Arama Sonuçları Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026ps$003d300?dt=list2025-07-09T17:59:15ZComputer securityent://SD_ILS/0/SD_ILS:114392025-07-09T17:59:15Z2025-07-09T17:59:15Zby Gollmann, Dieter<br/>Format: Books<br/>Computer security basicsent://SD_ILS/0/SD_ILS:22823772025-07-09T17:59:15Z2025-07-09T17:59:15Zby Lehtinen, Rick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596006691/?ar">https://go.oreilly.com/library-access/library/view/-/0596006691/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006691">https://learning.oreilly.com/library/view/~/0596006691</a>
<a href="https://learning.oreilly.com/library/view/~/0596006691/?ar">https://learning.oreilly.com/library/view/~/0596006691/?ar</a><br/>Format: Electronic Resources<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:22946552025-07-09T17:59:15Z2025-07-09T17:59:15Zby Easttom, Chuck.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar">https://go.oreilly.com/library-access/library/view/-/9780132828284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132828284/?ar">https://learning.oreilly.com/library/view/~/9780132828284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132828284">https://learning.oreilly.com/library/view/~/9780132828284</a><br/>Format: Electronic Resources<br/>Computer security handbookent://SD_ILS/0/SD_ILS:114602025-07-09T17:59:15Z2025-07-09T17:59:15Zby Bosworth, Seymour.<br/>Format: Books<br/>Computer security handbook.ent://SD_ILS/0/SD_ILS:22870292025-07-09T17:59:15Z2025-07-09T17:59:15Zby Bosworth, Seymour.<br/><a href="https://learning.oreilly.com/library/view/~/9780471716525/?ar">https://learning.oreilly.com/library/view/~/9780471716525/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780471716525/?ar">https://go.oreilly.com/library-access/library/view/-/9780471716525/?ar</a><br/>Format: Electronic Resources<br/>Computer Security Literacyent://SD_ILS/0/SD_ILS:23234262025-07-09T17:59:15Z2025-07-09T17:59:15Zby Jacobson, Douglas, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439856192/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856192/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856192/?ar">https://learning.oreilly.com/library/view/~/9781439856192/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856192">https://learning.oreilly.com/library/view/~/9781439856192</a><br/>Format: Electronic Resources<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:23109912025-07-09T17:59:15Z2025-07-09T17:59:15Zby Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format: Electronic Resources<br/>Computer network securityent://SD_ILS/0/SD_ILS:22742112025-07-09T17:59:15Z2025-07-09T17:59:15Zby Sadiqui, Ali, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6123268">Click to View</a><br/>Format: Electronic Resources<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:23236272025-07-09T17:59:15Z2025-07-09T17:59:15Zby Sadiqui, Ali, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar">https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786305275">https://learning.oreilly.com/library/view/~/9781786305275</a>
<a href="https://learning.oreilly.com/library/view/~/9781786305275/?ar">https://learning.oreilly.com/library/view/~/9781786305275/?ar</a><br/>Format: Electronic Resources<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:5043732025-07-09T17:59:15Z2025-07-09T17:59:15Zby Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format: Electronic Resources<br/>Introduction to Computer Security.ent://SD_ILS/0/SD_ILS:23179802025-07-09T17:59:15Z2025-07-09T17:59:15Zby Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321247442/?ar">https://go.oreilly.com/library-access/library/view/-/0321247442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321247442/?ar">https://learning.oreilly.com/library/view/~/0321247442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321247442">https://learning.oreilly.com/library/view/~/0321247442</a><br/>Format: Electronic Resources<br/>Computer Security : Art and Science.ent://SD_ILS/0/SD_ILS:23180122025-07-09T17:59:15Z2025-07-09T17:59:15Zby Bishop, Matthew A. (Matthew A.) author.<br/><a href="https://learning.oreilly.com/library/view/~/0201440997">https://learning.oreilly.com/library/view/~/0201440997</a>
<a href="https://learning.oreilly.com/library/view/~/0201440997/?ar">https://learning.oreilly.com/library/view/~/0201440997/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0201440997/?ar">https://go.oreilly.com/library-access/library/view/-/0201440997/?ar</a><br/>Format: Electronic Resources<br/>Computer Security Handbook, Set.ent://SD_ILS/0/SD_ILS:12693372025-07-09T17:59:15Z2025-07-09T17:59:15Zby Bosworth, Seymour.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1652940">Click to View</a><br/>Format: Electronic Resources<br/>Foundations of Computer Securityent://SD_ILS/0/SD_ILS:5085252025-07-09T17:59:15Z2025-07-09T17:59:15Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Electronic Resources<br/>Computer security and cryptographyent://SD_ILS/0/SD_ILS:22830572025-07-09T17:59:15Z2025-07-09T17:59:15Zby Konheim, Alan G., 1934-<br/><a href="https://learning.oreilly.com/library/view/~/9780471947837">https://learning.oreilly.com/library/view/~/9780471947837</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar">https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780471947837/?ar">https://learning.oreilly.com/library/view/~/9780471947837/?ar</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:20483782025-07-09T17:59:15Z2025-07-09T17:59:15Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=453166">Click to View</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:22868042025-07-09T17:59:15Z2025-07-09T17:59:15Zby Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a>
<a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format: Electronic Resources<br/>Computer security: art and scienceent://SD_ILS/0/SD_ILS:113982025-07-09T17:59:15Z2025-07-09T17:59:15Zby Bishop, Matt.<br/>Format: Books<br/>Computer Security : QuickStudy Reference Guide.ent://SD_ILS/0/SD_ILS:20963302025-07-09T17:59:15Z2025-07-09T17:59:15Zby BarCharts, Inc.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4876967">Click to View</a><br/>Format: Electronic Resources<br/>Computer and Information Security Handbook.ent://SD_ILS/0/SD_ILS:12586122025-07-09T17:59:15Z2025-07-09T17:59:15Zby Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1195617">Click to View</a><br/>Format: Electronic Resources<br/>Information Assurance and Computer Security.ent://SD_ILS/0/SD_ILS:11907422025-07-09T17:59:15Z2025-07-09T17:59:15Zby Thomas, J.P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=287000">Click to View</a><br/>Format: Electronic Resources<br/>Computer and Network Security Essentialsent://SD_ILS/0/SD_ILS:20882952025-07-09T17:59:15Z2025-07-09T17:59:15Zby Daimi, Kevin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format: Electronic Resources<br/>Computer and network security essentialsent://SD_ILS/0/SD_ILS:23465442025-07-09T17:59:15Z2025-07-09T17:59:15Zby Daimi, Kevin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4947026">Click to View</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:23430152025-07-09T17:59:15Z2025-07-09T17:59:15Zby Vacca, John R., editor.<br/>Format: Books<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:23133012025-07-09T17:59:15Z2025-07-09T17:59:15Zby Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128039298">https://learning.oreilly.com/library/view/~/9780128039298</a>
<a href="https://learning.oreilly.com/library/view/~/9780128039298/?ar">https://learning.oreilly.com/library/view/~/9780128039298/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar">https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:22123012025-07-09T17:59:15Z2025-07-09T17:59:15Zby Vacca, John R., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4858374">Click to View</a><br/>Format: Electronic Resources<br/>Computer security : art and scienceent://SD_ILS/0/SD_ILS:23184522025-07-09T17:59:15Z2025-07-09T17:59:15Zby Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format: Electronic Resources<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:22612152025-07-09T17:59:15Z2025-07-09T17:59:15Zby Seigneur, Jean-Marc.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format: Electronic Resources<br/>Computer incident response and product securityent://SD_ILS/0/SD_ILS:22917152025-07-09T17:59:15Z2025-07-09T17:59:15Zby Rajnovic, Damir, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780132491518">https://learning.oreilly.com/library/view/~/9780132491518</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132491518/?ar">https://go.oreilly.com/library-access/library/view/-/9780132491518/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132491518/?ar">https://learning.oreilly.com/library/view/~/9780132491518/?ar</a><br/>Format: Electronic Resources<br/>Computer security and encryption : an introductionent://SD_ILS/0/SD_ILS:22376602025-07-09T17:59:15Z2025-07-09T17:59:15Zby Chauhan, S. R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6404902">Click to View</a><br/>Format: Electronic Resources<br/>Computer science security : concepts and toolsent://SD_ILS/0/SD_ILS:23340352025-07-09T17:59:15Z2025-07-09T17:59:15Zby Zaidoun, Ameur Salem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786307552/?ar">https://learning.oreilly.com/library/view/~/9781786307552/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar">https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786307552">https://learning.oreilly.com/library/view/~/9781786307552</a><br/>Format: Electronic Resources<br/>The Essential Guide to Home Computer Security.ent://SD_ILS/0/SD_ILS:12356562025-07-09T17:59:15Z2025-07-09T17:59:15Zby R. Rowlingson, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=811317">Click to View</a><br/>Format: Electronic Resources<br/>Computer and information security handbook, second editionent://SD_ILS/0/SD_ILS:23001972025-07-09T17:59:15Z2025-07-09T17:59:15Zby Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar">https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123943972/?ar">https://learning.oreilly.com/library/view/~/9780123943972/?ar</a><br/>Format: Electronic Resources<br/>Computer Security in the 21st Centuryent://SD_ILS/0/SD_ILS:5042522025-07-09T17:59:15Z2025-07-09T17:59:15Zby Lee, D. T. editor.<br/><a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Electronic Resources<br/>Conducting computer security assessments at nuclear facilities.ent://SD_ILS/0/SD_ILS:20996742025-07-09T17:59:15Z2025-07-09T17:59:15Z<a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4853352">Click to View</a><br/>Format: Electronic Resources<br/>Information assurance handbook : effective computer security and risk management strategiesent://SD_ILS/0/SD_ILS:23048752025-07-09T17:59:15Z2025-07-09T17:59:15Zby Schou, Corey.<br/><a href="https://learning.oreilly.com/library/view/~/9780071821650">https://learning.oreilly.com/library/view/~/9780071821650</a>
<a href="https://learning.oreilly.com/library/view/~/9780071821650/?ar">https://learning.oreilly.com/library/view/~/9780071821650/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar">https://go.oreilly.com/library-access/library/view/-/9780071821650/?ar</a><br/>Format: Electronic Resources<br/>Computer communications security :principles, standard protocols and techniquesent://SD_ILS/0/SD_ILS:48832025-07-09T17:59:15Z2025-07-09T17:59:15Zby Ford, Warwick.<br/>Format: Books<br/>Network Security JumpStart : Computer and Network Security Basics.ent://SD_ILS/0/SD_ILS:11883262025-07-09T17:59:15Z2025-07-09T17:59:15Zby Strebe, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=272216">Click to View</a><br/>Format: Electronic Resources<br/>Biometrics, Computer Security Systems and Artificial Intelligence Applicationsent://SD_ILS/0/SD_ILS:5054262025-07-09T17:59:15Z2025-07-09T17:59:15Zby Saeed, Khalid. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format: Electronic Resources<br/>Analyzing computer security : a threat/vulnerability/countermeasure approachent://SD_ILS/0/SD_ILS:22918062025-07-09T17:59:15Z2025-07-09T17:59:15Zby Pfleeger, Charles P., 1948-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar">https://go.oreilly.com/library-access/library/view/-/9780132789493/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132789493/?ar">https://learning.oreilly.com/library/view/~/9780132789493/?ar</a><br/>Format: Electronic Resources<br/>Using computer science in high-tech security careersent://SD_ILS/0/SD_ILS:23407512025-07-09T17:59:15Z2025-07-09T17:59:15Zby Mooney, Carla, 1970- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5794501">Click to View</a><br/>Format: Electronic Resources<br/>Computer security incident response planning at nuclear facilitiesent://SD_ILS/0/SD_ILS:21328162025-07-09T17:59:15Z2025-07-09T17:59:15Zby International Atomic Energy Agency.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4853353">Click to View</a><br/>Format: Electronic Resources<br/>Principles of computer security : CompTIA Security+ and beyondent://SD_ILS/0/SD_ILS:23308102025-07-09T17:59:15Z2025-07-09T17:59:15Zby Conklin, Wm. Arthur (William Arthur), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260474329">https://learning.oreilly.com/library/view/~/9781260474329</a>
<a href="https://learning.oreilly.com/library/view/~/9781260474329/?ar">https://learning.oreilly.com/library/view/~/9781260474329/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260474329/?ar">https://go.oreilly.com/library-access/library/view/-/9781260474329/?ar</a><br/>Format: Electronic Resources<br/>Security, Privacy and Reliability in Computer Communications and Networks.ent://SD_ILS/0/SD_ILS:23420792025-07-09T17:59:15Z2025-07-09T17:59:15Zby Sha, Kewei.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=30251744">Click to View</a><br/>Format: Electronic Resources<br/>Security, privacy and reliability in computer communications and networksent://SD_ILS/0/SD_ILS:21438162025-07-09T17:59:15Z2025-07-09T17:59:15Zby Sha, Kewei, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4771355">Click to View</a><br/>Format: Electronic Resources<br/>Securing the Cloud : Cloud Computer Security Techniques and Tactics.ent://SD_ILS/0/SD_ILS:12271702025-07-09T17:59:15Z2025-07-09T17:59:15Zby Winkler, Vic (J.R.).<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=686827">Click to View</a><br/>Format: Electronic Resources<br/>Securing the cloud : cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:22924912025-07-09T17:59:15Z2025-07-09T17:59:15Zby Winkler, J. R. (Joachim R.)<br/><a href="https://learning.oreilly.com/library/view/~/9781597495929">https://learning.oreilly.com/library/view/~/9781597495929</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495929/?ar">https://learning.oreilly.com/library/view/~/9781597495929/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar</a><br/>Format: Electronic Resources<br/>Computer security, privacy, and politics current issues, challenges, and solutionsent://SD_ILS/0/SD_ILS:22612352025-07-09T17:59:15Z2025-07-09T17:59:15Zby Subramanian, Ramesh.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-804-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-804-8</a><br/>Format: Electronic Resources<br/>Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systemsent://SD_ILS/0/SD_ILS:5041792025-07-09T17:59:15Z2025-07-09T17:59:15Zby Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format: Electronic Resources<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:23134822025-07-09T17:59:15Z2025-07-09T17:59:15Zby Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format: Electronic Resources<br/>Risk Management for Computer Security : Protecting Your Network and Information Assets.ent://SD_ILS/0/SD_ILS:11921852025-07-09T17:59:15Z2025-07-09T17:59:15Zby Jones, Andy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294671">Click to View</a><br/>Format: Electronic Resources<br/>Machine learning for computer and cyber security : principles, algorithms, and practicesent://SD_ILS/0/SD_ILS:23555232025-07-09T17:59:15Z2025-07-09T17:59:15Zby Gupta, Brij, 1982- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5675759">Click to View</a><br/>Format: Electronic Resources<br/>VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Securityent://SD_ILS/0/SD_ILS:5033402025-07-09T17:59:15Z2025-07-09T17:59:15Zby Goodall, John R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format: Electronic Resources<br/>Machine Learning and Data Mining for Computer Security Methods and Applicationsent://SD_ILS/0/SD_ILS:5084772025-07-09T17:59:15Z2025-07-09T17:59:15Zby Maloof, Marcus A. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-253-5">http://dx.doi.org/10.1007/1-84628-253-5</a><br/>Format: Electronic Resources<br/>Essential Computer Security : Everyone's Guide to Email, Internet, and Wireless Security.ent://SD_ILS/0/SD_ILS:11958462025-07-09T17:59:15Z2025-07-09T17:59:15Zby Bradley, T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=319200">Click to View</a><br/>Format: Electronic Resources<br/>Principles of computer security : CompTIA security+ and beyond, (exam SY0-501)ent://SD_ILS/0/SD_ILS:23168972025-07-09T17:59:15Z2025-07-09T17:59:15Zby Conklin, Wm. Arthur (William Arthur), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260026009/?ar">https://go.oreilly.com/library-access/library/view/-/9781260026009/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260026009/?ar">https://learning.oreilly.com/library/view/~/9781260026009/?ar</a><br/>Format: Electronic Resources<br/>Computer security of instrumentation and control systems at nuclear facilities : technical guidance.ent://SD_ILS/0/SD_ILS:22307812025-07-09T17:59:15Z2025-07-09T17:59:15Z<a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5426853">Click to View</a><br/>Format: Electronic Resources<br/>Essential computer security everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:643242025-07-09T17:59:15Z2025-07-09T17:59:15Zby Bradley, Tony, 1969-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Essential computer security : everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:23160262025-07-09T17:59:15Z2025-07-09T17:59:15Zby Bradley, Tony, 1969- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491143/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491143/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491143/?ar">https://learning.oreilly.com/library/view/~/9781597491143/?ar</a><br/>Format: Electronic Resources<br/>Principles of Computer Security : CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)ent://SD_ILS/0/SD_ILS:23296552025-07-09T17:59:15Z2025-07-09T17:59:15Zby Weissman, Jonathan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260470123">https://learning.oreilly.com/library/view/~/9781260470123</a>
<a href="https://learning.oreilly.com/library/view/~/9781260470123/?ar">https://learning.oreilly.com/library/view/~/9781260470123/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260470123/?ar">https://go.oreilly.com/library-access/library/view/-/9781260470123/?ar</a><br/>Format: Electronic Resources<br/>Computer security aspects of design for instrumentation and control systems at nuclear power plantsent://SD_ILS/0/SD_ILS:23536342025-07-09T17:59:15Z2025-07-09T17:59:15Zby International Atomic Energy Agency, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6482097">Click to View</a><br/>Format: Electronic Resources<br/>The myths of security : what the computer security industry doesn't want you to knowent://SD_ILS/0/SD_ILS:22869382025-07-09T17:59:15Z2025-07-09T17:59:15Zby Viega, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar">https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596803957/?ar">https://learning.oreilly.com/library/view/~/9780596803957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596803957">https://learning.oreilly.com/library/view/~/9780596803957</a><br/>Format: Electronic Resources<br/>The myths of security : what the computer security industry doesn't want you to knowent://SD_ILS/0/SD_ILS:21065612025-07-09T17:59:15Z2025-07-09T17:59:15Zby Viega, John.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821</a><br/>Format: Electronic Resources<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:20848032025-07-09T17:59:15Z2025-07-09T17:59:15Zby Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Firewalls don't stop dragons : a step-by-step guide to computer security for non-techiesent://SD_ILS/0/SD_ILS:23172282025-07-09T17:59:15Z2025-07-09T17:59:15Zby Parker, Carey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484238523">https://learning.oreilly.com/library/view/~/9781484238523</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238523/?ar">https://learning.oreilly.com/library/view/~/9781484238523/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484238523/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238523/?ar</a><br/>Format: Electronic Resources<br/>Firewalls don't stop dragons : a step-by-step guide to computer security for non-techiesent://SD_ILS/0/SD_ILS:23257732025-07-09T17:59:15Z2025-07-09T17:59:15Zby Parker, Carey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261897">https://learning.oreilly.com/library/view/~/9781484261897</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261897/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261897/?ar">https://learning.oreilly.com/library/view/~/9781484261897/?ar</a><br/>Format: Electronic Resources<br/>Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036702025-07-09T17:59:15Z2025-07-09T17:59:15Zby Goodall, John R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858052025-07-09T17:59:15Z2025-07-09T17:59:15Zby Skavhaug, Amund. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45477-1">https://doi.org/10.1007/978-3-319-45477-1</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103662025-07-09T17:59:15Z2025-07-09T17:59:15Zby Winther, Rune. editor.<br/><a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117322025-07-09T17:59:15Z2025-07-09T17:59:15Zby Górski, Janusz. editor.<br/><a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128712025-07-09T17:59:15Z2025-07-09T17:59:15Zby Saglietti, Francesca. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 37th International Conference, SAFECOMP 2018, Västerås, Sweden, September 19-21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855842025-07-09T17:59:15Z2025-07-09T17:59:15Zby Gallina, Barbara. editor. (orcid)0000-0002-6952-1053<br/><a href="https://doi.org/10.1007/978-3-319-99130-6">https://doi.org/10.1007/978-3-319-99130-6</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security SAFECOMP 2016 Workshops, ASSURE, DECSoS, SASSUR, and TIPS, Trondheim, Norway, September 20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20862072025-07-09T17:59:15Z2025-07-09T17:59:15Zby Skavhaug, Amund. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45480-1">https://doi.org/10.1007/978-3-319-45480-1</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116812025-07-09T17:59:15Z2025-07-09T17:59:15Zby Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038182025-07-09T17:59:15Z2025-07-09T17:59:15Zby Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128462025-07-09T17:59:15Z2025-07-09T17:59:15Zby Biskup, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037492025-07-09T17:59:15Z2025-07-09T17:59:15Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129272025-07-09T17:59:15Z2025-07-09T17:59:15Zby Miyaji, Atsuko. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118522025-07-09T17:59:15Z2025-07-09T17:59:15Zby Yoshiura, Hiroshi. editor.<br/><a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037082025-07-09T17:59:15Z2025-07-09T17:59:15Zby Harrison, Michael D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103512025-07-09T17:59:15Z2025-07-09T17:59:15Zby Vimercati, Sabrina de Capitani. editor.<br/><a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format: Electronic Resources<br/>Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860192025-07-09T17:59:15Z2025-07-09T17:59:15Zby Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security SAFECOMP 2018 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Västerås, Sweden, September 18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853402025-07-09T17:59:15Z2025-07-09T17:59:15Zby Gallina, Barbara. editor. (orcid)0000-0002-6952-1053<br/><a href="https://doi.org/10.1007/978-3-319-99229-7">https://doi.org/10.1007/978-3-319-99229-7</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854982025-07-09T17:59:15Z2025-07-09T17:59:15Zby Inomata, Atsuo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858872025-07-09T17:59:15Z2025-07-09T17:59:15Zby Ogawa, Kazuto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20851862025-07-09T17:59:15Z2025-07-09T17:59:15Zby Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20851982025-07-09T17:59:15Z2025-07-09T17:59:15Zby Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856762025-07-09T17:59:15Z2025-07-09T17:59:15Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20854392025-07-09T17:59:15Z2025-07-09T17:59:15Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129892025-07-09T17:59:15Z2025-07-09T17:59:15Zby Cervesato, Iliano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Electronic Resources<br/>Security in Computer and Information Sciences : First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:21848892025-07-09T17:59:15Z2025-07-09T17:59:15Zby Gelenbe, Erol<br/><a href="https://library.oapen.org/bitstream/20.500.12657/23295/1/1006860.pdf">DOAB: download the publication</a>
<a href="https://directory.doabooks.org/handle/20.500.12854/27012">DOAB: description of the publication</a><br/>Format: Books<br/>Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849922025-07-09T17:59:15Z2025-07-09T17:59:15Zby Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201<br/><a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format: Electronic Resources<br/>Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103642025-07-09T17:59:15Z2025-07-09T17:59:15Zby Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format: Electronic Resources<br/>Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015462025-07-09T17:59:15Z2025-07-09T17:59:15Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Electronic Resources<br/>Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5127452025-07-09T17:59:15Z2025-07-09T17:59:15Zby Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, Franceent://SD_ILS/0/SD_ILS:5042642025-07-09T17:59:15Z2025-07-09T17:59:15Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842652025-07-09T17:59:15Z2025-07-09T17:59:15Zby Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Electronic Resources<br/>Information Security Education – Towards a Cybersecure Society 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20843462025-07-09T17:59:15Z2025-07-09T17:59:15Zby Drevin, Lynette. editor. (orcid)0000-0001-9370-8216<br/><a href="https://doi.org/10.1007/978-3-319-99734-6">https://doi.org/10.1007/978-3-319-99734-6</a><br/>Format: Electronic Resources<br/>Network Control and Engineering for Qos, Security and Mobility, V IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20–25, 2006, Santiago, Chileent://SD_ILS/0/SD_ILS:5053512025-07-09T17:59:15Z2025-07-09T17:59:15Zby Gaïti, Dominique. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-34827-8">http://dx.doi.org/10.1007/978-0-387-34827-8</a><br/>Format: Electronic Resources<br/>Podstawy ochrony komputerówent://SD_ILS/0/SD_ILS:22995462025-07-09T17:59:15Z2025-07-09T17:59:15Zby Lehtinen, Rick.<br/><a href="https://learning.oreilly.com/library/view/~/9781457172618">https://learning.oreilly.com/library/view/~/9781457172618</a>
<a href="https://learning.oreilly.com/library/view/~/9781457172618/?ar">https://learning.oreilly.com/library/view/~/9781457172618/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457172618/?ar">https://go.oreilly.com/library-access/library/view/-/9781457172618/?ar</a><br/>Format: Electronic Resources<br/>Firewall Design and Analysis.ent://SD_ILS/0/SD_ILS:12306452025-07-09T17:59:15Z2025-07-09T17:59:15Zby Liu, Alex X.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=731297">Click to View</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security and Assuranceent://SD_ILS/0/SD_ILS:23417222025-07-09T17:59:15Z2025-07-09T17:59:15Zby Clarke, Nathan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6870870">Click to View</a><br/>Format: Electronic Resources<br/>Role-Based Access Control.ent://SD_ILS/0/SD_ILS:11975332025-07-09T17:59:15Z2025-07-09T17:59:15Zby Ferraiolo, David F.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338751">Click to View</a><br/>Format: Electronic Resources<br/>Practical UNIX and Internet securityent://SD_ILS/0/SD_ILS:22812562025-07-09T17:59:15Z2025-07-09T17:59:15Zby Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596003234">https://learning.oreilly.com/library/view/~/0596003234</a>
<a href="https://learning.oreilly.com/library/view/~/0596003234/?ar">https://learning.oreilly.com/library/view/~/0596003234/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596003234/?ar">https://go.oreilly.com/library-access/library/view/-/0596003234/?ar</a><br/>Format: Electronic Resources<br/>Trust and Security in Collaborative Computing.ent://SD_ILS/0/SD_ILS:12706882025-07-09T17:59:15Z2025-07-09T17:59:15Zby Zou, Xukai.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679354">Click to View</a><br/>Format: Electronic Resources<br/>Security in Ad-Hoc and Sensor Networks.ent://SD_ILS/0/SD_ILS:12706872025-07-09T17:59:15Z2025-07-09T17:59:15Zby Beyah, Raheem.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679353">Click to View</a><br/>Format: Electronic Resources<br/>Security in Distributed and Networking Systems.ent://SD_ILS/0/SD_ILS:12583272025-07-09T17:59:15Z2025-07-09T17:59:15Zby Xiao, Yang.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1193126">Click to View</a><br/>Format: Electronic Resources<br/>Papers from the HAISA 2007 Symposium : Papers from the HAISA 2007 Symposium.ent://SD_ILS/0/SD_ILS:11965652025-07-09T17:59:15Z2025-07-09T17:59:15Zby Furnell, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328737">Click to View</a><br/>Format: Electronic Resources<br/>Hands on hackingent://SD_ILS/0/SD_ILS:23254522025-07-09T17:59:15Z2025-07-09T17:59:15Zby Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkitent://SD_ILS/0/SD_ILS:22958232025-07-09T17:59:15Z2025-07-09T17:59:15Zby Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis DVD toolkit 2Eent://SD_ILS/0/SD_ILS:22878022025-07-09T17:59:15Z2025-07-09T17:59:15Zby Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format: Electronic Resources<br/>Information hidingent://SD_ILS/0/SD_ILS:21558192025-07-09T17:59:15Z2025-07-09T17:59:15Zby Katzenbeisser, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4821270">Click to View</a><br/>Format: Electronic Resources<br/>Platform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engineent://SD_ILS/0/SD_ILS:23042752025-07-09T17:59:15Z2025-07-09T17:59:15Zby Ruan, Xiaoyu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265726/?ar">https://learning.oreilly.com/library/view/~/9781430265726/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430265726">https://learning.oreilly.com/library/view/~/9781430265726</a><br/>Format: Electronic Resources<br/>Advanced host intrusion prevention with CSAent://SD_ILS/0/SD_ILS:22822002025-07-09T17:59:15Z2025-07-09T17:59:15Zby Sullivan, Chad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587052520/?ar">https://go.oreilly.com/library-access/library/view/-/1587052520/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587052520">https://learning.oreilly.com/library/view/~/1587052520</a>
<a href="https://learning.oreilly.com/library/view/~/1587052520/?ar">https://learning.oreilly.com/library/view/~/1587052520/?ar</a><br/>Format: Electronic Resources<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013.ent://SD_ILS/0/SD_ILS:12745852025-07-09T17:59:15Z2025-07-09T17:59:15Zby Furnell, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1752831">Click to View</a><br/>Format: Electronic Resources<br/>Counter hack reloaded : a step-by-step guide to computer attacks and effective defensesent://SD_ILS/0/SD_ILS:22831032025-07-09T17:59:15Z2025-07-09T17:59:15Zby Skoudis, Ed.<br/><a href="https://learning.oreilly.com/library/view/~/9780131481046/?ar">https://learning.oreilly.com/library/view/~/9780131481046/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar">https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar</a><br/>Format: Electronic Resources<br/>Toward Better Usability, Security, and Privacy of Information Technology : Report of a Workshop.ent://SD_ILS/0/SD_ILS:13205012025-07-09T17:59:15Z2025-07-09T17:59:15Zby Steering Committee on the Usability, Security, and Privacy of Computer Systems.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3378675">Click to View</a><br/>Format: Electronic Resources<br/>Internet Denial of Service: Attack and Defense Mechanismsent://SD_ILS/0/SD_ILS:23267952025-07-09T17:59:15Z2025-07-09T17:59:15Zby Mirkovic, Jelena, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131475738/?ar">https://learning.oreilly.com/library/view/~/0131475738/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131475738/?ar">https://go.oreilly.com/library-access/library/view/-/0131475738/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131475738">https://learning.oreilly.com/library/view/~/0131475738</a><br/>Format: Electronic Resources<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:22862452025-07-09T17:59:15Z2025-07-09T17:59:15Zby Qian, Yi, 1962-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar">https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123735669/?ar">https://learning.oreilly.com/library/view/~/9780123735669/?ar</a><br/>Format: Electronic Resources<br/>Web security for developersent://SD_ILS/0/SD_ILS:23244222025-07-09T17:59:15Z2025-07-09T17:59:15Zby McDonald, Malcolm (Computer programmer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122683/?ar">https://learning.oreilly.com/library/view/~/9781098122683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122683">https://learning.oreilly.com/library/view/~/9781098122683</a><br/>Format: Electronic Resources<br/>Emerging and Readily Available Technologies and National Security : A Framework for Addressing Ethical, Legal, and Societal Issues.ent://SD_ILS/0/SD_ILS:13210012025-07-09T17:59:15Z2025-07-09T17:59:15Zby Board, Computer Science and Telecommunications.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3379188">Click to View</a><br/>Format: Electronic Resources<br/>Network and internetwork security: principles and practice.ent://SD_ILS/0/SD_ILS:37212025-07-09T17:59:15Z2025-07-09T17:59:15Zby Stallings, William.<br/>Format: Books<br/>The CERT guide to system and network security practicesent://SD_ILS/0/SD_ILS:117982025-07-09T17:59:15Z2025-07-09T17:59:15Zby Allen, Julia H.<br/>Format: Books<br/>How cyber security can protect your business : a guide for all stakeholdersent://SD_ILS/0/SD_ILS:23230602025-07-09T17:59:15Z2025-07-09T17:59:15Zby Wright, Christopher, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787781979/?ar">https://go.oreilly.com/library-access/library/view/-/9781787781979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787781979/?ar">https://learning.oreilly.com/library/view/~/9781787781979/?ar</a><br/>Format: Electronic Resources<br/>Intro to secure software : building security systemsent://SD_ILS/0/SD_ILS:23101562025-07-09T17:59:15Z2025-07-09T17:59:15Zby Sletten, Brian, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781491943595/?ar">https://learning.oreilly.com/videos/~/9781491943595/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491943595/?ar">https://go.oreilly.com/library-access/library/view/-/9781491943595/?ar</a><br/>Format: Electronic Resources<br/>Authentication and access control : practical cryptography methods and toolsent://SD_ILS/0/SD_ILS:23271232025-07-09T17:59:15Z2025-07-09T17:59:15Zby Boonkrong, Sirapat, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265703">https://learning.oreilly.com/library/view/~/9781484265703</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265703/?ar">https://learning.oreilly.com/library/view/~/9781484265703/?ar</a><br/>Format: Electronic Resources<br/>Protective security : creating military-grade defenses for your digital businessent://SD_ILS/0/SD_ILS:23285792025-07-09T17:59:15Z2025-07-09T17:59:15Zby Seaman, Jim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484269084">https://learning.oreilly.com/library/view/~/9781484269084</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269084/?ar">https://learning.oreilly.com/library/view/~/9781484269084/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269084/?ar</a><br/>Format: Electronic Resources<br/>PCI DSS : an integrated data security standard guideent://SD_ILS/0/SD_ILS:23243862025-07-09T17:59:15Z2025-07-09T17:59:15Zby Seaman, Jim.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258088">https://learning.oreilly.com/library/view/~/9781484258088</a>
<a href="https://learning.oreilly.com/library/view/~/9781484258088/?ar">https://learning.oreilly.com/library/view/~/9781484258088/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258088/?ar</a><br/>Format: Electronic Resources<br/>IT security controls : a guide to corporate standards and frameworksent://SD_ILS/0/SD_ILS:23324122025-07-09T17:59:15Z2025-07-09T17:59:15Zby Viegas, Virgilio, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484277997/?ar">https://learning.oreilly.com/library/view/~/9781484277997/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277997">https://learning.oreilly.com/library/view/~/9781484277997</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277997/?ar</a><br/>Format: Electronic Resources<br/>Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflictent://SD_ILS/0/SD_ILS:23290792025-07-09T17:59:15Z2025-07-09T17:59:15Zby Borges, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781801076203/?ar">https://learning.oreilly.com/library/view/~/9781801076203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar">https://go.oreilly.com/library-access/library/view/-/9781801076203/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801076203">https://learning.oreilly.com/library/view/~/9781801076203</a><br/>Format: Electronic Resources<br/>Cyber threat intelligence : the no-nonsense guide for CISOs and Security Managersent://SD_ILS/0/SD_ILS:23296372025-07-09T17:59:15Z2025-07-09T17:59:15Zby Roberts, Aaron.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272206">https://learning.oreilly.com/library/view/~/9781484272206</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484272206/?ar">https://learning.oreilly.com/library/view/~/9781484272206/?ar</a><br/>Format: Electronic Resources<br/>Solving identity management in modern applications : demystifying OAuth 2.0, OpenID Connect, and SAML 2.0ent://SD_ILS/0/SD_ILS:23227232025-07-09T17:59:15Z2025-07-09T17:59:15Zby Wilson, Yvonne.<br/><a href="https://learning.oreilly.com/library/view/~/9781484250952/?ar">https://learning.oreilly.com/library/view/~/9781484250952/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484250952">https://learning.oreilly.com/library/view/~/9781484250952</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar">https://go.oreilly.com/library-access/library/view/-/9781484250952/?ar</a><br/>Format: Electronic Resources<br/>Development of a Quality Assurance Prototype for Intrusion Detection Systemsent://SD_ILS/0/SD_ILS:187282025-07-09T17:59:15Z2025-07-09T17:59:15Zby Yüksel, Ulaş.<br/><a href="http://hdl.handle.net/11147/3428">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Comparison of recovery requirements with investigation requirements for intrusion management systemsent://SD_ILS/0/SD_ILS:252472025-07-09T17:59:15Z2025-07-09T17:59:15Zby Arpaçay Tapucu, Dilek.<br/><a href="http://hdl.handle.net/11147/3463">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Honeypots and routers : collecting internet attacksent://SD_ILS/0/SD_ILS:23222732025-07-09T17:59:15Z2025-07-09T17:59:15Zby Mohammed, Mohssen, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781498702201">https://learning.oreilly.com/library/view/~/9781498702201</a>
<a href="https://learning.oreilly.com/library/view/~/9781498702201/?ar">https://learning.oreilly.com/library/view/~/9781498702201/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781498702201/?ar">https://go.oreilly.com/library-access/library/view/-/9781498702201/?ar</a><br/>Format: Electronic Resources<br/>Anomaly detection using network traffic characterizationent://SD_ILS/0/SD_ILS:250272025-07-09T17:59:15Z2025-07-09T17:59:15Zby Yarımtepe, Oğuz.<br/><a href="http://hdl.handle.net/11147/3459">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Current security management & ethical issues of information technologyent://SD_ILS/0/SD_ILS:22612702025-07-09T17:59:15Z2025-07-09T17:59:15Zby Azari, Rasool.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93177-743-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93177-743-8</a><br/>Format: Electronic Resources<br/>Mastering Linux Security and Hardening - Second Editionent://SD_ILS/0/SD_ILS:23241672025-07-09T17:59:15Z2025-07-09T17:59:15Zby Tevault, Donald A.<br/><a href="https://learning.oreilly.com/library/view/~/9781838981778/?ar">https://learning.oreilly.com/library/view/~/9781838981778/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar">https://go.oreilly.com/library-access/library/view/-/9781838981778/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838981778">https://learning.oreilly.com/library/view/~/9781838981778</a><br/>Format: Electronic Resources<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:4682522025-07-09T17:59:15Z2025-07-09T17:59:15Zby Elbahadır, Hamza, author.<br/>Format: Books<br/>The business of cybersecurity : foundations and ideologiesent://SD_ILS/0/SD_ILS:21569012025-07-09T17:59:15Z2025-07-09T17:59:15Zby Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5770273">Click to View</a><br/>Format: Electronic Resources<br/>IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodellent://SD_ILS/0/SD_ILS:21213252025-07-09T17:59:15Z2025-07-09T17:59:15Zby Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4830572">Click to View</a><br/>Format: Electronic Resources<br/>Understanding security issuesent://SD_ILS/0/SD_ILS:21445942025-07-09T17:59:15Z2025-07-09T17:59:15Zby Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157542">Click to View</a><br/>Format: Electronic Resources<br/>Security and resilience in intelligent data-centric systems and communication networksent://SD_ILS/0/SD_ILS:22131042025-07-09T17:59:15Z2025-07-09T17:59:15Zby Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5090270">Click to View</a><br/>Format: Electronic Resources<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:22098142025-07-09T17:59:15Z2025-07-09T17:59:15Zby Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452265">Click to View</a><br/>Format: Electronic Resources<br/>Breaking into information security : crafting a custom career path to get the job you really wantent://SD_ILS/0/SD_ILS:22093442025-07-09T17:59:15Z2025-07-09T17:59:15Zby More, Josh, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4187289">Click to View</a><br/>Format: Electronic Resources<br/>Network security a practical guideent://SD_ILS/0/SD_ILS:20478022025-07-09T17:59:15Z2025-07-09T17:59:15Zby Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=298471">Click to View</a><br/>Format: Electronic Resources<br/>Insider threatsent://SD_ILS/0/SD_ILS:22726222025-07-09T17:59:15Z2025-07-09T17:59:15Zby Arduin, Pierre-Emmanuel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5323674">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity and resilience in the arcticent://SD_ILS/0/SD_ILS:22423152025-07-09T17:59:15Z2025-07-09T17:59:15Zby Trump, Benjamin D., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6355988">Click to View</a><br/>Format: Electronic Resources<br/>Empirical research for software security : foundations and experienceent://SD_ILS/0/SD_ILS:21086702025-07-09T17:59:15Z2025-07-09T17:59:15Zby ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5164090">Click to View</a><br/>Format: Electronic Resources<br/>The cybersecurity playbook for modern enterprisesent://SD_ILS/0/SD_ILS:23323232025-07-09T17:59:15Z2025-07-09T17:59:15Zby Wittkop, Jeremy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639/?ar">https://learning.oreilly.com/library/view/~/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639">https://learning.oreilly.com/library/view/~/9781803248639</a><br/>Format: Electronic Resources<br/>Enterprise Mac security : El Capitanent://SD_ILS/0/SD_ILS:23097402025-07-09T17:59:15Z2025-07-09T17:59:15Zby Edge, Charles S., Jr., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484217122/?ar">https://go.oreilly.com/library-access/library/view/-/9781484217122/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484217122/?ar">https://learning.oreilly.com/library/view/~/9781484217122/?ar</a><br/>Format: Electronic Resources<br/>Linux Firewalls, Third Editionent://SD_ILS/0/SD_ILS:23196682025-07-09T17:59:15Z2025-07-09T17:59:15Zby Suehring, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/0672327716/?ar">https://learning.oreilly.com/library/view/~/0672327716/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672327716">https://learning.oreilly.com/library/view/~/0672327716</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672327716/?ar">https://go.oreilly.com/library-access/library/view/-/0672327716/?ar</a><br/>Format: Electronic Resources<br/>Cyber security : the complete guide to cyber threats and protectionent://SD_ILS/0/SD_ILS:23351942025-07-09T17:59:15Z2025-07-09T17:59:15Zby Sutton, David (Information security practitioner), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175973">https://learning.oreilly.com/library/view/~/9781780175973</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175973/?ar">https://learning.oreilly.com/library/view/~/9781780175973/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar</a><br/>Format: Electronic Resources<br/>Choose your InfoSec path : an interactive cybersecurity adventure for beginnersent://SD_ILS/0/SD_ILS:23289902025-07-09T17:59:15Z2025-07-09T17:59:15Zby Roxon, Alexander J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484270363">https://learning.oreilly.com/library/view/~/9781484270363</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270363/?ar">https://learning.oreilly.com/library/view/~/9781484270363/?ar</a><br/>Format: Electronic Resources<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:22969362025-07-09T17:59:15Z2025-07-09T17:59:15Zby Mao, Wenji.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123972002/?ar">https://go.oreilly.com/library-access/library/view/-/9780123972002/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123972002/?ar">https://learning.oreilly.com/library/view/~/9780123972002/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity For Dummiesent://SD_ILS/0/SD_ILS:23328722025-07-09T17:59:15Z2025-07-09T17:59:15Zby Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119867180">https://learning.oreilly.com/library/view/~/9781119867180</a>
<a href="https://learning.oreilly.com/library/view/~/9781119867180/?ar">https://learning.oreilly.com/library/view/~/9781119867180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar">https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity and Third-Party Risk : Third Party Threat Huntingent://SD_ILS/0/SD_ILS:23290002025-07-09T17:59:15Z2025-07-09T17:59:15Zby Rasner, Gregory C.<br/><a href="https://learning.oreilly.com/library/view/~/9781119809555">https://learning.oreilly.com/library/view/~/9781119809555</a>
<a href="https://learning.oreilly.com/library/view/~/9781119809555/?ar">https://learning.oreilly.com/library/view/~/9781119809555/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar">https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar</a><br/>Format: Electronic Resources<br/>Informationssicherheit und Datenschutz : Handbuch für Praktiker und Begleitbuch zum T.I.S.P.ent://SD_ILS/0/SD_ILS:23221892025-07-09T17:59:15Z2025-07-09T17:59:15Zby Domnick, André, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar">https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098123659/?ar">https://learning.oreilly.com/library/view/~/9781098123659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098123659">https://learning.oreilly.com/library/view/~/9781098123659</a><br/>Format: Electronic Resources<br/>System assurance : beyond detecting vulnerabilitiesent://SD_ILS/0/SD_ILS:22903692025-07-09T17:59:15Z2025-07-09T17:59:15Zby Mansourov, Nikolai.<br/><a href="https://learning.oreilly.com/library/view/~/9780123814142">https://learning.oreilly.com/library/view/~/9780123814142</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780123814142/?ar">https://go.oreilly.com/library-access/library/view/-/9780123814142/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123814142/?ar">https://learning.oreilly.com/library/view/~/9780123814142/?ar</a><br/>Format: Electronic Resources<br/>Cyber spying : tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:22822722025-07-09T17:59:15Z2025-07-09T17:59:15Zby Fair, Ted.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836418">https://learning.oreilly.com/library/view/~/9781931836418</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836418/?ar">https://learning.oreilly.com/library/view/~/9781931836418/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836418/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836418/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781931836418">https://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Electronic Resources<br/>Nmap network scanning : official Nmap project guide to network discovery and security scanningent://SD_ILS/0/SD_ILS:1291032025-07-09T17:59:15Z2025-07-09T17:59:15Zby Lyon, Gordon Fyodor.<br/>Format: Books<br/>Wireless operational securityent://SD_ILS/0/SD_ILS:660872025-07-09T17:59:15Z2025-07-09T17:59:15Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkit.ent://SD_ILS/0/SD_ILS:657972025-07-09T17:59:15Z2025-07-09T17:59:15Zby Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:656262025-07-09T17:59:15Z2025-07-09T17:59:15Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2003051481.html">http://www.loc.gov/catdir/description/els031/2003051481.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2003051481.html">http://www.loc.gov/catdir/toc/els031/2003051481.html</a><br/>Format: Electronic Resources<br/>Information security best practices 205 basic rulesent://SD_ILS/0/SD_ILS:650922025-07-09T17:59:15Z2025-07-09T17:59:15Zby Stefanek, George L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2002016635.html">http://www.loc.gov/catdir/description/els031/2002016635.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2002016635.html">http://www.loc.gov/catdir/toc/els031/2002016635.html</a><br/>Format: Electronic Resources<br/>Hackingent://SD_ILS/0/SD_ILS:23328862025-07-09T17:59:15Z2025-07-09T17:59:15Zby Beaver, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119872191">https://learning.oreilly.com/library/view/~/9781119872191</a>
<a href="https://learning.oreilly.com/library/view/~/9781119872191/?ar">https://learning.oreilly.com/library/view/~/9781119872191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar">https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar</a><br/>Format: Electronic Resources<br/>Professional Red teaming : conducting successful cybersecurity engagementsent://SD_ILS/0/SD_ILS:23189772025-07-09T17:59:15Z2025-07-09T17:59:15Zby Oakley, Jacob G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243091/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243091/?ar">https://learning.oreilly.com/library/view/~/9781484243091/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243091">https://learning.oreilly.com/library/view/~/9781484243091</a><br/>Format: Electronic Resources<br/>Asset attack vectors : building effective vulnerability management strategies to protect organizationsent://SD_ILS/0/SD_ILS:23167202025-07-09T17:59:15Z2025-07-09T17:59:15Zby Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484236277/?ar">https://learning.oreilly.com/library/view/~/9781484236277/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484236277/?ar">https://go.oreilly.com/library-access/library/view/-/9781484236277/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484236277">https://learning.oreilly.com/library/view/~/9781484236277</a><br/>Format: Electronic Resources<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:23316942025-07-09T17:59:15Z2025-07-09T17:59:15Zby Harper, Allen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar">https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781264268955/?ar">https://learning.oreilly.com/library/view/~/9781264268955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781264268955">https://learning.oreilly.com/library/view/~/9781264268955</a><br/>Format: Electronic Resources<br/>Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigatorsent://SD_ILS/0/SD_ILS:23268662025-07-09T17:59:15Z2025-07-09T17:59:15Zby Long, Johnny, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080553979/?ar">https://go.oreilly.com/library-access/library/view/-/9780080553979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080553979/?ar">https://learning.oreilly.com/library/view/~/9780080553979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080553979">https://learning.oreilly.com/library/view/~/9780080553979</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:20522822025-07-09T17:59:15Z2025-07-09T17:59:15Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137538">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:20476392025-07-09T17:59:15Z2025-07-09T17:59:15Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273488">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise information systems assurance and system security managerial and technical issuesent://SD_ILS/0/SD_ILS:22614182025-07-09T17:59:15Z2025-07-09T17:59:15Zby Warkentin, Merrill.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3</a><br/>Format: Electronic Resources<br/>Firewall monitoring using intrusion detection systemsent://SD_ILS/0/SD_ILS:168172025-07-09T17:59:15Z2025-07-09T17:59:15Zby Asarcıklı, Şükran.<br/><a href="http://hdl.handle.net/11147/3295">Access to Electronic Version</a><br/>Format: Manuscript<br/>Cybersecurity Manager's Guideent://SD_ILS/0/SD_ILS:23270202025-07-09T17:59:15Z2025-07-09T17:59:15Zby Barnum, Todd.<br/><a href="https://learning.oreilly.com/library/view/~/9781492076209">https://learning.oreilly.com/library/view/~/9781492076209</a>
<a href="https://learning.oreilly.com/library/view/~/9781492076209/?ar">https://learning.oreilly.com/library/view/~/9781492076209/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar">https://go.oreilly.com/library-access/library/view/-/9781492076209/?ar</a><br/>Format: Electronic Resources<br/>Build Your Own Cybersecurity Testing Lab : Low-cost Solutions for Testing in Virtual and Cloud-based Environmentsent://SD_ILS/0/SD_ILS:23234382025-07-09T17:59:15Z2025-07-09T17:59:15Zby Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260458329">https://learning.oreilly.com/library/view/~/9781260458329</a>
<a href="https://learning.oreilly.com/library/view/~/9781260458329/?ar">https://learning.oreilly.com/library/view/~/9781260458329/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar">https://go.oreilly.com/library-access/library/view/-/9781260458329/?ar</a><br/>Format: Electronic Resources<br/>PoC GTFO. Volume IIIent://SD_ILS/0/SD_ILS:23271492025-07-09T17:59:15Z2025-07-09T17:59:15Zby Laphroaig, Manul.<br/><a href="https://learning.oreilly.com/library/view/~/9781098125691/?ar">https://learning.oreilly.com/library/view/~/9781098125691/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125691/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125691">https://learning.oreilly.com/library/view/~/9781098125691</a><br/>Format: Electronic Resources<br/>Standards And Practices Necessary To Implement A Successful Security Review Program For Intrusion Management Systemsent://SD_ILS/0/SD_ILS:482432025-07-09T17:59:15Z2025-07-09T17:59:15Zby Doruk, Alpay.<br/><a href="http://hdl.handle.net/11147/3706">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Windows Vista security for dummiesent://SD_ILS/0/SD_ILS:22842182025-07-09T17:59:15Z2025-07-09T17:59:15Zby Koerner, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9780470118054">https://learning.oreilly.com/library/view/~/9780470118054</a>
<a href="https://learning.oreilly.com/library/view/~/9780470118054/?ar">https://learning.oreilly.com/library/view/~/9780470118054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar">https://go.oreilly.com/library-access/library/view/-/9780470118054/?ar</a><br/>Format: Electronic Resources<br/>Security 2020 : Reduce Security Risks This Decade.ent://SD_ILS/0/SD_ILS:12283162025-07-09T17:59:15Z2025-07-09T17:59:15Zby Howard, Doug.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=694289">Click to View</a><br/>Format: Electronic Resources<br/>Securing network infrastructure : discover practical network security with Nmap and Nessus 7ent://SD_ILS/0/SD_ILS:23533722025-07-09T17:59:15Z2025-07-09T17:59:15Zby Sairam, Jetty, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5742610">Click to View</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:22074682025-07-09T17:59:15Z2025-07-09T17:59:15Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699255">Click to View</a><br/>Format: Electronic Resources<br/>Solaris security essentials.ent://SD_ILS/0/SD_ILS:22862572025-07-09T17:59:15Z2025-07-09T17:59:15Z<a href="https://learning.oreilly.com/library/view/~/9780131365414/?ar">https://learning.oreilly.com/library/view/~/9780131365414/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780131365414/?ar">https://go.oreilly.com/library-access/library/view/-/9780131365414/?ar</a><br/>Format: Electronic Resources<br/>Cyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:655792025-07-09T17:59:15Z2025-07-09T17:59:15Zby Parker, Tom, 1982-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>CYBER SECURITY AND DIGITAL FORENSICSent://SD_ILS/0/SD_ILS:23314412025-07-09T17:59:15Z2025-07-09T17:59:15Z<a href="https://learning.oreilly.com/library/view/~/9781119795636">https://learning.oreilly.com/library/view/~/9781119795636</a>
<a href="https://learning.oreilly.com/library/view/~/9781119795636/?ar">https://learning.oreilly.com/library/view/~/9781119795636/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar">https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar</a><br/>Format: Electronic Resources<br/>Data-Driven Security : Analysis, Visualization and Dashboards.ent://SD_ILS/0/SD_ILS:23015562025-07-09T17:59:15Z2025-07-09T17:59:15Zby Jacobs, Jay (Data analyst)<br/><a href="https://learning.oreilly.com/library/view/~/9781118793824">https://learning.oreilly.com/library/view/~/9781118793824</a>
<a href="https://learning.oreilly.com/library/view/~/9781118793824/?ar">https://learning.oreilly.com/library/view/~/9781118793824/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar">https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar</a><br/>Format: Electronic Resources<br/>Effective Oracle Database 10g security by designent://SD_ILS/0/SD_ILS:22850822025-07-09T17:59:15Z2025-07-09T17:59:15Zby Knox, David (David C.)<br/><a href="https://learning.oreilly.com/library/view/~/9780072231304/?ar">https://learning.oreilly.com/library/view/~/9780072231304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780072231304/?ar">https://go.oreilly.com/library-access/library/view/-/9780072231304/?ar</a><br/>Format: Electronic Resources<br/>Serverless security : protect functions using the CLAD security modelent://SD_ILS/0/SD_ILS:23230662025-07-09T17:59:15Z2025-07-09T17:59:15Zby Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar">https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538/?ar">https://learning.oreilly.com/library/view/~/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538">https://learning.oreilly.com/library/view/~/9781492082538</a><br/>Format: Electronic Resources<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:23192202025-07-09T17:59:15Z2025-07-09T17:59:15Zby Tanner, Nadean H., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar">https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119552932/?ar">https://learning.oreilly.com/library/view/~/9781119552932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119552932">https://learning.oreilly.com/library/view/~/9781119552932</a><br/>Format: Electronic Resources<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:22067942025-07-09T17:59:15Z2025-07-09T17:59:15Zby Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1574451">Click to View</a><br/>Format: Electronic Resources<br/>IBM business process manager security : concepts and guidanceent://SD_ILS/0/SD_ILS:23075462025-07-09T17:59:15Z2025-07-09T17:59:15Zby Wood, J. Keith, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738437263/?ar">https://go.oreilly.com/library-access/library/view/-/0738437263/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738437263">https://learning.oreilly.com/library/view/~/0738437263</a>
<a href="https://learning.oreilly.com/library/view/~/0738437263/?ar">https://learning.oreilly.com/library/view/~/0738437263/?ar</a><br/>Format: Electronic Resources<br/>Software security : building security inent://SD_ILS/0/SD_ILS:22821802025-07-09T17:59:15Z2025-07-09T17:59:15Zby McGraw, Gary, 1966-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321356705/?ar">https://go.oreilly.com/library-access/library/view/-/0321356705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321356705/?ar">https://learning.oreilly.com/library/view/~/0321356705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321356705">https://learning.oreilly.com/library/view/~/0321356705</a><br/>Format: Electronic Resources<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:21549092025-07-09T17:59:15Z2025-07-09T17:59:15Zby Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463579">Click to View</a><br/>Format: Electronic Resources<br/>I nove passi per il successo : Compendio per l'attuazione della norma ISO 27001 :2013ent://SD_ILS/0/SD_ILS:21230202025-07-09T17:59:15Z2025-07-09T17:59:15Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5255162">Click to View</a><br/>Format: Electronic Resources<br/>Neuf étapes vers le succès : Un apercu de la mise en oeuvre de la norme ISO 27001 : 2013ent://SD_ILS/0/SD_ILS:21230212025-07-09T17:59:15Z2025-07-09T17:59:15Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5255163">Click to View</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:21549082025-07-09T17:59:15Z2025-07-09T17:59:15Zby Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463578">Click to View</a><br/>Format: Electronic Resources<br/>Spring security : secure your web applications, RESTful services, and microservice architecturesent://SD_ILS/0/SD_ILS:22301482025-07-09T17:59:15Z2025-07-09T17:59:15Zby Knutson, Mick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5165113">Click to View</a><br/>Format: Electronic Resources<br/>CompTIA Security+ent://SD_ILS/0/SD_ILS:23049062025-07-09T17:59:15Z2025-07-09T17:59:15Zby Long, Mark.<br/><a href="https://learning.oreilly.com/videos/~/9781771372831/?ar">https://learning.oreilly.com/videos/~/9781771372831/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar">https://go.oreilly.com/library-access/library/view/-/9781771372831/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity dilemmas : technology, policy, and incentives : summary of discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forument://SD_ILS/0/SD_ILS:20276222025-07-09T17:59:15Z2025-07-09T17:59:15Zby National Academy of Sciences (U.S.)<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Cybersecurity-Dilemmas.pdf">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://www.nap.edu/catalog.php?record_id=21833">http://www.nap.edu/catalog.php?record_id=21833</a><br/>Format: Electronic Resources<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:654372025-07-09T17:59:15Z2025-07-09T17:59:15Zby Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Check Point NG : next generation security administrationent://SD_ILS/0/SD_ILS:23060662025-07-09T17:59:15Z2025-07-09T17:59:15Zby Simonis, Drew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994749/?ar">https://learning.oreilly.com/library/view/~/9781928994749/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar</a><br/>Format: Electronic Resources<br/>Cyber security for absolute beginners. Part 02.ent://SD_ILS/0/SD_ILS:23355132025-07-09T17:59:15Z2025-07-09T17:59:15Zby Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639403/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639403/?ar">https://learning.oreilly.com/videos/~/9781837639403/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639403">https://learning.oreilly.com/videos/~/9781837639403</a><br/>Format: Video recording<br/>Cyber security for absolute beginners, Part 01.ent://SD_ILS/0/SD_ILS:23355252025-07-09T17:59:15Z2025-07-09T17:59:15Zby Oni, Alexander, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837630943/?ar">https://learning.oreilly.com/videos/~/9781837630943/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837630943">https://learning.oreilly.com/videos/~/9781837630943</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar">https://go.oreilly.com/library-access/library/view/-/9781837630943/?ar</a><br/>Format: Video recording<br/>Getting started with cybersecurity scienceent://SD_ILS/0/SD_ILS:23333812025-07-09T17:59:15Z2025-07-09T17:59:15Zby Dykstra, Josiah, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920670926">https://learning.oreilly.com/videos/~/0636920670926</a>
<a href="https://learning.oreilly.com/videos/~/0636920670926/?ar">https://learning.oreilly.com/videos/~/0636920670926/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar">https://go.oreilly.com/library-access/library/view/-/0636920670926/?ar</a><br/>Format: Video recording<br/>Managing SSH clients and servers.ent://SD_ILS/0/SD_ILS:23343442025-07-09T17:59:15Z2025-07-09T17:59:15Zby Wallen, Jack, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar">https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492031666">https://learning.oreilly.com/videos/~/9781492031666</a>
<a href="https://learning.oreilly.com/videos/~/9781492031666/?ar">https://learning.oreilly.com/videos/~/9781492031666/?ar</a><br/>Format: Video recording<br/>ISO27001 in a Windows Environment : the best practice handbook for a Microsoft Windows environmentent://SD_ILS/0/SD_ILS:22900262025-07-09T17:59:15Z2025-07-09T17:59:15Zby Honan, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280495/?ar">https://learning.oreilly.com/library/view/~/9781849280495/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar</a><br/>Format: Electronic Resources<br/>Hack proofing Sun Solaris 8ent://SD_ILS/0/SD_ILS:656732025-07-09T17:59:15Z2025-07-09T17:59:15Zby Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Azure security handbook : a comprehensive guide for defending your enterprise environmentent://SD_ILS/0/SD_ILS:23298022025-07-09T17:59:15Z2025-07-09T17:59:15Zby Ots, Karl.<br/><a href="https://learning.oreilly.com/library/view/~/9781484272923">https://learning.oreilly.com/library/view/~/9781484272923</a>
<a href="https://learning.oreilly.com/library/view/~/9781484272923/?ar">https://learning.oreilly.com/library/view/~/9781484272923/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272923/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Windows 2000 security handbookent://SD_ILS/0/SD_ILS:22811702025-07-09T17:59:15Z2025-07-09T17:59:15Zby Schmidt, Jeff, MCSE.<br/><a href="https://learning.oreilly.com/library/view/~/0789719991">https://learning.oreilly.com/library/view/~/0789719991</a>
<a href="https://learning.oreilly.com/library/view/~/0789719991/?ar">https://learning.oreilly.com/library/view/~/0789719991/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0789719991/?ar">https://go.oreilly.com/library-access/library/view/-/0789719991/?ar</a><br/>Format: Electronic Resources<br/>Low tech hacking : street smarts for security professionalsent://SD_ILS/0/SD_ILS:22932292025-07-09T17:59:15Z2025-07-09T17:59:15Zby Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496650">https://learning.oreilly.com/library/view/~/9781597496650</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496650/?ar">https://learning.oreilly.com/library/view/~/9781597496650/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar</a><br/>Format: Electronic Resources<br/>Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptionsent://SD_ILS/0/SD_ILS:23297992025-07-09T17:59:15Z2025-07-09T17:59:15Zby Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format: Electronic Resources<br/>Writing secure code : practical strategies and proven techniques for building secure applications in a networked worldent://SD_ILS/0/SD_ILS:22811582025-07-09T17:59:15Z2025-07-09T17:59:15Zby Howard, Michael, 1965- author.<br/><a href="https://learning.oreilly.com/library/view/~/0735617228">https://learning.oreilly.com/library/view/~/0735617228</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0735617228/?ar">https://go.oreilly.com/library-access/library/view/-/0735617228/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735617228/?ar">https://learning.oreilly.com/library/view/~/0735617228/?ar</a><br/>Format: Electronic Resources<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:642592025-07-09T17:59:15Z2025-07-09T17:59:15Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:213582025-07-09T17:59:15Z2025-07-09T17:59:15Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Policy anomaly reporting for distributed firewallsent://SD_ILS/0/SD_ILS:163282025-07-09T17:59:15Z2025-07-09T17:59:15Zby Çetin, Füsun.<br/><a href="http://hdl.handle.net/11147/3197">Access to Electronic Version.</a><br/>Format: Manuscript<br/>A feedback-based testing methodology for network security softwareent://SD_ILS/0/SD_ILS:4088612025-07-09T17:59:15Z2025-07-09T17:59:15Zby Gerçek, Gürcan.<br/><a href="http://hdl.handle.net/11147/3600">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Traffic generator for firewall testingent://SD_ILS/0/SD_ILS:412352025-07-09T17:59:15Z2025-07-09T17:59:15Zby Kaya, Özgür.<br/><a href="http://hdl.handle.net/11147/3631">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:21254512025-07-09T17:59:15Z2025-07-09T17:59:15Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=625004">Click to View</a><br/>Format: Electronic Resources<br/>Building a global information assurance programent://SD_ILS/0/SD_ILS:23229162025-07-09T17:59:15Z2025-07-09T17:59:15Zby Curts, Raymond J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780203997550/?ar">https://learning.oreilly.com/library/view/~/9780203997550/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar">https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar</a><br/>Format: Electronic Resources<br/>Access monitoring system for distributed firewall policiesent://SD_ILS/0/SD_ILS:857052025-07-09T17:59:15Z2025-07-09T17:59:15Zby Çakı, Oğuzhan.<br/><a href="http://hdl.handle.net/11147/3953">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Web application security is a stack : how to CYA (Cover Your Apps) completelyent://SD_ILS/0/SD_ILS:22089712025-07-09T17:59:15Z2025-07-09T17:59:15Zby Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192126">Click to View</a><br/>Format: Electronic Resources<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:21108552025-07-09T17:59:15Z2025-07-09T17:59:15Zby Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192124">Click to View</a><br/>Format: Electronic Resources<br/>Silence on the wire a field guide to passive reconnaissance and indirect attacksent://SD_ILS/0/SD_ILS:20476512025-07-09T17:59:15Z2025-07-09T17:59:15Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273504">Click to View</a><br/>Format: Electronic Resources<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:22102642025-07-09T17:59:15Z2025-07-09T17:59:15Zby Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556899">Click to View</a><br/>Format: Electronic Resources<br/>Hack proofing Windows 2000 Serverent://SD_ILS/0/SD_ILS:656892025-07-09T17:59:15Z2025-07-09T17:59:15Zby Todd, Chad.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836494">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Practical cyber hacking skills for beginners.ent://SD_ILS/0/SD_ILS:23355142025-07-09T17:59:15Z2025-07-09T17:59:15Zby Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar">https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181">https://learning.oreilly.com/videos/~/9781837636181</a>
<a href="https://learning.oreilly.com/videos/~/9781837636181/?ar">https://learning.oreilly.com/videos/~/9781837636181/?ar</a><br/>Format: Video recording<br/>Security operations in practiceent://SD_ILS/0/SD_ILS:23339292025-07-09T17:59:15Z2025-07-09T17:59:15Zby Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175089/?ar">https://learning.oreilly.com/library/view/~/9781780175089/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175089/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175089">https://learning.oreilly.com/library/view/~/9781780175089</a><br/>Format: Electronic Resources<br/>Campus network topology discovery and distributed firewall policy generationent://SD_ILS/0/SD_ILS:1293602025-07-09T17:59:15Z2025-07-09T17:59:15Zby Çalışkan, Ezgi.<br/><a href="http://hdl.handle.net/11147/3102">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Web hacker's toolbox : tools used by successful hackers.ent://SD_ILS/0/SD_ILS:23354592025-07-09T17:59:15Z2025-07-09T17:59:15Zby Czagan, Dawid, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837632831/?ar">https://learning.oreilly.com/videos/~/9781837632831/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837632831">https://learning.oreilly.com/videos/~/9781837632831</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar</a><br/>Format: Video recording<br/>Security and privacy in the digital era. Volume 1ent://SD_ILS/0/SD_ILS:20609152025-07-09T17:59:15Z2025-07-09T17:59:15Zby Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4648717">Click to View</a><br/>Format: Electronic Resources<br/>Start-up secure : baking cybersecurity into your company from founding to exitent://SD_ILS/0/SD_ILS:23275242025-07-09T17:59:15Z2025-07-09T17:59:15Zby Castaldo, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119700739">https://learning.oreilly.com/library/view/~/9781119700739</a>
<a href="https://learning.oreilly.com/library/view/~/9781119700739/?ar">https://learning.oreilly.com/library/view/~/9781119700739/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar">https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar</a><br/>Format: Electronic Resources<br/>Identity attack vectors : implementing an effective identity and access management solutionent://SD_ILS/0/SD_ILS:23227372025-07-09T17:59:15Z2025-07-09T17:59:15Zby Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484251652/?ar">https://learning.oreilly.com/library/view/~/9781484251652/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484251652">https://learning.oreilly.com/library/view/~/9781484251652</a><br/>Format: Electronic Resources<br/>Hands-on machine learning for cybersecurity : safeguard your system by making your machines intelligent using the Python ecosystement://SD_ILS/0/SD_ILS:23185882025-07-09T17:59:15Z2025-07-09T17:59:15Zby Halder, Soma, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788992282/?ar">https://go.oreilly.com/library-access/library/view/-/9781788992282/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788992282/?ar">https://learning.oreilly.com/library/view/~/9781788992282/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788992282">https://learning.oreilly.com/library/view/~/9781788992282</a><br/>Format: Electronic Resources<br/>Buffer-Overflows und Format-String-Schwachstellen : Funktionsweisen, Exploits und Gegenmassnahmenent://SD_ILS/0/SD_ILS:22864512025-07-09T17:59:15Z2025-07-09T17:59:15Zby Klein, Tobias.<br/><a href="https://learning.oreilly.com/library/view/~/9783898641920/?ar">https://learning.oreilly.com/library/view/~/9783898641920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783898641920/?ar">https://go.oreilly.com/library-access/library/view/-/9783898641920/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783898641920">https://learning.oreilly.com/library/view/~/9783898641920</a><br/>Format: Electronic Resources<br/>OS X incident response : scripting and analysisent://SD_ILS/0/SD_ILS:22100352025-07-09T17:59:15Z2025-07-09T17:59:15Zby Bradley, Jaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4526010">Click to View</a><br/>Format: Electronic Resources<br/>Intrusion detection system alert correlation with operating system level logsent://SD_ILS/0/SD_ILS:957402025-07-09T17:59:15Z2025-07-09T17:59:15Zby Toprak, Mustafa.<br/><a href="http://hdl.handle.net/11147/4029">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:656212025-07-09T17:59:15Z2025-07-09T17:59:15Zby Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">An electronic book accessible through the World Wide Web; click for information</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2003062590.html">http://www.loc.gov/catdir/toc/els051/2003062590.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003062590.html">http://www.loc.gov/catdir/description/els041/2003062590.html</a><br/>Format: Electronic Resources<br/>Microsoft information protection administrator SC-400 certification guide : advance your microsoft security and compliance services knowledge and pass the sc-400 exam with confidence.ent://SD_ILS/0/SD_ILS:23740972025-07-09T17:59:15Z2025-07-09T17:59:15Zby Darr, Shabaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6824396">Click to View</a><br/>Format: Electronic Resources<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:21317362025-07-09T17:59:15Z2025-07-09T17:59:15Zby Mjølsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1648315">Click to View</a><br/>Format: Electronic Resources<br/>Misuse of Information Systems : The Impact of Security Countermeasures.ent://SD_ILS/0/SD_ILS:12911772025-07-09T17:59:15Z2025-07-09T17:59:15Zby D'Arcy, John P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3016826">Click to View</a><br/>Format: Electronic Resources<br/>Cryptoent://SD_ILS/0/SD_ILS:23313232025-07-09T17:59:15Z2025-07-09T17:59:15Zby Levy, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar">https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781666117615">https://learning.oreilly.com/library/view/~/9781666117615</a>
<a href="https://learning.oreilly.com/library/view/~/9781666117615/?ar">https://learning.oreilly.com/library/view/~/9781666117615/?ar</a><br/>Format: Electronic Resources<br/>Securing Office 365 : masterminding MDM and compliance in the cloudent://SD_ILS/0/SD_ILS:23185642025-07-09T17:59:15Z2025-07-09T17:59:15Zby Katzer, Matthew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484242308/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242308/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242308/?ar">https://learning.oreilly.com/library/view/~/9781484242308/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242308">https://learning.oreilly.com/library/view/~/9781484242308</a><br/>Format: Electronic Resources<br/>Crafting the InfoSec playbookent://SD_ILS/0/SD_ILS:23073922025-07-09T17:59:15Z2025-07-09T17:59:15Zby Bollinger, Jeff, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar">https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491913598">https://learning.oreilly.com/library/view/~/9781491913598</a>
<a href="https://learning.oreilly.com/library/view/~/9781491913598/?ar">https://learning.oreilly.com/library/view/~/9781491913598/?ar</a><br/>Format: Electronic Resources<br/>Enterprise-wide security solutions presentation guideent://SD_ILS/0/SD_ILS:23024822025-07-09T17:59:15Z2025-07-09T17:59:15Zby Kigma, Cees.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738402087/?ar">https://go.oreilly.com/library-access/library/view/-/0738402087/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738402087/?ar">https://learning.oreilly.com/library/view/~/0738402087/?ar</a><br/>Format: Electronic Resources<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:23215742025-07-09T17:59:15Z2025-07-09T17:59:15Zby Quade, Phil.<br/><a href="https://learning.oreilly.com/library/view/~/9781119617365">https://learning.oreilly.com/library/view/~/9781119617365</a>
<a href="https://learning.oreilly.com/library/view/~/9781119617365/?ar">https://learning.oreilly.com/library/view/~/9781119617365/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar">https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar</a><br/>Format: Electronic Resources<br/>Embedded systems security : practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:22949272025-07-09T17:59:15Z2025-07-09T17:59:15Zby Kleidermacher, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780123868862">https://learning.oreilly.com/library/view/~/9780123868862</a>
<a href="https://learning.oreilly.com/library/view/~/9780123868862/?ar">https://learning.oreilly.com/library/view/~/9780123868862/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780123868862/?ar">https://go.oreilly.com/library-access/library/view/-/9780123868862/?ar</a><br/>Format: Electronic Resources<br/>Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environmentent://SD_ILS/0/SD_ILS:23303152025-07-09T17:59:15Z2025-07-09T17:59:15Zby Ackerman, Pascal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800202092/?ar">https://learning.oreilly.com/library/view/~/9781800202092/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202092">https://learning.oreilly.com/library/view/~/9781800202092</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202092/?ar</a><br/>Format: Electronic Resources<br/>To improve cybersecurity, think like a hackerent://SD_ILS/0/SD_ILS:23131252025-07-09T17:59:15Z2025-07-09T17:59:15Zby Esteves, José, 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT58314">https://learning.oreilly.com/library/view/~/53863MIT58314</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT58314/?ar">https://learning.oreilly.com/library/view/~/53863MIT58314/?ar</a><br/>Format: Electronic Resources<br/>Securing the Vista environmentent://SD_ILS/0/SD_ILS:22834092025-07-09T17:59:15Z2025-07-09T17:59:15Zby Gregory, Peter H.<br/><a href="https://learning.oreilly.com/library/view/~/9780596514303/?ar">https://learning.oreilly.com/library/view/~/9780596514303/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596514303">https://learning.oreilly.com/library/view/~/9780596514303</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar">https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar</a><br/>Format: Electronic Resources<br/>Learning Whitehat hacking and penetration testingent://SD_ILS/0/SD_ILS:22978662025-07-09T17:59:15Z2025-07-09T17:59:15Zby Messier, Ric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370349/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771370349/?ar">https://learning.oreilly.com/videos/~/9781771370349/?ar</a><br/>Format: Electronic Resources<br/>Dear Hacker : letters to the editor of 2600ent://SD_ILS/0/SD_ILS:22894682025-07-09T17:59:15Z2025-07-09T17:59:15Zby Goldstein, Emmanuel, 1959-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar">https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470620069/?ar">https://learning.oreilly.com/library/view/~/9780470620069/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity for dummiesent://SD_ILS/0/SD_ILS:23228392025-07-09T17:59:15Z2025-07-09T17:59:15Zby Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119560326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119560326/?ar">https://learning.oreilly.com/library/view/~/9781119560326/?ar</a><br/>Format: Electronic Resources<br/>What is cybersecurity?ent://SD_ILS/0/SD_ILS:23187222025-07-09T17:59:15Z2025-07-09T17:59:15Zby Henri, Emmanuel, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492046585/?ar">https://learning.oreilly.com/videos/~/9781492046585/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar">https://go.oreilly.com/library-access/library/view/-/9781492046585/?ar</a><br/>Format: Electronic Resources<br/>Microsoft security fundamentals LiveLessonsent://SD_ILS/0/SD_ILS:23057252025-07-09T17:59:15Z2025-07-09T17:59:15Zby Lieberman, Ed, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780133949445/?ar">https://learning.oreilly.com/videos/~/9780133949445/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar">https://go.oreilly.com/library-access/library/view/-/9780133949445/?ar</a><br/>Format: Electronic Resources<br/>Software update as a mechanism for resilience and security : proceedings of a Workshop.ent://SD_ILS/0/SD_ILS:20137242025-07-09T17:59:15Z2025-07-09T17:59:15Zby Johnson, Anne Frances, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Software-Update-as-a-Mechanism-for-Resilience-and-Security.pdf">An electronic book accessible through the World Wide Web; click for information.</a>
<a href="http://doi.org/10.17226/24833">http://doi.org/10.17226/24833</a><br/>Format: Electronic Resources<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:657282025-07-09T17:59:15Z2025-07-09T17:59:15Zby Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Getting Started with HashiCorp Vaultent://SD_ILS/0/SD_ILS:23240622025-07-09T17:59:15Z2025-07-09T17:59:15Zby Krausen, Bryan, speaker.<br/><a href="https://learning.oreilly.com/videos/~/1018947658">https://learning.oreilly.com/videos/~/1018947658</a>
<a href="https://learning.oreilly.com/videos/~/1018947658/?ar">https://learning.oreilly.com/videos/~/1018947658/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1018947658/?ar">https://go.oreilly.com/library-access/library/view/-/1018947658/?ar</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:23102902025-07-09T17:59:15Z2025-07-09T17:59:15Zby Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format: Electronic Resources<br/>Network security bibleent://SD_ILS/0/SD_ILS:22884762025-07-09T17:59:15Z2025-07-09T17:59:15Zby Cole, Eric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar">https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470502495/?ar">https://learning.oreilly.com/library/view/~/9780470502495/?ar</a><br/>Format: Electronic Resources<br/>Trust in computer systems and the cloudent://SD_ILS/0/SD_ILS:23308502025-07-09T17:59:15Z2025-07-09T17:59:15Zby Bursell, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119692324/?ar">https://learning.oreilly.com/library/view/~/9781119692324/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar">https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119692324">https://learning.oreilly.com/library/view/~/9781119692324</a><br/>Format: Electronic Resources<br/>DevSecOps for .NET core : securing modern software applicationsent://SD_ILS/0/SD_ILS:23246122025-07-09T17:59:15Z2025-07-09T17:59:15Zby Zeeshan, Afzaal Ahmad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484258507/?ar">https://learning.oreilly.com/library/view/~/9781484258507/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar">https://go.oreilly.com/library-access/library/view/-/9781484258507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484258507">https://learning.oreilly.com/library/view/~/9781484258507</a><br/>Format: Electronic Resources<br/>Cyber operations : building, defending, and attacking modern computer networksent://SD_ILS/0/SD_ILS:23189142025-07-09T17:59:15Z2025-07-09T17:59:15Zby O'Leary, Mike, 1968- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242940">https://learning.oreilly.com/library/view/~/9781484242940</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242940/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242940/?ar">https://learning.oreilly.com/library/view/~/9781484242940/?ar</a><br/>Format: Electronic Resources<br/>Infosec management fundamentalsent://SD_ILS/0/SD_ILS:23080392025-07-09T17:59:15Z2025-07-09T17:59:15Zby Dalziel, Henry, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar">https://go.oreilly.com/library-access/library/view/-/9780128041871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128041871/?ar">https://learning.oreilly.com/library/view/~/9780128041871/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128041871">https://learning.oreilly.com/library/view/~/9780128041871</a><br/>Format: Electronic Resources<br/>Hack proofing your Web applicationsent://SD_ILS/0/SD_ILS:657612025-07-09T17:59:15Z2025-07-09T17:59:15Zby Traxler, Julie.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response.ent://SD_ILS/0/SD_ILS:23314912025-07-09T17:59:15Z2025-07-09T17:59:15Zby Hettema, Hinne.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512/?ar">https://learning.oreilly.com/library/view/~/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512">https://learning.oreilly.com/library/view/~/9781801815512</a><br/>Format: Electronic Resources<br/>Hands-on red team tactics : a practical guide to mastering red team operationsent://SD_ILS/0/SD_ILS:23177922025-07-09T17:59:15Z2025-07-09T17:59:15Zby Sharma, Himanshu, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995238">https://learning.oreilly.com/library/view/~/9781788995238</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995238/?ar">https://learning.oreilly.com/library/view/~/9781788995238/?ar</a><br/>Format: Electronic Resources<br/>Security and Usability : Designing Secure Systems that People Can Use.ent://SD_ILS/0/SD_ILS:22886102025-07-09T17:59:15Z2025-07-09T17:59:15Zby Cranor, Lorrie Faith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008279/?ar">https://go.oreilly.com/library-access/library/view/-/0596008279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008279/?ar">https://learning.oreilly.com/library/view/~/0596008279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008279">https://learning.oreilly.com/library/view/~/0596008279</a><br/>Format: Electronic Resources<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:659072025-07-09T17:59:15Z2025-07-09T17:59:15Zby Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Red Hat and IT security : with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditingent://SD_ILS/0/SD_ILS:23265142025-07-09T17:59:15Z2025-07-09T17:59:15Zby Chatterjee, Rithik, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484264348">https://learning.oreilly.com/library/view/~/9781484264348</a>
<a href="https://learning.oreilly.com/library/view/~/9781484264348/?ar">https://learning.oreilly.com/library/view/~/9781484264348/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar">https://go.oreilly.com/library-access/library/view/-/9781484264348/?ar</a><br/>Format: Electronic Resources<br/>Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:22966162025-07-09T17:59:15Z2025-07-09T17:59:15Zby Raggo, Michael T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format: Electronic Resources<br/>An introduction to security in a CSM 1.3 for AIX 5L environmentent://SD_ILS/0/SD_ILS:22878272025-07-09T17:59:15Z2025-07-09T17:59:15Zby Lascu, Octavian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738427896/?ar">https://go.oreilly.com/library-access/library/view/-/0738427896/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738427896/?ar">https://learning.oreilly.com/library/view/~/0738427896/?ar</a><br/>Format: Electronic Resources<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:657722025-07-09T17:59:15Z2025-07-09T17:59:15Zby Bendell, Dan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threatsent://SD_ILS/0/SD_ILS:23160162025-07-09T17:59:15Z2025-07-09T17:59:15Zby Donaldson, Scott E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484232583/?ar">https://learning.oreilly.com/library/view/~/9781484232583/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar">https://go.oreilly.com/library-access/library/view/-/9781484232583/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484232583">https://learning.oreilly.com/library/view/~/9781484232583</a><br/>Format: Electronic Resources<br/>Kali Linux cookbook : effective penetration testing solutionsent://SD_ILS/0/SD_ILS:23142702025-07-09T17:59:15Z2025-07-09T17:59:15Zby Schultz, Corey P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390303/?ar">https://learning.oreilly.com/library/view/~/9781784390303/?ar</a><br/>Format: Electronic Resources<br/>Snort Intrusion Detection 2.0.ent://SD_ILS/0/SD_ILS:11921112025-07-09T17:59:15Z2025-07-09T17:59:15Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294371">Click to View</a><br/>Format: Electronic Resources<br/>Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environmentent://SD_ILS/0/SD_ILS:23040392025-07-09T17:59:15Z2025-07-09T17:59:15Zby Mehan, Julie E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285728/?ar">https://learning.oreilly.com/library/view/~/9781849285728/?ar</a><br/>Format: Electronic Resources<br/>The complete cybersecurity bootcampent://SD_ILS/0/SD_ILS:23334072025-07-09T17:59:15Z2025-07-09T17:59:15Zby Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137949397">https://learning.oreilly.com/videos/~/9780137949397</a>
<a href="https://learning.oreilly.com/videos/~/9780137949397/?ar">https://learning.oreilly.com/videos/~/9780137949397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar">https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar</a><br/>Format: Video recording<br/>Real-world cryptographyent://SD_ILS/0/SD_ILS:23303832025-07-09T17:59:15Z2025-07-09T17:59:15Zby Wong, David (Cryptography engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710">https://learning.oreilly.com/library/view/~/9781617296710</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710/?ar">https://learning.oreilly.com/library/view/~/9781617296710/?ar</a><br/>Format: Electronic Resources<br/>NIST cybersecurity framework : a pocket guideent://SD_ILS/0/SD_ILS:23175352025-07-09T17:59:15Z2025-07-09T17:59:15Zby Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787780422/?ar">https://go.oreilly.com/library-access/library/view/-/9781787780422/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787780422/?ar">https://learning.oreilly.com/library/view/~/9781787780422/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787780422">https://learning.oreilly.com/library/view/~/9781787780422</a><br/>Format: Electronic Resources<br/>Hack the stack using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:642272025-07-09T17:59:15Z2025-07-09T17:59:15Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Windows security monitoring : scenarios and patternsent://SD_ILS/0/SD_ILS:23159452025-07-09T17:59:15Z2025-07-09T17:59:15Zby Miroshnikov, Andrei, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar">https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119390640/?ar">https://learning.oreilly.com/library/view/~/9781119390640/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119390640">https://learning.oreilly.com/library/view/~/9781119390640</a><br/>Format: Electronic Resources<br/>Threat forecasting : leveraging big data for predictive analysisent://SD_ILS/0/SD_ILS:23106292025-07-09T17:59:15Z2025-07-09T17:59:15Zby Pirc, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128004784/?ar">https://learning.oreilly.com/library/view/~/9780128004784/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar">https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128004784">https://learning.oreilly.com/library/view/~/9780128004784</a><br/>Format: Electronic Resources<br/>Fuzzing : brute force vulnerabilty discoveryent://SD_ILS/0/SD_ILS:22834512025-07-09T17:59:15Z2025-07-09T17:59:15Zby Sutton, Michael, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9780321446114">https://learning.oreilly.com/library/view/~/9780321446114</a>
<a href="https://learning.oreilly.com/library/view/~/9780321446114/?ar">https://learning.oreilly.com/library/view/~/9780321446114/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar">https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar</a><br/>Format: Electronic Resources<br/>Secure coding : principles and practicesent://SD_ILS/0/SD_ILS:22810062025-07-09T17:59:15Z2025-07-09T17:59:15Zby Graff, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/0596002424">https://learning.oreilly.com/library/view/~/0596002424</a>
<a href="https://learning.oreilly.com/library/view/~/0596002424/?ar">https://learning.oreilly.com/library/view/~/0596002424/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596002424/?ar">https://go.oreilly.com/library-access/library/view/-/0596002424/?ar</a><br/>Format: Electronic Resources<br/>Network intrusion dedection: an analyst's handbookent://SD_ILS/0/SD_ILS:80652025-07-09T17:59:15Z2025-07-09T17:59:15Zby Northcutt, Stephen<br/>Format: Books<br/>Mastering Defensive Security : Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure.ent://SD_ILS/0/SD_ILS:23308412025-07-09T17:59:15Z2025-07-09T17:59:15Zby Bravo, Cesar.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar">https://go.oreilly.com/library-access/library/view/-/9781800208162/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800208162/?ar">https://learning.oreilly.com/library/view/~/9781800208162/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800208162">https://learning.oreilly.com/library/view/~/9781800208162</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third editionent://SD_ILS/0/SD_ILS:23116552025-07-09T17:59:15Z2025-07-09T17:59:15Zby Johansen, Gerard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785888427/?ar">https://learning.oreilly.com/library/view/~/9781785888427/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar">https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar</a><br/>Format: Electronic Resources<br/>Mehr Hacking mit Python : eigene Tools entwickeln für Hacker and Pentesterent://SD_ILS/0/SD_ILS:23087772025-07-09T17:59:15Z2025-07-09T17:59:15Zby Seitz, Justin, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457196140">https://learning.oreilly.com/library/view/~/9781457196140</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457196140/?ar">https://go.oreilly.com/library-access/library/view/-/9781457196140/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457196140/?ar">https://learning.oreilly.com/library/view/~/9781457196140/?ar</a><br/>Format: Electronic Resources<br/>Cisco Pix firewalls configure, manage, & troubleshootent://SD_ILS/0/SD_ILS:656942025-07-09T17:59:15Z2025-07-09T17:59:15Zby Behrens, Thorsten.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Threat Modeling : Designing for Security.ent://SD_ILS/0/SD_ILS:12679162025-07-09T17:59:15Z2025-07-09T17:59:15Zby Shostack, Adam.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1629177">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackersent://SD_ILS/0/SD_ILS:23110062025-07-09T17:59:15Z2025-07-09T17:59:15Zby Halton, Wolf, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782168492/?ar">https://learning.oreilly.com/library/view/~/9781782168492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782168492">https://learning.oreilly.com/library/view/~/9781782168492</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity Operations Handbook : the definitive reference on operational cybersecurity.ent://SD_ILS/0/SD_ILS:11951102025-07-09T17:59:15Z2025-07-09T17:59:15Zby Rittinghouse, PhD, CISM, John.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=313612">Click to View</a><br/>Format: Electronic Resources<br/>The best damn firewall book periodent://SD_ILS/0/SD_ILS:658982025-07-09T17:59:15Z2025-07-09T17:59:15Zby Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836906">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Windows, Linux, BSD için ağ güvenliği ipuçları : 100 etkin güvenlik tekniğient://SD_ILS/0/SD_ILS:188752025-07-09T17:59:15Z2025-07-09T17:59:15Zby Lockhart, Andrew.<br/>Format: Books<br/>Building Internet firewallsent://SD_ILS/0/SD_ILS:69922025-07-09T17:59:15Z2025-07-09T17:59:15Zby Zwicky, Elizabeth D.<br/>Format: Books<br/>Scene of the cybercrime computer forensics handbookent://SD_ILS/0/SD_ILS:658712025-07-09T17:59:15Z2025-07-09T17:59:15Zby Shinder, Debra Littlejohn.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Maximum Security, Third Editionent://SD_ILS/0/SD_ILS:23197122025-07-09T17:59:15Z2025-07-09T17:59:15Zby Anonymous, author.<br/><a href="https://learning.oreilly.com/library/view/~/0672318717">https://learning.oreilly.com/library/view/~/0672318717</a>
<a href="https://learning.oreilly.com/library/view/~/0672318717/?ar">https://learning.oreilly.com/library/view/~/0672318717/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672318717/?ar">https://go.oreilly.com/library-access/library/view/-/0672318717/?ar</a><br/>Format: Electronic Resources<br/>Security and privacy for Microsoft Office 2010 users.ent://SD_ILS/0/SD_ILS:22942102025-07-09T17:59:15Z2025-07-09T17:59:15Zby Tulloch, Mitch.<br/><a href="https://learning.oreilly.com/library/view/~/9780735668829">https://learning.oreilly.com/library/view/~/9780735668829</a>
<a href="https://learning.oreilly.com/library/view/~/9780735668829/?ar">https://learning.oreilly.com/library/view/~/9780735668829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar">https://go.oreilly.com/library-access/library/view/-/9780735668829/?ar</a><br/>Format: Electronic Resources<br/>The security culture playbook : an executive guide to reducing risk and developing your human defense layerent://SD_ILS/0/SD_ILS:23342182025-07-09T17:59:15Z2025-07-09T17:59:15Zby Carpenter, Perry, author, narrator.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar">https://go.oreilly.com/library-access/library/view/-/9781663720177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781663720177">https://learning.oreilly.com/library/view/~/9781663720177</a>
<a href="https://learning.oreilly.com/library/view/~/9781663720177/?ar">https://learning.oreilly.com/library/view/~/9781663720177/?ar</a><br/>Format: Sound recording<br/>Securing open source libraries : managing vulnerabilities in open source code packagesent://SD_ILS/0/SD_ILS:23148902025-07-09T17:59:15Z2025-07-09T17:59:15Zby Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996980/?ar">https://learning.oreilly.com/library/view/~/9781491996980/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996980">https://learning.oreilly.com/library/view/~/9781491996980</a><br/>Format: Electronic Resources<br/>