Search Results for Electronic books. - Narrowed by: Computer networks -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dElectronic$002bbooks.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-06-21T04:39:40ZComputer network securityent://SD_ILS/0/SD_ILS:22742112024-06-21T04:39:40Z2024-06-21T04:39:40Zby Sadiqui, Ali, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6123268">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity of industrial systemsent://SD_ILS/0/SD_ILS:22735712024-06-21T04:39:40Z2024-06-21T04:39:40Zby Flaus, Jean-Marie, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5813671">Click to View</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:22123012024-06-21T04:39:40Z2024-06-21T04:39:40Zby Vacca, John R., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4858374">Click to View</a><br/>Format: Electronic Resources<br/>Two-factor authenticationent://SD_ILS/0/SD_ILS:21108432024-06-21T04:39:40Z2024-06-21T04:39:40Zby Stanislav, Mark, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2048577">Click to View</a><br/>Format: Electronic Resources<br/>Design and analysis of security protocol for communicationent://SD_ILS/0/SD_ILS:22741662024-06-21T04:39:40Z2024-06-21T04:39:40Zby Goyal, Dinesh, 1976- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6040173">Click to View</a><br/>Format: Electronic Resources<br/>Network security and cryptography : a self-teaching introductionent://SD_ILS/0/SD_ILS:22144602024-06-21T04:39:40Z2024-06-21T04:39:40Zby Musa, Sarhan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5389089">Click to View</a><br/>Format: Electronic Resources<br/>Security in network functions virtualizationent://SD_ILS/0/SD_ILS:22134702024-06-21T04:39:40Z2024-06-21T04:39:40Zby Zhang, Zonghua, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5152998">Click to View</a><br/>Format: Electronic Resources<br/>How to define and build an effective cyber threat intelligence capabilityent://SD_ILS/0/SD_ILS:20977252024-06-21T04:39:40Z2024-06-21T04:39:40Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1888755">Click to View</a><br/>Format: Electronic Resources<br/>Building an intelligence-led security programent://SD_ILS/0/SD_ILS:20977222024-06-21T04:39:40Z2024-06-21T04:39:40Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1888751">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity fundamentals : a real-world perspectiveent://SD_ILS/0/SD_ILS:23562652024-06-21T04:39:40Z2024-06-21T04:39:40Zby Thakur, Kutub, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6186711">Click to View</a><br/>Format: Electronic Resources<br/>Network vulnerability assessment : identify security loopholes in your network's infrastructureent://SD_ILS/0/SD_ILS:22151062024-06-21T04:39:40Z2024-06-21T04:39:40Zby Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5507753">Click to View</a><br/>Format: Electronic Resources<br/>Metasploit bootcamp : a fast-paced guide to enhance your pentesting skills.ent://SD_ILS/0/SD_ILS:22357402024-06-21T04:39:40Z2024-06-21T04:39:40Zby Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4866345">Click to View</a><br/>Format: Electronic Resources<br/>Perils of the web : cyber security and internet safetyent://SD_ILS/0/SD_ILS:22377742024-06-21T04:39:40Z2024-06-21T04:39:40Zby Hodalska, Magdalena, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6481756">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity attacks - red team strategies : a practical guide to building a penetration testing program having homefield advantageent://SD_ILS/0/SD_ILS:23510052024-06-21T04:39:40Z2024-06-21T04:39:40Zby Rehberger, Johann, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6155204">Click to View</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security and Assuranceent://SD_ILS/0/SD_ILS:23417222024-06-21T04:39:40Z2024-06-21T04:39:40Zby Clarke, Nathan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6870870">Click to View</a><br/>Format: Electronic Resources<br/>Advanced persistent threat : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategiesent://SD_ILS/0/SD_ILS:22111592024-06-21T04:39:40Z2024-06-21T04:39:40Zby Winkler, Ira, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4730826">Click to View</a><br/>Format: Electronic Resources<br/>Security automation with ansible 2 : leverage ansible 2 to automate complex security tasks like application security, network security, and malware analysisent://SD_ILS/0/SD_ILS:22724572024-06-21T04:39:40Z2024-06-21T04:39:40Zby Akula, Madhu, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5188229">Click to View</a><br/>Format: Electronic Resources<br/>Security risks in social media technologies : safe practices in public service applicationsent://SD_ILS/0/SD_ILS:22068422024-06-21T04:39:40Z2024-06-21T04:39:40Zby Oxley, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1574994">Click to View</a><br/>Format: Electronic Resources<br/>Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safeent://SD_ILS/0/SD_ILS:22686392024-06-21T04:39:40Z2024-06-21T04:39:40Zby Rubinoff, Shira, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6020320">Click to View</a><br/>Format: Electronic Resources<br/>Security within Conasense Paragonent://SD_ILS/0/SD_ILS:22324832024-06-21T04:39:40Z2024-06-21T04:39:40Zby Prasad, Ramjee, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5829254">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tacticsent://SD_ILS/0/SD_ILS:23401592024-06-21T04:39:40Z2024-06-21T04:39:40Zby Diogenes, Yuri, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5259454">Click to View</a><br/>Format: Electronic Resources<br/>Fuzzing for software security testing and quality assuranceent://SD_ILS/0/SD_ILS:21564652024-06-21T04:39:40Z2024-06-21T04:39:40Zby Takanen, Ari, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5430720">Click to View</a><br/>Format: Electronic Resources<br/>Zabbix cookbook : over 70 hands-on recipes to get your infrastructure up and running with Zabbixent://SD_ILS/0/SD_ILS:22709682024-06-21T04:39:40Z2024-06-21T04:39:40Zby Uytterhoeven, Patrik, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1996581">Click to View</a><br/>Format: Electronic Resources<br/>Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasuresent://SD_ILS/0/SD_ILS:21110912024-06-21T04:39:40Z2024-06-21T04:39:40Zby Mazurczyk, Wojciech, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4405578">Click to View</a><br/>Format: Electronic Resources<br/>Learning iOS security : enhance the security of your iOS platform and applications using iOS-centric security techniquesent://SD_ILS/0/SD_ILS:13867132024-06-21T04:39:40Z2024-06-21T04:39:40Zby Banks, Allister, author.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1973863">Click to View</a><br/>Format: Electronic Resources<br/>Network security : private communications in a public worldent://SD_ILS/0/SD_ILS:23341282024-06-21T04:39:40Z2024-06-21T04:39:40Zby Kaufman, Charlie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780136643531">https://learning.oreilly.com/library/view/~/9780136643531</a>
<a href="https://learning.oreilly.com/library/view/~/9780136643531/?ar">https://learning.oreilly.com/library/view/~/9780136643531/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780136643531/?ar">https://go.oreilly.com/library-access/library/view/-/9780136643531/?ar</a><br/>Format: Electronic Resources<br/>CIBERSEGURIDAD PARA DIRECTIVOS riesgos, control y eficiencia de las tecnologías de la informacionent://SD_ILS/0/SD_ILS:23337672024-06-21T04:39:40Z2024-06-21T04:39:40Zby DEUTSCH, VICTOR EDUARDO.<br/><a href="https://learning.oreilly.com/library/view/~/9788411312585">https://learning.oreilly.com/library/view/~/9788411312585</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788411312585/?ar">https://go.oreilly.com/library-access/library/view/-/9788411312585/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788411312585/?ar">https://learning.oreilly.com/library/view/~/9788411312585/?ar</a><br/>Format: Electronic Resources<br/>Security Sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:659502024-06-21T04:39:40Z2024-06-21T04:39:40Zby Andrâes, Steven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836012">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Client-Honeypots : Exploring Malicious Websites.ent://SD_ILS/0/SD_ILS:12611762024-06-21T04:39:40Z2024-06-21T04:39:40Zby Göbel, Jan Gerrit.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1348689">Click to View</a><br/>Format: Electronic Resources<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:657532024-06-21T04:39:40Z2024-06-21T04:39:40Zby Ahmad, David R. Mirza.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994701">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:655982024-06-21T04:39:40Z2024-06-21T04:39:40Zby Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Nokia network security solutions handbookent://SD_ILS/0/SD_ILS:659022024-06-21T04:39:40Z2024-06-21T04:39:40Zby Maxwell, Doug.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836708">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Network Security JumpStart : Computer and Network Security Basics.ent://SD_ILS/0/SD_ILS:11883262024-06-21T04:39:40Z2024-06-21T04:39:40Zby Strebe, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=272216">Click to View</a><br/>Format: Electronic Resources<br/>Security log management identifying patterns in the chaosent://SD_ILS/0/SD_ILS:659442024-06-21T04:39:40Z2024-06-21T04:39:40Zby Babbin, Jacob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0707/2006355064-d.html">http://www.loc.gov/catdir/enhancements/fy0707/2006355064-d.html</a><br/>Format: Electronic Resources<br/>Cisco Security.ent://SD_ILS/0/SD_ILS:13045032024-06-21T04:39:40Z2024-06-21T04:39:40Zby Bhatnagar, Kartik.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135750">Click to View</a><br/>Format: Electronic Resources<br/>Snort IDS and IPS toolkitent://SD_ILS/0/SD_ILS:641632024-06-21T04:39:40Z2024-06-21T04:39:40Zby Beale, Jay<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490993">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>SolarWinds Server & Application Monitor : Deployment and Administration.ent://SD_ILS/0/SD_ILS:12657472024-06-21T04:39:40Z2024-06-21T04:39:40Zby Brant, Justin M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1582950">Click to View</a><br/>Format: Electronic Resources<br/>Communications and Information Infrastructure Security.ent://SD_ILS/0/SD_ILS:12665072024-06-21T04:39:40Z2024-06-21T04:39:40Zby Voeller, John G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1598810">Click to View</a><br/>Format: Electronic Resources<br/>Intrusion Detection : A Machine Learning Approach.ent://SD_ILS/0/SD_ILS:12309162024-06-21T04:39:40Z2024-06-21T04:39:40Zby Tsai, Jeffrey J.P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=737642">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity for Executives : A Practical Guide.ent://SD_ILS/0/SD_ILS:12727772024-06-21T04:39:40Z2024-06-21T04:39:40Zby Touhill, Gregory J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1707094">Click to View</a><br/>Format: Electronic Resources<br/>Network and System Security.ent://SD_ILS/0/SD_ILS:12616822024-06-21T04:39:40Z2024-06-21T04:39:40Zby Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1364061">Click to View</a><br/>Format: Electronic Resources<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:22059732024-06-21T04:39:40Z2024-06-21T04:39:40Zby Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1036349">Click to View</a><br/>Format: Electronic Resources<br/>SELinux cookbook : over 70 hands-on recipes to develop fully functional policies to confine your applications and users using SELinuxent://SD_ILS/0/SD_ILS:22707192024-06-21T04:39:40Z2024-06-21T04:39:40Zby Vermeulen, Sven, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1797263">Click to View</a><br/>Format: Electronic Resources<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:21254512024-06-21T04:39:40Z2024-06-21T04:39:40Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=625004">Click to View</a><br/>Format: Electronic Resources<br/>Computer security and encryption : an introductionent://SD_ILS/0/SD_ILS:22376602024-06-21T04:39:40Z2024-06-21T04:39:40Zby Chauhan, S. R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6404902">Click to View</a><br/>Format: Electronic Resources<br/>Web application security is a stack : how to CYA (Cover Your Apps) completelyent://SD_ILS/0/SD_ILS:22089712024-06-21T04:39:40Z2024-06-21T04:39:40Zby Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192126">Click to View</a><br/>Format: Electronic Resources<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:21108552024-06-21T04:39:40Z2024-06-21T04:39:40Zby Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192124">Click to View</a><br/>Format: Electronic Resources<br/>Silence on the wire a field guide to passive reconnaissance and indirect attacksent://SD_ILS/0/SD_ILS:20476512024-06-21T04:39:40Z2024-06-21T04:39:40Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273504">Click to View</a><br/>Format: Electronic Resources<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:21329282024-06-21T04:39:40Z2024-06-21T04:39:40Zby Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4987646">Click to View</a><br/>Format: Electronic Resources<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:22102642024-06-21T04:39:40Z2024-06-21T04:39:40Zby Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556899">Click to View</a><br/>Format: Electronic Resources<br/>Security and privacy in the digital era. Volume 1ent://SD_ILS/0/SD_ILS:20609152024-06-21T04:39:40Z2024-06-21T04:39:40Zby Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4648717">Click to View</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:20483782024-06-21T04:39:40Z2024-06-21T04:39:40Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=453166">Click to View</a><br/>Format: Electronic Resources<br/>Misuse of Information Systems : The Impact of Security Countermeasures.ent://SD_ILS/0/SD_ILS:12911772024-06-21T04:39:40Z2024-06-21T04:39:40Zby D'Arcy, John P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3016826">Click to View</a><br/>Format: Electronic Resources<br/>Software update as a mechanism for resilience and security : proceedings of a Workshop.ent://SD_ILS/0/SD_ILS:20137242024-06-21T04:39:40Z2024-06-21T04:39:40Zby Johnson, Anne Frances, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Software-Update-as-a-Mechanism-for-Resilience-and-Security.pdf">An electronic book accessible through the World Wide Web; click for information.</a>
<a href="http://doi.org/10.17226/24833">http://doi.org/10.17226/24833</a><br/>Format: Electronic Resources<br/>The Essential Guide to Home Computer Security.ent://SD_ILS/0/SD_ILS:12356562024-06-21T04:39:40Z2024-06-21T04:39:40Zby R. Rowlingson, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=811317">Click to View</a><br/>Format: Electronic Resources<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:657282024-06-21T04:39:40Z2024-06-21T04:39:40Zby Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:659072024-06-21T04:39:40Z2024-06-21T04:39:40Zby Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Snort Intrusion Detection 2.0.ent://SD_ILS/0/SD_ILS:11921112024-06-21T04:39:40Z2024-06-21T04:39:40Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294371">Click to View</a><br/>Format: Electronic Resources<br/>Hack the stack using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:642272024-06-21T04:39:40Z2024-06-21T04:39:40Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Network Security.ent://SD_ILS/0/SD_ILS:12768532024-06-21T04:39:40Z2024-06-21T04:39:40Zby Perez, André.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1800888">Click to View</a><br/>Format: Electronic Resources<br/>Threat Modeling : Designing for Security.ent://SD_ILS/0/SD_ILS:12679162024-06-21T04:39:40Z2024-06-21T04:39:40Zby Shostack, Adam.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1629177">Click to View</a><br/>Format: Electronic Resources<br/>Practice of Network Security Monitoring : Understanding Incident Detection and Response.ent://SD_ILS/0/SD_ILS:12649952024-06-21T04:39:40Z2024-06-21T04:39:40Zby Bejtlich, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1572876">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity Operations Handbook : the definitive reference on operational cybersecurity.ent://SD_ILS/0/SD_ILS:11951102024-06-21T04:39:40Z2024-06-21T04:39:40Zby Rittinghouse, PhD, CISM, John.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=313612">Click to View</a><br/>Format: Electronic Resources<br/>Network forensicsent://SD_ILS/0/SD_ILS:22800782024-06-21T04:39:40Z2024-06-21T04:39:40Zby Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=7104514">Click to View</a><br/>Format: Electronic Resources<br/>Federated identity primerent://SD_ILS/0/SD_ILS:22060712024-06-21T04:39:40Z2024-06-21T04:39:40Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1081145">Click to View</a><br/>Format: Electronic Resources<br/>Cyber guerillaent://SD_ILS/0/SD_ILS:22102812024-06-21T04:39:40Z2024-06-21T04:39:40Zby Haaster, Jelle van, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4557157">Click to View</a><br/>Format: Electronic Resources<br/>How to defeat advanced malware : new tools for protection and forensicsent://SD_ILS/0/SD_ILS:20977262024-06-21T04:39:40Z2024-06-21T04:39:40Zby Dalziel, Max, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1888756">Click to View</a><br/>Format: Electronic Resources<br/>New solutions for cybersecurityent://SD_ILS/0/SD_ILS:22201952024-06-21T04:39:40Z2024-06-21T04:39:40Zby Shrobe, Howard E., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5240456">Click to View</a><br/>Format: Electronic Resources<br/>Managing online risk : apps, mobile, and social media securityent://SD_ILS/0/SD_ILS:22081372024-06-21T04:39:40Z2024-06-21T04:39:40Zby Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1798304">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security : the complete guide to cyber threats and protectionent://SD_ILS/0/SD_ILS:23569992024-06-21T04:39:40Z2024-06-21T04:39:40Zby Sutton, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=7146447">Click to View</a><br/>Format: Electronic Resources<br/>OPNsense Beginner to Professional : Protect Networks and Build Next-Generation Firewalls Easily with OPNsenseent://SD_ILS/0/SD_ILS:23332042024-06-21T04:39:40Z2024-06-21T04:39:40Zby Camargo, Julio Cesar Bueno de.<br/><a href="https://learning.oreilly.com/library/view/~/9781801816878/?ar">https://learning.oreilly.com/library/view/~/9781801816878/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801816878">https://learning.oreilly.com/library/view/~/9781801816878</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801816878/?ar">https://go.oreilly.com/library-access/library/view/-/9781801816878/?ar</a><br/>Format: Electronic Resources<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:657392024-06-21T04:39:40Z2024-06-21T04:39:40Zby Henmi, Anne.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490887">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>How to cheat at designing security for a Windows server 2003 networkent://SD_ILS/0/SD_ILS:656672024-06-21T04:39:40Z2024-06-21T04:39:40Zby Amini, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Ethereal packet sniffingent://SD_ILS/0/SD_ILS:656452024-06-21T04:39:40Z2024-06-21T04:39:40Zby Orebaugh, Angela.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Configuring Juniper Networks NetScreen & SSG firewallsent://SD_ILS/0/SD_ILS:641752024-06-21T04:39:40Z2024-06-21T04:39:40Zby Cameron, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Configuring Check Point NGX VPN-1/fire wall-ent://SD_ILS/0/SD_ILS:656622024-06-21T04:39:40Z2024-06-21T04:39:40Zby Stephens, Robert.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:657872024-06-21T04:39:40Z2024-06-21T04:39:40Zby Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:641782024-06-21T04:39:40Z2024-06-21T04:39:40Zby Alder, Raven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Cyber Security and Resiliency Policy Framework.ent://SD_ILS/0/SD_ILS:12774872024-06-21T04:39:40Z2024-06-21T04:39:40Zby Vaseashta, A.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1818046">Click to View</a><br/>Format: Electronic Resources<br/>ISA server and beyond real world security solutions for Microsoft enterprise networksent://SD_ILS/0/SD_ILS:657062024-06-21T04:39:40Z2024-06-21T04:39:40Zby Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836661">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Internet Security You Can Afford.ent://SD_ILS/0/SD_ILS:13054092024-06-21T04:39:40Z2024-06-21T04:39:40Zby Dawson, Christopher.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136769">Click to View</a><br/>Format: Electronic Resources<br/>Artificial intelligence, cybersecurity and cyber defenseent://SD_ILS/0/SD_ILS:22748782024-06-21T04:39:40Z2024-06-21T04:39:40Zby Ventre, Daniel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6384365">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Security.ent://SD_ILS/0/SD_ILS:12665062024-06-21T04:39:40Z2024-06-21T04:39:40Zby Voeller, John G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1598809">Click to View</a><br/>Format: Electronic Resources<br/>Hands on hackingent://SD_ILS/0/SD_ILS:22746992024-06-21T04:39:40Z2024-06-21T04:39:40Zby Hickey, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6301556">Click to View</a><br/>Format: Electronic Resources<br/>Security technology convergence insightsent://SD_ILS/0/SD_ILS:22085782024-06-21T04:39:40Z2024-06-21T04:39:40Zby Bernard, Ray, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2008287">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity : Managing Systems, Conducting Testing, and Investigating Intrusions.ent://SD_ILS/0/SD_ILS:12635962024-06-21T04:39:40Z2024-06-21T04:39:40Zby Mowbray, Thomas J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1481185">Click to View</a><br/>Format: Electronic Resources<br/>The business of cybersecurity : foundations and ideologiesent://SD_ILS/0/SD_ILS:21569012024-06-21T04:39:40Z2024-06-21T04:39:40Zby Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5770273">Click to View</a><br/>Format: Electronic Resources<br/>Smart cities cybersecurity and privacyent://SD_ILS/0/SD_ILS:22158832024-06-21T04:39:40Z2024-06-21T04:39:40Zby Kayhan Zrar Ghafoor, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5609779">Click to View</a><br/>Format: Electronic Resources<br/>Hands-on incident response and digital forensicsent://SD_ILS/0/SD_ILS:22678472024-06-21T04:39:40Z2024-06-21T04:39:40Zby Sheward, Mike, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5614288">Click to View</a><br/>Format: Electronic Resources<br/>IoT security issuesent://SD_ILS/0/SD_ILS:20621952024-06-21T04:39:40Z2024-06-21T04:39:40Zby Gilchrist, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4810138">Click to View</a><br/>Format: Electronic Resources<br/>IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodellent://SD_ILS/0/SD_ILS:21213252024-06-21T04:39:40Z2024-06-21T04:39:40Zby Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4830572">Click to View</a><br/>Format: Electronic Resources<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:22061652024-06-21T04:39:40Z2024-06-21T04:39:40Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115167">Click to View</a><br/>Format: Electronic Resources<br/>UTM security with Fortinet Mastering FortiOSent://SD_ILS/0/SD_ILS:22060322024-06-21T04:39:40Z2024-06-21T04:39:40Zby Tam, Kenneth.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1068442">Click to View</a><br/>Format: Electronic Resources<br/>Security for service oriented systemsent://SD_ILS/0/SD_ILS:21254562024-06-21T04:39:40Z2024-06-21T04:39:40Zby Thuraisingham, Bhavani M.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=631696">Click to View</a><br/>Format: Electronic Resources<br/>Advanced penetration testing : hacking the world's most secure networksent://SD_ILS/0/SD_ILS:20994712024-06-21T04:39:40Z2024-06-21T04:39:40Zby Allsopp, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4813145">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity and human rights in the age of cyberveillanceent://SD_ILS/0/SD_ILS:22641052024-06-21T04:39:40Z2024-06-21T04:39:40Zby Kulesza, Joanna, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4098051">Click to View</a><br/>Format: Electronic Resources<br/>Conducting network penetration and espionage in a global environmentent://SD_ILS/0/SD_ILS:22704352024-06-21T04:39:40Z2024-06-21T04:39:40Zby Middleton, Bruce, 1953- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1591686">Click to View</a><br/>Format: Electronic Resources<br/>The benefits and security risks of web-based applications for business trend reportent://SD_ILS/0/SD_ILS:22063752024-06-21T04:39:40Z2024-06-21T04:39:40Zby Kotwica, Kathleen.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1210948">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Metasploit.ent://SD_ILS/0/SD_ILS:12662182024-06-21T04:39:40Z2024-06-21T04:39:40Zby Jaswal, Nipun.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1593853">Click to View</a><br/>Format: Electronic Resources<br/>Understanding security issuesent://SD_ILS/0/SD_ILS:21445942024-06-21T04:39:40Z2024-06-21T04:39:40Zby Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157542">Click to View</a><br/>Format: Electronic Resources<br/>Security and resilience in intelligent data-centric systems and communication networksent://SD_ILS/0/SD_ILS:22131042024-06-21T04:39:40Z2024-06-21T04:39:40Zby Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5090270">Click to View</a><br/>Format: Electronic Resources<br/>Security operations center guidebook : a practical guide for a successful SOCent://SD_ILS/0/SD_ILS:22123322024-06-21T04:39:40Z2024-06-21T04:39:40Zby Jarpey, Gregory , author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4862661">Click to View</a><br/>Format: Electronic Resources<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:22098142024-06-21T04:39:40Z2024-06-21T04:39:40Zby Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452265">Click to View</a><br/>Format: Electronic Resources<br/>PCI compliance : understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:20976542024-06-21T04:39:40Z2024-06-21T04:39:40Zby Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1832710">Click to View</a><br/>Format: Electronic Resources<br/>Managing Information Security.ent://SD_ILS/0/SD_ILS:12615602024-06-21T04:39:40Z2024-06-21T04:39:40Zby Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1357643">Click to View</a><br/>Format: Electronic Resources<br/>Internet of things security : fundamentals, techniques and applicationsent://SD_ILS/0/SD_ILS:22310652024-06-21T04:39:40Z2024-06-21T04:39:40Zby Shandilya, Shishir K., editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5493971">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux - the ultimate hackers' arsenalent://SD_ILS/0/SD_ILS:22666852024-06-21T04:39:40Z2024-06-21T04:39:40Zby Velu, Vijay Kumar, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4898742">Click to View</a><br/>Format: Electronic Resources<br/>Network security a practical guideent://SD_ILS/0/SD_ILS:20478022024-06-21T04:39:40Z2024-06-21T04:39:40Zby Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=298471">Click to View</a><br/>Format: Electronic Resources<br/>Mobilita, sicurezza e nuove frontiere tecnologicheent://SD_ILS/0/SD_ILS:22411882024-06-21T04:39:40Z2024-06-21T04:39:40Zby Militello, Vincenzo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5662503">Click to View</a><br/>Format: Electronic Resources<br/>Insider threatsent://SD_ILS/0/SD_ILS:22726222024-06-21T04:39:40Z2024-06-21T04:39:40Zby Arduin, Pierre-Emmanuel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5323674">Click to View</a><br/>Format: Electronic Resources<br/>Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbixent://SD_ILS/0/SD_ILS:13867032024-06-21T04:39:40Z2024-06-21T04:39:40Zby Vacche, Andrea Dalle, author.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1973849">Click to View</a><br/>Format: Electronic Resources<br/>Empirical research for software security : foundations and experienceent://SD_ILS/0/SD_ILS:21086702024-06-21T04:39:40Z2024-06-21T04:39:40Zby ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5164090">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity For Dummiesent://SD_ILS/0/SD_ILS:23328722024-06-21T04:39:40Z2024-06-21T04:39:40Zby Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119867180">https://learning.oreilly.com/library/view/~/9781119867180</a>
<a href="https://learning.oreilly.com/library/view/~/9781119867180/?ar">https://learning.oreilly.com/library/view/~/9781119867180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar">https://go.oreilly.com/library-access/library/view/-/9781119867180/?ar</a><br/>Format: Electronic Resources<br/>Diving into secure access service Edge : a technical leadership guide to achieving success with sase at market speedent://SD_ILS/0/SD_ILS:23350812024-06-21T04:39:40Z2024-06-21T04:39:40Zby Ginn, Jeremiah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803242170/?ar">https://go.oreilly.com/library-access/library/view/-/9781803242170/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242170">https://learning.oreilly.com/library/view/~/9781803242170</a>
<a href="https://learning.oreilly.com/library/view/~/9781803242170/?ar">https://learning.oreilly.com/library/view/~/9781803242170/?ar</a><br/>Format: Electronic Resources<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:657722024-06-21T04:39:40Z2024-06-21T04:39:40Zby Bendell, Dan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Toward a Safer and More Secure Cyberspace.ent://SD_ILS/0/SD_ILS:13201382024-06-21T04:39:40Z2024-06-21T04:39:40Zby Committee on Improving Cybersecurity Research in the United States, National Research Council.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3378311">Click to View</a><br/>Format: Electronic Resources<br/>UTM security with Fortinet Mastering FortiOSent://SD_ILS/0/SD_ILS:4788052024-06-21T04:39:40Z2024-06-21T04:39:40Zby Tam, Kenneth.<br/>Knovel <a href="http://app.knovel.com/hotlink/toc/id:kpUTMSFMF4/utm-security-with">http://app.knovel.com/hotlink/toc/id:kpUTMSFMF4/utm-security-with</a><br/>Format: Electronic Resources<br/>Managing and securing a Cisco structured wireless-aware networkent://SD_ILS/0/SD_ILS:656852024-06-21T04:39:40Z2024-06-21T04:39:40Zby Wall, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266917">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013.ent://SD_ILS/0/SD_ILS:12745852024-06-21T04:39:40Z2024-06-21T04:39:40Zby Furnell, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1752831">Click to View</a><br/>Format: Electronic Resources<br/>Asterisk hackingent://SD_ILS/0/SD_ILS:642372024-06-21T04:39:40Z2024-06-21T04:39:40Zby Brashars, Joshua.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Wireless operational securityent://SD_ILS/0/SD_ILS:660872024-06-21T04:39:40Z2024-06-21T04:39:40Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Cisco Pix firewalls configure, manage, & troubleshootent://SD_ILS/0/SD_ILS:656942024-06-21T04:39:40Z2024-06-21T04:39:40Zby Behrens, Thorsten.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Web Security Basics.ent://SD_ILS/0/SD_ILS:13044592024-06-21T04:39:40Z2024-06-21T04:39:40Zby Bhasin, Shweta.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135706">Click to View</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkit.ent://SD_ILS/0/SD_ILS:657972024-06-21T04:39:40Z2024-06-21T04:39:40Zby Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:642292024-06-21T04:39:40Z2024-06-21T04:39:40Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Policy-based network management solutions for the next generationent://SD_ILS/0/SD_ILS:659142024-06-21T04:39:40Z2024-06-21T04:39:40Zby Strassner, John C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608597">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2003107477.html">http://www.loc.gov/catdir/description/els031/2003107477.html</a><br/>Format: Electronic Resources<br/>Configuring Symantec AntiVirus corporate editionent://SD_ILS/0/SD_ILS:655772024-06-21T04:39:40Z2024-06-21T04:39:40Zby Hunter, Laura E.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:656262024-06-21T04:39:40Z2024-06-21T04:39:40Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2003051481.html">http://www.loc.gov/catdir/description/els031/2003051481.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2003051481.html">http://www.loc.gov/catdir/toc/els031/2003051481.html</a><br/>Format: Electronic Resources<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:22081452024-06-21T04:39:40Z2024-06-21T04:39:40Zby Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1798312">Click to View</a><br/>Format: Electronic Resources<br/>Network security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:642842024-06-21T04:39:40Z2024-06-21T04:39:40Zby Manzuik, Steve.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Intelligent network management and control : intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radioent://SD_ILS/0/SD_ILS:23580962024-06-21T04:39:40Z2024-06-21T04:39:40Zby Benmammar, Badr, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6522998">Click to View</a><br/>Format: Electronic Resources<br/>Dns security : defending the domain name systement://SD_ILS/0/SD_ILS:22102632024-06-21T04:39:40Z2024-06-21T04:39:40Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4556898">Click to View</a><br/>Format: Electronic Resources<br/>How to cheat at Voip securityent://SD_ILS/0/SD_ILS:642262024-06-21T04:39:40Z2024-06-21T04:39:40Zby Porter, Thomas, PhD.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Computer Forensics with FTK.ent://SD_ILS/0/SD_ILS:12695842024-06-21T04:39:40Z2024-06-21T04:39:40Zby Carbone, Fernando.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1657797">Click to View</a><br/>Format: Electronic Resources<br/>Disappearing cryptography information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:656792024-06-21T04:39:40Z2024-06-21T04:39:40Zby Wayner, Peter, 1964-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2001099790.html">http://www.loc.gov/catdir/description/els031/2001099790.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2001099790.html">http://www.loc.gov/catdir/toc/els031/2001099790.html</a><br/>Format: Electronic Resources<br/>Data Visualization, Part 2 : New Directions for Evaluation, Number 140.ent://SD_ILS/0/SD_ILS:12654882024-06-21T04:39:40Z2024-06-21T04:39:40Zby Azzam, Tarek.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1579356">Click to View</a><br/>Format: Electronic Resources<br/>Information security best practices 205 basic rulesent://SD_ILS/0/SD_ILS:650922024-06-21T04:39:40Z2024-06-21T04:39:40Zby Stefanek, George L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2002016635.html">http://www.loc.gov/catdir/description/els031/2002016635.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2002016635.html">http://www.loc.gov/catdir/toc/els031/2002016635.html</a><br/>Format: Electronic Resources<br/>Microsoft DirectAccess Best Practices and Troubleshooting.ent://SD_ILS/0/SD_ILS:12622132024-06-21T04:39:40Z2024-06-21T04:39:40Zby Krause, Jordan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1389355">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to network security : theory and practiceent://SD_ILS/0/SD_ILS:23112862024-06-21T04:39:40Z2024-06-21T04:39:40Zby Wang, Jie, 1961- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118939482/?ar">https://go.oreilly.com/library-access/library/view/-/9781118939482/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118939482/?ar">https://learning.oreilly.com/library/view/~/9781118939482/?ar</a><br/>Format: Electronic Resources<br/>Network and system securityent://SD_ILS/0/SD_ILS:23011702024-06-21T04:39:40Z2024-06-21T04:39:40Zby Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124166899/?ar">https://learning.oreilly.com/library/view/~/9780124166899/?ar</a><br/>Format: Electronic Resources<br/>Network and data security for non-engineersent://SD_ILS/0/SD_ILS:23160462024-06-21T04:39:40Z2024-06-21T04:39:40Zby Groom, Frank M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781315350219/?ar">https://go.oreilly.com/library-access/library/view/-/9781315350219/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315350219/?ar">https://learning.oreilly.com/library/view/~/9781315350219/?ar</a><br/>Format: Electronic Resources<br/>The practice of network security monitoringent://SD_ILS/0/SD_ILS:23002322024-06-21T04:39:40Z2024-06-21T04:39:40Zby Bejtlich, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457185175/?ar">https://go.oreilly.com/library-access/library/view/-/9781457185175/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457185175/?ar">https://learning.oreilly.com/library/view/~/9781457185175/?ar</a><br/>Format: Electronic Resources<br/>Network security : a practical approachent://SD_ILS/0/SD_ILS:22969282024-06-21T04:39:40Z2024-06-21T04:39:40Zby Harrington, Jan L.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123116338/?ar">https://go.oreilly.com/library-access/library/view/-/9780123116338/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123116338/?ar">https://learning.oreilly.com/library/view/~/9780123116338/?ar</a><br/>Format: Electronic Resources<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:642702024-06-21T04:39:40Z2024-06-21T04:39:40Zby Contos, Brian T.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Beyond Cybersecurity : Protecting Your Digital Business.ent://SD_ILS/0/SD_ILS:12800882024-06-21T04:39:40Z2024-06-21T04:39:40Zby Kaplan, James M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1895275">Click to View</a><br/>Format: Electronic Resources<br/>IBM Mainframe Security : Beyond the Basics—A Practical Guide from a z/OS and RACF Perspective.ent://SD_ILS/0/SD_ILS:12625912024-06-21T04:39:40Z2024-06-21T04:39:40Zby Dattani, Dinesh D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1411689">Click to View</a><br/>Format: Electronic Resources<br/>Network security technologies and solutionsent://SD_ILS/0/SD_ILS:22854042024-06-21T04:39:40Z2024-06-21T04:39:40Zby Bhaiji, Fahim Hussain Yusuf.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780768681963/?ar">https://go.oreilly.com/library-access/library/view/-/9780768681963/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768681963/?ar">https://learning.oreilly.com/library/view/~/9780768681963/?ar</a><br/>Format: Electronic Resources<br/>Hacking with Kali : Practical Penetration Testing Techniques.ent://SD_ILS/0/SD_ILS:12534972024-06-21T04:39:40Z2024-06-21T04:39:40Zby Broad, James.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115177">Click to View</a><br/>Format: Electronic Resources<br/>IBM WebSphere Application Server v7.0 Security.ent://SD_ILS/0/SD_ILS:12451292024-06-21T04:39:40Z2024-06-21T04:39:40Zby Siliceo, Omar.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=943983">Click to View</a><br/>Format: Electronic Resources<br/>Hackingent://SD_ILS/0/SD_ILS:23328862024-06-21T04:39:40Z2024-06-21T04:39:40Zby Beaver, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119872191">https://learning.oreilly.com/library/view/~/9781119872191</a>
<a href="https://learning.oreilly.com/library/view/~/9781119872191/?ar">https://learning.oreilly.com/library/view/~/9781119872191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar">https://go.oreilly.com/library-access/library/view/-/9781119872191/?ar</a><br/>Format: Electronic Resources<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:23236272024-06-21T04:39:40Z2024-06-21T04:39:40Zby Sadiqui, Ali, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar">https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786305275">https://learning.oreilly.com/library/view/~/9781786305275</a>
<a href="https://learning.oreilly.com/library/view/~/9781786305275/?ar">https://learning.oreilly.com/library/view/~/9781786305275/?ar</a><br/>Format: Electronic Resources<br/>Developing and evaluating security-aware software systemsent://SD_ILS/0/SD_ILS:4763732024-06-21T04:39:40Z2024-06-21T04:39:40Zby Khan, Khaled M., 1959- editor.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/</a><br/>Format: Electronic Resources<br/>Security monitoringent://SD_ILS/0/SD_ILS:22860502024-06-21T04:39:40Z2024-06-21T04:39:40Zby Fry, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780596157944/?ar">https://learning.oreilly.com/library/view/~/9780596157944/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596157944">https://learning.oreilly.com/library/view/~/9780596157944</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar">https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar</a><br/>Format: Electronic Resources<br/>Network security assessmentent://SD_ILS/0/SD_ILS:22839252024-06-21T04:39:40Z2024-06-21T04:39:40Zby McNab, Chris (Chris R.), 1980-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596510305/?ar">https://go.oreilly.com/library-access/library/view/-/9780596510305/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596510305/?ar">https://learning.oreilly.com/library/view/~/9780596510305/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596510305">https://learning.oreilly.com/library/view/~/9780596510305</a><br/>Format: Electronic Resources<br/>Inside network perimeter securityent://SD_ILS/0/SD_ILS:22833652024-06-21T04:39:40Z2024-06-21T04:39:40Zby Northcutt, Stephen.<br/><a href="https://learning.oreilly.com/library/view/~/0672327376">https://learning.oreilly.com/library/view/~/0672327376</a>
<a href="https://learning.oreilly.com/library/view/~/0672327376/?ar">https://learning.oreilly.com/library/view/~/0672327376/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672327376/?ar">https://go.oreilly.com/library-access/library/view/-/0672327376/?ar</a><br/>Format: Electronic Resources<br/>Cyber Security and IT Infrastructure Protection.ent://SD_ILS/0/SD_ILS:12619622024-06-21T04:39:40Z2024-06-21T04:39:40Zby Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1377640">Click to View</a><br/>Format: Electronic Resources<br/>Computer and Information Security Handbook.ent://SD_ILS/0/SD_ILS:12586122024-06-21T04:39:40Z2024-06-21T04:39:40Zby Vacca, John R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1195617">Click to View</a><br/>Format: Electronic Resources<br/>Distributed Security and High Availability with Tivoli Access Manager and WebSphere Application Server for z/OS.ent://SD_ILS/0/SD_ILS:13099932024-06-21T04:39:40Z2024-06-21T04:39:40Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306602">Click to View</a><br/>Format: Electronic Resources<br/>Practical vulnerability management : a strategic approach to managing cyber riskent://SD_ILS/0/SD_ILS:23258672024-06-21T04:39:40Z2024-06-21T04:39:40Zby Magnusson, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125707/?ar">https://learning.oreilly.com/library/view/~/9781098125707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125707">https://learning.oreilly.com/library/view/~/9781098125707</a><br/>Format: Electronic Resources<br/>The Tao of Network Security Monitoring Beyond Intrusion Detectionent://SD_ILS/0/SD_ILS:23197682024-06-21T04:39:40Z2024-06-21T04:39:40Zby Bejtlich, Richard, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321246772/?ar">https://go.oreilly.com/library-access/library/view/-/0321246772/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321246772/?ar">https://learning.oreilly.com/library/view/~/0321246772/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321246772">https://learning.oreilly.com/library/view/~/0321246772</a><br/>Format: Electronic Resources<br/>End-to-end network security : defense-in-depthent://SD_ILS/0/SD_ILS:22840522024-06-21T04:39:40Z2024-06-21T04:39:40Zby Santos, Omar.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587053320/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053320/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587053320/?ar">https://learning.oreilly.com/library/view/~/9781587053320/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587053320">https://learning.oreilly.com/library/view/~/9781587053320</a><br/>Format: Electronic Resources<br/>Self-defending networks : the next generation of network securityent://SD_ILS/0/SD_ILS:22827902024-06-21T04:39:40Z2024-06-21T04:39:40Zby De Capite, Duane.<br/><a href="https://learning.oreilly.com/library/view/~/1587052539/?ar">https://learning.oreilly.com/library/view/~/1587052539/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587052539/?ar">https://go.oreilly.com/library-access/library/view/-/1587052539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587052539">https://learning.oreilly.com/library/view/~/1587052539</a><br/>Format: Electronic Resources<br/>The Practice of Network Security : Deployment Strategies for Production Environments.ent://SD_ILS/0/SD_ILS:23179042024-06-21T04:39:40Z2024-06-21T04:39:40Zby Liska, Allan, author.<br/><a href="https://learning.oreilly.com/library/view/~/0130462233">https://learning.oreilly.com/library/view/~/0130462233</a>
<a href="https://learning.oreilly.com/library/view/~/0130462233/?ar">https://learning.oreilly.com/library/view/~/0130462233/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0130462233/?ar">https://go.oreilly.com/library-access/library/view/-/0130462233/?ar</a><br/>Format: Electronic Resources<br/>Cyberspace and cybersecurityent://SD_ILS/0/SD_ILS:22607692024-06-21T04:39:40Z2024-06-21T04:39:40Zby Kostopoulos, George K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5110029">Click to View</a><br/>Format: Electronic Resources<br/>Cybercrime and business : strategies for global corporate securityent://SD_ILS/0/SD_ILS:22123622024-06-21T04:39:40Z2024-06-21T04:39:40Zby Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4863624">Click to View</a><br/>Format: Electronic Resources<br/>Security for service oriented architecturesent://SD_ILS/0/SD_ILS:22703852024-06-21T04:39:40Z2024-06-21T04:39:40Zby Williams, Walter (Telecommunications engineer), author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1564631">Click to View</a><br/>Format: Electronic Resources<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:659192024-06-21T04:39:40Z2024-06-21T04:39:40Zby Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Rewired cybersecurity governanceent://SD_ILS/0/SD_ILS:22734242024-06-21T04:39:40Z2024-06-21T04:39:40Zby Ellis, Ryan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5761058">Click to View</a><br/>Format: Electronic Resources<br/>Building a corporate culture of security : strategies for strengthening organizational resiliencyent://SD_ILS/0/SD_ILS:22097382024-06-21T04:39:40Z2024-06-21T04:39:40Zby Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4425984">Click to View</a><br/>Format: Electronic Resources<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:22089652024-06-21T04:39:40Z2024-06-21T04:39:40Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format: Electronic Resources<br/>Online security for the business travelerent://SD_ILS/0/SD_ILS:22078302024-06-21T04:39:40Z2024-06-21T04:39:40Zby Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1772301">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:20522822024-06-21T04:39:40Z2024-06-21T04:39:40Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137538">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:20476392024-06-21T04:39:40Z2024-06-21T04:39:40Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273488">Click to View</a><br/>Format: Electronic Resources<br/>Network Interdiction and Stochastic Integer Programming.ent://SD_ILS/0/SD_ILS:12968572024-06-21T04:39:40Z2024-06-21T04:39:40Zby Woodruff, David L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3036010">Click to View</a><br/>Format: Electronic Resources<br/>Cisco Security Professional's Guide to Secure Intrusion Detection Systems.ent://SD_ILS/0/SD_ILS:11919952024-06-21T04:39:40Z2024-06-21T04:39:40Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294035">Click to View</a><br/>Format: Electronic Resources<br/>IT-Sicherheit : Eine Einführungent://SD_ILS/0/SD_ILS:21225202024-06-21T04:39:40Z2024-06-21T04:39:40Zby Hellmann, Roland, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5157634">Click to View</a><br/>Format: Electronic Resources<br/>Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniquesent://SD_ILS/0/SD_ILS:20979712024-06-21T04:39:40Z2024-06-21T04:39:40Zby Chauhan, Sudhanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2025500">Click to View</a><br/>Format: Electronic Resources<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:22073322024-06-21T04:39:40Z2024-06-21T04:39:40Zby Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1673591">Click to View</a><br/>Format: Electronic Resources<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:22067902024-06-21T04:39:40Z2024-06-21T04:39:40Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1573362">Click to View</a><br/>Format: Electronic Resources<br/>Practical VoIP securityent://SD_ILS/0/SD_ILS:659622024-06-21T04:39:40Z2024-06-21T04:39:40Zby Porter, Thomas, PhD.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>How to Cheat at Configuring ISA Server 2004.ent://SD_ILS/0/SD_ILS:11860652024-06-21T04:39:40Z2024-06-21T04:39:40Zby Littlejohn Shinder, Debra.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254853">Click to View</a><br/>Format: Electronic Resources<br/>Hack Proofing Windows 2000 Server.ent://SD_ILS/0/SD_ILS:11920432024-06-21T04:39:40Z2024-06-21T04:39:40Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294154">Click to View</a><br/>Format: Electronic Resources<br/>The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical securityent://SD_ILS/0/SD_ILS:22128452024-06-21T04:39:40Z2024-06-21T04:39:40Zby Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4981408">Click to View</a><br/>Format: Electronic Resources<br/>Applied network security : master the art of detecting and averting advanced network security attacks and techniquesent://SD_ILS/0/SD_ILS:21558962024-06-21T04:39:40Z2024-06-21T04:39:40Zby Salmon, Arthur, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4853051">Click to View</a><br/>Format: Electronic Resources<br/>Mastering identity and access management with Microsoft Azure : start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environmentsent://SD_ILS/0/SD_ILS:22355222024-06-21T04:39:40Z2024-06-21T04:39:40Zby Nickel, Jochen, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4709423">Click to View</a><br/>Format: Electronic Resources<br/>North Korea's cyber operations : strategy and responsesent://SD_ILS/0/SD_ILS:22643272024-06-21T04:39:40Z2024-06-21T04:39:40Zby Jun, Jenny, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4332477">Click to View</a><br/>Format: Electronic Resources<br/>Network Security Evaluation Using the NSA IEM : Using the NSA IEM.ent://SD_ILS/0/SD_ILS:11860542024-06-21T04:39:40Z2024-06-21T04:39:40Zby Rogers, Russ.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254842">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the Code : Auditor's Guide to Writing Secure Code for the Web.ent://SD_ILS/0/SD_ILS:11920482024-06-21T04:39:40Z2024-06-21T04:39:40Zby Burnett, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294160">Click to View</a><br/>Format: Electronic Resources<br/>Buffer Overflow Attacks : Detect, Exploit, Prevent.ent://SD_ILS/0/SD_ILS:11825002024-06-21T04:39:40Z2024-06-21T04:39:40Zby Deckard, Jason.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=222803">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linuxent://SD_ILS/0/SD_ILS:22716212024-06-21T04:39:40Z2024-06-21T04:39:40Zby Sak, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4520799">Click to View</a><br/>Format: Electronic Resources<br/>Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0ent://SD_ILS/0/SD_ILS:22717582024-06-21T04:39:40Z2024-06-21T04:39:40Zby Olups, Rihards, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4643698">Click to View</a><br/>Format: Electronic Resources<br/>Biohackers : The Politics of Open Science.ent://SD_ILS/0/SD_ILS:13229962024-06-21T04:39:40Z2024-06-21T04:39:40Zby Delfanti, Alessandro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3386719">Click to View</a><br/>Format: Electronic Resources<br/>IBM System z9 109 Technical Introduction.ent://SD_ILS/0/SD_ILS:13099732024-06-21T04:39:40Z2024-06-21T04:39:40Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306582">Click to View</a><br/>Format: Electronic Resources<br/>Security Sage's Guide to Hardening the Network Infrastructure.ent://SD_ILS/0/SD_ILS:11921082024-06-21T04:39:40Z2024-06-21T04:39:40Zby Andres, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294359">Click to View</a><br/>Format: Electronic Resources<br/>Security Risk Management : Building an Information Security Risk Management Program from the Ground Up.ent://SD_ILS/0/SD_ILS:12269432024-06-21T04:39:40Z2024-06-21T04:39:40Zby Wheeler, Evan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=685406">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Adversary Characterization : Auditing the Hacker Mind.ent://SD_ILS/0/SD_ILS:11920122024-06-21T04:39:40Z2024-06-21T04:39:40Zby Parker, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294071">Click to View</a><br/>Format: Electronic Resources<br/>The Basics of Cyber Warfare : Understanding the Fundamentals of Cyber Warfare in Theory and Practice.ent://SD_ILS/0/SD_ILS:12514432024-06-21T04:39:40Z2024-06-21T04:39:40Zby Winterfeld, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073026">Click to View</a><br/>Format: Electronic Resources<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:21265082024-06-21T04:39:40Z2024-06-21T04:39:40Zby Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=826949">Click to View</a><br/>Format: Electronic Resources<br/>Web Hacking : Attacks and Defense.ent://SD_ILS/0/SD_ILS:23179722024-06-21T04:39:40Z2024-06-21T04:39:40Zby McClure, Stuart, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201761769/?ar">https://go.oreilly.com/library-access/library/view/-/0201761769/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201761769">https://learning.oreilly.com/library/view/~/0201761769</a>
<a href="https://learning.oreilly.com/library/view/~/0201761769/?ar">https://learning.oreilly.com/library/view/~/0201761769/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux CTF Blueprints.ent://SD_ILS/0/SD_ILS:12720992024-06-21T04:39:40Z2024-06-21T04:39:40Zby Buchanan, Cameron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1688607">Click to View</a><br/>Format: Electronic Resources<br/>Security in Wireless Networks and Mobile Platforms.ent://SD_ILS/0/SD_ILS:11975162024-06-21T04:39:40Z2024-06-21T04:39:40Zby Aissi, Selim.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338731">Click to View</a><br/>Format: Electronic Resources<br/>Network Security Foundations : Technology Fundamentals for IT Success.ent://SD_ILS/0/SD_ILS:11871342024-06-21T04:39:40Z2024-06-21T04:39:40Zby Strebe, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267332">Click to View</a><br/>Format: Electronic Resources<br/>Security Data Visualization : Graphical Techniques for Network Analysis.ent://SD_ILS/0/SD_ILS:12916132024-06-21T04:39:40Z2024-06-21T04:39:40Zby Conti, Greg.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3017625">Click to View</a><br/>Format: Electronic Resources<br/>Web Commerce Security : Design and Development.ent://SD_ILS/0/SD_ILS:12288842024-06-21T04:39:40Z2024-06-21T04:39:40Zby Nahari, Hadi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706729">Click to View</a><br/>Format: Electronic Resources<br/>Invasion of Privacy : Big Brother and the Company Hackers.ent://SD_ILS/0/SD_ILS:13043802024-06-21T04:39:40Z2024-06-21T04:39:40Zby Weber, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135625">Click to View</a><br/>Format: Electronic Resources<br/>The Basics of IT Audit : Purposes, Processes, and Practical Information.ent://SD_ILS/0/SD_ILS:12642472024-06-21T04:39:40Z2024-06-21T04:39:40Zby Gantz, Stephen D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1550527">Click to View</a><br/>Format: Electronic Resources<br/>Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infrastructure.ent://SD_ILS/0/SD_ILS:12534992024-06-21T04:39:40Z2024-06-21T04:39:40Zby Knapp, Eric D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115187">Click to View</a><br/>Format: Electronic Resources<br/>Trust and Security in Collaborative Computing.ent://SD_ILS/0/SD_ILS:12706882024-06-21T04:39:40Z2024-06-21T04:39:40Zby Zou, Xukai.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679354">Click to View</a><br/>Format: Electronic Resources<br/>Procuring penetration testing services.ent://SD_ILS/0/SD_ILS:21551952024-06-21T04:39:40Z2024-06-21T04:39:40Z<a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1778766">Click to View</a><br/>Format: Electronic Resources<br/>Security in fixed and wireless networksent://SD_ILS/0/SD_ILS:22799302024-06-21T04:39:40Z2024-06-21T04:39:40Zby Schafer, Gunter, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=7104366">Click to View</a><br/>Format: Electronic Resources<br/>Wireless communications security : solutions for the internet of thingsent://SD_ILS/0/SD_ILS:20610832024-06-21T04:39:40Z2024-06-21T04:39:40Zby Penttinen, Jyrki T. J., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4690021">Click to View</a><br/>Format: Electronic Resources<br/>Penetration testing bootcamp : quickly get up and running with pentesting techniquesent://SD_ILS/0/SD_ILS:22722242024-06-21T04:39:40Z2024-06-21T04:39:40Zby Beltrame, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4891268">Click to View</a><br/>Format: Electronic Resources<br/>Advanced persistent threat understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:22060462024-06-21T04:39:40Z2024-06-21T04:39:40Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073020">Click to View</a><br/>Format: Electronic Resources<br/>Iris biometric model for secured network accessent://SD_ILS/0/SD_ILS:21301262024-06-21T04:39:40Z2024-06-21T04:39:40Zby Khoury, Franjieh El.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1177222">Click to View</a><br/>Format: Electronic Resources<br/>Cisco PIX Firewalls : Configure / Manage / Troubleshoot.ent://SD_ILS/0/SD_ILS:11860472024-06-21T04:39:40Z2024-06-21T04:39:40Zby Browne, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254835">Click to View</a><br/>Format: Electronic Resources<br/>The complete Metasploit guide : explore effective penetration testing techniques with Metasploitent://SD_ILS/0/SD_ILS:22682362024-06-21T04:39:40Z2024-06-21T04:39:40Zby Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5802136">Click to View</a><br/>Format: Electronic Resources<br/>Windows 2012 server network security securing your windows network systems and infrastructureent://SD_ILS/0/SD_ILS:22061632024-06-21T04:39:40Z2024-06-21T04:39:40Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115160">Click to View</a><br/>Format: Electronic Resources<br/>Advances in cyber security : technology, operations, and experiencesent://SD_ILS/0/SD_ILS:13884052024-06-21T04:39:40Z2024-06-21T04:39:40Zby Hsu, D. Frank (Derbiau Frank), 1948- editor.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4803841">Click to View</a><br/>Format: Electronic Resources<br/>Botnets the killer web appent://SD_ILS/0/SD_ILS:642572024-06-21T04:39:40Z2024-06-21T04:39:40Zby Schiller, Craig A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Configuring NetScreen Firewalls.ent://SD_ILS/0/SD_ILS:11920052024-06-21T04:39:40Z2024-06-21T04:39:40Z<a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294055">Click to View</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:22074682024-06-21T04:39:40Z2024-06-21T04:39:40Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1699255">Click to View</a><br/>Format: Electronic Resources<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:642382024-06-21T04:39:40Z2024-06-21T04:39:40Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Network and security issues.ent://SD_ILS/0/SD_ILS:11911492024-06-21T04:39:40Z2024-06-21T04:39:40Zby Raitt, Dr. David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=289848">Click to View</a><br/>Format: Electronic Resources<br/>Cyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:655792024-06-21T04:39:40Z2024-06-21T04:39:40Zby Parker, Tom, 1982-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Internet security a jumpstart for systems administrators and IT managersent://SD_ILS/0/SD_ILS:656312024-06-21T04:39:40Z2024-06-21T04:39:40Zby Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003279708.html">http://www.loc.gov/catdir/description/els041/2003279708.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els041/2003279708.html">http://www.loc.gov/catdir/toc/els041/2003279708.html</a><br/>Format: Electronic Resources<br/>Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect itent://SD_ILS/0/SD_ILS:22656012024-06-21T04:39:40Z2024-06-21T04:39:40Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4662307">Click to View</a><br/>Format: Electronic Resources<br/>Use of Risk Analysis in Computer-Aided Persuasion.ent://SD_ILS/0/SD_ILS:12377402024-06-21T04:39:40Z2024-06-21T04:39:40Zby Duman, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=836226">Click to View</a><br/>Format: Electronic Resources<br/>Firewall Policies and VPN Configurations.ent://SD_ILS/0/SD_ILS:11883022024-06-21T04:39:40Z2024-06-21T04:39:40Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=272100">Click to View</a><br/>Format: Electronic Resources<br/>The Best Damn Firewall Book Period.ent://SD_ILS/0/SD_ILS:11921212024-06-21T04:39:40Z2024-06-21T04:39:40Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294396">Click to View</a><br/>Format: Electronic Resources<br/>Configuring SonicWALL Firewalls.ent://SD_ILS/0/SD_ILS:11862332024-06-21T04:39:40Z2024-06-21T04:39:40Zby Bendell, Dan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=256369">Click to View</a><br/>Format: Electronic Resources<br/>How to Cheat at Managing Information Security.ent://SD_ILS/0/SD_ILS:11868282024-06-21T04:39:40Z2024-06-21T04:39:40Zby Osborne, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=266207">Click to View</a><br/>Format: Electronic Resources<br/>Physical security for ITent://SD_ILS/0/SD_ILS:658502024-06-21T04:39:40Z2024-06-21T04:39:40Zby Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">An electronic book accessible through the World Wide Web; click for information</a>
Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip051/2004023167.html">http://www.loc.gov/catdir/toc/ecip051/2004023167.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0617/2004023167-d.html">http://www.loc.gov/catdir/enhancements/fy0617/2004023167-d.html</a><br/>Format: Electronic Resources<br/>Cyber resiliency with IBM QRadar and IBM Spectrum Virtualize for Public Cloud on Azure with IBM Copy Services Manager for Safeguarded Copyent://SD_ILS/0/SD_ILS:23338112024-06-21T04:39:40Z2024-06-21T04:39:40Zby International Business Machines Corporation, issuing body.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460628">https://learning.oreilly.com/library/view/~/9780738460628</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460628/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460628/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460628/?ar">https://learning.oreilly.com/library/view/~/9780738460628/?ar</a><br/>Format: Electronic Resources<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:22067942024-06-21T04:39:40Z2024-06-21T04:39:40Zby Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1574451">Click to View</a><br/>Format: Electronic Resources<br/>Building Virtual Pentesting Labs for Advanced Penetration Testing.ent://SD_ILS/0/SD_ILS:12688612024-06-21T04:39:40Z2024-06-21T04:39:40Zby Cardwell, Kevin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1644005">Click to View</a><br/>Format: Electronic Resources<br/>Web Penetration Testing with Kali Linux.ent://SD_ILS/0/SD_ILS:12627462024-06-21T04:39:40Z2024-06-21T04:39:40Zby Muniz, Joseph.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1420531">Click to View</a><br/>Format: Electronic Resources<br/>BackTrack 4 Assuring Security by Penetration Testing : Assuring Security by Penetration Testing.ent://SD_ILS/0/SD_ILS:12458232024-06-21T04:39:40Z2024-06-21T04:39:40Zby Ali, Shakeel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=950518">Click to View</a><br/>Format: Electronic Resources<br/>Network anomaly detection a machine learning perspectiveent://SD_ILS/0/SD_ILS:22700662024-06-21T04:39:40Z2024-06-21T04:39:40Zby Bhattacharyya, Dhruba K.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1316406">Click to View</a><br/>Format: Electronic Resources<br/>Industrial cybersecurity : efficiently secure critical infrastructure systemsent://SD_ILS/0/SD_ILS:22300282024-06-21T04:39:40Z2024-06-21T04:39:40Zby Ackerman, Pascal, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5110693">Click to View</a><br/>Format: Electronic Resources<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:22112802024-06-21T04:39:40Z2024-06-21T04:39:40Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4743573">Click to View</a><br/>Format: Electronic Resources<br/>Digital identity managementent://SD_ILS/0/SD_ILS:22085742024-06-21T04:39:40Z2024-06-21T04:39:40Zby Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2007485">Click to View</a><br/>Format: Electronic Resources<br/>Hacking Point of Sale : Payment Application Secrets, Threats, and Solutions.ent://SD_ILS/0/SD_ILS:12679142024-06-21T04:39:40Z2024-06-21T04:39:40Zby Gomzin, Slava.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1629175">Click to View</a><br/>Format: Electronic Resources<br/>Security Patterns in Practice : Designing Secure Architectures Using Software Patterns.ent://SD_ILS/0/SD_ILS:12598172024-06-21T04:39:40Z2024-06-21T04:39:40Zby Fernandez-Buglioni, Eduardo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1245159">Click to View</a><br/>Format: Electronic Resources<br/>Digital forensics and incident response : an intelligent way to respond to attacksent://SD_ILS/0/SD_ILS:22722552024-06-21T04:39:40Z2024-06-21T04:39:40Zby Johansen, Gerard, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4925642">Click to View</a><br/>Format: Electronic Resources<br/>Safety of web applications : risks, encryption and handling vulnerabilities with PHPent://SD_ILS/0/SD_ILS:22121092024-06-21T04:39:40Z2024-06-21T04:39:40Zby Quinton, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4840953">Click to View</a><br/>Format: Electronic Resources<br/>Understanding Bitcoin : Cryptography, Engineering and Economics.ent://SD_ILS/0/SD_ILS:12777492024-06-21T04:39:40Z2024-06-21T04:39:40Zby Franco, Pedro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1823060">Click to View</a><br/>Format: Electronic Resources<br/>Web Application Defender's Cookbook : Battling Hackers and Protecting Users.ent://SD_ILS/0/SD_ILS:12528732024-06-21T04:39:40Z2024-06-21T04:39:40Zby Barnett, Ryan C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1108733">Click to View</a><br/>Format: Electronic Resources<br/>Hacking For Dummies.ent://SD_ILS/0/SD_ILS:12526562024-06-21T04:39:40Z2024-06-21T04:39:40Zby Beaver, Kevin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106542">Click to View</a><br/>Format: Electronic Resources<br/>Information Assurance : Dependability and Security in Networked Systems.ent://SD_ILS/0/SD_ILS:11964582024-06-21T04:39:40Z2024-06-21T04:39:40Zby Qian, Yi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328312">Click to View</a><br/>Format: Electronic Resources<br/>Designing and Building Enterprise DMZs.ent://SD_ILS/0/SD_ILS:11958442024-06-21T04:39:40Z2024-06-21T04:39:40Zby Flynn, Hal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=319198">Click to View</a><br/>Format: Electronic Resources<br/>Virtual Private Networking : A Construction, Operation and Utilization Guide.ent://SD_ILS/0/SD_ILS:12099242024-06-21T04:39:40Z2024-06-21T04:39:40Zby Held, Gilbert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=470565">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Conflict : Competing National Perspectives.ent://SD_ILS/0/SD_ILS:12542592024-06-21T04:39:40Z2024-06-21T04:39:40Zby Ventre, Daniel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1124641">Click to View</a><br/>Format: Electronic Resources<br/>Spring security : secure your web applications, RESTful services, and microservice architecturesent://SD_ILS/0/SD_ILS:22301482024-06-21T04:39:40Z2024-06-21T04:39:40Zby Knutson, Mick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5165113">Click to View</a><br/>Format: Electronic Resources<br/>Tangled Web : A Guide to Securing Modern Web Applications.ent://SD_ILS/0/SD_ILS:12555872024-06-21T04:39:40Z2024-06-21T04:39:40Zby Zalewski, Michal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137574">Click to View</a><br/>Format: Electronic Resources<br/>CMS Security Handbook : The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone.ent://SD_ILS/0/SD_ILS:12289172024-06-21T04:39:40Z2024-06-21T04:39:40Zby Canavan, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706893">Click to View</a><br/>Format: Electronic Resources<br/>z/OS 1.6 Security Services Update.ent://SD_ILS/0/SD_ILS:13098442024-06-21T04:39:40Z2024-06-21T04:39:40Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306453">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux Network Scanning Cookbook.ent://SD_ILS/0/SD_ILS:12757822024-06-21T04:39:40Z2024-06-21T04:39:40Zby Hutchens, Justin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1771381">Click to View</a><br/>Format: Electronic Resources<br/>Secure Computer and Network Systems : Modeling, Analysis and Design.ent://SD_ILS/0/SD_ILS:11986442024-06-21T04:39:40Z2024-06-21T04:39:40Zby Ye, Nong.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=351427">Click to View</a><br/>Format: Electronic Resources<br/>z/OS Diagnostic Data : Collection and Analysis.ent://SD_ILS/0/SD_ILS:13101612024-06-21T04:39:40Z2024-06-21T04:39:40Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306770">Click to View</a><br/>Format: Electronic Resources<br/>SSL and TLS : theory and practiceent://SD_ILS/0/SD_ILS:22119622024-06-21T04:39:40Z2024-06-21T04:39:40Zby Oppliger, Rolf, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4821279">Click to View</a><br/>Format: Electronic Resources<br/>Docker security : using containers safely in productionent://SD_ILS/0/SD_ILS:23166222024-06-21T04:39:40Z2024-06-21T04:39:40Zby Mouat, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042297/?ar">https://learning.oreilly.com/library/view/~/9781492042297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042297/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042297/?ar</a><br/>Format: Electronic Resources<br/>Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsent://SD_ILS/0/SD_ILS:22768732024-06-21T04:39:40Z2024-06-21T04:39:40Zby Rehim, Rejah, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594304">Click to View</a><br/>Format: Electronic Resources<br/>Group theoretic cryptographyent://SD_ILS/0/SD_ILS:22705022024-06-21T04:39:40Z2024-06-21T04:39:40Zby González Vasco, María Isabel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1619960">Click to View</a><br/>Format: Electronic Resources<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:654372024-06-21T04:39:40Z2024-06-21T04:39:40Zby Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Implementing DirectAccess with Windows Server 2016ent://SD_ILS/0/SD_ILS:23117672024-06-21T04:39:40Z2024-06-21T04:39:40Zby Hicks, Richard M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484220597/?ar">https://learning.oreilly.com/library/view/~/9781484220597/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484220597/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220597/?ar</a><br/>Format: Electronic Resources<br/>Nessus Network Auditing : Jay Beale Open Source Security Series.ent://SD_ILS/0/SD_ILS:11920792024-06-21T04:39:40Z2024-06-21T04:39:40Zby Beale, Jay.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294281">Click to View</a><br/>Format: Electronic Resources<br/>Managing Cisco network securityent://SD_ILS/0/SD_ILS:656932024-06-21T04:39:40Z2024-06-21T04:39:40Zby Danielyan, Edgar.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836562">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>How to hack like a legend : breaking windowsent://SD_ILS/0/SD_ILS:23341902024-06-21T04:39:40Z2024-06-21T04:39:40Zby Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098141431/?ar">https://learning.oreilly.com/library/view/~/9781098141431/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar">https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098141431">https://learning.oreilly.com/library/view/~/9781098141431</a><br/>Format: Electronic Resources<br/>Hack proofing Sun Solaris 8ent://SD_ILS/0/SD_ILS:656732024-06-21T04:39:40Z2024-06-21T04:39:40Zby Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Instant Spring Security Starter.ent://SD_ILS/0/SD_ILS:12601432024-06-21T04:39:40Z2024-06-21T04:39:40Zby Jagielski, Piotr.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1274894">Click to View</a><br/>Format: Electronic Resources<br/>Cisco Security Specialists Guide to PIX Firewall.ent://SD_ILS/0/SD_ILS:11919962024-06-21T04:39:40Z2024-06-21T04:39:40Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294036">Click to View</a><br/>Format: Electronic Resources<br/>Data networks routing, security, and performance optimizationent://SD_ILS/0/SD_ILS:656442024-06-21T04:39:40Z2024-06-21T04:39:40Zby Kenyon, Tony, 1960-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582715">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2002019364.html">http://www.loc.gov/catdir/description/els031/2002019364.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2002019364.html">http://www.loc.gov/catdir/toc/els031/2002019364.html</a><br/>Format: Electronic Resources<br/>Configuring Symantec AntiVirus Enterprise Edition.ent://SD_ILS/0/SD_ILS:11920062024-06-21T04:39:40Z2024-06-21T04:39:40Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294056">Click to View</a><br/>Format: Electronic Resources<br/>Nokia Network Security Solutions Handbook.ent://SD_ILS/0/SD_ILS:11920812024-06-21T04:39:40Z2024-06-21T04:39:40Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294289">Click to View</a><br/>Format: Electronic Resources<br/>Cisco Firepower Threat Defense (FTD) : configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP)ent://SD_ILS/0/SD_ILS:23143932024-06-21T04:39:40Z2024-06-21T04:39:40Zby Rajib, Nazmul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134679471">https://learning.oreilly.com/library/view/~/9780134679471</a>
<a href="https://learning.oreilly.com/library/view/~/9780134679471/?ar">https://learning.oreilly.com/library/view/~/9780134679471/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar">https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar</a><br/>Format: Electronic Resources<br/>Cisco next-generation security solutions : all-in-one Cisco ASA FirePOWER services, NGIPS, and AMPent://SD_ILS/0/SD_ILS:23110542024-06-21T04:39:40Z2024-06-21T04:39:40Zby Santos, Omar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134213071/?ar">https://go.oreilly.com/library-access/library/view/-/9780134213071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134213071/?ar">https://learning.oreilly.com/library/view/~/9780134213071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134213071">https://learning.oreilly.com/library/view/~/9780134213071</a><br/>Format: Electronic Resources<br/>Zero trust networks : building secure systems in untrusted networksent://SD_ILS/0/SD_ILS:23135952024-06-21T04:39:40Z2024-06-21T04:39:40Zby Gilman, Evan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491962183/?ar">https://learning.oreilly.com/library/view/~/9781491962183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491962183">https://learning.oreilly.com/library/view/~/9781491962183</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491962183/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962183/?ar</a><br/>Format: Electronic Resources<br/>Incident Response : a Strategic Guide to Handling System and Network Security Breaches.ent://SD_ILS/0/SD_ILS:22904762024-06-21T04:39:40Z2024-06-21T04:39:40Zby Schultz, E. Eugene, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1578702569/?ar">https://go.oreilly.com/library-access/library/view/-/1578702569/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1578702569/?ar">https://learning.oreilly.com/library/view/~/1578702569/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1578702569">https://learning.oreilly.com/library/view/~/1578702569</a><br/>Format: Electronic Resources<br/>Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipesent://SD_ILS/0/SD_ILS:4754252024-06-21T04:39:40Z2024-06-21T04:39:40Zby Fadyushin, Vyacheslav.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format: Electronic Resources<br/>Best Practices in Computer Network Defense : Incident Detection and Response.ent://SD_ILS/0/SD_ILS:12684532024-06-21T04:39:40Z2024-06-21T04:39:40Zby Hathaway, M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1637648">Click to View</a><br/>Format: Electronic Resources<br/>Cyber and you : the impact of technology on our livesent://SD_ILS/0/SD_ILS:22170812024-06-21T04:39:40Z2024-06-21T04:39:40Zby Kendal, Maureen, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5811334">Click to View</a><br/>Format: Electronic Resources<br/>Network security a practical approachent://SD_ILS/0/SD_ILS:659562024-06-21T04:39:40Z2024-06-21T04:39:40Zby Harrington, Jan L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123116338">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0623/2005040077-d.html">http://www.loc.gov/catdir/enhancements/fy0623/2005040077-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0623/2005040077-t.html">http://www.loc.gov/catdir/enhancements/fy0623/2005040077-t.html</a><br/>Format: Electronic Resources<br/>Aspects of Network and Information Security.ent://SD_ILS/0/SD_ILS:11992802024-06-21T04:39:40Z2024-06-21T04:39:40Zby Kranakis, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=363205">Click to View</a><br/>Format: Electronic Resources<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:642592024-06-21T04:39:40Z2024-06-21T04:39:40Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:213582024-06-21T04:39:40Z2024-06-21T04:39:40Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>What should go on the internet? : privacy, freedom, and security onlineent://SD_ILS/0/SD_ILS:20988752024-06-21T04:39:40Z2024-06-21T04:39:40Zby Engel, Mary, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4533280">Click to View</a><br/>Format: Electronic Resources<br/>Security Log Management : Identifying Patterns in the Chaos.ent://SD_ILS/0/SD_ILS:11860452024-06-21T04:39:40Z2024-06-21T04:39:40Zby Babbin, Jacob.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254833">Click to View</a><br/>Format: Electronic Resources<br/>ISO 37001 : an introduction to anti-bribery management systems : doing the right thingsent://SD_ILS/0/SD_ILS:21122852024-06-21T04:39:40Z2024-06-21T04:39:40Zby Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5211339">Click to View</a><br/>Format: Electronic Resources<br/>Network Security Assessment : From Vulnerability to Patch.ent://SD_ILS/0/SD_ILS:11895942024-06-21T04:39:40Z2024-06-21T04:39:40Zby Manzuik, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=280219">Click to View</a><br/>Format: Electronic Resources<br/>Innocent Code : A Security Wake-Up Call for Web Programmers.ent://SD_ILS/0/SD_ILS:11819202024-06-21T04:39:40Z2024-06-21T04:39:40Zby Huseby, Sverre H.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=210558">Click to View</a><br/>Format: Electronic Resources<br/>Advanced penetration testing for highly-secured environments.ent://SD_ILS/0/SD_ILS:21554832024-06-21T04:39:40Z2024-06-21T04:39:40Zby Allen, Lee, 1946- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4520648">Click to View</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection.ent://SD_ILS/0/SD_ILS:12684492024-06-21T04:39:40Z2024-06-21T04:39:40Zby Edwards, M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1637644">Click to View</a><br/>Format: Electronic Resources<br/>Digital Whoness : Identity, Privacy and Freedom in the Cyberworld.ent://SD_ILS/0/SD_ILS:12593082024-06-21T04:39:40Z2024-06-21T04:39:40Zby Capurro, Rafael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1215540">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise Business Portals II with IBM Tivoli Access Manager.ent://SD_ILS/0/SD_ILS:13101482024-06-21T04:39:40Z2024-06-21T04:39:40Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306757">Click to View</a><br/>Format: Electronic Resources<br/>Security Intelligence : A Practitioner's Guide to Solving Enterprise Security Challenges.ent://SD_ILS/0/SD_ILS:12800512024-06-21T04:39:40Z2024-06-21T04:39:40Zby Li, Qing.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1895130">Click to View</a><br/>Format: Electronic Resources<br/>Defense and Detection Strategies against Internet Worms.ent://SD_ILS/0/SD_ILS:11833692024-06-21T04:39:40Z2024-06-21T04:39:40Zby Nazario, Jose.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227660">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity essentialsent://SD_ILS/0/SD_ILS:23224822024-06-21T04:39:40Z2024-06-21T04:39:40Zby Brooks, Charles J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119362395/?ar">https://learning.oreilly.com/library/view/~/9781119362395/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar">https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:3432012024-06-21T04:39:40Z2024-06-21T04:39:40Zby Wiles, Jack.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209</a><br/>Format: Electronic Resources<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:656692024-06-21T04:39:40Z2024-06-21T04:39:40Zby Rash, Michael (Michael Brandon)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Mobile security and privacy : advances, challenges and future research directionsent://SD_ILS/0/SD_ILS:22107842024-06-21T04:39:40Z2024-06-21T04:39:40Zby Au, Man-Ho, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4689767">Click to View</a><br/>Format: Electronic Resources<br/>