Arama Sonu&ccedil;ları Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026ps$003d300?dt=list 2025-07-09T17:59:15Z Computer security ent://SD_ILS/0/SD_ILS:11439 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Gollmann, Dieter<br/>Format:&#160;Books<br/> Computer security basics ent://SD_ILS/0/SD_ILS:2282377 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Lehtinen, Rick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596006691/?ar">https://go.oreilly.com/library-access/library/view/-/0596006691/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596006691">https://learning.oreilly.com/library/view/~/0596006691</a> <a href="https://learning.oreilly.com/library/view/~/0596006691/?ar">https://learning.oreilly.com/library/view/~/0596006691/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:2294655 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Easttom, Chuck.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar">https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132828284/?ar">https://learning.oreilly.com/library/view/~/9780132828284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132828284">https://learning.oreilly.com/library/view/~/9780132828284</a><br/>Format:&#160;Electronic Resources<br/> Computer security handbook ent://SD_ILS/0/SD_ILS:11460 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Bosworth, Seymour.<br/>Format:&#160;Books<br/> Computer security handbook. ent://SD_ILS/0/SD_ILS:2287029 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Bosworth, Seymour.<br/><a href="https://learning.oreilly.com/library/view/~/9780471716525/?ar">https://learning.oreilly.com/library/view/~/9780471716525/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780471716525/?ar">https://go.oreilly.com/library-access/library/view/-/9780471716525/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer Security Literacy ent://SD_ILS/0/SD_ILS:2323426 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Jacobson, Douglas, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856192/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856192/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439856192/?ar">https://learning.oreilly.com/library/view/~/9781439856192/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439856192">https://learning.oreilly.com/library/view/~/9781439856192</a><br/>Format:&#160;Electronic Resources<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:2310991 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer network security ent://SD_ILS/0/SD_ILS:2274211 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Sadiqui, Ali, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6123268">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:2323627 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Sadiqui, Ali, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar">https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786305275">https://learning.oreilly.com/library/view/~/9781786305275</a> <a href="https://learning.oreilly.com/library/view/~/9781786305275/?ar">https://learning.oreilly.com/library/view/~/9781786305275/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:504373 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Computer Security. ent://SD_ILS/0/SD_ILS:2317980 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321247442/?ar">https://go.oreilly.com/library-access/library/view/-/0321247442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321247442/?ar">https://learning.oreilly.com/library/view/~/0321247442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321247442">https://learning.oreilly.com/library/view/~/0321247442</a><br/>Format:&#160;Electronic Resources<br/> Computer Security : Art and Science. ent://SD_ILS/0/SD_ILS:2318012 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Bishop, Matthew A. (Matthew A.) author.<br/><a href="https://learning.oreilly.com/library/view/~/0201440997">https://learning.oreilly.com/library/view/~/0201440997</a> <a href="https://learning.oreilly.com/library/view/~/0201440997/?ar">https://learning.oreilly.com/library/view/~/0201440997/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0201440997/?ar">https://go.oreilly.com/library-access/library/view/-/0201440997/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer Security Handbook, Set. ent://SD_ILS/0/SD_ILS:1269337 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Bosworth, Seymour.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1652940">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:508525 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Electronic Resources<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:2283057 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://learning.oreilly.com/library/view/~/9780471947837">https://learning.oreilly.com/library/view/~/9780471947837</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar">https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780471947837/?ar">https://learning.oreilly.com/library/view/~/9780471947837/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2048378 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=453166">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2286804 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a> <a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security: art and science ent://SD_ILS/0/SD_ILS:11398 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Bishop, Matt.<br/>Format:&#160;Books<br/> Computer Security : QuickStudy Reference Guide. ent://SD_ILS/0/SD_ILS:2096330 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;BarCharts, Inc.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4876967">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer and Information Security Handbook. ent://SD_ILS/0/SD_ILS:1258612 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1195617">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Assurance and Computer Security. ent://SD_ILS/0/SD_ILS:1190742 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Thomas, J.P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=287000">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer and Network Security Essentials ent://SD_ILS/0/SD_ILS:2088295 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Daimi, Kevin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format:&#160;Electronic Resources<br/> Computer and network security essentials ent://SD_ILS/0/SD_ILS:2346544 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Daimi, Kevin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4947026">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2343015 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Vacca, John R., editor.<br/>Format:&#160;Books<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2313301 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128039298">https://learning.oreilly.com/library/view/~/9780128039298</a> <a href="https://learning.oreilly.com/library/view/~/9780128039298/?ar">https://learning.oreilly.com/library/view/~/9780128039298/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar">https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2212301 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Vacca, John R., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4858374">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer security : art and science ent://SD_ILS/0/SD_ILS:2318452 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format:&#160;Electronic Resources<br/> Collaborative computer security and trust management ent://SD_ILS/0/SD_ILS:2261215 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Seigneur, Jean-Marc.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format:&#160;Electronic Resources<br/> Computer incident response and product security ent://SD_ILS/0/SD_ILS:2291715 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Rajnovic, Damir, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780132491518">https://learning.oreilly.com/library/view/~/9780132491518</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780132491518/?ar">https://go.oreilly.com/library-access/library/view/-/9780132491518/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132491518/?ar">https://learning.oreilly.com/library/view/~/9780132491518/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security and encryption : an introduction ent://SD_ILS/0/SD_ILS:2237660 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Chauhan, S. R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6404902">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer science security : concepts and tools ent://SD_ILS/0/SD_ILS:2334035 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Zaidoun, Ameur Salem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786307552/?ar">https://learning.oreilly.com/library/view/~/9781786307552/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar">https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786307552">https://learning.oreilly.com/library/view/~/9781786307552</a><br/>Format:&#160;Electronic Resources<br/> The Essential Guide to Home Computer Security. ent://SD_ILS/0/SD_ILS:1235656 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;R. Rowlingson, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=811317">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook, second edition ent://SD_ILS/0/SD_ILS:2300197 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar">https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123943972/?ar">https://learning.oreilly.com/library/view/~/9780123943972/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer Security in the 21st Century ent://SD_ILS/0/SD_ILS:504252 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Lee, D. T. editor.<br/><a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format:&#160;Electronic Resources<br/> Conducting computer security assessments at nuclear facilities. ent://SD_ILS/0/SD_ILS:2099674 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z <a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4853352">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information assurance handbook : effective computer security and risk management strategies ent://SD_ILS/0/SD_ILS:2304875 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Schou, Corey.<br/><a href="https://learning.oreilly.com/library/view/~/9780071821650">https://learning.oreilly.com/library/view/~/9780071821650</a> <a href="https://learning.oreilly.com/library/view/~/9780071821650/?ar">https://learning.oreilly.com/library/view/~/9780071821650/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar">https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer communications security :principles, standard protocols and techniques ent://SD_ILS/0/SD_ILS:4883 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Ford, Warwick.<br/>Format:&#160;Books<br/> Network Security JumpStart : Computer and Network Security Basics. ent://SD_ILS/0/SD_ILS:1188326 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Strebe, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=272216">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Biometrics, Computer Security Systems and Artificial Intelligence Applications ent://SD_ILS/0/SD_ILS:505426 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Saeed, Khalid. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format:&#160;Electronic Resources<br/> Analyzing computer security : a threat/vulnerability/countermeasure approach ent://SD_ILS/0/SD_ILS:2291806 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Pfleeger, Charles P., 1948-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar">https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132789493/?ar">https://learning.oreilly.com/library/view/~/9780132789493/?ar</a><br/>Format:&#160;Electronic Resources<br/> Using computer science in high-tech security careers ent://SD_ILS/0/SD_ILS:2340751 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Mooney, Carla, 1970- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5794501">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer security incident response planning at nuclear facilities ent://SD_ILS/0/SD_ILS:2132816 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;International Atomic Energy Agency.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4853353">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Principles of computer security : CompTIA Security+ and beyond ent://SD_ILS/0/SD_ILS:2330810 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Conklin, Wm. Arthur (William Arthur), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260474329">https://learning.oreilly.com/library/view/~/9781260474329</a> <a href="https://learning.oreilly.com/library/view/~/9781260474329/?ar">https://learning.oreilly.com/library/view/~/9781260474329/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260474329/?ar">https://go.oreilly.com/library-access/library/view/-/9781260474329/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Reliability in Computer Communications and Networks. ent://SD_ILS/0/SD_ILS:2342079 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Sha, Kewei.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=30251744">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security, privacy and reliability in computer communications and networks ent://SD_ILS/0/SD_ILS:2143816 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Sha, Kewei, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4771355">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing the Cloud : Cloud Computer Security Techniques and Tactics. ent://SD_ILS/0/SD_ILS:1227170 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Winkler, Vic (J.R.).<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=686827">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:2292491 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Winkler, J. R. (Joachim R.)<br/><a href="https://learning.oreilly.com/library/view/~/9781597495929">https://learning.oreilly.com/library/view/~/9781597495929</a> <a href="https://learning.oreilly.com/library/view/~/9781597495929/?ar">https://learning.oreilly.com/library/view/~/9781597495929/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security, privacy, and politics current issues, challenges, and solutions ent://SD_ILS/0/SD_ILS:2261235 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Subramanian, Ramesh.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-804-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-804-8</a><br/>Format:&#160;Electronic Resources<br/> Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems ent://SD_ILS/0/SD_ILS:504179 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format:&#160;Electronic Resources<br/> Introduction to computer and network security : navigating shades of gray ent://SD_ILS/0/SD_ILS:2313482 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format:&#160;Electronic Resources<br/> Risk Management for Computer Security : Protecting Your Network and Information Assets. ent://SD_ILS/0/SD_ILS:1192185 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Jones, Andy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294671">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Machine learning for computer and cyber security : principles, algorithms, and practices ent://SD_ILS/0/SD_ILS:2355523 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Gupta, Brij, 1982- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5675759">Click to View</a><br/>Format:&#160;Electronic Resources<br/> VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Security ent://SD_ILS/0/SD_ILS:503340 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Goodall, John R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format:&#160;Electronic Resources<br/> Machine Learning and Data Mining for Computer Security Methods and Applications ent://SD_ILS/0/SD_ILS:508477 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Maloof, Marcus A. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-253-5">http://dx.doi.org/10.1007/1-84628-253-5</a><br/>Format:&#160;Electronic Resources<br/> Essential Computer Security : Everyone's Guide to Email, Internet, and Wireless Security. ent://SD_ILS/0/SD_ILS:1195846 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Bradley, T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=319200">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Principles of computer security : CompTIA security+ and beyond, (exam SY0-501) ent://SD_ILS/0/SD_ILS:2316897 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Conklin, Wm. Arthur (William Arthur), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260026009/?ar">https://go.oreilly.com/library-access/library/view/-/9781260026009/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781260026009/?ar">https://learning.oreilly.com/library/view/~/9781260026009/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security of instrumentation and control systems at nuclear facilities : technical guidance. ent://SD_ILS/0/SD_ILS:2230781 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z <a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5426853">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Essential computer security everyone's guide to e-mail, Internet, and wireless security ent://SD_ILS/0/SD_ILS:64324 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Bradley, Tony, 1969-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Essential computer security : everyone's guide to e-mail, Internet, and wireless security ent://SD_ILS/0/SD_ILS:2316026 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Bradley, Tony, 1969- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491143/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491143/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491143/?ar">https://learning.oreilly.com/library/view/~/9781597491143/?ar</a><br/>Format:&#160;Electronic Resources<br/> Principles of Computer Security : CompTIA Security+ and Beyond Lab Manual (Exam SY0-601) ent://SD_ILS/0/SD_ILS:2329655 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Weissman, Jonathan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260470123">https://learning.oreilly.com/library/view/~/9781260470123</a> <a href="https://learning.oreilly.com/library/view/~/9781260470123/?ar">https://learning.oreilly.com/library/view/~/9781260470123/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260470123/?ar">https://go.oreilly.com/library-access/library/view/-/9781260470123/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security aspects of design for instrumentation and control systems at nuclear power plants ent://SD_ILS/0/SD_ILS:2353634 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;International Atomic Energy Agency, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6482097">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The myths of security : what the computer security industry doesn't want you to know ent://SD_ILS/0/SD_ILS:2286938 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Viega, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar">https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596803957/?ar">https://learning.oreilly.com/library/view/~/9780596803957/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596803957">https://learning.oreilly.com/library/view/~/9780596803957</a><br/>Format:&#160;Electronic Resources<br/> The myths of security : what the computer security industry doesn't want you to know ent://SD_ILS/0/SD_ILS:2106561 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Viega, John.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821</a><br/>Format:&#160;Electronic Resources<br/> Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation ent://SD_ILS/0/SD_ILS:2084803 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format:&#160;Electronic Resources<br/> Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies ent://SD_ILS/0/SD_ILS:2317228 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Parker, Carey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484238523">https://learning.oreilly.com/library/view/~/9781484238523</a> <a href="https://learning.oreilly.com/library/view/~/9781484238523/?ar">https://learning.oreilly.com/library/view/~/9781484238523/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484238523/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238523/?ar</a><br/>Format:&#160;Electronic Resources<br/> Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies ent://SD_ILS/0/SD_ILS:2325773 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Parker, Carey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261897">https://learning.oreilly.com/library/view/~/9781484261897</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484261897/?ar">https://learning.oreilly.com/library/view/~/9781484261897/?ar</a><br/>Format:&#160;Electronic Resources<br/> Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503670 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Goodall, John R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085805 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Skavhaug, Amund. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45477-1">https://doi.org/10.1007/978-3-319-45477-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510366 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Winther, Rune. editor.<br/><a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511732 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;G&oacute;rski, Janusz. editor.<br/><a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512871 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Saglietti, Francesca. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 37th International Conference, SAFECOMP 2018, V&auml;ster&aring;s, Sweden, September 19-21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085584 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053<br/><a href="https://doi.org/10.1007/978-3-319-99130-6">https://doi.org/10.1007/978-3-319-99130-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security SAFECOMP 2016 Workshops, ASSURE, DECSoS, SASSUR, and TIPS, Trondheim, Norway, September 20, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086207 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Skavhaug, Amund. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45480-1">https://doi.org/10.1007/978-3-319-45480-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511681 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503818 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 &mdash; 26, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512846 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Biskup, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, M&aacute;laga, Spain, October 6-8, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503749 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512927 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Miyaji, Atsuko. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511852 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Yoshiura, Hiroshi. editor.<br/><a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503708 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Harrison, Michael D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510351 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Vimercati, Sabrina de Capitani. editor.<br/><a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format:&#160;Electronic Resources<br/> Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086019 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security SAFECOMP 2018 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, V&auml;ster&aring;s, Sweden, September 18, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085340 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053<br/><a href="https://doi.org/10.1007/978-3-319-99229-7">https://doi.org/10.1007/978-3-319-99229-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085498 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Inomata, Atsuo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085887 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Ogawa, Kazuto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085186 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085198 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085676 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085439 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science &ndash; ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512989 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Cervesato, Iliano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format:&#160;Electronic Resources<br/> Security in Computer and Information Sciences : First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2184889 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Gelenbe, Erol<br/><a href="https://library.oapen.org/bitstream/20.500.12657/23295/1/1006860.pdf">DOAB: download the publication</a> <a href="https://directory.doabooks.org/handle/20.500.12854/27012">DOAB: description of the publication</a><br/>Format:&#160;Books<br/> Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084992 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201<br/><a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510364 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:501546 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13&ndash;15, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512745 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22&ndash;27, 2004, Toulouse, France ent://SD_ILS/0/SD_ILS:504264 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084265 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security Education &ndash; Towards a Cybersecure Society 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084346 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Drevin, Lynette. editor. (orcid)0000-0001-9370-8216<br/><a href="https://doi.org/10.1007/978-3-319-99734-6">https://doi.org/10.1007/978-3-319-99734-6</a><br/>Format:&#160;Electronic Resources<br/> Network Control and Engineering for Qos, Security and Mobility, V IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20&ndash;25, 2006, Santiago, Chile ent://SD_ILS/0/SD_ILS:505351 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Ga&iuml;ti, Dominique. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-34827-8">http://dx.doi.org/10.1007/978-0-387-34827-8</a><br/>Format:&#160;Electronic Resources<br/> Podstawy ochrony komputer&oacute;w ent://SD_ILS/0/SD_ILS:2299546 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Lehtinen, Rick.<br/><a href="https://learning.oreilly.com/library/view/~/9781457172618">https://learning.oreilly.com/library/view/~/9781457172618</a> <a href="https://learning.oreilly.com/library/view/~/9781457172618/?ar">https://learning.oreilly.com/library/view/~/9781457172618/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457172618/?ar">https://go.oreilly.com/library-access/library/view/-/9781457172618/?ar</a><br/>Format:&#160;Electronic Resources<br/> Firewall Design and Analysis. ent://SD_ILS/0/SD_ILS:1230645 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Liu, Alex X.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=731297">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of Information Security and Assurance ent://SD_ILS/0/SD_ILS:2341722 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Clarke, Nathan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6870870">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Role-Based Access Control. ent://SD_ILS/0/SD_ILS:1197533 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Ferraiolo, David F.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338751">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical UNIX and Internet security ent://SD_ILS/0/SD_ILS:2281256 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596003234">https://learning.oreilly.com/library/view/~/0596003234</a> <a href="https://learning.oreilly.com/library/view/~/0596003234/?ar">https://learning.oreilly.com/library/view/~/0596003234/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596003234/?ar">https://go.oreilly.com/library-access/library/view/-/0596003234/?ar</a><br/>Format:&#160;Electronic Resources<br/> Trust and Security in Collaborative Computing. ent://SD_ILS/0/SD_ILS:1270688 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Zou, Xukai.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679354">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security in Ad-Hoc and Sensor Networks. ent://SD_ILS/0/SD_ILS:1270687 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Beyah, Raheem.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679353">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security in Distributed and Networking Systems. ent://SD_ILS/0/SD_ILS:1258327 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Xiao, Yang.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1193126">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Papers from the HAISA 2007 Symposium : Papers from the HAISA 2007 Symposium. ent://SD_ILS/0/SD_ILS:1196565 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Furnell, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328737">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:2325452 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a> <a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit ent://SD_ILS/0/SD_ILS:2295823 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis DVD toolkit 2E ent://SD_ILS/0/SD_ILS:2287802 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information hiding ent://SD_ILS/0/SD_ILS:2155819 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Katzenbeisser, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4821270">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Platform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engine ent://SD_ILS/0/SD_ILS:2304275 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Ruan, Xiaoyu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265726/?ar">https://learning.oreilly.com/library/view/~/9781430265726/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430265726">https://learning.oreilly.com/library/view/~/9781430265726</a><br/>Format:&#160;Electronic Resources<br/> Advanced host intrusion prevention with CSA ent://SD_ILS/0/SD_ILS:2282200 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Sullivan, Chad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587052520/?ar">https://go.oreilly.com/library-access/library/view/-/1587052520/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587052520">https://learning.oreilly.com/library/view/~/1587052520</a> <a href="https://learning.oreilly.com/library/view/~/1587052520/?ar">https://learning.oreilly.com/library/view/~/1587052520/?ar</a><br/>Format:&#160;Electronic Resources<br/> Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013. ent://SD_ILS/0/SD_ILS:1274585 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Furnell, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1752831">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses ent://SD_ILS/0/SD_ILS:2283103 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Skoudis, Ed.<br/><a href="https://learning.oreilly.com/library/view/~/9780131481046/?ar">https://learning.oreilly.com/library/view/~/9780131481046/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar">https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar</a><br/>Format:&#160;Electronic Resources<br/> Toward Better Usability, Security, and Privacy of Information Technology : Report of a Workshop. ent://SD_ILS/0/SD_ILS:1320501 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Steering Committee on the Usability, Security, and Privacy of Computer Systems.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3378675">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Internet Denial of Service: Attack and Defense Mechanisms ent://SD_ILS/0/SD_ILS:2326795 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Mirkovic, Jelena, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131475738/?ar">https://learning.oreilly.com/library/view/~/0131475738/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131475738/?ar">https://go.oreilly.com/library-access/library/view/-/0131475738/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131475738">https://learning.oreilly.com/library/view/~/0131475738</a><br/>Format:&#160;Electronic Resources<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:2286245 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Qian, Yi, 1962-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar">https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123735669/?ar">https://learning.oreilly.com/library/view/~/9780123735669/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web security for developers ent://SD_ILS/0/SD_ILS:2324422 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;McDonald, Malcolm (Computer programmer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098122683/?ar">https://learning.oreilly.com/library/view/~/9781098122683/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098122683">https://learning.oreilly.com/library/view/~/9781098122683</a><br/>Format:&#160;Electronic Resources<br/> Emerging and Readily Available Technologies and National Security : A Framework for Addressing Ethical, Legal, and Societal Issues. ent://SD_ILS/0/SD_ILS:1321001 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Board, Computer Science and Telecommunications.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3379188">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network and internetwork security: principles and practice. ent://SD_ILS/0/SD_ILS:3721 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Stallings, William.<br/>Format:&#160;Books<br/> The CERT guide to system and network security practices ent://SD_ILS/0/SD_ILS:11798 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Allen, Julia H.<br/>Format:&#160;Books<br/> How cyber security can protect your business : a guide for all stakeholders ent://SD_ILS/0/SD_ILS:2323060 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Wright, Christopher, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781979/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781979/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787781979/?ar">https://learning.oreilly.com/library/view/~/9781787781979/?ar</a><br/>Format:&#160;Electronic Resources<br/> Intro to secure software : building security systems ent://SD_ILS/0/SD_ILS:2310156 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Sletten, Brian, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781491943595/?ar">https://learning.oreilly.com/videos/~/9781491943595/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491943595/?ar">https://go.oreilly.com/library-access/library/view/-/9781491943595/?ar</a><br/>Format:&#160;Electronic Resources<br/> Authentication and access control : practical cryptography methods and tools ent://SD_ILS/0/SD_ILS:2327123 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Boonkrong, Sirapat, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484265703">https://learning.oreilly.com/library/view/~/9781484265703</a> <a href="https://learning.oreilly.com/library/view/~/9781484265703/?ar">https://learning.oreilly.com/library/view/~/9781484265703/?ar</a><br/>Format:&#160;Electronic Resources<br/> Protective security : creating military-grade defenses for your digital business ent://SD_ILS/0/SD_ILS:2328579 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Seaman, Jim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484269084">https://learning.oreilly.com/library/view/~/9781484269084</a> <a href="https://learning.oreilly.com/library/view/~/9781484269084/?ar">https://learning.oreilly.com/library/view/~/9781484269084/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS : an integrated data security standard guide ent://SD_ILS/0/SD_ILS:2324386 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Seaman, Jim.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258088">https://learning.oreilly.com/library/view/~/9781484258088</a> <a href="https://learning.oreilly.com/library/view/~/9781484258088/?ar">https://learning.oreilly.com/library/view/~/9781484258088/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT security controls : a guide to corporate standards and frameworks ent://SD_ILS/0/SD_ILS:2332412 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Viegas, Virgilio, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484277997/?ar">https://learning.oreilly.com/library/view/~/9781484277997/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484277997">https://learning.oreilly.com/library/view/~/9781484277997</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar</a><br/>Format:&#160;Electronic Resources<br/> Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict ent://SD_ILS/0/SD_ILS:2329079 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Borges, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781801076203/?ar">https://learning.oreilly.com/library/view/~/9781801076203/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801076203">https://learning.oreilly.com/library/view/~/9781801076203</a><br/>Format:&#160;Electronic Resources<br/> Cyber threat intelligence : the no-nonsense guide for CISOs and Security Managers ent://SD_ILS/0/SD_ILS:2329637 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Roberts, Aaron.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272206">https://learning.oreilly.com/library/view/~/9781484272206</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484272206/?ar">https://learning.oreilly.com/library/view/~/9781484272206/?ar</a><br/>Format:&#160;Electronic Resources<br/> Solving identity management in modern applications : demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 ent://SD_ILS/0/SD_ILS:2322723 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Wilson, Yvonne.<br/><a href="https://learning.oreilly.com/library/view/~/9781484250952/?ar">https://learning.oreilly.com/library/view/~/9781484250952/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484250952">https://learning.oreilly.com/library/view/~/9781484250952</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar</a><br/>Format:&#160;Electronic Resources<br/> Development of a Quality Assurance Prototype for Intrusion Detection Systems ent://SD_ILS/0/SD_ILS:18728 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Y&uuml;ksel, Ulaş.<br/><a href="http://hdl.handle.net/11147/3428">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Comparison of recovery requirements with investigation requirements for intrusion management systems ent://SD_ILS/0/SD_ILS:25247 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Arpa&ccedil;ay Tapucu, Dilek.<br/><a href="http://hdl.handle.net/11147/3463">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Honeypots and routers : collecting internet attacks ent://SD_ILS/0/SD_ILS:2322273 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Mohammed, Mohssen, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781498702201">https://learning.oreilly.com/library/view/~/9781498702201</a> <a href="https://learning.oreilly.com/library/view/~/9781498702201/?ar">https://learning.oreilly.com/library/view/~/9781498702201/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781498702201/?ar">https://go.oreilly.com/library-access/library/view/-/9781498702201/?ar</a><br/>Format:&#160;Electronic Resources<br/> Anomaly detection using network traffic characterization ent://SD_ILS/0/SD_ILS:25027 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Yarımtepe, Oğuz.<br/><a href="http://hdl.handle.net/11147/3459">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Current security management &amp; ethical issues of information technology ent://SD_ILS/0/SD_ILS:2261270 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Azari, Rasool.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93177-743-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93177-743-8</a><br/>Format:&#160;Electronic Resources<br/> Mastering Linux Security and Hardening - Second Edition ent://SD_ILS/0/SD_ILS:2324167 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Tevault, Donald A.<br/><a href="https://learning.oreilly.com/library/view/~/9781838981778/?ar">https://learning.oreilly.com/library/view/~/9781838981778/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar">https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838981778">https://learning.oreilly.com/library/view/~/9781838981778</a><br/>Format:&#160;Electronic Resources<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:468252 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Elbahadır, Hamza, author.<br/>Format:&#160;Books<br/> The business of cybersecurity : foundations and ideologies ent://SD_ILS/0/SD_ILS:2156901 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5770273">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodell ent://SD_ILS/0/SD_ILS:2121325 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4830572">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Understanding security issues ent://SD_ILS/0/SD_ILS:2144594 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157542">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and resilience in intelligent data-centric systems and communication networks ent://SD_ILS/0/SD_ILS:2213104 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5090270">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:2209814 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452265">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Breaking into information security : crafting a custom career path to get the job you really want ent://SD_ILS/0/SD_ILS:2209344 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;More, Josh, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4187289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security a practical guide ent://SD_ILS/0/SD_ILS:2047802 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=298471">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Insider threats ent://SD_ILS/0/SD_ILS:2272622 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Arduin, Pierre-Emmanuel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5323674">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and resilience in the arctic ent://SD_ILS/0/SD_ILS:2242315 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Trump, Benjamin D., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6355988">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Empirical research for software security : foundations and experience ent://SD_ILS/0/SD_ILS:2108670 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5164090">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The cybersecurity playbook for modern enterprises ent://SD_ILS/0/SD_ILS:2332323 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Wittkop, Jeremy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803248639/?ar">https://learning.oreilly.com/library/view/~/9781803248639/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803248639">https://learning.oreilly.com/library/view/~/9781803248639</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Mac security : El Capitan ent://SD_ILS/0/SD_ILS:2309740 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Edge, Charles S., Jr., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484217122/?ar">https://go.oreilly.com/library-access/library/view/-/9781484217122/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484217122/?ar">https://learning.oreilly.com/library/view/~/9781484217122/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux Firewalls, Third Edition ent://SD_ILS/0/SD_ILS:2319668 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Suehring, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/0672327716/?ar">https://learning.oreilly.com/library/view/~/0672327716/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672327716">https://learning.oreilly.com/library/view/~/0672327716</a> <a href="https://go.oreilly.com/library-access/library/view/-/0672327716/?ar">https://go.oreilly.com/library-access/library/view/-/0672327716/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : the complete guide to cyber threats and protection ent://SD_ILS/0/SD_ILS:2335194 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Sutton, David (Information security practitioner), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175973">https://learning.oreilly.com/library/view/~/9781780175973</a> <a href="https://learning.oreilly.com/library/view/~/9781780175973/?ar">https://learning.oreilly.com/library/view/~/9781780175973/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar</a><br/>Format:&#160;Electronic Resources<br/> Choose your InfoSec path : an interactive cybersecurity adventure for beginners ent://SD_ILS/0/SD_ILS:2328990 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Roxon, Alexander J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484270363">https://learning.oreilly.com/library/view/~/9781484270363</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484270363/?ar">https://learning.oreilly.com/library/view/~/9781484270363/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:2296936 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Mao, Wenji.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123972002/?ar">https://go.oreilly.com/library-access/library/view/-/9780123972002/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123972002/?ar">https://learning.oreilly.com/library/view/~/9780123972002/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity For Dummies ent://SD_ILS/0/SD_ILS:2332872 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119867180">https://learning.oreilly.com/library/view/~/9781119867180</a> <a href="https://learning.oreilly.com/library/view/~/9781119867180/?ar">https://learning.oreilly.com/library/view/~/9781119867180/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar">https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and Third-Party Risk : Third Party Threat Hunting ent://SD_ILS/0/SD_ILS:2329000 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Rasner, Gregory C.<br/><a href="https://learning.oreilly.com/library/view/~/9781119809555">https://learning.oreilly.com/library/view/~/9781119809555</a> <a href="https://learning.oreilly.com/library/view/~/9781119809555/?ar">https://learning.oreilly.com/library/view/~/9781119809555/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar">https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar</a><br/>Format:&#160;Electronic Resources<br/> Informationssicherheit und Datenschutz : Handbuch f&uuml;r Praktiker und Begleitbuch zum T.I.S.P. ent://SD_ILS/0/SD_ILS:2322189 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Domnick, Andr&eacute;, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar">https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098123659/?ar">https://learning.oreilly.com/library/view/~/9781098123659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098123659">https://learning.oreilly.com/library/view/~/9781098123659</a><br/>Format:&#160;Electronic Resources<br/> System assurance : beyond detecting vulnerabilities ent://SD_ILS/0/SD_ILS:2290369 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Mansourov, Nikolai.<br/><a href="https://learning.oreilly.com/library/view/~/9780123814142">https://learning.oreilly.com/library/view/~/9780123814142</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780123814142/?ar">https://go.oreilly.com/library-access/library/view/-/9780123814142/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123814142/?ar">https://learning.oreilly.com/library/view/~/9780123814142/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber spying : tracking your family's (sometimes) secret online lives ent://SD_ILS/0/SD_ILS:2282272 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Fair, Ted.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836418">https://learning.oreilly.com/library/view/~/9781931836418</a> <a href="https://learning.oreilly.com/library/view/~/9781931836418/?ar">https://learning.oreilly.com/library/view/~/9781931836418/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836418/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836418/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781931836418">https://www.sciencedirect.com/science/book/9781931836418</a><br/>Format:&#160;Electronic Resources<br/> Nmap network scanning : official Nmap project guide to network discovery and security scanning ent://SD_ILS/0/SD_ILS:129103 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Lyon, Gordon Fyodor.<br/>Format:&#160;Books<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:66087 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit. ent://SD_ILS/0/SD_ILS:65797 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:65626 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2003051481.html">http://www.loc.gov/catdir/description/els031/2003051481.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2003051481.html">http://www.loc.gov/catdir/toc/els031/2003051481.html</a><br/>Format:&#160;Electronic Resources<br/> Information security best practices 205 basic rules ent://SD_ILS/0/SD_ILS:65092 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2002016635.html">http://www.loc.gov/catdir/description/els031/2002016635.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2002016635.html">http://www.loc.gov/catdir/toc/els031/2002016635.html</a><br/>Format:&#160;Electronic Resources<br/> Hacking ent://SD_ILS/0/SD_ILS:2332886 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Beaver, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119872191">https://learning.oreilly.com/library/view/~/9781119872191</a> <a href="https://learning.oreilly.com/library/view/~/9781119872191/?ar">https://learning.oreilly.com/library/view/~/9781119872191/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar">https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar</a><br/>Format:&#160;Electronic Resources<br/> Professional Red teaming : conducting successful cybersecurity engagements ent://SD_ILS/0/SD_ILS:2318977 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Oakley, Jacob G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243091/?ar">https://learning.oreilly.com/library/view/~/9781484243091/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243091">https://learning.oreilly.com/library/view/~/9781484243091</a><br/>Format:&#160;Electronic Resources<br/> Asset attack vectors : building effective vulnerability management strategies to protect organizations ent://SD_ILS/0/SD_ILS:2316720 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484236277/?ar">https://learning.oreilly.com/library/view/~/9781484236277/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484236277/?ar">https://go.oreilly.com/library-access/library/view/-/9781484236277/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484236277">https://learning.oreilly.com/library/view/~/9781484236277</a><br/>Format:&#160;Electronic Resources<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:2331694 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Harper, Allen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar">https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781264268955/?ar">https://learning.oreilly.com/library/view/~/9781264268955/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781264268955">https://learning.oreilly.com/library/view/~/9781264268955</a><br/>Format:&#160;Electronic Resources<br/> Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators ent://SD_ILS/0/SD_ILS:2326866 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Long, Johnny, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080553979/?ar">https://go.oreilly.com/library-access/library/view/-/9780080553979/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080553979/?ar">https://learning.oreilly.com/library/view/~/9780080553979/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080553979">https://learning.oreilly.com/library/view/~/9780080553979</a><br/>Format:&#160;Electronic Resources<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:2052282 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:2047639 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273488">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise information systems assurance and system security managerial and technical issues ent://SD_ILS/0/SD_ILS:2261418 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Warkentin, Merrill.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3</a><br/>Format:&#160;Electronic Resources<br/> Firewall monitoring using intrusion detection systems ent://SD_ILS/0/SD_ILS:16817 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Asarcıklı, Ş&uuml;kran.<br/><a href="http://hdl.handle.net/11147/3295">Access to Electronic Version</a><br/>Format:&#160;Manuscript<br/> Cybersecurity Manager's Guide ent://SD_ILS/0/SD_ILS:2327020 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Barnum, Todd.<br/><a href="https://learning.oreilly.com/library/view/~/9781492076209">https://learning.oreilly.com/library/view/~/9781492076209</a> <a href="https://learning.oreilly.com/library/view/~/9781492076209/?ar">https://learning.oreilly.com/library/view/~/9781492076209/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar">https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar</a><br/>Format:&#160;Electronic Resources<br/> Build Your Own Cybersecurity Testing Lab : Low-cost Solutions for Testing in Virtual and Cloud-based Environments ent://SD_ILS/0/SD_ILS:2323438 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260458329">https://learning.oreilly.com/library/view/~/9781260458329</a> <a href="https://learning.oreilly.com/library/view/~/9781260458329/?ar">https://learning.oreilly.com/library/view/~/9781260458329/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar">https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar</a><br/>Format:&#160;Electronic Resources<br/> PoC GTFO. Volume III ent://SD_ILS/0/SD_ILS:2327149 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Laphroaig, Manul.<br/><a href="https://learning.oreilly.com/library/view/~/9781098125691/?ar">https://learning.oreilly.com/library/view/~/9781098125691/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098125691">https://learning.oreilly.com/library/view/~/9781098125691</a><br/>Format:&#160;Electronic Resources<br/> Standards And Practices Necessary To Implement A Successful Security Review Program For Intrusion Management Systems ent://SD_ILS/0/SD_ILS:48243 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Doruk, Alpay.<br/><a href="http://hdl.handle.net/11147/3706">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Windows Vista security for dummies ent://SD_ILS/0/SD_ILS:2284218 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Koerner, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9780470118054">https://learning.oreilly.com/library/view/~/9780470118054</a> <a href="https://learning.oreilly.com/library/view/~/9780470118054/?ar">https://learning.oreilly.com/library/view/~/9780470118054/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar">https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security 2020 : Reduce Security Risks This Decade. ent://SD_ILS/0/SD_ILS:1228316 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Howard, Doug.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=694289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing network infrastructure : discover practical network security with Nmap and Nessus 7 ent://SD_ILS/0/SD_ILS:2353372 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Sairam, Jetty, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5742610">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:2207468 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699255">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Solaris security essentials. ent://SD_ILS/0/SD_ILS:2286257 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z <a href="https://learning.oreilly.com/library/view/~/9780131365414/?ar">https://learning.oreilly.com/library/view/~/9780131365414/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780131365414/?ar">https://go.oreilly.com/library-access/library/view/-/9780131365414/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber adversary characterization auditing the hacker mind ent://SD_ILS/0/SD_ILS:65579 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Parker, Tom, 1982-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> CYBER SECURITY AND DIGITAL FORENSICS ent://SD_ILS/0/SD_ILS:2331441 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z <a href="https://learning.oreilly.com/library/view/~/9781119795636">https://learning.oreilly.com/library/view/~/9781119795636</a> <a href="https://learning.oreilly.com/library/view/~/9781119795636/?ar">https://learning.oreilly.com/library/view/~/9781119795636/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar">https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data-Driven Security : Analysis, Visualization and Dashboards. ent://SD_ILS/0/SD_ILS:2301556 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Jacobs, Jay (Data analyst)<br/><a href="https://learning.oreilly.com/library/view/~/9781118793824">https://learning.oreilly.com/library/view/~/9781118793824</a> <a href="https://learning.oreilly.com/library/view/~/9781118793824/?ar">https://learning.oreilly.com/library/view/~/9781118793824/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar">https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar</a><br/>Format:&#160;Electronic Resources<br/> Effective Oracle Database 10g security by design ent://SD_ILS/0/SD_ILS:2285082 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Knox, David (David C.)<br/><a href="https://learning.oreilly.com/library/view/~/9780072231304/?ar">https://learning.oreilly.com/library/view/~/9780072231304/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780072231304/?ar">https://go.oreilly.com/library-access/library/view/-/9780072231304/?ar</a><br/>Format:&#160;Electronic Resources<br/> Serverless security : protect functions using the CLAD security model ent://SD_ILS/0/SD_ILS:2323066 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar">https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492082538/?ar">https://learning.oreilly.com/library/view/~/9781492082538/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492082538">https://learning.oreilly.com/library/view/~/9781492082538</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:2319220 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Tanner, Nadean H., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar">https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119552932/?ar">https://learning.oreilly.com/library/view/~/9781119552932/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119552932">https://learning.oreilly.com/library/view/~/9781119552932</a><br/>Format:&#160;Electronic Resources<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:2206794 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1574451">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM business process manager security : concepts and guidance ent://SD_ILS/0/SD_ILS:2307546 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Wood, J. Keith, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738437263/?ar">https://go.oreilly.com/library-access/library/view/-/0738437263/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738437263">https://learning.oreilly.com/library/view/~/0738437263</a> <a href="https://learning.oreilly.com/library/view/~/0738437263/?ar">https://learning.oreilly.com/library/view/~/0738437263/?ar</a><br/>Format:&#160;Electronic Resources<br/> Software security : building security in ent://SD_ILS/0/SD_ILS:2282180 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;McGraw, Gary, 1966-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321356705/?ar">https://go.oreilly.com/library-access/library/view/-/0321356705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321356705/?ar">https://learning.oreilly.com/library/view/~/0321356705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321356705">https://learning.oreilly.com/library/view/~/0321356705</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 / ISO27002 : a pocket guide ent://SD_ILS/0/SD_ILS:2154909 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463579">Click to View</a><br/>Format:&#160;Electronic Resources<br/> I nove passi per il successo : Compendio per l'attuazione della norma ISO 27001 :2013 ent://SD_ILS/0/SD_ILS:2123020 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5255162">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Neuf &eacute;tapes vers le succ&egrave;s : Un apercu de la mise en oeuvre de la norme ISO 27001 : 2013 ent://SD_ILS/0/SD_ILS:2123021 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5255163">Click to View</a><br/>Format:&#160;Electronic Resources<br/> An introduction to information security and ISO27001:2013 : a pocket guide ent://SD_ILS/0/SD_ILS:2154908 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463578">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Spring security : secure your web applications, RESTful services, and microservice architectures ent://SD_ILS/0/SD_ILS:2230148 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Knutson, Mick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5165113">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Security+ ent://SD_ILS/0/SD_ILS:2304906 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Long, Mark.<br/><a href="https://learning.oreilly.com/videos/~/9781771372831/?ar">https://learning.oreilly.com/videos/~/9781771372831/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar">https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity dilemmas : technology, policy, and incentives : summary of discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forum ent://SD_ILS/0/SD_ILS:2027622 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;National Academy of Sciences (U.S.)<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Cybersecurity-Dilemmas.pdf">An electronic book accessible through the World Wide Web; click for information</a> <a href="http://www.nap.edu/catalog.php?record_id=21833">http://www.nap.edu/catalog.php?record_id=21833</a><br/>Format:&#160;Electronic Resources<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:65437 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Check Point NG : next generation security administration ent://SD_ILS/0/SD_ILS:2306066 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Simonis, Drew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994749/?ar">https://learning.oreilly.com/library/view/~/9781928994749/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security for absolute beginners. Part 02. ent://SD_ILS/0/SD_ILS:2335513 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837639403/?ar">https://learning.oreilly.com/videos/~/9781837639403/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837639403">https://learning.oreilly.com/videos/~/9781837639403</a><br/>Format:&#160;Video recording<br/> Cyber security for absolute beginners, Part 01. ent://SD_ILS/0/SD_ILS:2335525 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Oni, Alexander, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837630943/?ar">https://learning.oreilly.com/videos/~/9781837630943/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837630943">https://learning.oreilly.com/videos/~/9781837630943</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar">https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar</a><br/>Format:&#160;Video recording<br/> Getting started with cybersecurity science ent://SD_ILS/0/SD_ILS:2333381 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Dykstra, Josiah, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920670926">https://learning.oreilly.com/videos/~/0636920670926</a> <a href="https://learning.oreilly.com/videos/~/0636920670926/?ar">https://learning.oreilly.com/videos/~/0636920670926/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar">https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar</a><br/>Format:&#160;Video recording<br/> Managing SSH clients and servers. ent://SD_ILS/0/SD_ILS:2334344 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Wallen, Jack, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar">https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492031666">https://learning.oreilly.com/videos/~/9781492031666</a> <a href="https://learning.oreilly.com/videos/~/9781492031666/?ar">https://learning.oreilly.com/videos/~/9781492031666/?ar</a><br/>Format:&#160;Video recording<br/> ISO27001 in a Windows Environment : the best practice handbook for a Microsoft Windows environment ent://SD_ILS/0/SD_ILS:2290026 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Honan, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280495/?ar">https://learning.oreilly.com/library/view/~/9781849280495/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Sun Solaris 8 ent://SD_ILS/0/SD_ILS:65673 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Azure security handbook : a comprehensive guide for defending your enterprise environment ent://SD_ILS/0/SD_ILS:2329802 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Ots, Karl.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272923">https://learning.oreilly.com/library/view/~/9781484272923</a> <a href="https://learning.oreilly.com/library/view/~/9781484272923/?ar">https://learning.oreilly.com/library/view/~/9781484272923/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Windows 2000 security handbook ent://SD_ILS/0/SD_ILS:2281170 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Schmidt, Jeff, MCSE.<br/><a href="https://learning.oreilly.com/library/view/~/0789719991">https://learning.oreilly.com/library/view/~/0789719991</a> <a href="https://learning.oreilly.com/library/view/~/0789719991/?ar">https://learning.oreilly.com/library/view/~/0789719991/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0789719991/?ar">https://go.oreilly.com/library-access/library/view/-/0789719991/?ar</a><br/>Format:&#160;Electronic Resources<br/> Low tech hacking : street smarts for security professionals ent://SD_ILS/0/SD_ILS:2293229 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496650">https://learning.oreilly.com/library/view/~/9781597496650</a> <a href="https://learning.oreilly.com/library/view/~/9781597496650/?ar">https://learning.oreilly.com/library/view/~/9781597496650/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptions ent://SD_ILS/0/SD_ILS:2329799 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format:&#160;Electronic Resources<br/> Writing secure code : practical strategies and proven techniques for building secure applications in a networked world ent://SD_ILS/0/SD_ILS:2281158 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Howard, Michael, 1965- author.<br/><a href="https://learning.oreilly.com/library/view/~/0735617228">https://learning.oreilly.com/library/view/~/0735617228</a> <a href="https://go.oreilly.com/library-access/library/view/-/0735617228/?ar">https://go.oreilly.com/library-access/library/view/-/0735617228/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735617228/?ar">https://learning.oreilly.com/library/view/~/0735617228/?ar</a><br/>Format:&#160;Electronic Resources<br/> Techno Security's guide to managing risks for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:64259 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:21358 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Policy anomaly reporting for distributed firewalls ent://SD_ILS/0/SD_ILS:16328 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;&Ccedil;etin, F&uuml;sun.<br/><a href="http://hdl.handle.net/11147/3197">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> A feedback-based testing methodology for network security software ent://SD_ILS/0/SD_ILS:408861 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Ger&ccedil;ek, G&uuml;rcan.<br/><a href="http://hdl.handle.net/11147/3600">Access to Electronic Versiyon.</a><br/>Format:&#160;Manuscript<br/> Traffic generator for firewall testing ent://SD_ILS/0/SD_ILS:41235 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Kaya, &Ouml;zg&uuml;r.<br/><a href="http://hdl.handle.net/11147/3631">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:2125451 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=625004">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building a global information assurance program ent://SD_ILS/0/SD_ILS:2322916 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Curts, Raymond J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780203997550/?ar">https://learning.oreilly.com/library/view/~/9780203997550/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar">https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar</a><br/>Format:&#160;Electronic Resources<br/> Access monitoring system for distributed firewall policies ent://SD_ILS/0/SD_ILS:85705 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;&Ccedil;akı, Oğuzhan.<br/><a href="http://hdl.handle.net/11147/3953">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Web application security is a stack : how to CYA (Cover Your Apps) completely ent://SD_ILS/0/SD_ILS:2208971 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192126">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:2110855 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192124">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Silence on the wire a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:2047651 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273504">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:2210264 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556899">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Windows 2000 Server ent://SD_ILS/0/SD_ILS:65689 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Todd, Chad.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836494">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Practical cyber hacking skills for beginners. ent://SD_ILS/0/SD_ILS:2335514 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar">https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837636181">https://learning.oreilly.com/videos/~/9781837636181</a> <a href="https://learning.oreilly.com/videos/~/9781837636181/?ar">https://learning.oreilly.com/videos/~/9781837636181/?ar</a><br/>Format:&#160;Video recording<br/> Security operations in practice ent://SD_ILS/0/SD_ILS:2333929 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175089/?ar">https://learning.oreilly.com/library/view/~/9781780175089/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780175089">https://learning.oreilly.com/library/view/~/9781780175089</a><br/>Format:&#160;Electronic Resources<br/> Campus network topology discovery and distributed firewall policy generation ent://SD_ILS/0/SD_ILS:129360 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;&Ccedil;alışkan, Ezgi.<br/><a href="http://hdl.handle.net/11147/3102">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Web hacker's toolbox : tools used by successful hackers. ent://SD_ILS/0/SD_ILS:2335459 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Czagan, Dawid, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837632831/?ar">https://learning.oreilly.com/videos/~/9781837632831/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837632831">https://learning.oreilly.com/videos/~/9781837632831</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar</a><br/>Format:&#160;Video recording<br/> Security and privacy in the digital era. Volume 1 ent://SD_ILS/0/SD_ILS:2060915 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4648717">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Start-up secure : baking cybersecurity into your company from founding to exit ent://SD_ILS/0/SD_ILS:2327524 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Castaldo, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119700739">https://learning.oreilly.com/library/view/~/9781119700739</a> <a href="https://learning.oreilly.com/library/view/~/9781119700739/?ar">https://learning.oreilly.com/library/view/~/9781119700739/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar">https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar</a><br/>Format:&#160;Electronic Resources<br/> Identity attack vectors : implementing an effective identity and access management solution ent://SD_ILS/0/SD_ILS:2322737 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484251652/?ar">https://learning.oreilly.com/library/view/~/9781484251652/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484251652">https://learning.oreilly.com/library/view/~/9781484251652</a><br/>Format:&#160;Electronic Resources<br/> Hands-on machine learning for cybersecurity : safeguard your system by making your machines intelligent using the Python ecosystem ent://SD_ILS/0/SD_ILS:2318588 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Halder, Soma, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788992282/?ar">https://go.oreilly.com/library-access/library/view/-/9781788992282/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788992282/?ar">https://learning.oreilly.com/library/view/~/9781788992282/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788992282">https://learning.oreilly.com/library/view/~/9781788992282</a><br/>Format:&#160;Electronic Resources<br/> Buffer-Overflows und Format-String-Schwachstellen : Funktionsweisen, Exploits und Gegenmassnahmen ent://SD_ILS/0/SD_ILS:2286451 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Klein, Tobias.<br/><a href="https://learning.oreilly.com/library/view/~/9783898641920/?ar">https://learning.oreilly.com/library/view/~/9783898641920/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783898641920/?ar">https://go.oreilly.com/library-access/library/view/-/9783898641920/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783898641920">https://learning.oreilly.com/library/view/~/9783898641920</a><br/>Format:&#160;Electronic Resources<br/> OS X incident response : scripting and analysis ent://SD_ILS/0/SD_ILS:2210035 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Bradley, Jaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4526010">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intrusion detection system alert correlation with operating system level logs ent://SD_ILS/0/SD_ILS:95740 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Toprak, Mustafa.<br/><a href="http://hdl.handle.net/11147/4029">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:65621 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">An electronic book accessible through the World Wide Web; click for information</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2003062590.html">http://www.loc.gov/catdir/toc/els051/2003062590.html</a> Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003062590.html">http://www.loc.gov/catdir/description/els041/2003062590.html</a><br/>Format:&#160;Electronic Resources<br/> Microsoft information protection administrator SC-400 certification guide : advance your microsoft security and compliance services knowledge and pass the sc-400 exam with confidence. ent://SD_ILS/0/SD_ILS:2374097 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Darr, Shabaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6824396">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:2131736 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Mj&oslash;lsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1648315">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Misuse of Information Systems : The Impact of Security Countermeasures. ent://SD_ILS/0/SD_ILS:1291177 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;D'Arcy, John P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3016826">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Crypto ent://SD_ILS/0/SD_ILS:2331323 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Levy, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar">https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781666117615">https://learning.oreilly.com/library/view/~/9781666117615</a> <a href="https://learning.oreilly.com/library/view/~/9781666117615/?ar">https://learning.oreilly.com/library/view/~/9781666117615/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Office 365 : masterminding MDM and compliance in the cloud ent://SD_ILS/0/SD_ILS:2318564 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Katzer, Matthew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484242308/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242308/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484242308/?ar">https://learning.oreilly.com/library/view/~/9781484242308/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484242308">https://learning.oreilly.com/library/view/~/9781484242308</a><br/>Format:&#160;Electronic Resources<br/> Crafting the InfoSec playbook ent://SD_ILS/0/SD_ILS:2307392 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Bollinger, Jeff, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar">https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491913598">https://learning.oreilly.com/library/view/~/9781491913598</a> <a href="https://learning.oreilly.com/library/view/~/9781491913598/?ar">https://learning.oreilly.com/library/view/~/9781491913598/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise-wide security solutions presentation guide ent://SD_ILS/0/SD_ILS:2302482 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Kigma, Cees.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738402087/?ar">https://go.oreilly.com/library-access/library/view/-/0738402087/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738402087/?ar">https://learning.oreilly.com/library/view/~/0738402087/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:2321574 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Quade, Phil.<br/><a href="https://learning.oreilly.com/library/view/~/9781119617365">https://learning.oreilly.com/library/view/~/9781119617365</a> <a href="https://learning.oreilly.com/library/view/~/9781119617365/?ar">https://learning.oreilly.com/library/view/~/9781119617365/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar">https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar</a><br/>Format:&#160;Electronic Resources<br/> Embedded systems security : practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:2294927 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Kleidermacher, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780123868862">https://learning.oreilly.com/library/view/~/9780123868862</a> <a href="https://learning.oreilly.com/library/view/~/9780123868862/?ar">https://learning.oreilly.com/library/view/~/9780123868862/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780123868862/?ar">https://go.oreilly.com/library-access/library/view/-/9780123868862/?ar</a><br/>Format:&#160;Electronic Resources<br/> Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environment ent://SD_ILS/0/SD_ILS:2330315 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800202092/?ar">https://learning.oreilly.com/library/view/~/9781800202092/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800202092">https://learning.oreilly.com/library/view/~/9781800202092</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar</a><br/>Format:&#160;Electronic Resources<br/> To improve cybersecurity, think like a hacker ent://SD_ILS/0/SD_ILS:2313125 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Esteves, Jos&eacute;, 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT58314">https://learning.oreilly.com/library/view/~/53863MIT58314</a> <a href="https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT58314/?ar">https://learning.oreilly.com/library/view/~/53863MIT58314/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing the Vista environment ent://SD_ILS/0/SD_ILS:2283409 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Gregory, Peter H.<br/><a href="https://learning.oreilly.com/library/view/~/9780596514303/?ar">https://learning.oreilly.com/library/view/~/9780596514303/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596514303">https://learning.oreilly.com/library/view/~/9780596514303</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar">https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning Whitehat hacking and penetration testing ent://SD_ILS/0/SD_ILS:2297866 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Messier, Ric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771370349/?ar">https://learning.oreilly.com/videos/~/9781771370349/?ar</a><br/>Format:&#160;Electronic Resources<br/> Dear Hacker : letters to the editor of 2600 ent://SD_ILS/0/SD_ILS:2289468 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Goldstein, Emmanuel, 1959-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar">https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470620069/?ar">https://learning.oreilly.com/library/view/~/9780470620069/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for dummies ent://SD_ILS/0/SD_ILS:2322839 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119560326/?ar">https://learning.oreilly.com/library/view/~/9781119560326/?ar</a><br/>Format:&#160;Electronic Resources<br/> What is cybersecurity? ent://SD_ILS/0/SD_ILS:2318722 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft security fundamentals LiveLessons ent://SD_ILS/0/SD_ILS:2305725 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Lieberman, Ed, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780133949445/?ar">https://learning.oreilly.com/videos/~/9780133949445/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar">https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar</a><br/>Format:&#160;Electronic Resources<br/> Software update as a mechanism for resilience and security : proceedings of a Workshop. ent://SD_ILS/0/SD_ILS:2013724 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Johnson, Anne Frances, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Software-Update-as-a-Mechanism-for-Resilience-and-Security.pdf">An electronic book accessible through the World Wide Web; click for information.</a> <a href="http://doi.org/10.17226/24833">http://doi.org/10.17226/24833</a><br/>Format:&#160;Electronic Resources<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:65728 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with HashiCorp Vault ent://SD_ILS/0/SD_ILS:2324062 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Krausen, Bryan, speaker.<br/><a href="https://learning.oreilly.com/videos/~/1018947658">https://learning.oreilly.com/videos/~/1018947658</a> <a href="https://learning.oreilly.com/videos/~/1018947658/?ar">https://learning.oreilly.com/videos/~/1018947658/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1018947658/?ar">https://go.oreilly.com/library-access/library/view/-/1018947658/?ar</a><br/>Format:&#160;Electronic Resources<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:2310290 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security bible ent://SD_ILS/0/SD_ILS:2288476 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Cole, Eric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar">https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470502495/?ar">https://learning.oreilly.com/library/view/~/9780470502495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Trust in computer systems and the cloud ent://SD_ILS/0/SD_ILS:2330850 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Bursell, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119692324/?ar">https://learning.oreilly.com/library/view/~/9781119692324/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar">https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119692324">https://learning.oreilly.com/library/view/~/9781119692324</a><br/>Format:&#160;Electronic Resources<br/> DevSecOps for .NET core : securing modern software applications ent://SD_ILS/0/SD_ILS:2324612 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Zeeshan, Afzaal Ahmad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258507/?ar">https://learning.oreilly.com/library/view/~/9781484258507/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484258507">https://learning.oreilly.com/library/view/~/9781484258507</a><br/>Format:&#160;Electronic Resources<br/> Cyber operations : building, defending, and attacking modern computer networks ent://SD_ILS/0/SD_ILS:2318914 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;O'Leary, Mike, 1968- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242940">https://learning.oreilly.com/library/view/~/9781484242940</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484242940/?ar">https://learning.oreilly.com/library/view/~/9781484242940/?ar</a><br/>Format:&#160;Electronic Resources<br/> Infosec management fundamentals ent://SD_ILS/0/SD_ILS:2308039 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar">https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128041871/?ar">https://learning.oreilly.com/library/view/~/9780128041871/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128041871">https://learning.oreilly.com/library/view/~/9780128041871</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:65761 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Traxler, Julie.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response. ent://SD_ILS/0/SD_ILS:2331491 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Hettema, Hinne.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801815512/?ar">https://learning.oreilly.com/library/view/~/9781801815512/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801815512">https://learning.oreilly.com/library/view/~/9781801815512</a><br/>Format:&#160;Electronic Resources<br/> Hands-on red team tactics : a practical guide to mastering red team operations ent://SD_ILS/0/SD_ILS:2317792 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Sharma, Himanshu, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995238">https://learning.oreilly.com/library/view/~/9781788995238</a> <a href="https://learning.oreilly.com/library/view/~/9781788995238/?ar">https://learning.oreilly.com/library/view/~/9781788995238/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security and Usability : Designing Secure Systems that People Can Use. ent://SD_ILS/0/SD_ILS:2288610 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Cranor, Lorrie Faith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008279/?ar">https://go.oreilly.com/library-access/library/view/-/0596008279/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008279/?ar">https://learning.oreilly.com/library/view/~/0596008279/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008279">https://learning.oreilly.com/library/view/~/0596008279</a><br/>Format:&#160;Electronic Resources<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:65907 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Red Hat and IT security : with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditing ent://SD_ILS/0/SD_ILS:2326514 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Chatterjee, Rithik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484264348">https://learning.oreilly.com/library/view/~/9781484264348</a> <a href="https://learning.oreilly.com/library/view/~/9781484264348/?ar">https://learning.oreilly.com/library/view/~/9781484264348/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar">https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:2296616 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Raggo, Michael T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format:&#160;Electronic Resources<br/> An introduction to security in a CSM 1.3 for AIX 5L environment ent://SD_ILS/0/SD_ILS:2287827 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Lascu, Octavian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738427896/?ar">https://go.oreilly.com/library-access/library/view/-/0738427896/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738427896/?ar">https://learning.oreilly.com/library/view/~/0738427896/?ar</a><br/>Format:&#160;Electronic Resources<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:65772 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Bendell, Dan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threats ent://SD_ILS/0/SD_ILS:2316016 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Donaldson, Scott E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232583/?ar">https://learning.oreilly.com/library/view/~/9781484232583/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484232583">https://learning.oreilly.com/library/view/~/9781484232583</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux cookbook : effective penetration testing solutions ent://SD_ILS/0/SD_ILS:2314270 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Schultz, Corey P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390303/?ar">https://learning.oreilly.com/library/view/~/9781784390303/?ar</a><br/>Format:&#160;Electronic Resources<br/> Snort Intrusion Detection 2.0. ent://SD_ILS/0/SD_ILS:1192111 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294371">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environment ent://SD_ILS/0/SD_ILS:2304039 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Mehan, Julie E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285728/?ar">https://learning.oreilly.com/library/view/~/9781849285728/?ar</a><br/>Format:&#160;Electronic Resources<br/> The complete cybersecurity bootcamp ent://SD_ILS/0/SD_ILS:2333407 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137949397">https://learning.oreilly.com/videos/~/9780137949397</a> <a href="https://learning.oreilly.com/videos/~/9780137949397/?ar">https://learning.oreilly.com/videos/~/9780137949397/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar">https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar</a><br/>Format:&#160;Video recording<br/> Real-world cryptography ent://SD_ILS/0/SD_ILS:2330383 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Wong, David (Cryptography engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296710">https://learning.oreilly.com/library/view/~/9781617296710</a> <a href="https://learning.oreilly.com/library/view/~/9781617296710/?ar">https://learning.oreilly.com/library/view/~/9781617296710/?ar</a><br/>Format:&#160;Electronic Resources<br/> NIST cybersecurity framework : a pocket guide ent://SD_ILS/0/SD_ILS:2317535 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787780422/?ar">https://go.oreilly.com/library-access/library/view/-/9781787780422/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787780422/?ar">https://learning.oreilly.com/library/view/~/9781787780422/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787780422">https://learning.oreilly.com/library/view/~/9781787780422</a><br/>Format:&#160;Electronic Resources<br/> Hack the stack using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:64227 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Windows security monitoring : scenarios and patterns ent://SD_ILS/0/SD_ILS:2315945 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Miroshnikov, Andrei, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar">https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119390640/?ar">https://learning.oreilly.com/library/view/~/9781119390640/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119390640">https://learning.oreilly.com/library/view/~/9781119390640</a><br/>Format:&#160;Electronic Resources<br/> Threat forecasting : leveraging big data for predictive analysis ent://SD_ILS/0/SD_ILS:2310629 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Pirc, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128004784/?ar">https://learning.oreilly.com/library/view/~/9780128004784/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar">https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128004784">https://learning.oreilly.com/library/view/~/9780128004784</a><br/>Format:&#160;Electronic Resources<br/> Fuzzing : brute force vulnerabilty discovery ent://SD_ILS/0/SD_ILS:2283451 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Sutton, Michael, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9780321446114">https://learning.oreilly.com/library/view/~/9780321446114</a> <a href="https://learning.oreilly.com/library/view/~/9780321446114/?ar">https://learning.oreilly.com/library/view/~/9780321446114/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar">https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure coding : principles and practices ent://SD_ILS/0/SD_ILS:2281006 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Graff, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/0596002424">https://learning.oreilly.com/library/view/~/0596002424</a> <a href="https://learning.oreilly.com/library/view/~/0596002424/?ar">https://learning.oreilly.com/library/view/~/0596002424/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596002424/?ar">https://go.oreilly.com/library-access/library/view/-/0596002424/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network intrusion dedection: an analyst's handbook ent://SD_ILS/0/SD_ILS:8065 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Northcutt, Stephen<br/>Format:&#160;Books<br/> Mastering Defensive Security : Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure. ent://SD_ILS/0/SD_ILS:2330841 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Bravo, Cesar.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar">https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800208162/?ar">https://learning.oreilly.com/library/view/~/9781800208162/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800208162">https://learning.oreilly.com/library/view/~/9781800208162</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition ent://SD_ILS/0/SD_ILS:2311655 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Johansen, Gerard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785888427/?ar">https://learning.oreilly.com/library/view/~/9781785888427/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar">https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mehr Hacking mit Python : eigene Tools entwickeln f&uuml;r Hacker and Pentester ent://SD_ILS/0/SD_ILS:2308777 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Seitz, Justin, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457196140">https://learning.oreilly.com/library/view/~/9781457196140</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457196140/?ar">https://go.oreilly.com/library-access/library/view/-/9781457196140/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457196140/?ar">https://learning.oreilly.com/library/view/~/9781457196140/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco Pix firewalls configure, manage, &amp; troubleshoot ent://SD_ILS/0/SD_ILS:65694 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Behrens, Thorsten.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Threat Modeling : Designing for Security. ent://SD_ILS/0/SD_ILS:1267916 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Shostack, Adam.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1629177">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackers ent://SD_ILS/0/SD_ILS:2311006 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Halton, Wolf, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782168492/?ar">https://learning.oreilly.com/library/view/~/9781782168492/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782168492">https://learning.oreilly.com/library/view/~/9781782168492</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Operations Handbook : the definitive reference on operational cybersecurity. ent://SD_ILS/0/SD_ILS:1195110 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Rittinghouse, PhD, CISM, John.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=313612">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The best damn firewall book period ent://SD_ILS/0/SD_ILS:65898 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836906">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Windows, Linux, BSD i&ccedil;in ağ g&uuml;venliği ipu&ccedil;ları : 100 etkin g&uuml;venlik tekniği ent://SD_ILS/0/SD_ILS:18875 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Lockhart, Andrew.<br/>Format:&#160;Books<br/> Building Internet firewalls ent://SD_ILS/0/SD_ILS:6992 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Zwicky, Elizabeth D.<br/>Format:&#160;Books<br/> Scene of the cybercrime computer forensics handbook ent://SD_ILS/0/SD_ILS:65871 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Shinder, Debra Littlejohn.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Maximum Security, Third Edition ent://SD_ILS/0/SD_ILS:2319712 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Anonymous, author.<br/><a href="https://learning.oreilly.com/library/view/~/0672318717">https://learning.oreilly.com/library/view/~/0672318717</a> <a href="https://learning.oreilly.com/library/view/~/0672318717/?ar">https://learning.oreilly.com/library/view/~/0672318717/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0672318717/?ar">https://go.oreilly.com/library-access/library/view/-/0672318717/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy for Microsoft Office 2010 users. ent://SD_ILS/0/SD_ILS:2294210 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Tulloch, Mitch.<br/><a href="https://learning.oreilly.com/library/view/~/9780735668829">https://learning.oreilly.com/library/view/~/9780735668829</a> <a href="https://learning.oreilly.com/library/view/~/9780735668829/?ar">https://learning.oreilly.com/library/view/~/9780735668829/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar">https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar</a><br/>Format:&#160;Electronic Resources<br/> The security culture playbook : an executive guide to reducing risk and developing your human defense layer ent://SD_ILS/0/SD_ILS:2334218 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Carpenter, Perry, author, narrator.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar">https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781663720177">https://learning.oreilly.com/library/view/~/9781663720177</a> <a href="https://learning.oreilly.com/library/view/~/9781663720177/?ar">https://learning.oreilly.com/library/view/~/9781663720177/?ar</a><br/>Format:&#160;Sound recording<br/> Securing open source libraries : managing vulnerabilities in open source code packages ent://SD_ILS/0/SD_ILS:2314890 2025-07-09T17:59:15Z 2025-07-09T17:59:15Z by&#160;Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996980/?ar">https://learning.oreilly.com/library/view/~/9781491996980/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491996980">https://learning.oreilly.com/library/view/~/9781491996980</a><br/>Format:&#160;Electronic Resources<br/>