS/0/SD_ILS:23308102026-01-13T13:02:50Z2026-01-13T13:02:50Zby Conklin, Wm. Arthur (William Arthur), author.<br/>ISBN 9781260474329 1260474321<br/><a href="https://learning.oreilly.com/library/view/~/9781260474329">https://learning.oreilly.com/library/view/~/9781260474329</a>
<a href="https://learning.oreilly.com/library/view/~/9781260474329/?ar">https://learning.oreilly.com/library/view/~/9781260474329/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260474329/?ar">https://go.oreilly.com/library-access/library/view/-/9781260474329/?ar</a><br/>Format: Electronic Resources<br/>Security, Privacy and Reliability in Computer Communications and Networks.ent://SD_ILS/0/SD_ILS:23420792026-01-13T13:02:50Z2026-01-13T13:02:50Zby Sha, Kewei.<br/>ISBN 9788793379909<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=30251744">Click to View</a><br/>Format: Electronic Resources<br/>Security, privacy and reliability in computer communications and networksent://SD_ILS/0/SD_ILS:21438162026-01-13T13:02:50Z2026-01-13T13:02:50Zby Sha, Kewei, editor.<br/>ISBN 9788793379909 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4771355">Click to View</a><br/>Format: Electronic Resources<br/>Securing the Cloud : Cloud Computer Security Techniques and Tactics.ent://SD_ILS/0/SD_ILS:12271702026-01-13T13:02:50Z2026-01-13T13:02:50Zby Winkler, Vic (J.R.).<br/>ISBN 9781597495936<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=686827">Click to View</a><br/>Format: Electronic Resources<br/>Securing the cloud : cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:22924912026-01-13T13:02:50Z2026-01-13T13:02:50Zby Winkler, J. R. (Joachim R.)<br/>ISBN 9781597495936 159749593X<br/><a href="https://learning.oreilly.com/library/view/~/9781597495929">https://learning.oreilly.com/library/view/~/9781597495929</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495929/?ar">https://learning.oreilly.com/library/view/~/9781597495929/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar</a><br/>Format: Electronic Resources<br/>Computer security, privacy, and politics current issues, challenges, and solutionsent://SD_ILS/0/SD_ILS:22612352026-01-13T13:02:50Z2026-01-13T13:02:50Zby Subramanian, Ramesh.<br/>ISBN 9781599048062 (ebook) 159904806X<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-804-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-804-8</a><br/>Format: Electronic Resources<br/>Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systemsent://SD_ILS/0/SD_ILS:5041792026-01-13T13:02:50Z2026-01-13T13:02:50Zby Pejaś, Jerzy. editor.<br/>ISBN 9780387234847<br/><a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format: Electronic Resources<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:23134822026-01-13T13:02:50Z2026-01-13T13:02:50Zby Brooks, R. R. (Richard R.)<br/>ISBN 9781482214123 1482214121<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format: Electronic Resources<br/>Risk Management for Computer Security : Protecting Your Network and Information Assets.ent://SD_ILS/0/SD_ILS:11921852026-01-13T13:02:50Z2026-01-13T13:02:50Zby Jones, Andy.<br/>ISBN 9780080491554<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294671">Click to View</a><br/>Format: Electronic Resources<br/>Machine learning for computer and cyber security : principles, algorithms, and practicesent://SD_ILS/0/SD_ILS:23555232026-01-13T13:02:50Z2026-01-13T13:02:50Zby Gupta, Brij, 1982- editor.<br/>ISBN 9780429995729 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5675759">Click to View</a><br/>Format: Electronic Resources<br/>VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Securityent://SD_ILS/0/SD_ILS:5033402026-01-13T13:02:50Z2026-01-13T13:02:50Zby Goodall, John R. editor.<br/>ISBN 9783540782438<br/><a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format: Electronic Resources<br/>Machine Learning and Data Mining for Computer Security Methods and Applicationsent://SD_ILS/0/SD_ILS:5084772026-01-13T13:02:50Z2026-01-13T13:02:50Zby Maloof, Marcus A. editor.<br/>ISBN 9781846282539<br/><a href="http://dx.doi.org/10.1007/1-84628-253-5">http://dx.doi.org/10.1007/1-84628-253-5</a><br/>Format: Electronic Resources<br/>Essential Computer Security : Everyone's Guide to Email, Internet, and Wireless Security.ent://SD_ILS/0/SD_ILS:11958462026-01-13T13:02:50Z2026-01-13T13:02:50Zby Bradley, T.<br/>ISBN 9780080505893<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=319200">Click to View</a><br/>Format: Electronic Resources<br/>Principles of computer security : CompTIA security+ and beyond, (exam SY0-501)ent://SD_ILS/0/SD_ILS:23168972026-01-13T13:02:50Z2026-01-13T13:02:50Zby Conklin, Wm. Arthur (William Arthur), author.<br/>ISBN 9781260026009 1260026000<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260026009/?ar">https://go.oreilly.com/library-access/library/view/-/9781260026009/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260026009/?ar">https://learning.oreilly.com/library/view/~/9781260026009/?ar</a><br/>Format: Electronic Resources<br/>Computer security of instrumentation and control systems at nuclear facilities : technical guidance.ent://SD_ILS/0/SD_ILS:22307812026-01-13T13:02:50Z2026-01-13T13:02:50Z<a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5426853">Click to View</a><br/>Format: Electronic Resources<br/>Essential computer security everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:643242026-01-13T13:02:50Z2026-01-13T13:02:50Zby Bradley, Tony, 1969-<br/>ISBN 9781597491143 1597491144<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Essential computer security : everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:23160262026-01-13T13:02:50Z2026-01-13T13:02:50Zby Bradley, Tony, 1969- author.<br/>ISBN 9780080505893 0080505899 9781429417662 1429417668 9781597491594<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491143/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491143/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491143/?ar">https://learning.oreilly.com/library/view/~/9781597491143/?ar</a><br/>Format: Electronic Resources<br/>Principles of Computer Security : CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)ent://SD_ILS/0/SD_ILS:23296552026-01-13T13:02:50Z2026-01-13T13:02:50Zby Weissman, Jonathan, author.<br/>ISBN 1260470121 9781260470123<br/><a href="https://learning.oreilly.com/library/view/~/9781260470123">https://learning.oreilly.com/library/view/~/9781260470123</a>
<a href="https://learning.oreilly.com/library/view/~/9781260470123/?ar">https://learning.oreilly.com/library/view/~/9781260470123/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260470123/?ar">https://go.oreilly.com/library-access/library/view/-/9781260470123/?ar</a><br/>Format: Electronic Resources<br/>Computer security aspects of design for instrumentation and control systems at nuclear power plantsent://SD_ILS/0/SD_ILS:23536342026-01-13T13:02:50Z2026-01-13T13:02:50Zby International Atomic Energy Agency, author.<br/>ISBN 9789201090201 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6482097">Click to View</a><br/>Format: Electronic Resources<br/>The myths of security : what the computer security industry doesn't want you to knowent://SD_ILS/0/SD_ILS:22869382026-01-13T13:02:50Z2026-01-13T13:02:50Zby Viega, John.<br/>ISBN 9780596555832 0596555830 9780596803957 0596803958<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar">https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596803957/?ar">https://learning.oreilly.com/library/view/~/9780596803957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596803957">https://learning.oreilly.com/library/view/~/9780596803957</a><br/>Format: Electronic Resources<br/>The myths of security : what the computer security industry doesn't want you to knowent://SD_ILS/0/SD_ILS:21065612026-01-13T13:02:50Z2026-01-13T13:02:50Zby Viega, John.<br/>ISBN 9780596551247 059655124X 9780596555832 0596555830<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821</a><br/>Format: Electronic Resources<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:20848032026-01-13T13:02:50Z2026-01-13T13:02:50Zby Petrenko, Sergei. author.<br/>ISBN 9783319790367<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Firewalls don't stop dragons : a step-by-step guide to computer security for non-techiesent://SD_ILS/0/SD_ILS:23172282026-01-13T13:02:50Z2026-01-13T13:02:50Zby Parker, Carey, author.<br/>ISBN 9781484238523 1484238524 9781484238530 1484238532<br/><a href="https://learning.oreilly.com/library/view/~/9781484238523">https://learning.oreilly.com/library/view/~/9781484238523</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238523/?ar">https://learning.oreilly.com/library/view/~/9781484238523/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484238523/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238523/?ar</a><br/>Format: Electronic Resources<br/>Firewalls don't stop dragons : a step-by-step guide to computer security for non-techiesent://SD_ILS/0/SD_ILS:23257732026-01-13T13:02:50Z2026-01-13T13:02:50Zby Parker, Carey, author.<br/>ISBN 9781484261897 1484261895<br/><a href="https://learning.oreilly.com/library/view/~/9781484261897">https://learning.oreilly.com/library/view/~/9781484261897</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261897/?ar">https://learning.oreilly.com/library/view/~/9781484261897/?ar</a><br/>Format: Electronic Resources<br/>Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036702026-01-13T13:02:50Z2026-01-13T13:02:50Zby Goodall, John R. editor.<br/>ISBN 9783540859338<br/><a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858052026-01-13T13:02:50Z2026-01-13T13:02:50Zby Skavhaug, Amund. editor.<br/>ISBN 9783319454771<br/><a href="https://doi.org/10.1007/978-3-319-45477-1">https://doi.org/10.1007/978-3-319-45477-1</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103662026-01-13T13:02:50Z2026-01-13T13:02:50Zby Winther, Rune. editor.<br/>ISBN 9783540320005<br/><a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117322026-01-13T13:02:50Z2026-01-13T13:02:50Zby Górski, Janusz. editor.<br/>ISBN 9783540457633<br/><a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128712026-01-13T13:02:50Z2026-01-13T13:02:50Zby Saglietti, Francesca. editor.<br/>ISBN 9783540751014<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 37th International Conference, SAFECOMP 2018, Västerås, Sweden, September 19-21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855842026-01-13T13:02:50Z2026-01-13T13:02:50Zby Gallina, Barbara. editor. (orcid)0000-0002-6952-1053<br/>ISBN 9783319991306<br/><a href="https://doi.org/10.1007/978-3-319-99130-6">https://doi.org/10.1007/978-3-319-99130-6</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security SAFECOMP 2016 Workshops, ASSURE, DECSoS, SASSUR, and TIPS, Trondheim, Norway, September 20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20862072026-01-13T13:02:50Z2026-01-13T13:02:50Zby Skavhaug, Amund. editor.<br/>ISBN 9783319454801<br/><a href="https://doi.org/10.1007/978-3-319-45480-1">https://doi.org/10.1007/978-3-319-45480-1</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116812026-01-13T13:02:50Z2026-01-13T13:02:50Zby Gollmann, Dieter. editor.<br/>ISBN 9783540446057<br/><a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038182026-01-13T13:02:50Z2026-01-13T13:02:50Zby Matsuura, Kanta. editor.<br/>ISBN 9783540895985<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128462026-01-13T13:02:50Z2026-01-13T13:02:50Zby Biskup, Joachim. editor.<br/>ISBN 9783540748359<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037492026-01-13T13:02:50Z2026-01-13T13:02:50Zby Jajodia, Sushil. editor.<br/>ISBN 9783540883135<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129272026-01-13T13:02:50Z2026-01-13T13:02:50Zby Miyaji, Atsuko. editor.<br/>ISBN 9783540756514<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118522026-01-13T13:02:50Z2026-01-13T13:02:50Zby Yoshiura, Hiroshi. editor.<br/>ISBN 9783540477006<br/><a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037082026-01-13T13:02:50Z2026-01-13T13:02:50Zby Harrison, Michael D. editor.<br/>ISBN 9783540876984<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103512026-01-13T13:02:50Z2026-01-13T13:02:50Zby Vimercati, Sabrina de Capitani. editor.<br/>ISBN 9783540319818<br/><a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format: Electronic Resources<br/>Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860192026-01-13T13:02:50Z2026-01-13T13:02:50Zby Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/>ISBN 9783319728179<br/><a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security SAFECOMP 2018 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Västerås, Sweden, September 18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853402026-01-13T13:02:50Z2026-01-13T13:02:50Zby Gallina, Barbara. editor. (orcid)0000-0002-6952-1053<br/>ISBN 9783319992297<br/><a href="https://doi.org/10.1007/978-3-319-99229-7">https://doi.org/10.1007/978-3-319-99229-7</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854982026-01-13T13:02:50Z2026-01-13T13:02:50Zby Inomata, Atsuo. editor.<br/>ISBN 9783319979168<br/><a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858872026-01-13T13:02:50Z2026-01-13T13:02:50Zby Ogawa, Kazuto. editor.<br/>ISBN 9783319445243<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20851982026-01-13T13:02:50Z2026-01-13T13:02:50Zby Lopez, Javier. editor.<br/>ISBN 9783319990736<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20851862026-01-13T13:02:50Z2026-01-13T13:02:50Zby Lopez, Javier. editor.<br/>ISBN 9783319989891<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20854392026-01-13T13:02:50Z2026-01-13T13:02:50Zby Askoxylakis, Ioannis. editor.<br/>ISBN 9783319457444<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856762026-01-13T13:02:50Z2026-01-13T13:02:50Zby Askoxylakis, Ioannis. editor.<br/>ISBN 9783319457413<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129892026-01-13T13:02:50Z2026-01-13T13:02:50Zby Cervesato, Iliano. editor.<br/>ISBN 9783540769293<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Electronic Resources<br/>Security in Computer and Information Sciences : First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:21848892026-01-13T13:02:50Z2026-01-13T13:02:50Zby Gelenbe, Erol<br/>ISBN 978-3-319-95189-8<br/><a href="https://library.oapen.org/bitstream/20.500.12657/23295/1/1006860.pdf">DOAB: download the publication</a>
<a href="https://directory.doabooks.org/handle/20.500.12854/27012">DOAB: description of the publication</a><br/>Format: Books<br/>Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849922026-01-13T13:02:50Z2026-01-13T13:02:50Zby Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201<br/>ISBN 9783319951898<br/><a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format: Electronic Resources<br/>Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103642026-01-13T13:02:50Z2026-01-13T13:02:50Zby Gorodetsky, Vladimir. editor.<br/>ISBN 9783540319986<br/><a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format: Electronic Resources<br/>Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015462026-01-13T13:02:50Z2026-01-13T13:02:50Zby Jajodia, Sushil. editor.<br/>ISBN 9780387096995<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Electronic Resources<br/>Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5127452026-01-13T13:02:50Z2026-01-13T13:02:50Zby Gorodetsky, Vladimir. editor.<br/>ISBN 9783540739869<br/><a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, Franceent://SD_ILS/0/SD_ILS:5042642026-01-13T13:02:50Z2026-01-13T13:02:50Zby Dimitrakos, Theo. editor.<br/>ISBN 9780387240985<br/><a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842652026-01-13T13:02:50Z2026-01-13T13:02:50Zby Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/>ISBN 9783319998282<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Electronic Resources<br/>Information Security Education – Towards a Cybersecure Society 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20843462026-01-13T13:02:50Z2026-01-13T13:02:50Zby Drevin, Lynette. editor. (orcid)0000-0001-9370-8216<br/>ISBN 9783319997346<br/><a href="https://doi.org/10.1007/978-3-319-99734-6">https://doi.org/10.1007/978-3-319-99734-6</a><br/>Format: Electronic Resources<br/>Network Control and Engineering for Qos, Security and Mobility, V IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20–25, 2006, Santiago, Chileent://SD_ILS/0/SD_ILS:5053512026-01-13T13:02:50Z2026-01-13T13:02:50Zby Gaïti, Dominique. editor.<br/>ISBN 9780387348278<br/><a href="http://dx.doi.org/10.1007/978-0-387-34827-8">http://dx.doi.org/10.1007/978-0-387-34827-8</a><br/>Format: Electronic Resources<br/>Podstawy ochrony komputerówent://SD_ILS/0/SD_ILS:22995462026-01-13T13:02:50Z2026-01-13T13:02:50Zby Lehtinen, Rick.<br/>ISBN 9781457172618 1457172615 9781457172588 1457172585<br/><a href="https://learning.oreilly.com/library/view/~/9781457172618">https://learning.oreilly.com/library/view/~/9781457172618</a>
<a href="https://learning.oreilly.com/library/view/~/9781457172618/?ar">https://learning.oreilly.com/library/view/~/9781457172618/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457172618/?ar">https://go.oreilly.com/library-access/library/view/-/9781457172618/?ar</a><br/>Format: Electronic Resources<br/>Firewall Design and Analysis.ent://SD_ILS/0/SD_ILS:12306452026-01-13T13:02:50Z2026-01-13T13:02:50Zby Liu, Alex X.<br/>ISBN 9789814261661<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=731297">Click to View</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security and Assuranceent://SD_ILS/0/SD_ILS:23417222026-01-13T13:02:50Z2026-01-13T13:02:50Zby Clarke, Nathan, editor.<br/>ISBN 9781803821306<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6870870">Click to View</a><br/>Format: Electronic Resources<br/>Role-Based Access Control.ent://SD_ILS/0/SD_ILS:11975332026-01-13T13:02:50Z2026-01-13T13:02:50Zby Ferraiolo, David F.<br/>ISBN 9781596931145<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338751">Click to View</a><br/>Format: Electronic Resources<br/>Practical UNIX and Internet securityent://SD_ILS/0/SD_ILS:22812562026-01-13T13:02:50Z2026-01-13T13:02:50Zby Garfinkel, Simson.<br/>ISBN 9781449310325 144931032X 9781449310127 1449310125<br/><a href="https://learning.oreilly.com/library/view/~/0596003234">https://learning.oreilly.com/library/view/~/0596003234</a>
<a href="https://learning.oreilly.com/library/view/~/0596003234/?ar">https://learning.oreilly.com/library/view/~/0596003234/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596003234/?ar">https://go.oreilly.com/library-access/library/view/-/0596003234/?ar</a><br/>Format: Electronic Resources<br/>Trust and Security in Collaborative Computing.ent://SD_ILS/0/SD_ILS:12706882026-01-13T13:02:50Z2026-01-13T13:02:50Zby Zou, Xukai.<br/>ISBN 9789812790880<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679354">Click to View</a><br/>Format: Electronic Resources<br/>Security in Ad-Hoc and Sensor Networks.ent://SD_ILS/0/SD_ILS:12706872026-01-13T13:02:50Z2026-01-13T13:02:50Zby Beyah, Raheem.<br/>ISBN 9789814271097<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679353">Click to View</a><br/>Format: Electronic Resources<br/>Security in Distributed and Networking Systems.ent://SD_ILS/0/SD_ILS:12583272026-01-13T13:02:50Z2026-01-13T13:02:50Zby Xiao, Yang.<br/>ISBN 9789812770103<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1193126">Click to View</a><br/>Format: Electronic Resources<br/>Papers from the HAISA 2007 Symposium : Papers from the HAISA 2007 Symposium.ent://SD_ILS/0/SD_ILS:11965652026-01-13T13:02:50Z2026-01-13T13:02:50Zby Furnell, Steven.<br/>ISBN 9781846636974<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328737">Click to View</a><br/>Format: Electronic Resources<br/>Hands on hackingent://SD_ILS/0/SD_ILS:23254522026-01-13T13:02:50Z2026-01-13T13:02:50Zby Hickey, Matthew (Computer security expert), author.<br/>ISBN 9781119561507 1119561507 9781119561484 1119561485 1119561515<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkitent://SD_ILS/0/SD_ILS:22958232026-01-13T13:02:50Z2026-01-13T13:02:50Zby Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis DVD toolkit 2Eent://SD_ILS/0/SD_ILS:22878022026-01-13T13:02:50Z2026-01-13T13:02:50Zby Carvey, Harlan A.<br/>ISBN 9780080957036 008095703X<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format: Electronic Resources<br/>Information hidingent://SD_ILS/0/SD_ILS:21558192026-01-13T13:02:50Z2026-01-13T13:02:50Zby Katzenbeisser, Stefan, author.<br/>ISBN 9781608079292 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4821270">Click to View</a><br/>Format: Electronic Resources<br/>Platform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engineent://SD_ILS/0/SD_ILS:23042752026-01-13T13:02:50Z2026-01-13T13:02:50Zby Ruan, Xiaoyu, author.<br/>ISBN 9781430265726 1430265728 143026571X 9781430265719<br/><a href="https://learning.oreilly.com/library/view/~/9781430265726/?ar">https://learning.oreilly.com/library/view/~/9781430265726/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430265726">https://learning.oreilly.com/library/view/~/9781430265726</a><br/>Format: Electronic Resources<br/>Advanced host intrusion prevention with CSAent://SD_ILS/0/SD_ILS:22822002026-01-13T13:02:50Z2026-01-13T13:02:50Zby Sullivan, Chad.<br/>ISBN 9781587052521 1587052520 8131737764 9788131737767 1282654616<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587052520/?ar">https://go.oreilly.com/library-access/library/view/-/1587052520/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587052520">https://learning.oreilly.com/library/view/~/1587052520</a>
<a href="https://learning.oreilly.com/library/view/~/1587052520/?ar">https://learning.oreilly.com/library/view/~/1587052520/?ar</a><br/>Format: Electronic Resources<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013.ent://SD_ILS/0/SD_ILS:12745852026-01-13T13:02:50Z2026-01-13T13:02:50Zby Furnell, Steven.<br/>ISBN 9781784412470<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1752831">Click to View</a><br/>Format: Electronic Resources<br/>Counter hack reloaded : a step-by-step guide to computer attacks and effective defensesent://SD_ILS/0/SD_ILS:22831032026-01-13T13:02:50Z2026-01-13T13:02:50Zby Skoudis, Ed.<br/>ISBN 9780131481046 0131481045 9780132704533 0132704536<br/><a href="https://learning.oreilly.com/library/view/~/9780131481046/?ar">https://learning.oreilly.com/library/view/~/9780131481046/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar">https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar</a><br/>Format: Electronic Resources<br/>Toward Better Usability, Security, and Privacy of Information Technology : Report of a Workshop.ent://SD_ILS/0/SD_ILS:13205012026-01-13T13:02:50Z2026-01-13T13:02:50Zby Steering Committee on the Usability, Security, and Privacy of Computer Systems.<br/>ISBN 9780309160919<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3378675">Click to View</a><br/>Format: Electronic Resources<br/>Internet Denial of Service: Attack and Defense Mechanismsent://SD_ILS/0/SD_ILS:23267952026-01-13T13:02:50Z2026-01-13T13:02:50Zby Mirkovic, Jelena, author.<br/>ISBN 9780131475731 0131475738<br/><a href="https://learning.oreilly.com/library/view/~/0131475738/?ar">https://learning.oreilly.com/library/view/~/0131475738/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131475738/?ar">https://go.oreilly.com/library-access/library/view/-/0131475738/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131475738">https://learning.oreilly.com/library/view/~/0131475738</a><br/>Format: Electronic Resources<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:22862452026-01-13T13:02:50Z2026-01-13T13:02:50Zby Qian, Yi, 1962-<br/>ISBN 9780123735669 0123735661 9780080555881 0080555888<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar">https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123735669/?ar">https://learning.oreilly.com/library/view/~/9780123735669/?ar</a><br/>Format: Electronic Resources<br/>Web security for developersent://SD_ILS/0/SD_ILS:23244222026-01-13T13:02:50Z2026-01-13T13:02:50Zby McDonald, Malcolm (Computer programmer), author.<br/>ISBN 1593279957 9781593279950<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122683/?ar">https://learning.oreilly.com/library/view/~/9781098122683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122683">https://learning.oreilly.com/library/view/~/9781098122683</a><br/>Format: Electronic Resources<br/>Emerging and Readily Available Technologies and National Security : A Framework for Addressing Ethical, Legal, and Societal Issues.ent://SD_ILS/0/SD_ILS:13210012026-01-13T13:02:50Z2026-01-13T13:02:50Zby Board, Computer Science and Telecommunications.<br/>ISBN 9780309293358<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3379188">Click to View</a><br/>Format: Electronic Resources<br/>Network and internetwork security: principles and practice.ent://SD_ILS/0/SD_ILS:37212026-01-13T13:02:50Z2026-01-13T13:02:50Zby Stallings, William.<br/>ISBN 0131800507<br/>Format: Books<br/>The CERT guide to system and network security practicesent://SD_ILS/0/SD_ILS:117982026-01-13T13:02:50Z2026-01-13T13:02:50Zby Allen, Julia H.<br/>ISBN 020173723X<br/>Format: Books<br/>How cyber security can protect your business : a guide for all stakeholdersent://SD_ILS/0/SD_ILS:23230602026-01-13T13:02:50Z2026-01-13T13:02:50Zby Wright, Christopher, author.<br/>ISBN 9781787781962 1787781968<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781979/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781979/?ar">https://learning.oreilly.com/library/view/~/9781787781979/?ar</a><br/>Format: Electronic Resources<br/>Intro to secure software : building security systemsent://SD_ILS/0/SD_ILS:23101562026-01-13T13:02:50Z2026-01-13T13:02:50Zby Sletten, Brian, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781491943595/?ar">https://learning.oreilly.com/videos/~/9781491943595/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491943595/?ar">https://go.oreilly.com/library-access/library/view/-/9781491943595/?ar</a><br/>Format: Electronic Resources<br/>Protective security : creating military-grade defenses for your digital businessent://SD_ILS/0/SD_ILS:23285792026-01-13T13:02:50Z2026-01-13T13:02:50Zby Seaman, Jim, author.<br/>ISBN 9781484269084 148426908X<br/><a href="https://learning.oreilly.com/library/view/~/9781484269084">https://learning.oreilly.com/library/view/~/9781484269084</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269084/?ar">https://learning.oreilly.com/library/view/~/9781484269084/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar</a><br/>Format: Electronic Resources<br/>Authentication and access control : practical cryptography methods and toolsent://SD_ILS/0/SD_ILS:23271232026-01-13T13:02:50Z2026-01-13T13:02:50Zby Boonkrong, Sirapat, author.<br/>ISBN 9781484265703 148426570X 9781484265710 1484265718<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265703">https://learning.oreilly.com/library/view/~/9781484265703</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265703/?ar">https://learning.oreilly.com/library/view/~/9781484265703/?ar</a><br/>Format: Electronic Resources<br/>PCI DSS : an integrated data security standard guideent://SD_ILS/0/SD_ILS:23243862026-01-13T13:02:50Z2026-01-13T13:02:50Zby Seaman, Jim.<br/>ISBN 9781484258088 1484258088<br/><a href="https://learning.oreilly.com/library/view/~/9781484258088">https://learning.oreilly.com/library/view/~/9781484258088</a>
<a href="https://learning.oreilly.com/library/view/~/9781484258088/?ar">https://learning.oreilly.com/library/view/~/9781484258088/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar</a><br/>Format: Electronic Resources<br/>IT security controls : a guide to corporate standards and frameworksent://SD_ILS/0/SD_ILS:23324122026-01-13T13:02:50Z2026-01-13T13:02:50Zby Viegas, Virgilio, author.<br/>ISBN 9781484277997 1484277996<br/><a href="https://learning.oreilly.com/library/view/~/9781484277997/?ar">https://learning.oreilly.com/library/view/~/9781484277997/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277997">https://learning.oreilly.com/library/view/~/9781484277997</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar</a><br/>Format: Electronic Resources<br/>Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflictent://SD_ILS/0/SD_ILS:23290792026-01-13T13:02:50Z2026-01-13T13:02:50Zby Borges, Dan.<br/>ISBN 9781801078146 1801078149<br/><a href="https://learning.oreilly.com/library/view/~/9781801076203/?ar">https://learning.oreilly.com/library/view/~/9781801076203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076203">https://learning.oreilly.com/library/view/~/9781801076203</a><br/>Format: Electronic Resources<br/>Cyber threat intelligence : the no-nonsense guide for CISOs and Security Managersent://SD_ILS/0/SD_ILS:23296372026-01-13T13:02:50Z2026-01-13T13:02:50Zby Roberts, Aaron.<br/>ISBN 9781484272206 148427220X<br/><a href="https://learning.oreilly.com/library/view/~/9781484272206">https://learning.oreilly.com/library/view/~/9781484272206</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484272206/?ar">https://learning.oreilly.com/library/view/~/9781484272206/?ar</a><br/>Format: Electronic Resources<br/>Solving identity management in modern applications : demystifying OAuth 2.0, OpenID Connect, and SAML 2.0ent://SD_ILS/0/SD_ILS:23227232026-01-13T13:02:50Z2026-01-13T13:02:50Zby Wilson, Yvonne.<br/>ISBN 9781484250952 1484250958<br/><a href="https://learning.oreilly.com/library/view/~/9781484250952/?ar">https://learning.oreilly.com/library/view/~/9781484250952/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484250952">https://learning.oreilly.com/library/view/~/9781484250952</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar</a><br/>Format: Electronic Resources<br/>Development of a Quality Assurance Prototype for Intrusion Detection Systemsent://SD_ILS/0/SD_ILS:187282026-01-13T13:02:50Z2026-01-13T13:02:50Zby Yüksel, Ulaş.<br/><a href="http://hdl.handle.net/11147/3428">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Comparison of recovery requirements with investigation requirements for intrusion management systemsent://SD_ILS/0/SD_ILS:252472026-01-13T13:02:50Z2026-01-13T13:02:50Zby Arpaçay Tapucu, Dilek.<br/><a href="http://hdl.handle.net/11147/3463">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Honeypots and routers : collecting internet attacksent://SD_ILS/0/SD_ILS:23222732026-01-13T13:02:50Z2026-01-13T13:02:50Zby Mohammed, Mohssen, 1982- author.<br/>ISBN 9781498702201 1498702201<br/><a href="https://learning.oreilly.com/library/view/~/9781498702201">https://learning.oreilly.com/library/view/~/9781498702201</a>
<a href="https://learning.oreilly.com/library/view/~/9781498702201/?ar">https://learning.oreilly.com/library/view/~/9781498702201/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781498702201/?ar">https://go.oreilly.com/library-access/library/view/-/9781498702201/?ar</a><br/>Format: Electronic Resources<br/>Anomaly detection using network traffic characterizationent://SD_ILS/0/SD_ILS:250272026-01-13T13:02:50Z2026-01-13T13:02:50Zby Yarımtepe, Oğuz.<br/><a href="http://hdl.handle.net/11147/3459">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Current security management & ethical issues of information technologyent://SD_ILS/0/SD_ILS:22612702026-01-13T13:02:50Z2026-01-13T13:02:50Zby Azari, Rasool.<br/>ISBN 9781931777599 (ebook)<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93177-743-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93177-743-8</a><br/>Format: Electronic Resources<br/>Mastering Linux Security and Hardening - Second Editionent://SD_ILS/0/SD_ILS:23241672026-01-13T13:02:50Z2026-01-13T13:02:50Zby Tevault, Donald A.<br/>ISBN 9781838981778 1838981772<br/><a href="https://learning.oreilly.com/library/view/~/9781838981778/?ar">https://learning.oreilly.com/library/view/~/9781838981778/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar">https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838981778">https://learning.oreilly.com/library/view/~/9781838981778</a><br/>Format: Electronic Resources<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:4682522026-01-13T13:02:50Z2026-01-13T13:02:50Zby Elbahadır, Hamza, author.<br/>ISBN 9786054205271<br/>Format: Books<br/>IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodellent://SD_ILS/0/SD_ILS:21213252026-01-13T13:02:50Z2026-01-13T13:02:50Zby Simić, Daniela, author.<br/>ISBN 9783110516982 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4830572">Click to View</a><br/>Format: Electronic Resources<br/>The business of cybersecurity : foundations and ideologiesent://SD_ILS/0/SD_ILS:21569012026-01-13T13:02:50Z2026-01-13T13:02:50Zby Sathnur, Ashwini, author.<br/>ISBN 9781948976190 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5770273">Click to View</a><br/>Format: Electronic Resources<br/>Understanding security issuesent://SD_ILS/0/SD_ILS:21445942026-01-13T13:02:50Z2026-01-13T13:02:50Zby Donaldson, Scott E., author.<br/>ISBN 9781501506505 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157542">Click to View</a><br/>Format: Electronic Resources<br/>Security and resilience in intelligent data-centric systems and communication networksent://SD_ILS/0/SD_ILS:22131042026-01-13T13:02:50Z2026-01-13T13:02:50Zby Ficco, Massimo, editor.<br/>ISBN 9780128113745 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5090270">Click to View</a><br/>Format: Electronic Resources<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:22098142026-01-13T13:02:50Z2026-01-13T13:02:50Zby Chapman, Chris, author.<br/>ISBN 9780128036013 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452265">Click to View</a><br/>Format: Electronic Resources<br/>Network security a practical guideent://SD_ILS/0/SD_ILS:20478022026-01-13T13:02:50Z2026-01-13T13:02:50Zby Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=298471">Click to View</a><br/>Format: Electronic Resources<br/>Insider threatsent://SD_ILS/0/SD_ILS:22726222026-01-13T13:02:50Z2026-01-13T13:02:50Zby Arduin, Pierre-Emmanuel, author.<br/>ISBN 9781119516477 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5323674">Click to View</a><br/>Format: Electronic Resources<br/>Breaking into information security : crafting a custom career path to get the job you really wantent://SD_ILS/0/SD_ILS:22093442026-01-13T13:02:50Z2026-01-13T13:02:50Zby More, Josh, author.<br/>ISBN 9780128009895 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4187289">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity and resilience in the arcticent://SD_ILS/0/SD_ILS:22423152026-01-13T13:02:50Z2026-01-13T13:02:50Zby Trump, Benjamin D., editor.<br/>ISBN 9781643680774 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6355988">Click to View</a><br/>Format: Electronic Resources<br/>The cybersecurity playbook for modern enterprisesent://SD_ILS/0/SD_ILS:23323232026-01-13T13:02:50Z2026-01-13T13:02:50Zby Wittkop, Jeremy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639/?ar">https://learning.oreilly.com/library/view/~/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639">https://learning.oreilly.com/library/view/~/9781803248639</a><br/>Format: Electronic Resources<br/>Empirical research for software security : foundations and experienceent://SD_ILS/0/SD_ILS:21086702026-01-13T13:02:50Z2026-01-13T13:02:50Zby ben Othmane, Lotfi, editor.<br/>ISBN 9781498776424 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5164090">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise Mac security : El Capitanent://SD_ILS/0/SD_ILS:23097402026-01-13T13:02:50Z2026-01-13T13:02:50Zby Edge, Charles S., Jr., author.<br/>ISBN 148421711X 9781484217115<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484217122/?ar">https://go.oreilly.com/library-access/library/view/-/9781484217122/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484217122/?ar">https://learning.oreilly.com/library/view/~/9781484217122/?ar</a><br/>Format: Electronic Resources<br/>Linux Firewalls, Third Editionent://SD_ILS/0/SD_ILS:23196682026-01-13T13:02:50Z2026-01-13T13:02:50Zby Suehring, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/0672327716/?ar">https://learning.oreilly.com/library/view/~/0672327716/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672327716">https://learning.oreilly.com/library/view/~/0672327716</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672327716/?ar">https://go.oreilly.com/library-access/library/view/-/0672327716/?ar</a><br/>Format: Electronic Resources<br/>Choose your InfoSec path : an interactive cybersecurity adventure for beginnersent://SD_ILS/0/SD_ILS:23289902026-01-13T13:02:50Z2026-01-13T13:02:50Zby Roxon, Alexander J.<br/>ISBN 9781484270363 1484270363<br/><a href="https://learning.oreilly.com/library/view/~/9781484270363">https://learning.oreilly.com/library/view/~/9781484270363</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270363/?ar">https://learning.oreilly.com/library/view/~/9781484270363/?ar</a><br/>Format: Electronic Resources<br/>Cyber security : the complete guide to cyber threats and protectionent://SD_ILS/0/SD_ILS:23351942026-01-13T13:02:50Z2026-01-13T13:02:50Zby Sutton, David (Information security practitioner), author.<br/>ISBN 9781780175973 1780175973<br/><a href="https://learning.oreilly.com/library/view/~/9781780175973">https://learning.oreilly.com/library/view/~/9781780175973</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175973/?ar">https://learning.oreilly.com/library/view/~/9781780175973/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity For Dummiesent://SD_ILS/0/SD_ILS:23328722026-01-13T13:02:50Z2026-01-13T13:02:50Zby Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119867180">https://learning.oreilly.com/library/view/~/9781119867180</a>
<a href="https://learning.oreilly.com/library/view/~/9781119867180/?ar">https://learning.oreilly.com/library/view/~/9781119867180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar">https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar</a><br/>Format: Electronic Resources<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:22969362026-01-13T13:02:50Z2026-01-13T13:02:50Zby Mao, Wenji.<br/>ISBN 9780123973245 0123973244 0123972000 9780123972002<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123972002/?ar">https://go.oreilly.com/library-access/library/view/-/9780123972002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123972002/?ar">https://learning.oreilly.com/library/view/~/9780123972002/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity and Third-Party Risk : Third Party Threat Huntingent://SD_ILS/0/SD_ILS:23290002026-01-13T13:02:50Z2026-01-13T13:02:50Zby Rasner, Gregory C.<br/>ISBN 9781119809906 1119809908 9781119809562 1119809568 9781394176854<br/><a href="https://learning.oreilly.com/library/view/~/9781119809555">https://learning.oreilly.com/library/view/~/9781119809555</a>
<a href="https://learning.oreilly.com/library/view/~/9781119809555/?ar">https://learning.oreilly.com/library/view/~/9781119809555/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar">https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar</a><br/>Format: Electronic Resources<br/>Informationssicherheit und Datenschutz : Handbuch für Praktiker und Begleitbuch zum T.I.S.P.ent://SD_ILS/0/SD_ILS:23221892026-01-13T13:02:50Z2026-01-13T13:02:50Zby Domnick, André, author.<br/>ISBN 3960885407 9783960885405 1098123654 9781098123659<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar">https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098123659/?ar">https://learning.oreilly.com/library/view/~/9781098123659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098123659">https://learning.oreilly.com/library/view/~/9781098123659</a><br/>Format: Electronic Resources<br/>System assurance : beyond detecting vulnerabilitiesent://SD_ILS/0/SD_ILS:22903692026-01-13T13:02:50Z2026-01-13T13:02:50Zby Mansourov, Nikolai.<br/>ISBN 9780123814142 0123814146 9780123814159 0123814154<br/><a href="https://learning.oreilly.com/library/view/~/9780123814142">https://learning.oreilly.com/library/view/~/9780123814142</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780123814142/?ar">https://go.oreilly.com/library-access/library/view/-/9780123814142/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123814142/?ar">https://learning.oreilly.com/library/view/~/9780123814142/?ar</a><br/>Format: Electronic Resources<br/>Cyber spying : tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:22822722026-01-13T13:02:50Z2026-01-13T13:02:50Zby Fair, Ted.<br/>ISBN 1597490253 9781597490252 9780080488653 008048865X 1281035815<br/><a href="https://learning.oreilly.com/library/view/~/9781931836418">https://learning.oreilly.com/library/view/~/9781931836418</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836418/?ar">https://learning.oreilly.com/library/view/~/9781931836418/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836418/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836418/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781931836418">https://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Electronic Resources<br/>Nmap network scanning : official Nmap project guide to network discovery and security scanningent://SD_ILS/0/SD_ILS:1291032026-01-13T13:02:50Z2026-01-13T13:02:50Zby Lyon, Gordon Fyodor.<br/>ISBN 9780979958717 0979958717<br/>Format: Books<br/>Wireless operational securityent://SD_ILS/0/SD_ILS:660872026-01-13T13:02:50Z2026-01-13T13:02:50Zby Rittinghouse, John W.<br/>ISBN 9781555583170 1555583172<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkit.ent://SD_ILS/0/SD_ILS:657972026-01-13T13:02:50Z2026-01-13T13:02:50Zby Long, Johnny.<br/>ISBN 9781597490214 1597490210<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:656262026-01-13T13:02:50Z2026-01-13T13:02:50Zby Rittinghouse, John W.<br/>ISBN 9781555583064 1555583067<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2003051481.html">http://www.loc.gov/catdir/description/els031/2003051481.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2003051481.html">http://www.loc.gov/catdir/toc/els031/2003051481.html</a><br/>Format: Electronic Resources<br/>Information security best practices 205 basic rulesent://SD_ILS/0/SD_ILS:650922026-01-13T13:02:50Z2026-01-13T13:02:50Zby Stefanek, George L.<br/>ISBN 9781878707963 1878707965<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2002016635.html">http://www.loc.gov/catdir/description/els031/2002016635.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2002016635.html">http://www.loc.gov/catdir/toc/els031/2002016635.html</a><br/>Format: Electronic Resources<br/>Hackingent://SD_ILS/0/SD_ILS:23328862026-01-13T13:02:50Z2026-01-13T13:02:50Zby Beaver, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119872191">https://learning.oreilly.com/library/view/~/9781119872191</a>
<a href="https://learning.oreilly.com/library/view/~/9781119872191/?ar">https://learning.oreilly.com/library/view/~/9781119872191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar">https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar</a><br/>Format: Electronic Resources<br/>Professional Red teaming : conducting successful cybersecurity engagementsent://SD_ILS/0/SD_ILS:23189772026-01-13T13:02:50Z2026-01-13T13:02:50Zby Oakley, Jacob G., author.<br/>ISBN 9781484243091 1484243099 9781484243107 1484243102<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243091/?ar">https://learning.oreilly.com/library/view/~/9781484243091/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243091">https://learning.oreilly.com/library/view/~/9781484243091</a><br/>Format: Electronic Resources<br/>Asset attack vectors : building effective vulnerability management strategies to protect organizationsent://SD_ILS/0/SD_ILS:23167202026-01-13T13:02:50Z2026-01-13T13:02:50Zby Haber, Morey J.<br/>ISBN 9781484236277 1484236270 1484236262 9781484236260<br/><a href="https://learning.oreilly.com/library/view/~/9781484236277/?ar">https://learning.oreilly.com/library/view/~/9781484236277/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484236277/?ar">https://go.oreilly.com/library-access/library/view/-/9781484236277/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484236277">https://learning.oreilly.com/library/view/~/9781484236277</a><br/>Format: Electronic Resources<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:23316942026-01-13T13:02:50Z2026-01-13T13:02:50Zby Harper, Allen, author.<br/>ISBN 9781264268955 1264268955<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar">https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781264268955/?ar">https://learning.oreilly.com/library/view/~/9781264268955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781264268955">https://learning.oreilly.com/library/view/~/9781264268955</a><br/>Format: Electronic Resources<br/>Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigatorsent://SD_ILS/0/SD_ILS:23268662026-01-13T13:02:50Z2026-01-13T13:02:50Zby Long, Johnny, author.<br/>ISBN 9780080553979 0080553974<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080553979/?ar">https://go.oreilly.com/library-access/library/view/-/9780080553979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080553979/?ar">https://learning.oreilly.com/library/view/~/9780080553979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080553979">https://learning.oreilly.com/library/view/~/9780080553979</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:20522822026-01-13T13:02:50Z2026-01-13T13:02:50Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137538">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:20476392026-01-13T13:02:50Z2026-01-13T13:02:50Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273488">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise information systems assurance and system security managerial and technical issuesent://SD_ILS/0/SD_ILS:22614182026-01-13T13:02:50Z2026-01-13T13:02:50Zby Warkentin, Merrill.<br/>ISBN 9781591409137 (PDF) 1591409136<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3</a><br/>Format: Electronic Resources<br/>Firewall monitoring using intrusion detection systemsent://SD_ILS/0/SD_ILS:168172026-01-13T13:02:50Z2026-01-13T13:02:50Zby Asarcıklı, Şükran.<br/><a href="http://hdl.handle.net/11147/3295">Access to Electronic Version</a><br/>Format: Manuscript<br/>Cybersecurity Manager's Guideent://SD_ILS/0/SD_ILS:23270202026-01-13T13:02:50Z2026-01-13T13:02:50Zby Barnum, Todd.<br/>ISBN 9781492076162 1492076163 9781492076186 149207618X 9781492076216<br/><a href="https://learning.oreilly.com/library/view/~/9781492076209">https://learning.oreilly.com/library/view/~/9781492076209</a>
<a href="https://learning.oreilly.com/library/view/~/9781492076209/?ar">https://learning.oreilly.com/library/view/~/9781492076209/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar">https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar</a><br/>Format: Electronic Resources<br/>PoC GTFO. Volume IIIent://SD_ILS/0/SD_ILS:23271492026-01-13T13:02:50Z2026-01-13T13:02:50Zby Laphroaig, Manul.<br/>ISBN 9781718500655 1718500653<br/><a href="https://learning.oreilly.com/library/view/~/9781098125691/?ar">https://learning.oreilly.com/library/view/~/9781098125691/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125691">https://learning.oreilly.com/library/view/~/9781098125691</a><br/>Format: Electronic Resources<br/>Standards And Practices Necessary To Implement A Successful Security Review Program For Intrusion Management Systemsent://SD_ILS/0/SD_ILS:482432026-01-13T13:02:50Z2026-01-13T13:02:50Zby Doruk, Alpay.<br/><a href="http://hdl.handle.net/11147/3706">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Build Your Own Cybersecurity Testing Lab : Low-cost Solutions for Testing in Virtual and Cloud-based Environmentsent://SD_ILS/0/SD_ILS:23234382026-01-13T13:02:50Z2026-01-13T13:02:50Zby Messier, Ric, author.<br/>ISBN 1260458326 9781260458329<br/><a href="https://learning.oreilly.com/library/view/~/9781260458329">https://learning.oreilly.com/library/view/~/9781260458329</a>
<a href="https://learning.oreilly.com/library/view/~/9781260458329/?ar">https://learning.oreilly.com/library/view/~/9781260458329/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar">https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar</a><br/>Format: Electronic Resources<br/>Windows Vista security for dummiesent://SD_ILS/0/SD_ILS:22842182026-01-13T13:02:50Z2026-01-13T13:02:50Zby Koerner, Brian.<br/>ISBN 9780470118054 0470118059<br/><a href="https://learning.oreilly.com/library/view/~/9780470118054">https://learning.oreilly.com/library/view/~/9780470118054</a>
<a href="https://learning.oreilly.com/library/view/~/9780470118054/?ar">https://learning.oreilly.com/library/view/~/9780470118054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar">https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar</a><br/>Format: Electronic Resources<br/>Security 2020 : Reduce Security Risks This Decade.ent://SD_ILS/0/SD_ILS:12283162026-01-13T13:02:50Z2026-01-13T13:02:50Zby Howard, Doug.<br/>ISBN 9781118008331<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=694289">Click to View</a><br/>Format: Electronic Resources<br/>Securing network infrastructure : discover practical network security with Nmap and Nessus 7ent://SD_ILS/0/SD_ILS:23533722026-01-13T13:02:50Z2026-01-13T13:02:50Zby Sairam, Jetty, author.<br/>ISBN 9781838646974 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5742610">Click to View</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:22074682026-01-13T13:02:50Z2026-01-13T13:02:50Zby Andress, Jason, author.<br/>ISBN 9780128008126 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699255">Click to View</a><br/>Format: Electronic Resources<br/>Cyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:655792026-01-13T13:02:50Z2026-01-13T13:02:50Zby Parker, Tom, 1982-<br/>ISBN 9781931836111 1931836116<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Solaris security essentials.ent://SD_ILS/0/SD_ILS:22862572026-01-13T13:02:50Z2026-01-13T13:02:50ZISBN 9780131365414 013136541X<br/><a href="https://learning.oreilly.com/library/view/~/9780131365414/?ar">https://learning.oreilly.com/library/view/~/9780131365414/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780131365414/?ar">https://go.oreilly.com/library-access/library/view/-/9780131365414/?ar</a><br/>Format: Electronic Resources<br/>CYBER SECURITY AND DIGITAL FORENSICSent://SD_ILS/0/SD_ILS:23314412026-01-13T13:02:50Z2026-01-13T13:02:50ZISBN 9781119795650 1119795656<br/><a href="https://learning.oreilly.com/library/view/~/9781119795636">https://learning.oreilly.com/library/view/~/9781119795636</a>
<a href="https://learning.oreilly.com/library/view/~/9781119795636/?ar">https://learning.oreilly.com/library/view/~/9781119795636/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar">https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar</a><br/>Format: Electronic Resources<br/>Effective Oracle Database 10g security by designent://SD_ILS/0/SD_ILS:22850822026-01-13T13:02:50Z2026-01-13T13:02:50Zby Knox, David (David C.)<br/><a href="https://learning.oreilly.com/library/view/~/9780072231304/?ar">https://learning.oreilly.com/library/view/~/9780072231304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780072231304/?ar">https://go.oreilly.com/library-access/library/view/-/9780072231304/?ar</a><br/>Format: Electronic Resources<br/>Serverless security : protect functions using the CLAD security modelent://SD_ILS/0/SD_ILS:23230662026-01-13T13:02:50Z2026-01-13T13:02:50Zby Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar">https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538/?ar">https://learning.oreilly.com/library/view/~/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538">https://learning.oreilly.com/library/view/~/9781492082538</a><br/>Format: Electronic Resources<br/>Data-Driven Security : Analysis, Visualization and Dashboards.ent://SD_ILS/0/SD_ILS:23015562026-01-13T13:02:50Z2026-01-13T13:02:50Zby Jacobs, Jay (Data analyst)<br/>ISBN 130637376X 9781306373760 9781118793664 1118793668 9781118793824<br/><a href="https://learning.oreilly.com/library/view/~/9781118793824">https://learning.oreilly.com/library/view/~/9781118793824</a>
<a href="https://learning.oreilly.com/library/view/~/9781118793824/?ar">https://learning.oreilly.com/library/view/~/9781118793824/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar">https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:23192202026-01-13T13:02:50Z2026-01-13T13:02:50Zby Tanner, Nadean H., author.<br/>ISBN 9781119552949 111955294X 9781119552956 1119552958 9781119552963<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar">https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119552932/?ar">https://learning.oreilly.com/library/view/~/9781119552932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119552932">https://learning.oreilly.com/library/view/~/9781119552932</a><br/>Format: Electronic Resources<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:22067942026-01-13T13:02:50Z2026-01-13T13:02:50Zby Sanders, Chris, 1986-<br/>ISBN 9780124172166 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1574451">Click to View</a><br/>Format: Electronic Resources<br/>IBM business process manager security : concepts and guidanceent://SD_ILS/0/SD_ILS:23075462026-01-13T13:02:50Z2026-01-13T13:02:50Zby Wood, J. Keith, author.<br/>ISBN 9780738437262 0738437263<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738437263/?ar">https://go.oreilly.com/library-access/library/view/-/0738437263/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738437263">https://learning.oreilly.com/library/view/~/0738437263</a>
<a href="https://learning.oreilly.com/library/view/~/0738437263/?ar">https://learning.oreilly.com/library/view/~/0738437263/?ar</a><br/>Format: Electronic Resources<br/>Software security : building security inent://SD_ILS/0/SD_ILS:22821802026-01-13T13:02:50Z2026-01-13T13:02:50Zby McGraw, Gary, 1966-<br/>ISBN 9780321356703 0321356705<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321356705/?ar">https://go.oreilly.com/library-access/library/view/-/0321356705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321356705/?ar">https://learning.oreilly.com/library/view/~/0321356705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321356705">https://learning.oreilly.com/library/view/~/0321356705</a><br/>Format: Electronic Resources<br/>I nove passi per il successo : Compendio per l'attuazione della norma ISO 27001 :2013ent://SD_ILS/0/SD_ILS:21230202026-01-13T13:02:50Z2026-01-13T13:02:50Zby Calder, Alan, author.<br/>ISBN 9781849289252 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5255162">Click to View</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:21549082026-01-13T13:02:50Z2026-01-13T13:02:50Zby Watkins, Steve G.<br/>ISBN 9781849285278 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463578">Click to View</a><br/>Format: Electronic Resources<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:21549092026-01-13T13:02:50Z2026-01-13T13:02:50Zby Calder, Alan.<br/>ISBN 9781849285230 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463579">Click to View</a><br/>Format: Electronic Resources<br/>Neuf étapes vers le succès : Un apercu de la mise en oeuvre de la norme ISO 27001 : 2013ent://SD_ILS/0/SD_ILS:21230212026-01-13T13:02:50Z2026-01-13T13:02:50Zby Calder, Alan, author.<br/>ISBN 9781849289214 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5255163">Click to View</a><br/>Format: Electronic Resources<br/>Spring security : secure your web applications, RESTful services, and microservice architecturesent://SD_ILS/0/SD_ILS:22301482026-01-13T13:02:50Z2026-01-13T13:02:50Zby Knutson, Mick, author.<br/>ISBN 9781787126466 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5165113">Click to View</a><br/>Format: Electronic Resources<br/>CompTIA Security+ent://SD_ILS/0/SD_ILS:23049062026-01-13T13:02:50Z2026-01-13T13:02:50Zby Long, Mark.<br/><a href="https://learning.oreilly.com/videos/~/9781771372831/?ar">https://learning.oreilly.com/videos/~/9781771372831/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar">https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity dilemmas : technology, policy, and incentives : summary of discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forument://SD_ILS/0/SD_ILS:20276222026-01-13T13:02:50Z2026-01-13T13:02:50Zby National Academy of Sciences (U.S.)<br/>ISBN 9780309380089<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Cybersecurity-Dilemmas.pdf">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://www.nap.edu/catalog.php?record_id=21833">http://www.nap.edu/catalog.php?record_id=21833</a><br/>Format: Electronic Resources<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:654372026-01-13T13:02:50Z2026-01-13T13:02:50Zby Archibald, Neil.<br/>ISBN 9781931836203 1931836205<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Getting started with cybersecurity scienceent://SD_ILS/0/SD_ILS:23333812026-01-13T13:02:50Z2026-01-13T13:02:50Zby Dykstra, Josiah, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920670926">https://learning.oreilly.com/videos/~/0636920670926</a>
<a href="https://learning.oreilly.com/videos/~/0636920670926/?ar">https://learning.oreilly.com/videos/~/0636920670926/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar">https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar</a><br/>Format: Video recording<br/>Managing SSH clients and servers.ent://SD_ILS/0/SD_ILS:23343442026-01-13T13:02:50Z2026-01-13T13:02:50Zby Wallen, Jack, presenter.<br/>ISBN 9781492031666 1492031666<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar">https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492031666">https://learning.oreilly.com/videos/~/9781492031666</a>
<a href="https://learning.oreilly.com/videos/~/9781492031666/?ar">https://learning.oreilly.com/videos/~/9781492031666/?ar</a><br/>Format: Video recording<br/>ISO27001 in a Windows Environment : the best practice handbook for a Microsoft Windows environmentent://SD_ILS/0/SD_ILS:22900262026-01-13T13:02:50Z2026-01-13T13:02:50Zby Honan, Brian.<br/>ISBN 9781849280495 1849280495<br/><a href="https://learning.oreilly.com/library/view/~/9781849280495/?ar">https://learning.oreilly.com/library/view/~/9781849280495/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar</a><br/>Format: Electronic Resources<br/>Check Point NG : next generation security administrationent://SD_ILS/0/SD_ILS:23060662026-01-13T13:02:50Z2026-01-13T13:02:50Zby Simonis, Drew, author.<br/>ISBN 0080476457 9780080476452 1928994741 9781928994749 1281053058<br/><a href="https://learning.oreilly.com/library/view/~/9781928994749/?ar">https://learning.oreilly.com/library/view/~/9781928994749/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar</a><br/>Format: Electronic Resources<br/>Hack proofing Sun Solaris 8ent://SD_ILS/0/SD_ILS:656732026-01-13T13:02:50Z2026-01-13T13:02:50Zby Miles, Wyman.<br/>ISBN 9781928994442 192899444X<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Cyber security for absolute beginners. Part 02.ent://SD_ILS/0/SD_ILS:23355132026-01-13T13:02:50Z2026-01-13T13:02:50Zby Oni, Alexander, presenter.<br/>ISBN 9781837639403 183763940X<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639403/?ar">https://learning.oreilly.com/videos/~/9781837639403/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639403">https://learning.oreilly.com/videos/~/9781837639403</a><br/>Format: Video recording<br/>Cyber security for absolute beginners, Part 01.ent://SD_ILS/0/SD_ILS:23355252026-01-13T13:02:50Z2026-01-13T13:02:50Zby Oni, Alexander, presenter.<br/>ISBN 9781837630943 1837630941<br/><a href="https://learning.oreilly.com/videos/~/9781837630943/?ar">https://learning.oreilly.com/videos/~/9781837630943/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837630943">https://learning.oreilly.com/videos/~/9781837630943</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar">https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar</a><br/>Format: Video recording<br/>Azure security handbook : a comprehensive guide for defending your enterprise environmentent://SD_ILS/0/SD_ILS:23298022026-01-13T13:02:50Z2026-01-13T13:02:50Zby Ots, Karl.<br/>ISBN 9781484272923 1484272927<br/><a href="https://learning.oreilly.com/library/view/~/9781484272923">https://learning.oreilly.com/library/view/~/9781484272923</a>
<a href="https://learning.oreilly.com/library/view/~/9781484272923/?ar">https://learning.oreilly.com/library/view/~/9781484272923/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Windows 2000 security handbookent://SD_ILS/0/SD_ILS:22811702026-01-13T13:02:50Z2026-01-13T13:02:50Zby Schmidt, Jeff, MCSE.<br/><a href="https://learning.oreilly.com/library/view/~/0789719991">https://learning.oreilly.com/library/view/~/0789719991</a>
<a href="https://learning.oreilly.com/library/view/~/0789719991/?ar">https://learning.oreilly.com/library/view/~/0789719991/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0789719991/?ar">https://go.oreilly.com/library-access/library/view/-/0789719991/?ar</a><br/>Format: Electronic Resources<br/>Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptionsent://SD_ILS/0/SD_ILS:23297992026-01-13T13:02:50Z2026-01-13T13:02:50Zby Lohrmann, Daniel J., 1963- author.<br/>ISBN 1119835313 9781119835325 1119835321 9781119835318<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format: Electronic Resources<br/>Low tech hacking : street smarts for security professionalsent://SD_ILS/0/SD_ILS:22932292026-01-13T13:02:50Z2026-01-13T13:02:50Zby Wiles, Jack.<br/>ISBN 9781597496650 1597496650 9781597496667 1597496669<br/><a href="https://learning.oreilly.com/library/view/~/9781597496650">https://learning.oreilly.com/library/view/~/9781597496650</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496650/?ar">https://learning.oreilly.com/library/view/~/9781597496650/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar</a><br/>Format: Electronic Resources<br/>Writing secure code : practical strategies and proven techniques for building secure applications in a networked worldent://SD_ILS/0/SD_ILS:22811582026-01-13T13:02:50Z2026-01-13T13:02:50Zby Howard, Michael, 1965- author.<br/>ISBN 9780735635500 0735635501<br/><a href="https://learning.oreilly.com/library/view/~/0735617228">https://learning.oreilly.com/library/view/~/0735617228</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0735617228/?ar">https://go.oreilly.com/library-access/library/view/-/0735617228/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735617228/?ar">https://learning.oreilly.com/library/view/~/0735617228/?ar</a><br/>Format: Electronic Resources<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:642592026-01-13T13:02:50Z2026-01-13T13:02:50Zby Wiles, Jack.<br/>ISBN 9781597491389 1597491381<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:213582026-01-13T13:02:50Z2026-01-13T13:02:50Zby Maynor, David.<br/>ISBN 9781597490566 1597490563<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Policy anomaly reporting for distributed firewallsent://SD_ILS/0/SD_ILS:163282026-01-13T13:02:50Z2026-01-13T13:02:50Zby Çetin, Füsun.<br/><a href="http://hdl.handle.net/11147/3197">Access to Electronic Version.</a><br/>Format: Manuscript<br/>A feedback-based testing methodology for network security softwareent://SD_ILS/0/SD_ILS:4088612026-01-13T13:02:50Z2026-01-13T13:02:50Zby Gerçek, Gürcan.<br/><a href="http://hdl.handle.net/11147/3600">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Traffic generator for firewall testingent://SD_ILS/0/SD_ILS:412352026-01-13T13:02:50Z2026-01-13T13:02:50Zby Kaya, Özgür.<br/><a href="http://hdl.handle.net/11147/3631">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:21254512026-01-13T13:02:50Z2026-01-13T13:02:50Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=625004">Click to View</a><br/>Format: Electronic Resources<br/>Access monitoring system for distributed firewall policiesent://SD_ILS/0/SD_ILS:857052026-01-13T13:02:50Z2026-01-13T13:02:50Zby Çakı, Oğuzhan.<br/><a href="http://hdl.handle.net/11147/3953">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Silence on the wire a field guide to passive reconnaissance and indirect attacksent://SD_ILS/0/SD_ILS:20476512026-01-13T13:02:50Z2026-01-13T13:02:50Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273504">Click to View</a><br/>Format: Electronic Resources<br/>Building a global information assurance programent://SD_ILS/0/SD_ILS:23229162026-01-13T13:02:50Z2026-01-13T13:02:50Zby Curts, Raymond J., author.<br/>ISBN 9780203997550 0203997557 9780429225215 0429225210 9781135511159<br/><a href="https://learning.oreilly.com/library/view/~/9780203997550/?ar">https://learning.oreilly.com/library/view/~/9780203997550/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar">https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar</a><br/>Format: Electronic Resources<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:22102642026-01-13T13:02:50Z2026-01-13T13:02:50Zby Fowler, Kevvie, author.<br/>ISBN 9780128034507 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556899">Click to View</a><br/>Format: Electronic Resources<br/>Web application security is a stack : how to CYA (Cover Your Apps) completelyent://SD_ILS/0/SD_ILS:22089712026-01-13T13:02:50Z2026-01-13T13:02:50Zby Vittie, Lori Mac, author.<br/>ISBN 9781849287050 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192126">Click to View</a><br/>Format: Electronic Resources<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:21108552026-01-13T13:02:50Z2026-01-13T13:02:50Zby Vladimirov, A., author.<br/>ISBN 9781849286008 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192124">Click to View</a><br/>Format: Electronic Resources<br/>Hack proofing Windows 2000 Serverent://SD_ILS/0/SD_ILS:656892026-01-13T13:02:50Z2026-01-13T13:02:50Zby Todd, Chad.<br/>ISBN 9781931836494 1931836493<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836494">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Practical cyber hacking skills for beginners.ent://SD_ILS/0/SD_ILS:23355142026-01-13T13:02:50Z2026-01-13T13:02:50Zby Oni, Alexander, presenter.<br/>ISBN 9781837636181 1837636184<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar">https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181">https://learning.oreilly.com/videos/~/9781837636181</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181/?ar">https://learning.oreilly.com/videos/~/9781837636181/?ar</a><br/>Format: Video recording<br/>Security operations in practiceent://SD_ILS/0/SD_ILS:23339292026-01-13T13:02:50Z2026-01-13T13:02:50Zby Sheward, Mike, author.<br/>ISBN 9781780175089 1780175086<br/><a href="https://learning.oreilly.com/library/view/~/9781780175089/?ar">https://learning.oreilly.com/library/view/~/9781780175089/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175089">https://learning.oreilly.com/library/view/~/9781780175089</a><br/>Format: Electronic Resources<br/>Campus network topology discovery and distributed firewall policy generationent://SD_ILS/0/SD_ILS:1293602026-01-13T13:02:50Z2026-01-13T13:02:50Zby Çalışkan, Ezgi.<br/><a href="http://hdl.handle.net/11147/3102">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Web hacker's toolbox : tools used by successful hackers.ent://SD_ILS/0/SD_ILS:23354592026-01-13T13:02:50Z2026-01-13T13:02:50Zby Czagan, Dawid, presenter.<br/>ISBN 9781837632831 1837632839<br/><a href="https://learning.oreilly.com/videos/~/9781837632831/?ar">https://learning.oreilly.com/videos/~/9781837632831/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837632831">https://learning.oreilly.com/videos/~/9781837632831</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar</a><br/>Format: Video recording<br/>Security and privacy in the digital era. Volume 1ent://SD_ILS/0/SD_ILS:20609152026-01-13T13:02:50Z2026-01-13T13:02:50Zby Guerrier, Claudine, author.<br/>ISBN 9781119347323 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4648717">Click to View</a><br/>Format: Electronic Resources<br/>Identity attack vectors : implementing an effective identity and access management solutionent://SD_ILS/0/SD_ILS:23227372026-01-13T13:02:50Z2026-01-13T13:02:50Zby Haber, Morey J.<br/>ISBN 9781484251652 1484251652<br/><a href="https://learning.oreilly.com/library/view/~/9781484251652/?ar">https://learning.oreilly.com/library/view/~/9781484251652/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484251652">https://learning.oreilly.com/library/view/~/9781484251652</a><br/>Format: Electronic Resources<br/>Hands-on machine learning for cybersecurity : safeguard your system by making your machines intelligent using the Python ecosystement://SD_ILS/0/SD_ILS:23185882026-01-13T13:02:50Z2026-01-13T13:02:50Zby Halder, Soma, author.<br/>ISBN 178899096X 9781788990967<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788992282/?ar">https://go.oreilly.com/library-access/library/view/-/9781788992282/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788992282/?ar">https://learning.oreilly.com/library/view/~/9781788992282/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788992282">https://learning.oreilly.com/library/view/~/9781788992282</a><br/>Format: Electronic Resources<br/>Start-up secure : baking cybersecurity into your company from founding to exitent://SD_ILS/0/SD_ILS:23275242026-01-13T13:02:50Z2026-01-13T13:02:50Zby Castaldo, Chris, author.<br/>ISBN 9781119700753 1119700752 1119700744 9781119700746 9781394174768<br/><a href="https://learning.oreilly.com/library/view/~/9781119700739">https://learning.oreilly.com/library/view/~/9781119700739</a>
<a href="https://learning.oreilly.com/library/view/~/9781119700739/?ar">https://learning.oreilly.com/library/view/~/9781119700739/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar">https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar</a><br/>Format: Electronic Resources<br/>Buffer-Overflows und Format-String-Schwachstellen : Funktionsweisen, Exploits und Gegenmassnahmenent://SD_ILS/0/SD_ILS:22864512026-01-13T13:02:50Z2026-01-13T13:02:50Zby Klein, Tobias.<br/>ISBN 9783898641920 3898641929<br/><a href="https://learning.oreilly.com/library/view/~/9783898641920/?ar">https://learning.oreilly.com/library/view/~/9783898641920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783898641920/?ar">https://go.oreilly.com/library-access/library/view/-/9783898641920/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783898641920">https://learning.oreilly.com/library/view/~/9783898641920</a><br/>Format: Electronic Resources<br/>Intrusion detection system alert correlation with operating system level logsent://SD_ILS/0/SD_ILS:957402026-01-13T13:02:50Z2026-01-13T13:02:50Zby Toprak, Mustafa.<br/><a href="http://hdl.handle.net/11147/4029">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:656212026-01-13T13:02:50Z2026-01-13T13:02:50Zby Erbschloe, Michael, 1951-<br/>ISBN 9781555583125 1555583121<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">An electronic book accessible through the World Wide Web; click for information</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2003062590.html">http://www.loc.gov/catdir/toc/els051/2003062590.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003062590.html">http://www.loc.gov/catdir/description/els041/2003062590.html</a><br/>Format: Electronic Resources<br/>OS X incident response : scripting and analysisent://SD_ILS/0/SD_ILS:22100352026-01-13T13:02:50Z2026-01-13T13:02:50Zby Bradley, Jaron, author.<br/>ISBN 9780128045039 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4526010">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft information protection administrator SC-400 certification guide : advance your microsoft security and compliance services knowledge and pass the sc-400 exam with confidence.ent://SD_ILS/0/SD_ILS:23740972026-01-13T13:02:50Z2026-01-13T13:02:50Zby Darr, Shabaz, author.<br/>ISBN 9781801819787<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6824396">Click to View</a><br/>Format: Electronic Resources<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:21317362026-01-13T13:02:50Z2026-01-13T13:02:50Zby Mjølsnes, Stig F., author.<br/>ISBN 9781466506510 (e-book)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1648315">Click to View</a><br/>Format: Electronic Resources<br/>Misuse of Information Systems : The Impact of Security Countermeasures.ent://SD_ILS/0/SD_ILS:12911772026-01-13T13:02:50Z2026-01-13T13:02:50Zby D'Arcy, John P.<br/>ISBN 9781593323141<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3016826">Click to View</a><br/>Format: Electronic Resources<br/>Cryptoent://SD_ILS/0/SD_ILS:23313232026-01-13T13:02:50Z2026-01-13T13:02:50Zby Levy, Steven, author.<br/>ISBN 9781666117615 1666117617<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar">https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781666117615">https://learning.oreilly.com/library/view/~/9781666117615</a>
<a href="https://learning.oreilly.com/library/view/~/9781666117615/?ar">https://learning.oreilly.com/library/view/~/9781666117615/?ar</a><br/>Format: Electronic Resources<br/>Securing Office 365 : masterminding MDM and compliance in the cloudent://SD_ILS/0/SD_ILS:23185642026-01-13T13:02:50Z2026-01-13T13:02:50Zby Katzer, Matthew A., author.<br/>ISBN 9781484242308 1484242300 1484242297 9781484242292 9781484242315<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484242308/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242308/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242308/?ar">https://learning.oreilly.com/library/view/~/9781484242308/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242308">https://learning.oreilly.com/library/view/~/9781484242308</a><br/>Format: Electronic Resources<br/>Crafting the InfoSec playbookent://SD_ILS/0/SD_ILS:23073922026-01-13T13:02:50Z2026-01-13T13:02:50Zby Bollinger, Jeff, author.<br/>ISBN 1491949406 9781491949405 9781491913604 1491913606<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar">https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491913598">https://learning.oreilly.com/library/view/~/9781491913598</a>
<a href="https://learning.oreilly.com/library/view/~/9781491913598/?ar">https://learning.oreilly.com/library/view/~/9781491913598/?ar</a><br/>Format: Electronic Resources<br/>Embedded systems security : practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:22949272026-01-13T13:02:50Z2026-01-13T13:02:50Zby Kleidermacher, David.<br/>ISBN 9780123868862 0123868866 9780123868879 0123868874<br/><a href="https://learning.oreilly.com/library/view/~/9780123868862">https://learning.oreilly.com/library/view/~/9780123868862</a>
<a href="https://learning.oreilly.com/library/view/~/9780123868862/?ar">https://learning.oreilly.com/library/view/~/9780123868862/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780123868862/?ar">https://go.oreilly.com/library-access/library/view/-/9780123868862/?ar</a><br/>Format: Electronic Resources<br/>Enterprise-wide security solutions presentation guideent://SD_ILS/0/SD_ILS:23024822026-01-13T13:02:50Z2026-01-13T13:02:50Zby Kigma, Cees.<br/>ISBN 0738402087 9780738402086<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738402087/?ar">https://go.oreilly.com/library-access/library/view/-/0738402087/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738402087/?ar">https://learning.oreilly.com/library/view/~/0738402087/?ar</a><br/>Format: Electronic Resources<br/>Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environmentent://SD_ILS/0/SD_ILS:23303152026-01-13T13:02:50Z2026-01-13T13:02:50Zby Ackerman, Pascal, author.<br/>ISBN 1800205821 9781800205826<br/><a href="https://learning.oreilly.com/library/view/~/9781800202092/?ar">https://learning.oreilly.com/library/view/~/9781800202092/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202092">https://learning.oreilly.com/library/view/~/9781800202092</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar</a><br/>Format: Electronic Resources<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:23215742026-01-13T13:02:50Z2026-01-13T13:02:50Zby Quade, Phil.<br/>ISBN 9781119617396 1119617391 1119617383 9781119617389 9781119617402<br/><a href="https://learning.oreilly.com/library/view/~/9781119617365">https://learning.oreilly.com/library/view/~/9781119617365</a>
<a href="https://learning.oreilly.com/library/view/~/9781119617365/?ar">https://learning.oreilly.com/library/view/~/9781119617365/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar">https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar</a><br/>Format: Electronic Resources<br/>To improve cybersecurity, think like a hackerent://SD_ILS/0/SD_ILS:23131252026-01-13T13:02:50Z2026-01-13T13:02:50Zby Esteves, José, 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT58314">https://learning.oreilly.com/library/view/~/53863MIT58314</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT58314/?ar">https://learning.oreilly.com/library/view/~/53863MIT58314/?ar</a><br/>Format: Electronic Resources<br/>Securing the Vista environmentent://SD_ILS/0/SD_ILS:22834092026-01-13T13:02:50Z2026-01-13T13:02:50Zby Gregory, Peter H.<br/>ISBN 9780596514303 0596514301<br/><a href="https://learning.oreilly.com/library/view/~/9780596514303/?ar">https://learning.oreilly.com/library/view/~/9780596514303/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596514303">https://learning.oreilly.com/library/view/~/9780596514303</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar">https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar</a><br/>Format: Electronic Resources<br/>Learning Whitehat hacking and penetration testingent://SD_ILS/0/SD_ILS:22978662026-01-13T13:02:50Z2026-01-13T13:02:50Zby Messier, Ric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771370349/?ar">https://learning.oreilly.com/videos/~/9781771370349/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity for dummiesent://SD_ILS/0/SD_ILS:23228392026-01-13T13:02:50Z2026-01-13T13:02:50Zby Steinberg, Joseph (Cybersecurity expert), author.<br/>ISBN 9781119560340 1119560349<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560326/?ar">https://learning.oreilly.com/library/view/~/9781119560326/?ar</a><br/>Format: Electronic Resources<br/>What is cybersecurity?ent://SD_ILS/0/SD_ILS:23187222026-01-13T13:02:50Z2026-01-13T13:02:50Zby Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format: Electronic Resources<br/>Microsoft security fundamentals LiveLessonsent://SD_ILS/0/SD_ILS:23057252026-01-13T13:02:50Z2026-01-13T13:02:50Zby Lieberman, Ed, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780133949445/?ar">https://learning.oreilly.com/videos/~/9780133949445/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar">https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar</a><br/>Format: Electronic Resources<br/>Dear Hacker : letters to the editor of 2600ent://SD_ILS/0/SD_ILS:22894682026-01-13T13:02:50Z2026-01-13T13:02:50Zby Goldstein, Emmanuel, 1959-<br/>ISBN 9780470620069 0470620064<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar">https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470620069/?ar">https://learning.oreilly.com/library/view/~/9780470620069/?ar</a><br/>Format: Electronic Resources<br/>Software update as a mechanism for resilience and security : proceedings of a Workshop.ent://SD_ILS/0/SD_ILS:20137242026-01-13T13:02:50Z2026-01-13T13:02:50Zby Johnson, Anne Frances, rapporteur.<br/>ISBN 9780309462914<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Software-Update-as-a-Mechanism-for-Resilience-and-Security.pdf">An electronic book accessible through the World Wide Web; click for information.</a>
<a href="http://doi.org/10.17226/24833">http://doi.org/10.17226/24833</a><br/>Format: Electronic Resources<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:657282026-01-13T13:02:50Z2026-01-13T13:02:50Zby Burton, James.<br/>ISBN 9781932266696 1932266690<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Getting Started with HashiCorp Vaultent://SD_ILS/0/SD_ILS:23240622026-01-13T13:02:50Z2026-01-13T13:02:50Zby Krausen, Bryan, speaker.<br/><a href="https://learning.oreilly.com/videos/~/1018947658">https://learning.oreilly.com/videos/~/1018947658</a>
<a href="https://learning.oreilly.com/videos/~/1018947658/?ar">https://learning.oreilly.com/videos/~/1018947658/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1018947658/?ar">https://go.oreilly.com/library-access/library/view/-/1018947658/?ar</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:23102902026-01-13T13:02:50Z2026-01-13T13:02:50Zby Kovacich, Gerald L., author.<br/>ISBN 9780128023792 0128023791 012802190X 9780128021903<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format: Electronic Resources<br/>Network security bibleent://SD_ILS/0/SD_ILS:22884762026-01-13T13:02:50Z2026-01-13T13:02:50Zby Cole, Eric.<br/>ISBN 0470502495 9780470502495 9780470569993 0470569999 9786612303487<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar">https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470502495/?ar">https://learning.oreilly.com/library/view/~/9780470502495/?ar</a><br/>Format: Electronic Resources<br/>Hack proofing your Web applicationsent://SD_ILS/0/SD_ILS:657612026-01-13T13:02:50Z2026-01-13T13:02:50Zby Traxler, Julie.<br/>ISBN 9781928994312 1928994318<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response.ent://SD_ILS/0/SD_ILS:23314912026-01-13T13:02:50Z2026-01-13T13:02:50Zby Hettema, Hinne.<br/>ISBN 9781801812559 1801812551<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512/?ar">https://learning.oreilly.com/library/view/~/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512">https://learning.oreilly.com/library/view/~/9781801815512</a><br/>Format: Electronic Resources<br/>Trust in computer systems and the cloudent://SD_ILS/0/SD_ILS:23308502026-01-13T13:02:50Z2026-01-13T13:02:50Zby Bursell, Mike, author.<br/>ISBN 9781119695158 1119695155 9781119692317 1119692318 9781119693017<br/><a href="https://learning.oreilly.com/library/view/~/9781119692324/?ar">https://learning.oreilly.com/library/view/~/9781119692324/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar">https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119692324">https://learning.oreilly.com/library/view/~/9781119692324</a><br/>Format: Electronic Resources<br/>DevSecOps for .NET core : securing modern software applicationsent://SD_ILS/0/SD_ILS:23246122026-01-13T13:02:50Z2026-01-13T13:02:50Zby Zeeshan, Afzaal Ahmad, author.<br/>ISBN 9781484258507 1484258509<br/><a href="https://learning.oreilly.com/library/view/~/9781484258507/?ar">https://learning.oreilly.com/library/view/~/9781484258507/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484258507">https://learning.oreilly.com/library/view/~/9781484258507</a><br/>Format: Electronic Resources<br/>Cyber operations : building, defending, and attacking modern computer networksent://SD_ILS/0/SD_ILS:23189142026-01-13T13:02:50Z2026-01-13T13:02:50Zby O'Leary, Mike, 1968- author.<br/>ISBN 9781484242940 1484242947 1484242939 9781484242933 9781484242957<br/><a href="https://learning.oreilly.com/library/view/~/9781484242940">https://learning.oreilly.com/library/view/~/9781484242940</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242940/?ar">https://learning.oreilly.com/library/view/~/9781484242940/?ar</a><br/>Format: Electronic Resources<br/>Hands-on red team tactics : a practical guide to mastering red team operationsent://SD_ILS/0/SD_ILS:23177922026-01-13T13:02:50Z2026-01-13T13:02:50Zby Sharma, Himanshu, author.<br/>ISBN 9781788997003 178899700X<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995238">https://learning.oreilly.com/library/view/~/9781788995238</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995238/?ar">https://learning.oreilly.com/library/view/~/9781788995238/?ar</a><br/>Format: Electronic Resources<br/>Infosec management fundamentalsent://SD_ILS/0/SD_ILS:23080392026-01-13T13:02:50Z2026-01-13T13:02:50Zby Dalziel, Henry, author.<br/>ISBN 9780128041871 0128041870 0128041722 9780128041727<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar">https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128041871/?ar">https://learning.oreilly.com/library/view/~/9780128041871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128041871">https://learning.oreilly.com/library/view/~/9780128041871</a><br/>Format: Electronic Resources<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:659072026-01-13T13:02:50Z2026-01-13T13:02:50Zby Beale, Jay.<br/>ISBN 9781931836043 1931836043<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Red Hat and IT security : with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditingent://SD_ILS/0/SD_ILS:23265142026-01-13T13:02:50Z2026-01-13T13:02:50Zby Chatterjee, Rithik, author.<br/>ISBN 9781484264348 1484264347 9781484264355 1484264355<br/><a href="https://learning.oreilly.com/library/view/~/9781484264348">https://learning.oreilly.com/library/view/~/9781484264348</a>
<a href="https://learning.oreilly.com/library/view/~/9781484264348/?ar">https://learning.oreilly.com/library/view/~/9781484264348/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar">https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar</a><br/>Format: Electronic Resources<br/>Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:22966162026-01-13T13:02:50Z2026-01-13T13:02:50Zby Raggo, Michael T.<br/>ISBN 9781597497411 159749741X<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format: Electronic Resources<br/>Security and Usability : Designing Secure Systems that People Can Use.ent://SD_ILS/0/SD_ILS:22886102026-01-13T13:02:50Z2026-01-13T13:02:50Zby Cranor, Lorrie Faith.<br/>ISBN 9780596553852 0596553854<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008279/?ar">https://go.oreilly.com/library-access/library/view/-/0596008279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008279/?ar">https://learning.oreilly.com/library/view/~/0596008279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008279">https://learning.oreilly.com/library/view/~/0596008279</a><br/>Format: Electronic Resources<br/>An introduction to security in a CSM 1.3 for AIX 5L environmentent://SD_ILS/0/SD_ILS:22878272026-01-13T13:02:50Z2026-01-13T13:02:50Zby Lascu, Octavian.<br/>ISBN 9780738427898 0738427896<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738427896/?ar">https://go.oreilly.com/library-access/library/view/-/0738427896/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738427896/?ar">https://learning.oreilly.com/library/view/~/0738427896/?ar</a><br/>Format: Electronic Resources<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:657722026-01-13T13:02:50Z2026-01-13T13:02:50Zby Bendell, Dan.<br/>ISBN 9781597492508 1597492507<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threatsent://SD_ILS/0/SD_ILS:23160162026-01-13T13:02:50Z2026-01-13T13:02:50Zby Donaldson, Scott E., author.<br/>ISBN 9781484232583 1484232585 9781484232590 1484232593 9781484246283<br/><a href="https://learning.oreilly.com/library/view/~/9781484232583/?ar">https://learning.oreilly.com/library/view/~/9781484232583/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484232583">https://learning.oreilly.com/library/view/~/9781484232583</a><br/>Format: Electronic Resources<br/>Snort Intrusion Detection 2.0.ent://SD_ILS/0/SD_ILS:11921112026-01-13T13:02:50Z2026-01-13T13:02:50Zby Syngress.<br/>ISBN 9780080481005<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294371">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux cookbook : effective penetration testing solutionsent://SD_ILS/0/SD_ILS:23142702026-01-13T13:02:50Z2026-01-13T13:02:50Zby Schultz, Corey P., author.<br/>ISBN 9781784394257 1784394254<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390303/?ar">https://learning.oreilly.com/library/view/~/9781784390303/?ar</a><br/>Format: Electronic Resources<br/>Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environmentent://SD_ILS/0/SD_ILS:23040392026-01-13T13:02:50Z2026-01-13T13:02:50Zby Mehan, Julie E., author.<br/>ISBN 9781849285728 1849285721<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285728/?ar">https://learning.oreilly.com/library/view/~/9781849285728/?ar</a><br/>Format: Electronic Resources<br/>The complete cybersecurity bootcampent://SD_ILS/0/SD_ILS:23334072026-01-13T13:02:50Z2026-01-13T13:02:50Zby Santos, Omar, presenter.<br/>ISBN 9780137949397 0137949391<br/><a href="https://learning.oreilly.com/videos/~/9780137949397">https://learning.oreilly.com/videos/~/9780137949397</a>
<a href="https://learning.oreilly.com/videos/~/9780137949397/?ar">https://learning.oreilly.com/videos/~/9780137949397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar">https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar</a><br/>Format: Video recording<br/>Real-world cryptographyent://SD_ILS/0/SD_ILS:23303832026-01-13T13:02:50Z2026-01-13T13:02:50Zby Wong, David (Cryptography engineer), author.<br/>ISBN 9781638350842 1638350841 1617296716 9781617296710<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710">https://learning.oreilly.com/library/view/~/9781617296710</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710/?ar">https://learning.oreilly.com/library/view/~/9781617296710/?ar</a><br/>Format: Electronic Resources<br/>NIST cybersecurity framework : a pocket guideent://SD_ILS/0/SD_ILS:23175352026-01-13T13:02:50Z2026-01-13T13:02:50Zby Calder, Alan, 1957- author.<br/>ISBN 9781787780415 1787780414 9781787780422 1787780422<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787780422/?ar">https://go.oreilly.com/library-access/library/view/-/9781787780422/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787780422/?ar">https://learning.oreilly.com/library/view/~/9781787780422/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787780422">https://learning.oreilly.com/library/view/~/9781787780422</a><br/>Format: Electronic Resources<br/>Hack the stack using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:642272026-01-13T13:02:50Z2026-01-13T13:02:50Zby Gregg, Michael (Michael C.)<br/>ISBN 9781597491099 1597491098<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Windows security monitoring : scenarios and patternsent://SD_ILS/0/SD_ILS:23159452026-01-13T13:02:50Z2026-01-13T13:02:50Zby Miroshnikov, Andrei, author.<br/>ISBN 9781119390879 1119390877 9781119390909 1119390907 9781119390893<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar">https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119390640/?ar">https://learning.oreilly.com/library/view/~/9781119390640/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119390640">https://learning.oreilly.com/library/view/~/9781119390640</a><br/>Format: Electronic Resources<br/>Secure coding : principles and practicesent://SD_ILS/0/SD_ILS:22810062026-01-13T13:02:50Z2026-01-13T13:02:50Zby Graff, Mark.<br/>ISBN 0596522177 9780596522179<br/><a href="https://learning.oreilly.com/library/view/~/0596002424">https://learning.oreilly.com/library/view/~/0596002424</a>
<a href="https://learning.oreilly.com/library/view/~/0596002424/?ar">https://learning.oreilly.com/library/view/~/0596002424/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596002424/?ar">https://go.oreilly.com/library-access/library/view/-/0596002424/?ar</a><br/>Format: Electronic Resources<br/>Mastering Defensive Security : Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure.ent://SD_ILS/0/SD_ILS:23308412026-01-13T13:02:50Z2026-01-13T13:02:50Zby Bravo, Cesar.<br/>ISBN 1800206097 9781800206090<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar">https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800208162/?ar">https://learning.oreilly.com/library/view/~/9781800208162/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800208162">https://learning.oreilly.com/library/view/~/9781800208162</a><br/>Format: Electronic Resources<br/>Threat forecasting : leveraging big data for predictive analysisent://SD_ILS/0/SD_ILS:23106292026-01-13T13:02:50Z2026-01-13T13:02:50Zby Pirc, John, author.<br/>ISBN 9780128004784 0128004789 0128000066 9780128000069<br/><a href="https://learning.oreilly.com/library/view/~/9780128004784/?ar">https://learning.oreilly.com/library/view/~/9780128004784/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar">https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128004784">https://learning.oreilly.com/library/view/~/9780128004784</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third editionent://SD_ILS/0/SD_ILS:23116552026-01-13T13:02:50Z2026-01-13T13:02:50Zby Johansen, Gerard, author.<br/>ISBN 9781785886065 1785886061 1785888420 9781785888427<br/><a href="https://learning.oreilly.com/library/view/~/9781785888427/?ar">https://learning.oreilly.com/library/view/~/9781785888427/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar">https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar</a><br/>Format: Electronic Resources<br/>Mehr Hacking mit Python : eigene Tools entwickeln für Hacker and Pentesterent://SD_ILS/0/SD_ILS:23087772026-01-13T13:02:50Z2026-01-13T13:02:50Zby Seitz, Justin, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457196140">https://learning.oreilly.com/library/view/~/9781457196140</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457196140/?ar">https://go.oreilly.com/library-access/library/view/-/9781457196140/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457196140/?ar">https://learning.oreilly.com/library/view/~/9781457196140/?ar</a><br/>Format: Electronic Resources<br/>Fuzzing : brute force vulnerabilty discoveryent://SD_ILS/0/SD_ILS:22834512026-01-13T13:02:50Z2026-01-13T13:02:50Zby Sutton, Michael, 1973-<br/>ISBN 9780321446114 0321446119 0321525019 9780321525017 9781282680968<br/><a href="https://learning.oreilly.com/library/view/~/9780321446114">https://learning.oreilly.com/library/view/~/9780321446114</a>
<a href="https://learning.oreilly.com/library/view/~/9780321446114/?ar">https://learning.oreilly.com/library/view/~/9780321446114/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar">https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar</a><br/>Format: Electronic Resources<br/>Network intrusion dedection: an analyst's handbookent://SD_ILS/0/SD_ILS:80652026-01-13T13:02:50Z2026-01-13T13:02:50Zby Northcutt, Stephen<br/>ISBN 0735710082<br/>Format: Books<br/>Cisco Pix firewalls configure, manage, & troubleshootent://SD_ILS/0/SD_ILS:656942026-01-13T13:02:50Z2026-01-13T13:02:50Zby Behrens, Thorsten.<br/>ISBN 9781597490047 1597490040<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Threat Modeling : Designing for Security.ent://SD_ILS/0/SD_ILS:12679162026-01-13T13:02:50Z2026-01-13T13:02:50Zby Shostack, Adam.<br/>ISBN 9781118822692<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1629177">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity Operations Handbook : the definitive reference on operational cybersecurity.ent://SD_ILS/0/SD_ILS:11951102026-01-13T13:02:50Z2026-01-13T13:02:50Zby Rittinghouse, PhD, CISM, John.<br/>ISBN 9780080530185<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=313612">Click to View</a><br/>Format: Electronic Resources<br/>The best damn firewall book periodent://SD_ILS/0/SD_ILS:658982026-01-13T13:02:50Z2026-01-13T13:02:50Zby Shinder, Thomas W.<br/>ISBN 9781931836906 1931836906<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836906">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Windows, Linux, BSD için ağ güvenliği ipuçları : 100 etkin güvenlik tekniğient://SD_ILS/0/SD_ILS:188752026-01-13T13:02:50Z2026-01-13T13:02:50Zby Lockhart, Andrew.<br/>ISBN 9759809923 9789759809928<br/>Format: Books<br/>Building Internet firewallsent://SD_ILS/0/SD_ILS:69922026-01-13T13:02:50Z2026-01-13T13:02:50Zby Zwicky, Elizabeth D.<br/>ISBN 1565928717<br/>Format: Books<br/>Scene of the cybercrime computer forensics handbookent://SD_ILS/0/SD_ILS:658712026-01-13T13:02:50Z2026-01-13T13:02:50Zby Shinder, Debra Littlejohn.<br/>ISBN 9781931836654 1931836655<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackersent://SD_ILS/0/SD_ILS:23110062026-01-13T13:02:50Z2026-01-13T13:02:50Zby Halton, Wolf, author.<br/>ISBN 9781782168508 1782168508 1782168494 9781782168492<br/><a href="https://learning.oreilly.com/library/view/~/9781782168492/?ar">https://learning.oreilly.com/library/view/~/9781782168492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782168492">https://learning.oreilly.com/library/view/~/9781782168492</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar</a><br/>Format: Electronic Resources<br/>Maximum Security, Third Editionent://SD_ILS/0/SD_ILS:23197122026-01-13T13:02:50Z2026-01-13T13:02:50Zby Anonymous, author.<br/><a href="https://learning.oreilly.com/library/view/~/0672318717">https://learning.oreilly.com/library/view/~/0672318717</a>
<a href="https://learning.oreilly.com/library/view/~/0672318717/?ar">https://learning.oreilly.com/library/view/~/0672318717/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672318717/?ar">https://go.oreilly.com/library-access/library/view/-/0672318717/?ar</a><br/>Format: Electronic Resources<br/>Security and privacy for Microsoft Office 2010 users.ent://SD_ILS/0/SD_ILS:22942102026-01-13T13:02:50Z2026-01-13T13:02:50Zby Tulloch, Mitch.<br/>ISBN 9780735668812 0735668817 9780735668799 0735668795<br/><a href="https://learning.oreilly.com/library/view/~/9780735668829">https://learning.oreilly.com/library/view/~/9780735668829</a>
<a href="https://learning.oreilly.com/library/view/~/9780735668829/?ar">https://learning.oreilly.com/library/view/~/9780735668829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar">https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar</a><br/>Format: Electronic Resources<br/>Is it safe? : protecting your computer, your business, and yourself onlineent://SD_ILS/0/SD_ILS:22855542026-01-13T13:02:50Z2026-01-13T13:02:50Zby Miller, Michael, 1958-<br/>ISBN 9780768683080 0768683084<br/><a href="https://learning.oreilly.com/library/view/~/9780768683080/?ar">https://learning.oreilly.com/library/view/~/9780768683080/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar">https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768683080">https://learning.oreilly.com/library/view/~/9780768683080</a><br/>Format: Electronic Resources<br/>The tangled Web: a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:2563412026-01-13T13:02:50Z2026-01-13T13:02:50Zby Zalewski, Michal.<br/>ISBN 9781593273880 1593273886<br/>Format: Books<br/>