Search Results for Electronic books. - Narrowed by: Computer networks -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dElectronic$002bbooks.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300? 2024-06-20T04:00:09Z Computer network security ent://SD_ILS/0/SD_ILS:2274211 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Sadiqui, Ali, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6123268">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity of industrial systems ent://SD_ILS/0/SD_ILS:2273571 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Flaus, Jean-Marie, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5813671">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2212301 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Vacca, John R., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4858374">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Two-factor authentication ent://SD_ILS/0/SD_ILS:2110843 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Stanislav, Mark, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2048577">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Design and analysis of security protocol for communication ent://SD_ILS/0/SD_ILS:2274166 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Goyal, Dinesh, 1976- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6040173">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security and cryptography : a self-teaching introduction ent://SD_ILS/0/SD_ILS:2214460 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Musa, Sarhan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5389089">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security in network functions virtualization ent://SD_ILS/0/SD_ILS:2213470 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Zhang, Zonghua, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5152998">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building an intelligence-led security program ent://SD_ILS/0/SD_ILS:2097722 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1888751">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to define and build an effective cyber threat intelligence capability ent://SD_ILS/0/SD_ILS:2097725 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1888755">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity fundamentals : a real-world perspective ent://SD_ILS/0/SD_ILS:2356265 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Thakur, Kutub, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6186711">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network vulnerability assessment : identify security loopholes in your network's infrastructure ent://SD_ILS/0/SD_ILS:2215106 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5507753">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Metasploit bootcamp : a fast-paced guide to enhance your pentesting skills. ent://SD_ILS/0/SD_ILS:2235740 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4866345">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Perils of the web : cyber security and internet safety ent://SD_ILS/0/SD_ILS:2237774 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Hodalska, Magdalena, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6481756">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity attacks - red team strategies : a practical guide to building a penetration testing program having homefield advantage ent://SD_ILS/0/SD_ILS:2351005 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Rehberger, Johann, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6155204">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of Information Security and Assurance ent://SD_ILS/0/SD_ILS:2341722 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Clarke, Nathan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6870870">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent threat : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:2211159 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Winkler, Ira, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4730826">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security automation with ansible 2 : leverage ansible 2 to automate complex security tasks like application security, network security, and malware analysis ent://SD_ILS/0/SD_ILS:2272457 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Akula, Madhu, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5188229">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security risks in social media technologies : safe practices in public service applications ent://SD_ILS/0/SD_ILS:2206842 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Oxley, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1574994">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe ent://SD_ILS/0/SD_ILS:2268639 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Rubinoff, Shira, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6020320">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security within Conasense Paragon ent://SD_ILS/0/SD_ILS:2232483 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Prasad, Ramjee, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5829254">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics ent://SD_ILS/0/SD_ILS:2340159 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Diogenes, Yuri, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5259454">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:2156465 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Takanen, Ari, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5430720">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Zabbix cookbook : over 70 hands-on recipes to get your infrastructure up and running with Zabbix ent://SD_ILS/0/SD_ILS:2270968 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Uytterhoeven, Patrik, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1996581">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures ent://SD_ILS/0/SD_ILS:2111091 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Mazurczyk, Wojciech, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4405578">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Learning iOS security : enhance the security of your iOS platform and applications using iOS-centric security techniques ent://SD_ILS/0/SD_ILS:1386713 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Banks, Allister, author.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1973863">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CIBERSEGURIDAD PARA DIRECTIVOS riesgos, control y eficiencia de las tecnolog&iacute;as de la informacion ent://SD_ILS/0/SD_ILS:2333767 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;DEUTSCH, VICTOR EDUARDO.<br/><a href="https://learning.oreilly.com/library/view/~/9788411312585">https://learning.oreilly.com/library/view/~/9788411312585</a> <a href="https://go.oreilly.com/library-access/library/view/-/9788411312585/?ar">https://go.oreilly.com/library-access/library/view/-/9788411312585/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9788411312585/?ar">https://learning.oreilly.com/library/view/~/9788411312585/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security : private communications in a public world ent://SD_ILS/0/SD_ILS:2334128 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Kaufman, Charlie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780136643531">https://learning.oreilly.com/library/view/~/9780136643531</a> <a href="https://learning.oreilly.com/library/view/~/9780136643531/?ar">https://learning.oreilly.com/library/view/~/9780136643531/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780136643531/?ar">https://go.oreilly.com/library-access/library/view/-/9780136643531/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security Sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:65950 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Andr&acirc;es, Steven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836012">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Client-Honeypots : Exploring Malicious Websites. ent://SD_ILS/0/SD_ILS:1261176 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;G&ouml;bel, Jan Gerrit.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1348689">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:65753 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Ahmad, David R. Mirza.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994701">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Host integrity monitoring using Osiris and Samhain ent://SD_ILS/0/SD_ILS:65598 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Nokia network security solutions handbook ent://SD_ILS/0/SD_ILS:65902 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Maxwell, Doug.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836708">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Network Security JumpStart : Computer and Network Security Basics. ent://SD_ILS/0/SD_ILS:1188326 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Strebe, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=272216">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security log management identifying patterns in the chaos ent://SD_ILS/0/SD_ILS:65944 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Babbin, Jacob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0707/2006355064-d.html">http://www.loc.gov/catdir/enhancements/fy0707/2006355064-d.html</a><br/>Format:&#160;Electronic Resources<br/> Cisco Security. ent://SD_ILS/0/SD_ILS:1304503 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Bhatnagar, Kartik.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135750">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Snort IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:64163 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Beale, Jay<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490993">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> SolarWinds Server &amp; Application Monitor : Deployment and Administration. ent://SD_ILS/0/SD_ILS:1265747 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Brant, Justin M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1582950">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Communications and Information Infrastructure Security. ent://SD_ILS/0/SD_ILS:1266507 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Voeller, John G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1598810">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection : A Machine Learning Approach. ent://SD_ILS/0/SD_ILS:1230916 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Tsai, Jeffrey J.P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=737642">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for Executives : A Practical Guide. ent://SD_ILS/0/SD_ILS:1272777 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Touhill, Gregory J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1707094">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security. ent://SD_ILS/0/SD_ILS:1261682 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1364061">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:2205973 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1036349">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SELinux cookbook : over 70 hands-on recipes to develop fully functional policies to confine your applications and users using SELinux ent://SD_ILS/0/SD_ILS:2270719 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Vermeulen, Sven, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1797263">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:2125451 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=625004">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer security and encryption : an introduction ent://SD_ILS/0/SD_ILS:2237660 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Chauhan, S. R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6404902">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web application security is a stack : how to CYA (Cover Your Apps) completely ent://SD_ILS/0/SD_ILS:2208971 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192126">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:2110855 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192124">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Silence on the wire a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:2047651 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273504">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:2132928 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4987646">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:2210264 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556899">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in the digital era. Volume 1 ent://SD_ILS/0/SD_ILS:2060915 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4648717">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2048378 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=453166">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Misuse of Information Systems : The Impact of Security Countermeasures. ent://SD_ILS/0/SD_ILS:1291177 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;D'Arcy, John P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3016826">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Software update as a mechanism for resilience and security : proceedings of a Workshop. ent://SD_ILS/0/SD_ILS:2013724 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Johnson, Anne Frances, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Software-Update-as-a-Mechanism-for-Resilience-and-Security.pdf">An electronic book accessible through the World Wide Web; click for information.</a> <a href="http://doi.org/10.17226/24833">http://doi.org/10.17226/24833</a><br/>Format:&#160;Electronic Resources<br/> The Essential Guide to Home Computer Security. ent://SD_ILS/0/SD_ILS:1235656 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;R. Rowlingson, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=811317">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:65728 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:65907 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Snort Intrusion Detection 2.0. ent://SD_ILS/0/SD_ILS:1192111 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294371">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack the stack using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:64227 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Network Security. ent://SD_ILS/0/SD_ILS:1276853 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Perez, Andr&eacute;.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1800888">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Threat Modeling : Designing for Security. ent://SD_ILS/0/SD_ILS:1267916 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Shostack, Adam.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1629177">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practice of Network Security Monitoring : Understanding Incident Detection and Response. ent://SD_ILS/0/SD_ILS:1264995 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Bejtlich, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572876">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Operations Handbook : the definitive reference on operational cybersecurity. ent://SD_ILS/0/SD_ILS:1195110 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Rittinghouse, PhD, CISM, John.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=313612">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network forensics ent://SD_ILS/0/SD_ILS:2280078 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=7104514">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:2206071 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1081145">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber guerilla ent://SD_ILS/0/SD_ILS:2210281 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Haaster, Jelle van, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4557157">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to defeat advanced malware : new tools for protection and forensics ent://SD_ILS/0/SD_ILS:2097726 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Dalziel, Max, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1888756">Click to View</a><br/>Format:&#160;Electronic Resources<br/> New solutions for cybersecurity ent://SD_ILS/0/SD_ILS:2220195 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Shrobe, Howard E., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5240456">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Managing online risk : apps, mobile, and social media security ent://SD_ILS/0/SD_ILS:2208137 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1798304">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : the complete guide to cyber threats and protection ent://SD_ILS/0/SD_ILS:2356999 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Sutton, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=7146447">Click to View</a><br/>Format:&#160;Electronic Resources<br/> OPNsense Beginner to Professional : Protect Networks and Build Next-Generation Firewalls Easily with OPNsense ent://SD_ILS/0/SD_ILS:2333204 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Camargo, Julio Cesar Bueno de.<br/><a href="https://learning.oreilly.com/library/view/~/9781801816878/?ar">https://learning.oreilly.com/library/view/~/9781801816878/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801816878">https://learning.oreilly.com/library/view/~/9781801816878</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801816878/?ar">https://go.oreilly.com/library-access/library/view/-/9781801816878/?ar</a><br/>Format:&#160;Electronic Resources<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:65739 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Henmi, Anne.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490887">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at designing security for a Windows server 2003 network ent://SD_ILS/0/SD_ILS:65667 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Amini, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Ethereal packet sniffing ent://SD_ILS/0/SD_ILS:65645 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Orebaugh, Angela.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Configuring Juniper Networks NetScreen &amp; SSG firewalls ent://SD_ILS/0/SD_ILS:64175 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Cameron, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Configuring Check Point NGX VPN-1/fire wall- ent://SD_ILS/0/SD_ILS:65662 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Stephens, Robert.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Nessus, Snort, &amp; Ethereal power tools customizing open source security applications ent://SD_ILS/0/SD_ILS:65787 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at configuring Open Source security tools ent://SD_ILS/0/SD_ILS:64178 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Alder, Raven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and Resiliency Policy Framework. ent://SD_ILS/0/SD_ILS:1277487 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Vaseashta, A.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1818046">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ISA server and beyond real world security solutions for Microsoft enterprise networks ent://SD_ILS/0/SD_ILS:65706 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836661">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Internet Security You Can Afford. ent://SD_ILS/0/SD_ILS:1305409 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Dawson, Christopher.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136769">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Artificial intelligence, cybersecurity and cyber defense ent://SD_ILS/0/SD_ILS:2274878 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Ventre, Daniel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6384365">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security. ent://SD_ILS/0/SD_ILS:1266506 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Voeller, John G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1598809">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:2274699 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Hickey, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6301556">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security technology convergence insights ent://SD_ILS/0/SD_ILS:2208578 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Bernard, Ray, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2008287">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity : Managing Systems, Conducting Testing, and Investigating Intrusions. ent://SD_ILS/0/SD_ILS:1263596 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Mowbray, Thomas J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1481185">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The business of cybersecurity : foundations and ideologies ent://SD_ILS/0/SD_ILS:2156901 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5770273">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Smart cities cybersecurity and privacy ent://SD_ILS/0/SD_ILS:2215883 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Kayhan Zrar Ghafoor, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5609779">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands-on incident response and digital forensics ent://SD_ILS/0/SD_ILS:2267847 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Sheward, Mike, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5614288">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IoT security issues ent://SD_ILS/0/SD_ILS:2062195 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Gilchrist, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4810138">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodell ent://SD_ILS/0/SD_ILS:2121325 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4830572">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:2206165 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Electronic Resources<br/> UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:2206032 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Tam, Kenneth.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1068442">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security for service oriented systems ent://SD_ILS/0/SD_ILS:2125456 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Thuraisingham, Bhavani M.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=631696">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced penetration testing : hacking the world's most secure networks ent://SD_ILS/0/SD_ILS:2099471 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Allsopp, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4813145">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and human rights in the age of cyberveillance ent://SD_ILS/0/SD_ILS:2264105 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Kulesza, Joanna, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4098051">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:2270435 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Middleton, Bruce, 1953- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1591686">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The benefits and security risks of web-based applications for business trend report ent://SD_ILS/0/SD_ILS:2206375 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Kotwica, Kathleen.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1210948">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering Metasploit. ent://SD_ILS/0/SD_ILS:1266218 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Jaswal, Nipun.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1593853">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Understanding security issues ent://SD_ILS/0/SD_ILS:2144594 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157542">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and resilience in intelligent data-centric systems and communication networks ent://SD_ILS/0/SD_ILS:2213104 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5090270">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security operations center guidebook : a practical guide for a successful SOC ent://SD_ILS/0/SD_ILS:2212332 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Jarpey, Gregory , author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4862661">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:2209814 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452265">Click to View</a><br/>Format:&#160;Electronic Resources<br/> PCI compliance : understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:2097654 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1832710">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security. ent://SD_ILS/0/SD_ILS:1261560 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1357643">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Internet of things security : fundamentals, techniques and applications ent://SD_ILS/0/SD_ILS:2231065 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Shandilya, Shishir K., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5493971">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux - the ultimate hackers' arsenal ent://SD_ILS/0/SD_ILS:2266685 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4898742">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security a practical guide ent://SD_ILS/0/SD_ILS:2047802 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=298471">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Insider threats ent://SD_ILS/0/SD_ILS:2272622 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Arduin, Pierre-Emmanuel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5323674">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mobilita, sicurezza e nuove frontiere tecnologiche ent://SD_ILS/0/SD_ILS:2241188 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Militello, Vincenzo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5662503">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbix ent://SD_ILS/0/SD_ILS:1386703 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Vacche, Andrea Dalle, author.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1973849">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Empirical research for software security : foundations and experience ent://SD_ILS/0/SD_ILS:2108670 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5164090">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity For Dummies ent://SD_ILS/0/SD_ILS:2332872 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119867180">https://learning.oreilly.com/library/view/~/9781119867180</a> <a href="https://learning.oreilly.com/library/view/~/9781119867180/?ar">https://learning.oreilly.com/library/view/~/9781119867180/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar">https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar</a><br/>Format:&#160;Electronic Resources<br/> Diving into secure access service Edge : a technical leadership guide to achieving success with sase at market speed ent://SD_ILS/0/SD_ILS:2335081 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Ginn, Jeremiah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803242170/?ar">https://go.oreilly.com/library-access/library/view/-/9781803242170/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803242170">https://learning.oreilly.com/library/view/~/9781803242170</a> <a href="https://learning.oreilly.com/library/view/~/9781803242170/?ar">https://learning.oreilly.com/library/view/~/9781803242170/?ar</a><br/>Format:&#160;Electronic Resources<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:65772 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Bendell, Dan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Toward a Safer and More Secure Cyberspace. ent://SD_ILS/0/SD_ILS:1320138 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Committee on Improving Cybersecurity Research in the United States, National Research Council.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3378311">Click to View</a><br/>Format:&#160;Electronic Resources<br/> UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:478805 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Tam, Kenneth.<br/>Knovel <a href="http://app.knovel.com/hotlink/toc/id:kpUTMSFMF4/utm-security-with">http://app.knovel.com/hotlink/toc/id:kpUTMSFMF4/utm-security-with</a><br/>Format:&#160;Electronic Resources<br/> Managing and securing a Cisco structured wireless-aware network ent://SD_ILS/0/SD_ILS:65685 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Wall, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266917">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013. ent://SD_ILS/0/SD_ILS:1274585 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Furnell, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1752831">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Asterisk hacking ent://SD_ILS/0/SD_ILS:64237 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Brashars, Joshua.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:66087 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Cisco Pix firewalls configure, manage, &amp; troubleshoot ent://SD_ILS/0/SD_ILS:65694 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Behrens, Thorsten.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Web Security Basics. ent://SD_ILS/0/SD_ILS:1304459 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Bhasin, Shweta.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135706">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit. ent://SD_ILS/0/SD_ILS:65797 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:64229 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Dubrawsky, Ido.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Policy-based network management solutions for the next generation ent://SD_ILS/0/SD_ILS:65914 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Strassner, John C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608597">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2003107477.html">http://www.loc.gov/catdir/description/els031/2003107477.html</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:65626 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2003051481.html">http://www.loc.gov/catdir/description/els031/2003051481.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2003051481.html">http://www.loc.gov/catdir/toc/els031/2003051481.html</a><br/>Format:&#160;Electronic Resources<br/> Configuring Symantec AntiVirus corporate edition ent://SD_ILS/0/SD_ILS:65577 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Hunter, Laura E.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:2208145 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1798312">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security assessment from vulnerability to patch ent://SD_ILS/0/SD_ILS:64284 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Manzuik, Steve.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Intelligent network management and control : intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio ent://SD_ILS/0/SD_ILS:2358096 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Benmammar, Badr, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6522998">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dns security : defending the domain name system ent://SD_ILS/0/SD_ILS:2210263 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556898">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at Voip security ent://SD_ILS/0/SD_ILS:64226 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Porter, Thomas, PhD.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Computer Forensics with FTK. ent://SD_ILS/0/SD_ILS:1269584 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Carbone, Fernando.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1657797">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:65679 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Wayner, Peter, 1964-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2001099790.html">http://www.loc.gov/catdir/description/els031/2001099790.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2001099790.html">http://www.loc.gov/catdir/toc/els031/2001099790.html</a><br/>Format:&#160;Electronic Resources<br/> Data Visualization, Part 2 : New Directions for Evaluation, Number 140. ent://SD_ILS/0/SD_ILS:1265488 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Azzam, Tarek.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1579356">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security best practices 205 basic rules ent://SD_ILS/0/SD_ILS:65092 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2002016635.html">http://www.loc.gov/catdir/description/els031/2002016635.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2002016635.html">http://www.loc.gov/catdir/toc/els031/2002016635.html</a><br/>Format:&#160;Electronic Resources<br/> Microsoft DirectAccess Best Practices and Troubleshooting. ent://SD_ILS/0/SD_ILS:1262213 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Krause, Jordan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1389355">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Introduction to network security : theory and practice ent://SD_ILS/0/SD_ILS:2311286 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Wang, Jie, 1961- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118939482/?ar">https://go.oreilly.com/library-access/library/view/-/9781118939482/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118939482/?ar">https://learning.oreilly.com/library/view/~/9781118939482/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network and system security ent://SD_ILS/0/SD_ILS:2301170 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124166899/?ar">https://learning.oreilly.com/library/view/~/9780124166899/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network and data security for non-engineers ent://SD_ILS/0/SD_ILS:2316046 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Groom, Frank M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781315350219/?ar">https://go.oreilly.com/library-access/library/view/-/9781315350219/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781315350219/?ar">https://learning.oreilly.com/library/view/~/9781315350219/?ar</a><br/>Format:&#160;Electronic Resources<br/> The practice of network security monitoring ent://SD_ILS/0/SD_ILS:2300232 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Bejtlich, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457185175/?ar">https://go.oreilly.com/library-access/library/view/-/9781457185175/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457185175/?ar">https://learning.oreilly.com/library/view/~/9781457185175/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security : a practical approach ent://SD_ILS/0/SD_ILS:2296928 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Harrington, Jan L.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123116338/?ar">https://go.oreilly.com/library-access/library/view/-/9780123116338/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123116338/?ar">https://learning.oreilly.com/library/view/~/9780123116338/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:64270 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Beyond Cybersecurity : Protecting Your Digital Business. ent://SD_ILS/0/SD_ILS:1280088 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Kaplan, James M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1895275">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM Mainframe Security : Beyond the Basics—A Practical Guide from a z/OS and RACF Perspective. ent://SD_ILS/0/SD_ILS:1262591 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Dattani, Dinesh D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1411689">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security technologies and solutions ent://SD_ILS/0/SD_ILS:2285404 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Bhaiji, Fahim Hussain Yusuf.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780768681963/?ar">https://go.oreilly.com/library-access/library/view/-/9780768681963/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768681963/?ar">https://learning.oreilly.com/library/view/~/9780768681963/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking with Kali : Practical Penetration Testing Techniques. ent://SD_ILS/0/SD_ILS:1253497 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Broad, James.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115177">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM WebSphere Application Server v7.0 Security. ent://SD_ILS/0/SD_ILS:1245129 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Siliceo, Omar.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=943983">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking ent://SD_ILS/0/SD_ILS:2332886 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Beaver, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119872191">https://learning.oreilly.com/library/view/~/9781119872191</a> <a href="https://learning.oreilly.com/library/view/~/9781119872191/?ar">https://learning.oreilly.com/library/view/~/9781119872191/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar">https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:2323627 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Sadiqui, Ali, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar">https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786305275">https://learning.oreilly.com/library/view/~/9781786305275</a> <a href="https://learning.oreilly.com/library/view/~/9781786305275/?ar">https://learning.oreilly.com/library/view/~/9781786305275/?ar</a><br/>Format:&#160;Electronic Resources<br/> Developing and evaluating security-aware software systems ent://SD_ILS/0/SD_ILS:476373 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Khan, Khaled M., 1959- editor.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/</a><br/>Format:&#160;Electronic Resources<br/> Security monitoring ent://SD_ILS/0/SD_ILS:2286050 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Fry, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780596157944/?ar">https://learning.oreilly.com/library/view/~/9780596157944/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596157944">https://learning.oreilly.com/library/view/~/9780596157944</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar">https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security assessment ent://SD_ILS/0/SD_ILS:2283925 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;McNab, Chris (Chris R.), 1980-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596510305/?ar">https://go.oreilly.com/library-access/library/view/-/9780596510305/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596510305/?ar">https://learning.oreilly.com/library/view/~/9780596510305/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596510305">https://learning.oreilly.com/library/view/~/9780596510305</a><br/>Format:&#160;Electronic Resources<br/> Inside network perimeter security ent://SD_ILS/0/SD_ILS:2283365 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Northcutt, Stephen.<br/><a href="https://learning.oreilly.com/library/view/~/0672327376">https://learning.oreilly.com/library/view/~/0672327376</a> <a href="https://learning.oreilly.com/library/view/~/0672327376/?ar">https://learning.oreilly.com/library/view/~/0672327376/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0672327376/?ar">https://go.oreilly.com/library-access/library/view/-/0672327376/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and IT Infrastructure Protection. ent://SD_ILS/0/SD_ILS:1261962 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1377640">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer and Information Security Handbook. ent://SD_ILS/0/SD_ILS:1258612 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1195617">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Distributed Security and High Availability with Tivoli Access Manager and WebSphere Application Server for z/OS. ent://SD_ILS/0/SD_ILS:1309993 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306602">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical vulnerability management : a strategic approach to managing cyber risk ent://SD_ILS/0/SD_ILS:2325867 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Magnusson, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098125707/?ar">https://learning.oreilly.com/library/view/~/9781098125707/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098125707">https://learning.oreilly.com/library/view/~/9781098125707</a><br/>Format:&#160;Electronic Resources<br/> The Tao of Network Security Monitoring Beyond Intrusion Detection ent://SD_ILS/0/SD_ILS:2319768 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Bejtlich, Richard, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321246772/?ar">https://go.oreilly.com/library-access/library/view/-/0321246772/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321246772/?ar">https://learning.oreilly.com/library/view/~/0321246772/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321246772">https://learning.oreilly.com/library/view/~/0321246772</a><br/>Format:&#160;Electronic Resources<br/> End-to-end network security : defense-in-depth ent://SD_ILS/0/SD_ILS:2284052 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Santos, Omar.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587053320/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053320/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587053320/?ar">https://learning.oreilly.com/library/view/~/9781587053320/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587053320">https://learning.oreilly.com/library/view/~/9781587053320</a><br/>Format:&#160;Electronic Resources<br/> Self-defending networks : the next generation of network security ent://SD_ILS/0/SD_ILS:2282790 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;De Capite, Duane.<br/><a href="https://learning.oreilly.com/library/view/~/1587052539/?ar">https://learning.oreilly.com/library/view/~/1587052539/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587052539/?ar">https://go.oreilly.com/library-access/library/view/-/1587052539/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587052539">https://learning.oreilly.com/library/view/~/1587052539</a><br/>Format:&#160;Electronic Resources<br/> The Practice of Network Security : Deployment Strategies for Production Environments. ent://SD_ILS/0/SD_ILS:2317904 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Liska, Allan, author.<br/><a href="https://learning.oreilly.com/library/view/~/0130462233">https://learning.oreilly.com/library/view/~/0130462233</a> <a href="https://learning.oreilly.com/library/view/~/0130462233/?ar">https://learning.oreilly.com/library/view/~/0130462233/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0130462233/?ar">https://go.oreilly.com/library-access/library/view/-/0130462233/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace and cybersecurity ent://SD_ILS/0/SD_ILS:2260769 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Kostopoulos, George K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5110029">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime and business : strategies for global corporate security ent://SD_ILS/0/SD_ILS:2212362 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4863624">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security for service oriented architectures ent://SD_ILS/0/SD_ILS:2270385 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Williams, Walter (Telecommunications engineer), author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1564631">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:65919 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Rewired cybersecurity governance ent://SD_ILS/0/SD_ILS:2273424 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Ellis, Ryan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5761058">Click to View</a><br/>Format:&#160;Electronic Resources<br/> You : for sale protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:2208965 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building a corporate culture of security : strategies for strengthening organizational resiliency ent://SD_ILS/0/SD_ILS:2209738 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4425984">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Online security for the business traveler ent://SD_ILS/0/SD_ILS:2207830 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1772301">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:2052282 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:2047639 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273488">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network Interdiction and Stochastic Integer Programming. ent://SD_ILS/0/SD_ILS:1296857 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Woodruff, David L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3036010">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco Security Professional's Guide to Secure Intrusion Detection Systems. ent://SD_ILS/0/SD_ILS:1191995 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294035">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheit : Eine Einf&uuml;hrung ent://SD_ILS/0/SD_ILS:2122520 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Hellmann, Roland, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157634">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques ent://SD_ILS/0/SD_ILS:2097971 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Chauhan, Sudhanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2025500">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:2206790 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1573362">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:2207332 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1673591">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical VoIP security ent://SD_ILS/0/SD_ILS:65962 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Porter, Thomas, PhD.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> How to Cheat at Configuring ISA Server 2004. ent://SD_ILS/0/SD_ILS:1186065 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Littlejohn Shinder, Debra.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254853">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing Windows 2000 Server. ent://SD_ILS/0/SD_ILS:1192043 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294154">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical security ent://SD_ILS/0/SD_ILS:2212845 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4981408">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Applied network security : master the art of detecting and averting advanced network security attacks and techniques ent://SD_ILS/0/SD_ILS:2155896 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Salmon, Arthur, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4853051">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering identity and access management with Microsoft Azure : start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments ent://SD_ILS/0/SD_ILS:2235522 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Nickel, Jochen, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4709423">Click to View</a><br/>Format:&#160;Electronic Resources<br/> North Korea's cyber operations : strategy and responses ent://SD_ILS/0/SD_ILS:2264327 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Jun, Jenny, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4332477">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network Security Evaluation Using the NSA IEM : Using the NSA IEM. ent://SD_ILS/0/SD_ILS:1186054 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Rogers, Russ.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254842">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the Code : Auditor's Guide to Writing Secure Code for the Web. ent://SD_ILS/0/SD_ILS:1192048 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Burnett, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294160">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Buffer Overflow Attacks : Detect, Exploit, Prevent. ent://SD_ILS/0/SD_ILS:1182500 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Deckard, Jason.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=222803">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0 ent://SD_ILS/0/SD_ILS:2271758 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Olups, Rihards, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4643698">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux ent://SD_ILS/0/SD_ILS:2271621 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Sak, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4520799">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Biohackers : The Politics of Open Science. ent://SD_ILS/0/SD_ILS:1322996 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Delfanti, Alessandro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3386719">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM System z9 109 Technical Introduction. ent://SD_ILS/0/SD_ILS:1309973 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306582">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Sage's Guide to Hardening the Network Infrastructure. ent://SD_ILS/0/SD_ILS:1192108 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Andres, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294359">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Risk Management : Building an Information Security Risk Management Program from the Ground Up. ent://SD_ILS/0/SD_ILS:1226943 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Wheeler, Evan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=685406">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber Adversary Characterization : Auditing the Hacker Mind. ent://SD_ILS/0/SD_ILS:1192012 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Parker, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294071">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Basics of Cyber Warfare : Understanding the Fundamentals of Cyber Warfare in Theory and Practice. ent://SD_ILS/0/SD_ILS:1251443 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Winterfeld, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073026">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:2126508 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826949">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web Hacking : Attacks and Defense. ent://SD_ILS/0/SD_ILS:2317972 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;McClure, Stuart, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201761769/?ar">https://go.oreilly.com/library-access/library/view/-/0201761769/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0201761769">https://learning.oreilly.com/library/view/~/0201761769</a> <a href="https://learning.oreilly.com/library/view/~/0201761769/?ar">https://learning.oreilly.com/library/view/~/0201761769/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux CTF Blueprints. ent://SD_ILS/0/SD_ILS:1272099 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Buchanan, Cameron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1688607">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security in Wireless Networks and Mobile Platforms. ent://SD_ILS/0/SD_ILS:1197516 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Aissi, Selim.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338731">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network Security Foundations : Technology Fundamentals for IT Success. ent://SD_ILS/0/SD_ILS:1187134 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Strebe, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267332">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Data Visualization : Graphical Techniques for Network Analysis. ent://SD_ILS/0/SD_ILS:1291613 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Conti, Greg.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3017625">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web Commerce Security : Design and Development. ent://SD_ILS/0/SD_ILS:1228884 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Nahari, Hadi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706729">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Invasion of Privacy : Big Brother and the Company Hackers. ent://SD_ILS/0/SD_ILS:1304380 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Weber, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135625">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infrastructure. ent://SD_ILS/0/SD_ILS:1253499 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Knapp, Eric D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115187">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Basics of IT Audit : Purposes, Processes, and Practical Information. ent://SD_ILS/0/SD_ILS:1264247 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Gantz, Stephen D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1550527">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Trust and Security in Collaborative Computing. ent://SD_ILS/0/SD_ILS:1270688 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Zou, Xukai.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679354">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Procuring penetration testing services. ent://SD_ILS/0/SD_ILS:2155195 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z <a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1778766">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security in fixed and wireless networks ent://SD_ILS/0/SD_ILS:2279930 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Schafer, Gunter, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=7104366">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Wireless communications security : solutions for the internet of things ent://SD_ILS/0/SD_ILS:2061083 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Penttinen, Jyrki T. J., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4690021">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing bootcamp : quickly get up and running with pentesting techniques ent://SD_ILS/0/SD_ILS:2272224 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Beltrame, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4891268">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent threat understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:2206046 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073020">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Iris biometric model for secured network access ent://SD_ILS/0/SD_ILS:2130126 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Khoury, Franjieh El.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1177222">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco PIX Firewalls : Configure / Manage / Troubleshoot. ent://SD_ILS/0/SD_ILS:1186047 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Browne, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254835">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The complete Metasploit guide : explore effective penetration testing techniques with Metasploit ent://SD_ILS/0/SD_ILS:2268236 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5802136">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in cyber security : technology, operations, and experiences ent://SD_ILS/0/SD_ILS:1388405 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Hsu, D. Frank (Derbiau Frank), 1948- editor.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4803841">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows 2012 server network security securing your windows network systems and infrastructure ent://SD_ILS/0/SD_ILS:2206163 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115160">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Botnets the killer web app ent://SD_ILS/0/SD_ILS:64257 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Schiller, Craig A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Configuring NetScreen Firewalls. ent://SD_ILS/0/SD_ILS:1192005 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z <a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294055">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:2207468 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699255">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:64238 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Network and security issues. ent://SD_ILS/0/SD_ILS:1191149 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Raitt, Dr. David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=289848">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber adversary characterization auditing the hacker mind ent://SD_ILS/0/SD_ILS:65579 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Parker, Tom, 1982-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Internet security a jumpstart for systems administrators and IT managers ent://SD_ILS/0/SD_ILS:65631 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003279708.html">http://www.loc.gov/catdir/description/els041/2003279708.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els041/2003279708.html">http://www.loc.gov/catdir/toc/els041/2003279708.html</a><br/>Format:&#160;Electronic Resources<br/> Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it ent://SD_ILS/0/SD_ILS:2265601 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4662307">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Use of Risk Analysis in Computer-Aided Persuasion. ent://SD_ILS/0/SD_ILS:1237740 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Duman, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=836226">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Firewall Policies and VPN Configurations. ent://SD_ILS/0/SD_ILS:1188302 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=272100">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Best Damn Firewall Book Period. ent://SD_ILS/0/SD_ILS:1192121 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294396">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to Cheat at Managing Information Security. ent://SD_ILS/0/SD_ILS:1186828 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Osborne, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=266207">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring SonicWALL Firewalls. ent://SD_ILS/0/SD_ILS:1186233 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Bendell, Dan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=256369">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Physical security for IT ent://SD_ILS/0/SD_ILS:65850 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">An electronic book accessible through the World Wide Web; click for information</a> Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip051/2004023167.html">http://www.loc.gov/catdir/toc/ecip051/2004023167.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0617/2004023167-d.html">http://www.loc.gov/catdir/enhancements/fy0617/2004023167-d.html</a><br/>Format:&#160;Electronic Resources<br/> Cyber resiliency with IBM QRadar and IBM Spectrum Virtualize for Public Cloud on Azure with IBM Copy Services Manager for Safeguarded Copy ent://SD_ILS/0/SD_ILS:2333811 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;International Business Machines Corporation, issuing body.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460628">https://learning.oreilly.com/library/view/~/9780738460628</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460628/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460628/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460628/?ar">https://learning.oreilly.com/library/view/~/9780738460628/?ar</a><br/>Format:&#160;Electronic Resources<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:2206794 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1574451">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building Virtual Pentesting Labs for Advanced Penetration Testing. ent://SD_ILS/0/SD_ILS:1268861 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Cardwell, Kevin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1644005">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web Penetration Testing with Kali Linux. ent://SD_ILS/0/SD_ILS:1262746 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Muniz, Joseph.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1420531">Click to View</a><br/>Format:&#160;Electronic Resources<br/> BackTrack 4 Assuring Security by Penetration Testing : Assuring Security by Penetration Testing. ent://SD_ILS/0/SD_ILS:1245823 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Ali, Shakeel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=950518">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network anomaly detection a machine learning perspective ent://SD_ILS/0/SD_ILS:2270066 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Bhattacharyya, Dhruba K.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1316406">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Industrial cybersecurity : efficiently secure critical infrastructure systems ent://SD_ILS/0/SD_ILS:2230028 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Ackerman, Pascal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5110693">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Loseless information : hiding in images ent://SD_ILS/0/SD_ILS:2211280 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4743573">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital identity management ent://SD_ILS/0/SD_ILS:2208574 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2007485">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking Point of Sale : Payment Application Secrets, Threats, and Solutions. ent://SD_ILS/0/SD_ILS:1267914 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Gomzin, Slava.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1629175">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Patterns in Practice : Designing Secure Architectures Using Software Patterns. ent://SD_ILS/0/SD_ILS:1259817 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Fernandez-Buglioni, Eduardo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1245159">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics and incident response : an intelligent way to respond to attacks ent://SD_ILS/0/SD_ILS:2272255 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Johansen, Gerard, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4925642">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Safety of web applications : risks, encryption and handling vulnerabilities with PHP ent://SD_ILS/0/SD_ILS:2212109 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Quinton, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4840953">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Understanding Bitcoin : Cryptography, Engineering and Economics. ent://SD_ILS/0/SD_ILS:1277749 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Franco, Pedro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1823060">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web Application Defender's Cookbook : Battling Hackers and Protecting Users. ent://SD_ILS/0/SD_ILS:1252873 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Barnett, Ryan C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking For Dummies. ent://SD_ILS/0/SD_ILS:1252656 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Beaver, Kevin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Assurance : Dependability and Security in Networked Systems. ent://SD_ILS/0/SD_ILS:1196458 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Qian, Yi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328312">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Designing and Building Enterprise DMZs. ent://SD_ILS/0/SD_ILS:1195844 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Flynn, Hal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=319198">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Virtual Private Networking : A Construction, Operation and Utilization Guide. ent://SD_ILS/0/SD_ILS:1209924 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Held, Gilbert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=470565">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber Conflict : Competing National Perspectives. ent://SD_ILS/0/SD_ILS:1254259 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1124641">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Spring security : secure your web applications, RESTful services, and microservice architectures ent://SD_ILS/0/SD_ILS:2230148 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Knutson, Mick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5165113">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CMS Security Handbook : The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone. ent://SD_ILS/0/SD_ILS:1228917 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Canavan, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706893">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Tangled Web : A Guide to Securing Modern Web Applications. ent://SD_ILS/0/SD_ILS:1255587 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Zalewski, Michal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137574">Click to View</a><br/>Format:&#160;Electronic Resources<br/> z/OS 1.6 Security Services Update. ent://SD_ILS/0/SD_ILS:1309844 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306453">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux Network Scanning Cookbook. ent://SD_ILS/0/SD_ILS:1275782 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Hutchens, Justin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1771381">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure Computer and Network Systems : Modeling, Analysis and Design. ent://SD_ILS/0/SD_ILS:1198644 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Ye, Nong.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=351427">Click to View</a><br/>Format:&#160;Electronic Resources<br/> z/OS Diagnostic Data : Collection and Analysis. ent://SD_ILS/0/SD_ILS:1310161 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306770">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SSL and TLS : theory and practice ent://SD_ILS/0/SD_ILS:2211962 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Oppliger, Rolf, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4821279">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Docker security : using containers safely in production ent://SD_ILS/0/SD_ILS:2316622 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Mouat, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042297/?ar">https://learning.oreilly.com/library/view/~/9781492042297/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042297/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools ent://SD_ILS/0/SD_ILS:2276873 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Rehim, Rejah, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594304">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Group theoretic cryptography ent://SD_ILS/0/SD_ILS:2270502 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Gonz&aacute;lez Vasco, Mar&iacute;a Isabel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1619960">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:65437 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Implementing DirectAccess with Windows Server 2016 ent://SD_ILS/0/SD_ILS:2311767 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Hicks, Richard M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484220597/?ar">https://learning.oreilly.com/library/view/~/9781484220597/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484220597/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220597/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nessus Network Auditing : Jay Beale Open Source Security Series. ent://SD_ILS/0/SD_ILS:1192079 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Beale, Jay.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294281">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Managing Cisco network security ent://SD_ILS/0/SD_ILS:65693 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Danielyan, Edgar.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836562">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> How to hack like a legend : breaking windows ent://SD_ILS/0/SD_ILS:2334190 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098141431/?ar">https://learning.oreilly.com/library/view/~/9781098141431/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar">https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098141431">https://learning.oreilly.com/library/view/~/9781098141431</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Sun Solaris 8 ent://SD_ILS/0/SD_ILS:65673 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Instant Spring Security Starter. ent://SD_ILS/0/SD_ILS:1260143 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Jagielski, Piotr.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1274894">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data networks routing, security, and performance optimization ent://SD_ILS/0/SD_ILS:65644 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Kenyon, Tony, 1960-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582715">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2002019364.html">http://www.loc.gov/catdir/description/els031/2002019364.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2002019364.html">http://www.loc.gov/catdir/toc/els031/2002019364.html</a><br/>Format:&#160;Electronic Resources<br/> Cisco Security Specialists Guide to PIX Firewall. ent://SD_ILS/0/SD_ILS:1191996 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294036">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring Symantec AntiVirus Enterprise Edition. ent://SD_ILS/0/SD_ILS:1192006 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294056">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Nokia Network Security Solutions Handbook. ent://SD_ILS/0/SD_ILS:1192081 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco Firepower Threat Defense (FTD) : configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP) ent://SD_ILS/0/SD_ILS:2314393 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Rajib, Nazmul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134679471">https://learning.oreilly.com/library/view/~/9780134679471</a> <a href="https://learning.oreilly.com/library/view/~/9780134679471/?ar">https://learning.oreilly.com/library/view/~/9780134679471/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar">https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco next-generation security solutions : all-in-one Cisco ASA FirePOWER services, NGIPS, and AMP ent://SD_ILS/0/SD_ILS:2311054 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Santos, Omar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134213071/?ar">https://go.oreilly.com/library-access/library/view/-/9780134213071/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134213071/?ar">https://learning.oreilly.com/library/view/~/9780134213071/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134213071">https://learning.oreilly.com/library/view/~/9780134213071</a><br/>Format:&#160;Electronic Resources<br/> Zero trust networks : building secure systems in untrusted networks ent://SD_ILS/0/SD_ILS:2313595 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Gilman, Evan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491962183/?ar">https://learning.oreilly.com/library/view/~/9781491962183/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491962183">https://learning.oreilly.com/library/view/~/9781491962183</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491962183/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962183/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident Response : a Strategic Guide to Handling System and Network Security Breaches. ent://SD_ILS/0/SD_ILS:2290476 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Schultz, E. Eugene, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1578702569/?ar">https://go.oreilly.com/library-access/library/view/-/1578702569/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1578702569/?ar">https://learning.oreilly.com/library/view/~/1578702569/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1578702569">https://learning.oreilly.com/library/view/~/1578702569</a><br/>Format:&#160;Electronic Resources<br/> Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipes ent://SD_ILS/0/SD_ILS:475425 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Fadyushin, Vyacheslav.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format:&#160;Electronic Resources<br/> Best Practices in Computer Network Defense : Incident Detection and Response. ent://SD_ILS/0/SD_ILS:1268453 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Hathaway, M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1637648">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber and you : the impact of technology on our lives ent://SD_ILS/0/SD_ILS:2217081 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Kendal, Maureen, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5811334">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security a practical approach ent://SD_ILS/0/SD_ILS:65956 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Harrington, Jan L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123116338">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0623/2005040077-d.html">http://www.loc.gov/catdir/enhancements/fy0623/2005040077-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0623/2005040077-t.html">http://www.loc.gov/catdir/enhancements/fy0623/2005040077-t.html</a><br/>Format:&#160;Electronic Resources<br/> Aspects of Network and Information Security. ent://SD_ILS/0/SD_ILS:1199280 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Kranakis, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=363205">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Techno Security's guide to managing risks for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:64259 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:21358 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> What should go on the internet? : privacy, freedom, and security online ent://SD_ILS/0/SD_ILS:2098875 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Engel, Mary, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4533280">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Log Management : Identifying Patterns in the Chaos. ent://SD_ILS/0/SD_ILS:1186045 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Babbin, Jacob.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254833">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ISO 37001 : an introduction to anti-bribery management systems : doing the right things ent://SD_ILS/0/SD_ILS:2112285 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5211339">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network Security Assessment : From Vulnerability to Patch. ent://SD_ILS/0/SD_ILS:1189594 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Manzuik, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=280219">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Innocent Code : A Security Wake-Up Call for Web Programmers. ent://SD_ILS/0/SD_ILS:1181920 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Huseby, Sverre H.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=210558">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced penetration testing for highly-secured environments. ent://SD_ILS/0/SD_ILS:2155483 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Allen, Lee, 1946- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4520648">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection. ent://SD_ILS/0/SD_ILS:1268449 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Edwards, M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1637644">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital Whoness : Identity, Privacy and Freedom in the Cyberworld. ent://SD_ILS/0/SD_ILS:1259308 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Capurro, Rafael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1215540">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Business Portals II with IBM Tivoli Access Manager. ent://SD_ILS/0/SD_ILS:1310148 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306757">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Intelligence : A Practitioner's Guide to Solving Enterprise Security Challenges. ent://SD_ILS/0/SD_ILS:1280051 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Li, Qing.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1895130">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Defense and Detection Strategies against Internet Worms. ent://SD_ILS/0/SD_ILS:1183369 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Nazario, Jose.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227660">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity essentials ent://SD_ILS/0/SD_ILS:2322482 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Brooks, Charles J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119362395/?ar">https://learning.oreilly.com/library/view/~/9781119362395/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar">https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar</a><br/>Format:&#160;Electronic Resources<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:343201 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Wiles, Jack.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209</a><br/>Format:&#160;Electronic Resources<br/> Intrusion prevention and active response deploying network and host IPS ent://SD_ILS/0/SD_ILS:65669 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Rash, Michael (Michael Brandon)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Mobile security and privacy : advances, challenges and future research directions ent://SD_ILS/0/SD_ILS:2210784 2024-06-20T04:00:09Z 2024-06-20T04:00:09Z by&#160;Au, Man-Ho, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4689767">Click to View</a><br/>Format:&#160;Electronic Resources<br/>